[House Hearing, 112 Congress]
[From the U.S. Government Publishing Office]






  TEN YEARS AFTER 9/11: CAN TERRORISTS STILL EXPLOIT OUR VISA SYSTEM?

=======================================================================

                                HEARING

                               before the

                       SUBCOMMITTEE ON BORDER AND
                           MARITIME SECURITY

                                 of the

                     COMMITTEE ON HOMELAND SECURITY
                        HOUSE OF REPRESENTATIVES

                      ONE HUNDRED TWELFTH CONGRESS

                             FIRST SESSION

                               __________

                           SEPTEMBER 13, 2011

                               __________

                           Serial No. 112-43

                               __________

       Printed for the use of the Committee on Homeland Security
                                     






      Available via the World Wide Web: http://www.gpo.gov/fdsys/

                                _____

                  U.S. GOVERNMENT PRINTING OFFICE
72-930 PDF                WASHINGTON : 2012
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing 
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC 
area (202) 512-1800 Fax: (202) 512-2104  Mail: Stop IDCC, Washington, DC 
20402-0001








                     COMMITTEE ON HOMELAND SECURITY

                   Peter T. King, New York, Chairman
Lamar Smith, Texas                   Bennie G. Thompson, Mississippi
Daniel E. Lungren, California        Loretta Sanchez, California
Mike Rogers, Alabama                 Sheila Jackson Lee, Texas
Michael T. McCaul, Texas             Henry Cuellar, Texas
Gus M. Bilirakis, Florida            Yvette D. Clarke, New York
Paul C. Broun, Georgia               Laura Richardson, California
Candice S. Miller, Michigan          Danny K. Davis, Illinois
Tim Walberg, Michigan                Brian Higgins, New York
Chip Cravaack, Minnesota             Jackie Speier, California
Joe Walsh, Illinois                  Cedric L. Richmond, Louisiana
Patrick Meehan, Pennsylvania         Hansen Clarke, Michigan
Ben Quayle, Arizona                  William R. Keating, Massachusetts
Scott Rigell, Virginia               Kathleen C. Hochul, New York
Billy Long, Missouri                 Janice Hahn, California
Jeff Duncan, South Carolina
Tom Marino, Pennsylvania
Blake Farenthold, Texas
Mo Brooks, Alabama
            Michael J. Russell, Staff Director/Chief Counsel
               Kerry Ann Watkins, Senior Policy Director
                    Michael S. Twinchek, Chief Clerk
                I. Lanier Avant, Minority Staff Director
                                 ------                                

              SUBCOMMITTEE ON BORDER AND MARITIME SECURITY

                Candice S. Miller, Michigan, Chairwoman
Mike Rogers, Alabama                 Henry Cuellar, Texas
Michael T. McCaul, Texas             Loretta Sanchez, California
Paul C. Broun, Georgia               Sheila Jackson Lee, Texas
Ben Quayle, Arizona, Vice Chair      Brian Higgins, New York
Scott Rigell, Virginia               Hansen Clarke, Michigan
Jeff Duncan, South Carolina          Bennie G. Thompson, Mississippi 
Peter T. King, New York (Ex              (Ex Officio)
    Officio)

                      Paul Anstine, Staff Director
                   Diana Bergwin, Subcommittee Clerk
            Alison Northrop, Minority Subcommittee Director












                            C O N T E N T S

                              ----------                              
                                                                   Page

                               Statements

The Honorable Candice S. Miller, a Representative in Congress 
  From the State of Michigan, and Chairwoman, Subcommittee on 
  Border and Maritime Security:
  Oral Statement.................................................     1
  Prepared Statement.............................................     3
The Honorable Henry Cuellar, a Representative in Congress From 
  the State of Texas, and Ranking Member, Subcommittee on Border 
  and Maritime Security..........................................     5
The Honorable Bennie G. Thompson, a Representative in Congress 
  From the State of Mississippi, and Ranking Member, Committee on 
  Homeland Security..............................................     7

                               Witnesses

Mr. Thomas Winkowski, Assistant Commissioner, Office of Field 
  Operations, U.S. Customs and Border Protection, Department of 
  Homeland Security:
  Oral Statement.................................................    10
  Prepared Statement.............................................    11
Mr. Edward J. Ramotowski, Deputy Assistant Secretary, Acting, 
  Bureau of Consular Affairs, U.S. Department of State:
  Oral Statement.................................................    14
  Prepared Statement.............................................    16
Mr. John D. Cohen, Deputy Counter-Terrorism Coordinator, 
  Department of Homeland Security:
  Oral Statement.................................................    24
  Prepared Statement.............................................    25
Mr. Peter T. Edge, Deputy Associate Director, Homeland Security 
  Investigations, Immigration and Customs Enforcement, Department 
  of Homeland Security:
  Oral Statement.................................................    30
  Prepared Statement.............................................    32
Mr. Richard M. Stana, Director, Homeland Security and Justice, 
  Government Accountability Office:
  Oral Statement.................................................    36
  Prepared Statement.............................................    38

                                Appendix

The Honorable Henry Cuellar, a Representative in Congress From 
  the State of Texas, and Ranking Member, Subcommittee on Border 
  and Maritime Security:
  Slide..........................................................    53

 
  TEN YEARS AFTER 9/11: CAN TERRORISTS STILL EXPLOIT OUR VISA SYSTEM?

                              ----------                              


                      Tuesday, September 13, 2011

             U.S. House of Representatives,
                    Committee on Homeland Security,
              Subcommittee on Border and Maritime Security,
                                                    Washington, DC.
    The subcommittee met, pursuant to call, at 10:00 a.m., in 
Room 311, Cannon House Office Building, Hon. Candice S. Miller 
[Chairwoman of the subcommittee] presiding.
    Present: Representatives Miller, McCaul, Quayle, Rigell, 
Duncan, Cuellar, Clarke, and Thompson (ex officio).
    Also present: Representative Bilirakis.
    Mrs. Miller. I am going to call the hearing in order here 
this morning. Of course this is the Committee on Homeland 
Security, Subcommittee on Border and Maritime Security. I think 
we have a very interesting, interesting and critically 
important topic to discuss this morning. The title of our 
hearing is ``Ten Years After 
9/11: Can Terrorists Still Exploit Our Visa System?''
    We will be hearing testimony from a fantastic distinguished 
panel whom I will be introducing in a moment. As I make my 
opening statement you may want to take a look at some of the 
pictures that we are going to have up on the screen of various 
terrorists, murderers, cowards, cockroaches, however you want 
to categorize these individuals that overstayed their visas.
    So 2 days ago of course we commemorated the 10th 
anniversary of the devastating acts perpetrated by these 
cowardly terrorists who took the lives of nearly 3,000 of our 
fellow citizens. As a Nation most of us had not really heard 
before of al-Qaeda before that day despite their contributions 
which funded the 1993 attacks on the World Trade Center, fatwa 
that had declared war against our Nation in 1996, the bombing 
of our embassies in Kenya and Tanzania in 1998, and of course 
the bombing of the U.S.S. Cole in 2000. Despite these attacks 
we were really not prepared and certainly our countrymen paid a 
horrific price.
    In Article I, Section 8 we find the enumerated powers of 
Congress, and in the first paragraph of that section you find 
what, in my opinion, is certainly the first and foremost 
responsibility of the Federal Government, and that is to 
provide for the common defense. The very purpose of this 
committee is aligned with this principal responsibility of the 
Government and to guard against another attack.
    Photographs along our wall in this committee hearing room 
certainly remind us of our purpose to defeat al-Qaeda and like-
minded groups and to defend our homeland, which includes of 
course securing our borders.
    On that day in September we learned a very hard lesson as a 

9/11 Commission has noted. For terrorists, they said, travel 
documents are as important as weapons and four of the 9/11 
hijackers had overstayed visas, a missed opportunity to prevent 
the attacks.
    Since September 11, we have put a series of measures in 
place to strengthen our visa security process and today have a 
layered approach that begins overseas at the U.S. embassies and 
consulates around the world which pushes our border out to 
deter and prevent visa fraud and terrorists from obtaining 
travel documents. Immigration and Customs Enforcement agents 
and Customs and Border Protection officers are now stationed 
overseas to conduct additional background checks on prospective 
visa applicants. Certainly while this system is an improvement 
over what was in place before 9/11, it is by no means perfect. 
We will be exploring today what we can do to improve our 
system.
    Our enemies are intent on attacking our country and are 
actively seeking to avoid our countermeasures. Our job is to be 
one step ahead instead of constantly reacting to their last 
attack.
    In the case of the Christmas day bomber--I see his picture 
there--it certainly illustrates the lengths terrorists will go 
to thwart our security measures. The Christmas day bomber was 
known to the intelligence community. His father had approached 
the embassy in Nigeria with his concerns that his son may be 
involved in terrorism. But still he was able to fly on a valid 
U.S. visa. He tried to detonate his concealed explosive device 
7 minutes before the plane was to land in Detroit. Of course I 
reside in the Detroit area, fly in and out of that airport, 
just flew out of it yesterday, which would have placed that 
plane certainly over my Congressional district, over southeast 
Michigan. So I am especially interested to hear from our 
witnesses today about the progress we have made to ensure that 
another known person of concern cannot board an aircraft with a 
valid U.S. visa.
    Last week before the full committee, Ranking Member Cuellar 
and I were just talking, we heard from Representative Lee 
Hamilton and former Secretary Tom Ridge regarding the progress 
of the 9/11 Commission recommendations. The report recommended 
and Congress mandated a biometric exit program to ensure that 
foreign visitors have not overstayed their visa and have 
returned home. However, this administration has still not 
articulated the way forward on this vital program.
    The U.S. Visitor and Immigration Status Indicator 
Technology, or US-VISIT as they call it, captures foreign 
nationals' fingerprints at the port of entry and at U.S. 
consulates overseas in instances where the individual is 
traveling on a visa. The fingerprints are then recorded and 
compared with fingerprints already in the Federal database to 
check for immigration violators, criminals, and others wanted 
for violation of U.S. laws.
    In 2009, US-VISIT conducted an exit pilot project at the 
Detroit and Atlanta airports and generated 175 watch lists and 
more than 120 visa overstay hits. So I think if we are serious 
about controlling who comes into our Nation and preventing 
another attack, we need to get serious about an exit program. 
It has been more than 2 years since the pilot, and the 
Department again has yet to articulate a program or plan to 
move forward with a comprehensive exit plan in the air 
environment or elsewhere.
    More than just preventing terrorists from entering the 
country, the lack of a visa exit program inhibits our ability 
to control our border. I think it is an interesting statistic 
that in this country as we talk about illegal immigrants and 
how many are here in our country, it is interesting to note 
that it is theorized that about 40 percent of everyone who is 
here illegally didn't come across the border. They are here 
because of overstay of visas, 40 percent. That is a very 
startling number.
    Today there is a backlog of 757,000 unvetted visa overstay 
records. So we obviously have to do better than that, and I 
will be very interested as our hearing progresses about talking 
about this backlog, what we are doing to ensure that we don't 
have such as backlog in the future.
    ICE pursues only a small fraction of these visa 
overstayers. By not seriously enforcing visa overstays, we are 
sending a message that if you make it past the port of entry, 
the chances of us ever finding you are slim to none. ICE 
enforcement memos put an additional question mark over our 
enforcement efforts there.
    We do know that terrorists have a very strong affinity for 
using a student visa process to enter the country, as earlier 
this year a young man from Saudi Arabia purposely sought out a 
program that would allow him to come to the United States as a 
student. Then of course he has been accused of purchasing 
chemicals that he intended to use to construct an IED.
    So we have a lot of questions about this, and certainly our 
visa security process needs to be robust. We have to deny 
terrorists the freedom of movement because 10 years ago we saw 
what failure looked like very unfortunately on that horrific 
day which we all commemorated just this past Sunday.
    [The statement of Mrs. Miller follows:]
           Prepared Statement of Chairwoman Candice S. Miller
                           September 13, 2011
    Two days ago we commemorated the 10th anniversary of the 
devastating acts perpetrated by cowardly terrorists who took the lives 
of nearly 3,000 of our fellow citizens.
    As a Nation, most of us had not heard of al-Qaeda despite their 
financial contributions which funded the 1993 attacks on the World 
Trade Center, fatwa that declared war against our Nation in 1996, the 
bombing of our embassies in Kenya and Tanzania in 1998 and the bombing 
of the U.S.S. Cole in 2000. Despite these attacks, we were not 
prepared, and our countrymen paid the price.
    In Article I Section 8, we find the enumerated powers of Congress, 
and in the first paragraph of that section you find what is, in my 
opinion, the principal responsibility of the Federal Government--to 
provide for the common defense.
    The very purpose of this committee is aligned with the principal 
responsibility of the Government--to guard against another attack. 
Photographs along the wall here in the hearing room remind us of our 
purpose--to defeat al-Qaeda and like-minded groups and defend the 
homeland.
    On that day in September, we learned a hard lesson--as the 9/11 
Commission noted, ``For terrorists, travel documents are as important 
as weapons.'' Four of the 9/11 hijackers had overstayed visas--a missed 
opportunity to prevent the attacks.
    Since September 11 we have put a series of measures in place to 
strengthen our visa security process. Today, we have a layered approach 
that begins overseas at U.S. Embassies and Consulates around the world 
which pushes our border out to deter and prevent visa fraud, and 
terrorists from obtaining travel documents.
    Immigrations and Customs Enforcement agents and Customs and Border 
Protection officers are now stationed overseas to conduct additional 
background checks on prospective visa applicants.
    While this system is an improvement over what was in place before 
September 11, it is by no means perfect.
    Our enemies are intent on attacking our country, and are actively 
seeking to avoid our counter measures. Our job is to be one step ahead, 
instead of constantly reacting to their last attack.
    The case of Umar Farouk Abdulmutallab illustrates the lengths 
terrorists will go to thwart our security measures.
    The Christmas day bomber was known to the intelligence community, 
his father had approached the Embassy in Nigeria with his concerns that 
his son might be involved in terrorism, but he was able to fly on a 
valid U.S. visa.
    Abdulmutallab tried to detonate his concealed explosive device 7 
minutes before the plane was to land in Detroit--which would have 
placed that plane over my Congressional district. I am especially 
interested to hear from our witnesses about the progress we have made 
to ensure that another known person of concern cannot board an aircraft 
with a valid U.S. visa.
    The 9/11 Commission report recommended and Congress mandated a 
biometric exit program to ensure that foreign visitors have not 
overstayed their visa and have returned home.
    The U.S. Visitor and Immigrant Status Indicator Technology, or US-
VISIT captures foreign nationals' fingerprints at the port of entry and 
at U.S. Consulates overseas in instances where the individual is 
traveling on a visa. The fingerprints are then recorded and compared 
with fingerprints already in Federal databases to check for immigration 
violators, criminals, and others wanted for violations of U.S. laws.
    In 2009, US-VISIT conducted an exit pilot project at the Detroit 
and Atlanta airports and generated 175 watch list and more than 120 
visa overstays hits. However, full deployment of an exit program is 
being delayed due to space and infrastructure constraints, and the 
remaining question of how to limit disruption to the flow of people and 
commerce into the United States. The Bipartisan Policy Center 9/11 
Report Card lists this recommendation as ``unfulfilled''.
    If we are serious about controlling who comes into the Nation and 
preventing another 9/11 attack, we need to get serious about an exit 
program. It has been more than 2 years since the pilot and the 
Department has yet to articulate a plan to move forward with a 
comprehensive exit plan in the air environment or elsewhere.
    More than just preventing terrorists from entering the country, the 
lack of a visa exit program inhibits our ability to control the border. 
Nearly 40% of all illegal aliens do not sneak across the border in the 
dark of night; they walk through the front door, and never leave.
    Today, there is a backlog of 757,000 unvetted visa overstay 
records. We can and must do better than that. I will be interested in 
hearing about our progress on this backlog and what we are doing to 
ensure that we do not have such a backlog in the future.
    Immigration and Customs Enforcement pursues only a small fraction 
of these visa overstayers. By not seriously enforcing visa overstays, 
we are sending the message that if you make it past the port of entry, 
the chances of us ever finding you are slim to none.
    We know that terrorists have a strong affinity for using the 
student visa process to enter the county as earlier this year a young 
man from Saudi Arabia purposely sought out a program that would allow 
him to come to the United States as a student. He stands accused of 
purchasing chemicals he intended to use to construct an Improvised 
Explosive Device (IED).
    I am sure my colleague, Mr. Bilirakis will have some questions for 
the witnesses on the status of our efforts in this area.
    Our visa security process must be robust, and we must deny 
terrorists the freedom of movement because 10 years ago we saw what 
failure looked like.



    Mrs. Miller. At this time the Chairwoman would now 
recognize the Ranking Minority Member of the subcommittee, the 
gentleman from Texas, Mr. Cuellar, for his opening statement.
    Mr. Cuellar. Thank you, Chairwoman Miller, for holding this 
committee hearing. I also want to thank the Ranking Member of 
the full committee for the work that he has done in the past on 
this issue. I am pleased that the subcommittee is meeting today 
to examine the issues of visa security, which is particularly 
appropriate as we recently marked the tenth anniversary of the 
terrorist attacks of September 11, 2001.
    The 9/11 hijackers did not sneak into this country, did not 
cross a river, the Rio Grande, but rather entered the United 
States on visas. More recently the attempted bombing of an 
airline by Umar Farouk on Christmas day 2009 refocused 
attention on the vulnerabilities in the visa process.
    Since 2001, the Department of Homeland Security and 
Department of State, with direction from Congress, have taken 
important steps to strengthen visa security, including efforts 
to identify and enforce overstays, individuals who are admitted 
to the United States legally either with or without a visa but 
then overstay their authorized period of admission. Of the 
approximately 11.5 million to 12 million unauthorized resident 
alien populations, the most recent estimates proposed that it 
is about 33 to 48 percent are overstays. That is almost 50 
percent of all the people that got here, again I emphasize did 
not cross the Rio Grande but actually came in through a visa 
and overstayed.
    Five of the 19 September 11, 2001 hijackers were overstays. 
There should be no argument against about the vital importance 
of the work completed by the Immigration and Customs 
Enforcement, ICE, and the Counterterrorism and Criminal 
Exploitation Unit, the CTCEU, whose primary responsibility is 
overstay enforcement.
    In addition to the CTCEU overstay investigations, the 
primary responsibility for apprehending and removing overstays 
as well as aliens who did not have lawful immigration status 
rests with ICE, the Enforcement Removal Operation, the ERO. It 
is my understanding certain individuals subject to orders were 
removal from the United States are often delayed due to the 
respective host government relations with the United States and 
members.
    Madam Chairwoman, I will have a handout on this, an 
overhead to go over this, and ask the witnesses on this 
particular issue. Consequently host countries refuse to accept 
the return of the nationals or use lengthy delay tactics. I 
know this is an issue that I sat down with John Morton in the 
State Department trying to get the State Department to move a 
little faster on this particular issue. I look forward to 
hearing more from the State and GAO about the U.S. former 
relations with these recalcitrant countries and why visas 
continue to be issued to individuals from such countries, and 
at what rate and as well as recommended steps for improvement 
and actions being taken. Again, Members, I would ask you to 
look at this particular issue as we talk about this.
    Also within DHS and ICE, ICE has stood up a visa security 
unit, the VSUs, at high-risk visa issuing posts. It is my 
understanding, I might be wrong, but it is my understanding 
that historically there has been some tension between ICE and 
State regarding getting new VSUs established and hopefully we 
have gone beyond that turf battle. I hope to hear from the two 
agencies about whether they have made progress in overcoming 
those obstacles.
    Customs and Border Protection also plays an important role 
in preventing terrorist travel to the United States. They have 
established the Immigration Advisory Program Units at key 
overseas airports to help screen travelers to the United 
States. Also I visited the CBP's National Targeting Center and 
I have seen the good work that they are doing along with their 
interagency partners, prescreening individuals en route to the 
country.
    Many believe that given its security missions and resources 
DHS should play an even greater role in the visa processes. At 
a minimum we need to make most of our limited visa security 
resources and ensure that all agencies are doing their part.
    I look forward to hearing from our DHS and State witnesses 
about how their agencies can work cooperatively to prevent 
those who would seek to do us harm from traveling to the United 
States.
    It is worth noting that despite all the attention of the 
vulnerabilities along the Southern border, and again I 
emphasize to Members, an estimated 40 to 48 percent, as the 
Chairwoman said, of those currently in the United States 
illegally entered legally through the proverbial front door but 
have overstayed, again visas legally into the United States but 
overstayed, not crossing the Rio Grande.
    We know that the overwhelming majority of those who enter 
the country do so for legitimate purposes. Even those who enter 
the country illegally or enter legally but overstay the 
majority mean this country no harm. But nevertheless those 
people have overstayed and violated the law.
    However, a decade after 9/11 the fact remains that there 
are terrorists and others who seek to enter the United States 
for purposes to hurt us and our communities. So I look forward 
to a good, frank dialogue on this important Homeland Security 
matter, and I thank the Chairwoman Miller for holding this 
important hearing and the witnesses for joining us here today.
    Thank you.
    Mrs. Miller. I thank the gentleman. Before I recognize the 
Ranking Member of the full committee I would ask unanimous 
consent that the gentleman from Florida, Mr. Bilirakis, who is 
the Chair of the committee's Subcommittee on Emergency 
Preparedness, Response, and Communications, be permitted to sit 
on the dais and participate in today's hearing.
    Without objection, so ordered.
    At this time the Chairwoman would recognize the Minority 
Ranking Member of the full committee, the gentleman from 
Mississippi, Mr. Thompson, for his opening statement.
    Mr. Thompson. Thank you very much, Madam Chairwoman. I 
appreciate you holding this hearing. I also welcome our panel 
of witnesses.
    In the aftermath of the September 11 attacks, Congress 
recognized the importance of securing the visa process and 
required it to be used as a counterterrorism tool. Since that 
time the Departments of Homeland Security and State have made 
important strides toward better securing the visa and passenger 
prescreening processes for travelers to the United States, 
efforts including establishing visa security units at high-risk 
embassies and consulates, deploying immigration advisory 
program personnel at foreign airports and enhancing 
prescreening of airline passengers before they arrive in the 
United States. However, the attempted bombing of Northwest 
flight 253 on Christmas day 2009, by an individual with a valid 
U.S. visa served as a wake-up call about the persistent visa 
security vulnerabilities.
    During the 111th Congress, the Committee on Homeland 
Security and this subcommittee held hearings to examine the 
circumstances surrounding the attempted Christmas day bombing. 
From our examination of the chain of events leading up to the 
incident, it is clear that there were several failures that 
allowed the perpetrator to board the U.S.-bound flight.
    Today I look forward to hearing what progress has been made 
in closing those security gaps since that incident nearly 2 
years ago. I also hope to hear that DHS and the State 
Department have taken proactive measures to address possible 
emerging threats to visa security. I have long held that we 
must develop a layered security approach that pushes borders 
out and begins the screening process far in advance of a 
passenger boarding a flight in this country.
    Both DHS and the State Department have vital roles to play 
in this effort. Clearly defined responsibility and close 
coordination between the departments are essential to success. 
I want to hear from the witnesses today whether the turf 
battles between the departments are now a thing of the past or 
if they still linger. I certainly hope it is the former and not 
the latter.
    Of course these security efforts require appropriate 
personnel and resources and that in turn requires adequate 
funding. Members of Congress who talk a good game on border 
security will need to put their money where their mouths are 
when it comes to funding these programs, even in tight 
budgetary times.
    Just as we must ensure the security of the visa process for 
those entering the United States, we must also ensure 
individuals depart this country in a timely manner. As already 
indicated, over 40 percent of the persons unlawfully present in 
the United States enter this country legally and have 
overstayed. Among those millions of people may be a handful of 
those who seek to do us harm.
    In accordance with the 9/11 Commission recommendations, 
Congress has repeatedly required DHS to deploy a biometric 
entry-exit system under US-VISIT to attract visitors to the 
United States. Yet a decade after September 11, 2001, we are no 
closer to having such a system than we were on that fateful 
day. Some of us read the paper this morning and I guess 
somebody is going to tell us something new about that in this 
hearing. I look forward to hearing that. The lack of progress 
toward this mandate under this administration and its 
predecessors is simply unacceptable. I hope to hear from our 
witnesses about how DHS can fully fulfill our 9/11 Commission 
recommendations and Congressional mandates. We will never truly 
have visa security until an entry-exit system is completed.
    I thank the witnesses for being here today and I look 
forward to their testimony. I yield back.
    Mrs. Miller. I thank the gentleman for his comments. It is 
interesting to note that the administration is going to be 
making an announcement about this issue based on the fact that 
we are having a hearing about it. So I sometimes think it is 
exactly what Congress needs to be doing, exercising its 
oversight responsibilities to get some action on various 
things.
    What I will do is go through and read the bios of our very 
distinguished panel, and we appreciate you all coming. We can 
go through rather than interrupting each time.
    First Mr. Thomas Winkowski, who is the Assistant 
Commissioner from the Office of Field Operations, U.S. Customs 
and Border Protection, Department of Homeland Security, was 
appointed the Assistant Commissioner in August 2007. He is 
responsible for operations at 20 major field offices, 331 ports 
of entry, 58 operational container security initiative ports, 
and 15 preclearance stations in Canada, Ireland, the Caribbean. 
Previously he served as Director of Field Operations in Miami, 
where he was responsible for managing all inspectional 
operations at the Miami International Airport and the seaport, 
Port Everglades, Fort Lauderdale International Airport, and 
West Palm Beach and Key West as well.
    Then we will hear from Mr. Edward Ramotowski, who is the 
Deputy Assistant Secretary, Acting, Bureau of Consular Affairs, 
the U.S. Department of State. He assumed his current position 
as Managing Director of Visa Services at the U.S. Department of 
State in August 2009, and in that position he oversees the visa 
office in Washington, DC, two domestic processing centers, as 
well as visa operations at over 200 U.S. embassies and 
consulates abroad. From August 2006 to July 2009 he served as 
principal officer at the U.S. Consulate General in Guadalajara, 
Mexico. He has previously worked as a Special Assistant to the 
Assistant Secretary of State for Consular Affairs, Chief of the 
Consular Section of the U.S. Embassy in Nassau, Bahamas and the 
U.S. Council in Warsaw, Poland.
    Then we will hear from Mr. John Cohen, who is the Deputy 
Counterterrorism Coordinator, Department of Homeland Security. 
He serves as the Principal Deputy Coordinator for 
Counterterrorism at the U.S. Department of Homeland Security, 
and as the Senior Advisor on Counterterrorism, Law Enforcement 
and Information Sharing. He has also served as the Senior 
Advisor to the Program Manager for the Information Sharing 
Environment, Office of the Director of National Intel, where he 
authored and coordinated the implementation of key components 
of the National Strategy for Information Sharing.
    Peter Edge, the Deputy Associate Director, Homeland 
Security Investigations, Immigration and Customs Enforcement, 
Department of Homeland Security, began his law enforcement 
career in 1986 in Essex County, New Jersey Prosecutor's Office, 
prior to his selection as a Special Agent was with the U.S. 
Customs Service in Newark, New Jersey. In 2005, Mr. Edge was 
promoted to the position of Assistant Special Agent in Charge 
of the SAC New York office where he lead high-profile 
investigative components such as the El Dorado Task Force, the 
New York High Intensity Financial Crime Area, JFK International 
Airport, and the Immigration Division. Today he serves as the 
Deputy Associate Director of Homeland Security Investigations 
for the U.S. Immigration And Customs Enforcement.
    Then we will hear from Mr. Richard Stana, we welcome him 
back to the committee again, the Director of the Homeland 
Security and Justice, Government Accountability Office. During 
his 27-year career with the GAO, he has directed reviews on a 
wide variety of complex domestic and military issues while 
serving in headquarters, field, and overseas offices. Most 
recently he has directed GAO's work relating to immigration, 
customs law enforcement, drug control corrections, court 
administration, and election system.
    So you can see we have a very, very distinguished panel. We 
will begin with Mr. Winkowski. The floor is yours, sir, for 
your prepared testimony.

 STATEMENT OF THOMAS WINKOWSKI, ASSISTANT COMMISSIONER, OFFICE 
   OF FIELD OPERATIONS, U.S. CUSTOMS AND BORDER PROTECTION, 
                DEPARTMENT OF HOMELAND SECURITY

    Mr. Winkowski. Good morning, Chairwoman Miller, Ranking 
Member Cuellar, and distinguished Members of the subcommittee. 
Thank you for the opportunity to appear today to discuss CBP's 
visa security efforts.
    Since its establishment in 2001, the National Targeting 
Center's priority mission has been to provide tactical 
targeting and analytical research support for CBP's 
antiterrorism efforts. The NTC develops tactical data and 
actual intelligence to prevent high-risk travelers and goods 
from entering the United States.
    Centralized NTC targeting endeavors combined with 
interagency collaboration as well as robust partnerships with 
our foreign counterparts ensure a coordinated response to 
terrorists in National security events.
    CBP works in coordination and collaboration with a number 
of Government agencies with broad authorities, robust 
capabilities, and missions that are complimentary for other 
Nation's security. Each agency's unique capability and 
resources leverage DHS's layered risk management approach to 
safeguarding U.S. borders.
    A few critical examples of this, Chairwoman Miller, the NTC 
coordinates with the terrorist screening center to resolve 
every terrorist screening database encounter. We work closely 
with the State Department to enhance visa security. As a 
result, the State Department has revoked more than 1,000 visas 
based on CBP's vetting results and recommendations.
    ICE has collocated visa security personnel at the National 
Targeting Center to augment and expand current operations. We 
are collaborating with TSA in the private sector on an air 
cargo advanced screening pilot which was implemented following 
the October 2010 attempts by extremists to ship explosive 
devices in their cargo shipments.
    Additionally, CBP has information-sharing agreements with 
foreign partners, including Canada, the United Kingdom, New 
Zealand, and Australia.
    On an average day CBP processes nearly 1 million travelers 
at our ports of entry. The challenge faced by CBP each day is 
rapidly and accurately identifying those individuals that pose 
a threat to the United States and prevent their entry into the 
country. CBP takes action at a number of points in the travel 
continuum.
    In the area of visa and visa waiver program security, while 
the State Department is responsible for visa issuance, CBP has 
partnered with the State Department to ensure the visa issuance 
and travel process. In March 2010 we implemented a system that 
vets all visas on a continuous basis.
    Under the Visa Waiver Program and the Electronic System for 
Travel Authorization, ESTA, we conduct enhanced vetting on Visa 
Waiver Program applicants in advance of travel. As you recall, 
that was a 9/11 Commission recommendation.
    In the area of predeparture screening, CBP now conducts 
predeparture screening of all travelers prior to boarding 
flights bound for the United States. When the NTC identifies a 
high-risk traveler through this process, we coordinate with our 
immigration advisory program offices that are located in 8 
airports around the world or our regional carry liaison group 
which is located in three areas in the United States, in 
Honolulu, JFK Airport, and Miami International Airport, to 
resolve the issues or recommend to the carrier that a traveler 
not be boarded.
    Now as a result of these efforts 100 percent of travelers 
on all flights arriving at and departing from the United States 
are checked against Government databases prior to boarding a 
flight. In fiscal year 2011, CBP made more than 2,000 no-board 
recommendations to carriers. In the area of outbound in 
addition to predeparture screening of inbound travelers, we 
have also enhanced our outbound screening efforts. As a result 
CBP has notable success in identifying and preventing the 
departure of the Time Square bomber in May 2010 as well as a 
suspected serial killer that was departing Atlanta airport in 
August 2010.
    In closing, CBP is continuing proactively looking for 
solutions to threats to the homeland identified by 
operationalizing intelligence through real-time targeting, 
officer screening, and data sharing. Partnering with our 
agencies and nations, effectively extending our borders and 
exchanging information, makes this a truly global fight again 
terror.
    Our future state should include additional screening 
processes and methods to make this protection a greater reality 
so the American public remains safe. Chairwoman Miller, Ranking 
Member Cuellar, and Members of the subcommittee thank you for 
the opportunity to testify. I look forward to answering your 
questions.
    [The statement of Mr. Winkowski follows:]
                 Prepared Statement of Thomas Winkowski
                           September 13, 2011
    Chairwoman Miller, Ranking Member Cuellar, and distinguished 
Members of the subcommittee, thank you for the opportunity to appear 
today to discuss the good work of U.S. Customs and Border Protection 
(CBP) related to ensuring and enforcing security measures implemented 
since the attacks of September 11, 2001. I appreciate the committee's 
leadership and your commitment to helping ensure the security of the 
American people.
                cbp's role in multiple layers of defense
    CBP and, more broadly, Department of Homeland Security (DHS) 
continually refine our risk-based and layered approach to security, 
focusing our resources on the greatest vulnerabilities, extending our 
borders outward, and interdicting threats before they reach the United 
States. DHS, in cooperation with our interagency and foreign partners, 
is now screening people and goods earlier in the travel process. With 
more advanced and better quality data than ever before, we now employ 
an extensive network of research and analysis well before a traveler 
applies for admission at a U.S. port of entry.
    Depending on the traveler's point of origin and travel and entry 
document requirements, the screening process can begin in a number of 
ways: With the application for a visa, application for electronic 
travel authorization, purchase of an airline ticket, or arrival at a 
foreign airport or domestic port of entry. At each step along the way, 
CBP, in cooperation with other Government agencies and commercial 
carriers, reviews information about the traveler, including their 
documents, their effects, and/or their responses to questions, prior to 
arrival at a U.S. port of entry. Several Federal agencies are 
responsible for different aspects of our aviation security, while other 
countries and the private sector--particularly the air carriers--also 
have important roles to play. These multiple layers of defense across 
departments and agencies secure the aviation sector and ensure the 
safety of the traveling public.
    The foiled plot to bring liquid explosives onboard U.S.-bound 
flights from the United Kingdom in 2006, the attempted bombing of 
Northwest Flight 253 on December 25, 2009, the failed Times Square 
bombing in May 2010, and the attempts to mail explosive devices within 
printer cartridges from Yemen in October 2010 are all powerful 
illustrations that terrorists continue to try to overcome security 
measures we have enacted since September 11, 2001.
    CBP continually evaluates and supplements existing security 
measures with additional enhancements to strengthen our ability to 
identify and prevent the international travel of mala fide travelers 
and cargo. The success of these additional security measures depends in 
great part on our ability to gather, share, and respond to information 
in a timely manner--using both strategic intelligence to identify 
existing and emerging threat streams, and tactical intelligence to 
perform link analysis and targeted responses.
CBP and Intelligence
    As part of our efforts to screen passengers bound for the United 
States, CBP uses the U.S. Government's consolidated terrorist watch 
list, specifically, the Terrorist Screening Database (TSDB), managed by 
the Terrorist Screening Center. In addition, we use additional relevant 
information from the intelligence community to determine whether 
someone may be a risk to a flight, requires further screening and 
investigation, should not be admitted, or should be referred to 
appropriate law enforcement personnel.
    Further, CBP's Office of Intelligence and Investigative Liaison 
(OIIL), which serves as the situational awareness hub for CBP, provides 
timely and relevant information along with actionable intelligence to 
operators and decision-makers and improving coordination of CBP-wide 
operations. Through prioritization and mitigation of emerging threats, 
risks, and vulnerabilities, OIIL helps CBP to better function as an 
intelligence-driven operational organization and turns numerous data 
points and intelligence into actionable information for CBP officers 
and analysts.
National Targeting Center
    The National Targeting Center (NTC) is another key tool for DHS in 
analyzing, assessing, and making determinations based on the TSDB and 
other intelligence information. The NTC is a 24/7 operation, 
established to provide tactical targeting information aimed at 
interdicting terrorists, criminal actors, and contraband at the 
earliest point. CBP's Automated Targeting System (ATS) is a decision-
support tool crucial to the operation of the NTC and is a primary 
platform used by DHS to match travelers, conveyances, and shipments 
against law enforcement information and known patterns of illicit 
activity.
Safeguards for Visas and Travel
    One of the initial layers of defense in securing air travel is 
preventing dangerous persons from obtaining visas, travel 
authorizations, and boarding passes. Before boarding a flight destined 
for the United States or arriving at a U.S. port of entry, most foreign 
nationals need to obtain a visa--issued by a U.S. embassy or 
consulate--or, if they are eligible to travel under the Visa Waiver 
Program (VWP), they must apply for a travel authorization issued 
through the Electronic System for Travel Authorization (ESTA).\1\
---------------------------------------------------------------------------
    \1\ Exceptions would be citizens of countries under other visa 
exempt authority, such as Canada. Citizens of countries under visa 
exempt authority entering the U.S. via air are subjected to CBP's 
screening and inspection processes prior to departure. In the land 
environment, they are subjected to CBP processing upon arrival at a 
U.S. port of entry.
---------------------------------------------------------------------------
    The Department of State (DOS) is responsible for visa issuance. DOS 
also screens all visa applicants' biographic data against the DOS 
Consular Lookout and Support System, which includes entries that alert 
consular officers to the existence of TSDB files, for records related 
to potential visa ineligibilities and checks their biometric data 
(i.e., fingerprints and facial images) against other U.S. Government 
databases for records indicating potential security, criminal, and 
immigration violations prior to the issuance of the visa. For 
individuals traveling under the VWP, CBP operates ESTA, a web-based 
system through which individuals must apply for travel authorization 
prior to traveling to the United States. Through ESTA, CBP conducts 
enhanced vetting of VWP applicants in advance of travel to the United 
States in order to assess whether they could pose a risk to the United 
States or the public at large. Additionally, through interactive 
communications with CBP, air carriers are required to verify that VWP 
travelers have a valid authorization before boarding an aircraft bound 
for the United States.
Pre-departure Vetting
    CBP can also gather information and assess risk at the point of 
travel booking. CBP conducts pre-departure and outbound screening for 
all international flights arriving into and departing from the United 
States. This works in concert with the Transportation Security 
Administration's Secure Flight program, which vets 100 percent of 
passengers flying to, from, and within the United States against the No 
Fly and Selectee portions of the known or suspected terrorist watch 
list, or TSDB. The NTC uses a variety of data sources and automated 
enforcement tools to perform its function. The process starts when a 
traveler purchases a ticket for travel to the United States; a 
Passenger Name Record (PNR) may be generated in the airline's 
reservation system. PNR data contains various elements, including 
information on itinerary, co-travelers, changes to the reservation, and 
payment information. CBP receives PNR data from the airline at various 
intervals beginning 72 hours prior to departure and concluding at the 
scheduled departure time.
    CBP uses the Automated Targeting System (ATS) to then evaluate the 
PNR data against ``targeting rules'' that are based on law enforcement 
data, intelligence information, and past case experience. ATS allows 
CBP to identify and interdict travelers with potential nexus to 
transnational crime, including terrorism, narcotics trafficking, and 
human smuggling.
    The traveler's check-in provides the next opportunity in the travel 
process for CBP to gather information and assess risk. On the day of 
departure, when an individual checks in for his or her intended flight, 
the basic biographic information from the individual's passport is 
collected by the air carrier and submitted to CBP's Advance Passenger 
Information System (APIS). Carriers are required to verify the APIS 
against the traveler's government-issued travel document and provide 
the data to DHS at least 30 minutes before departure, or up to the time 
of securing the doors if using APIS Quick Query, for all passengers and 
crew on board.\2\ APIS data contains important identifying information 
that is not included in PNR data, including verified identity and 
travel document information such as a traveler's date of birth, 
citizenship, and travel document number. DHS vets APIS information on 
all international flights to and from the United States against the 
TSDB, as well as against criminal history information, records of lost 
or stolen passports, public health records, and prior immigration or 
customs violations and visa refusals. APIS is also connected to 
Interpol's lost and stolen travel document database for routine queries 
on all foreign passports used for check-in.
---------------------------------------------------------------------------
    \2\ APIS is the electronic data interchange for air carrier 
transmissions of electronic passenger, crew member, and non-crew member 
manifest data.
---------------------------------------------------------------------------
    Another layer in the vetting process is the Immigration Advisory 
Program (IAP), which stations CBP officers at eight foreign airports in 
six countries in coordination with the host foreign governments. 
Officers are deployed to these key transit hubs and work with border 
control authorities, foreign law enforcement agencies, and air carriers 
to identify known or suspected terrorists and other high-risk travelers 
and assist in preventing them from boarding aircraft destined for the 
United States. CBP officials at the NTC support IAP by screening all 
travelers against the TSDB, including the subset No Fly list, ESTA 
denials, visa revocations, public health lookouts, lost and stolen 
passport records, and all State Department records for persons 
identified as actually, or likely, having engaged in terrorist 
activity. At IAP locations, CBP officers can make ``no board'' 
recommendations to carriers and host governments regarding passengers 
bound for the United States who may constitute security risks, but 
officers do not have the authority to arrest, detain, search, or 
prevent passengers from boarding planes. Those authorities lie with the 
host government.
    After the attempted bombing on December 25, 2009, CBP expanded on 
the NTC's IAP pre-departure screening efforts to include screening at 
all foreign airports with direct flights departing to the United States 
to identify and assess risks prior to travel and prevent the boarding 
of high-risk travelers. When pre-departure screening identifies a 
potential high-risk traveler, the NTC confirms the information through 
vetting procedures, and then coordinates the issuance of ``no board'' 
recommendations to carriers via the nearest ICE or CBP Attache, Air 
Carrier Security Office, and the CBP Regional Carrier Liaison Group. 
Now, as a result of these efforts, 100 percent of travelers on all 
flights arriving at and departing from the United States are checked 
against Government databases prior to boarding a flight. During fiscal 
year 2011 to date, pre-departure screening by the NTC has kept more 
than 2,000 high-risk or otherwise inadmissible travelers from boarding 
flights destined for the United States.
    In March 2010, the NTC implemented a new program to conduct 
continuous vetting of U.S. nonimmigrant visas that have been recently 
issued, revoked, and/or denied. The continuous vetting ensures that 
changes in a traveler's visa status are identified in near real-time, 
allowing CBP to immediately determine whether to provide a ``no board'' 
recommendation to a carrier or recommend that DOS revoke the visa, or 
whether additional notification should take place for individuals 
determined to be within the United States. If a violation is 
discovered, and the person is scheduled to travel to the United States, 
CBP will request that DOS revoke the visa and recommend that the 
airline not board the passenger. If no imminent travel is identified, 
and derogatory information exists that would render a subject 
inadmissible, CBP will coordinate with DOS for a prudential visa 
revocation. If the subject of an existing visa revocation initiated by 
the DOS or recommended by CBP is found to be in the United States, CBP 
will notify the ICE Counterterrorism and Criminal Exploitation 
Enforcement Unit for further action as appropriate.
    Additionally, ICE has co-located Visa Security Program (VSP) 
personnel at the NTC to augment and expand current operations. ICE 
special agents and intelligence analysts conduct thorough analysis and 
in-depth investigations of high-risk visa applicants. The focus of the 
VSP and NTC are complementary: The VSP is focused on identifying 
terrorists and criminal suspects and preventing them from exploiting 
the visa process and reaching the United States, while the NTC provides 
tactical targeting and analytical research in support of preventing 
terrorist and terrorist weapons from entering the United States. The 
co-location of VSP personnel at the NTC has helped increase both 
communication and information sharing.
Vetting While En Route to the United States and Upon Arrival
    While flights are en route to the United States, CBP continues to 
evaluate the updated APIS and PNR information submitted by the 
airlines. Based on the information garnered during the in-flight 
analysis, as well as the CBP officer's observations at the port of 
entry, a determination is made as to whether the traveler should be 
admitted to the United States following primary inspection or referred 
for a secondary inspection.
                               conclusion
    As this committee no doubt knows, we live in a world of ever-
evolving risks, and we must move as deftly as possible to identify and 
fix security gaps and to anticipate future vulnerabilities. CBP will 
continue to work with our colleagues within DHS, and with DOS, and the 
intelligence community to address these challenges.
    Chairwoman Miller, Ranking Member Cuellar, and Members of the 
subcommittee, thank you for this opportunity to testify. I look forward 
to answering your questions.

    Mrs. Miller. Thank you very much. The Chairwoman now 
recognizes Mr. Ramotowski for his comments and his testimony.

STATEMENT OF EDWARD J. RAMOTOWSKI, DEPUTY ASSISTANT SECRETARY, 
  ACTING, BUREAU OF CONSULAR AFFAIRS, U.S. DEPARTMENT OF STATE

    Mr. Ramotowski. Good morning, Madam Chairwoman, Ranking 
Member Cuellar, and distinguished Members of the subcommittee. 
As a 25-year veteran of the United States Foreign Service, it 
is an honor to testify before you just 2 days after our Nation 
marked such a somber event, the 10-year anniversary of the 9/11 
attacks. My colleagues and I in the Foreign Service in the 
State Department will never forget that day, and we are fully 
determined to ensure that such a tragedy does not occur again.
    My focus today is on how the Department of State reformed 
the visa process in the 10 years since 9/11 to eliminate 
loopholes for terrorists to exploit our system, as well as 
additional measures the Department undertook in response to the 
December 25, 2009 attempted airline bombing.
    Today visa processing rests on a multi-layered approach to 
security, what we refer to as the five pillars, technological 
advances, biometric innovations, personal interviews, 
interagency data sharing, and intensive training. All of these 
pillars supported the Department's response to the Christmas 
day incident and we are continually refining and improving them 
to deal with constantly evolving threat.
    Among the key measures taken, we improved our visa Viper 
terrorist information reporting program, by directing all 
chiefs of mission to ensure that it was working effectively at 
all their posts and instructing consular officers to include 
complete information about the U.S. visa status of any 
individuals included in Viper reporting.
    As a second critical step, we issued new instructions to 
officers on visa revocation procedures, and we enforced 
standing guidance on their discretionary authority to deny 
visas under Section 214(b) of the Immigration and Nationality 
Act with specific reference to cases that raise security and 
other serious concerns.
    We also created a dedicated revocation unit in Washington 
that is focused exclusively on ensuring that any derogatory 
information on a U.S. visa holder is rapidly evaluated and 
acted upon.
    As another step, we improved the capability of consular 
systems to match visa records against new and emerging 
derogatory information, to support the revocation process in 
appropriate cases. We employ sophisticated name searching 
algorithms to ensure matches to derogatory information 
contained in the millions of records in our lookout system. We 
use our authority to immediately revoke a visa in circumstances 
where we believe there is an imminent threat.
    The continuous vetting of the database of issued visas by 
the Department and our partner agencies helps ensure that new 
derogatory information that arises after visa issuance is 
rapidly analyzed for revocation purposes.
    Let me briefly turn to the overall visa security and the 
five-pillar system we have in place today. Before any visa is 
issued the applicant's fingerprints are screened against DHS 
and FBI databases. We use facial recognition technology to 
screen visa applicants against a watch list of photos obtained 
from the terrorist screening center as well as visa applicant 
photos contained in our own consular consolidated database.
    Our new on-line visa application forms have the potential 
to provide consular and fraud prevention officers as well as 
our intelligence and law enforcement partners the opportunity 
to analyze data in advance of a visa interview, including the 
detection of potential nonbiographic links to derogatory 
information. We have ambitious plans to screen more of this 
data with our partner agencies to make the visa system even 
more secure.
    We also invest heavily in our people. Each consular officer 
completes the basic consular course and receives continuing 
advanced education in interviewing and name-checking techniques 
throughout his or her career. Language fluency and area and 
culture knowledge are other important skill sets that consular 
officers use daily to improve the adjudication of visas.
    We work closely with our partners to ensure that no 
terrorist receives a visa or is admitted into our country. Our 
vast database of visa information is fully available to other 
agencies and we have specifically designed our systems to 
facilitate comprehensive data sharing. In return we have 
unprecedented levels of cooperation with law enforcement and 
intelligence agencies and benefit from their capabilities and 
resources in ways that were not possible at the time of 9/11 or 
even on Christmas day 2009.
    Distinguished Members of the committee, our current layered 
approach to border security screening in which each agency 
applies its particular strengths and expertise best serves our 
border security agenda while furthering traditional U.S. 
interest in legitimate travel, trade promotion, and exchange of 
ideas. The United States must meet both goals to guarantee our 
long-term security.
    Thank you and I welcome your questions.
    [The statement of Mr. Ramotowski follows:]
               Prepared Statement of Edward J. Ramotowski
                           September 13, 2011
    Good afternoon Madame Chairwoman Miller, Ranking Member Cuellar, 
and distinguished Members of the committee. I thank you for this 
opportunity to update you on the steps we have taken to increase the 
security of the visa process.
    The Department of State (the ``Department'') is dedicated to the 
protection of our borders, and has no higher priority than the safety 
of our fellow citizens. We are the first line of defense in border 
security because the Department is often the first Government agency to 
have contact with foreign nationals wishing to visit the United States. 
We are committed, along with our partner agencies, to a layered 
approach to border security that will enable the U.S. Government to 
track and review the visa eligibility and status of foreign visitors 
from their visa applications throughout their travel to, sojourn in, 
and departure from, the United States.
         corrective actions implemented after december 25, 2009
    After the December 25, 2009 attempted terrorist attack on Northwest 
flight 253, the President ordered corrective steps to address 
identified weaknesses in the systems and procedures we use to protect 
the people of the United States. In the months following the attack, we 
reviewed our requirements for reporting potential terrorists who are 
not applying for visas, which fall under our ``Visas Viper'' program, 
as well as visa issuance and revocation criteria, and we introduced 
technological and procedural enhancements to facilitate and strengthen 
visa-related business processes.
    Our immediate focus was on the deficiencies identified following 
the attempted attack on flight 253 by Umar Farouk Abdulmutallab. On the 
day following his father's November 2009 visit to the U.S. Embassy in 
Abuja, Nigeria, the Embassy sent a Visas Viper cable to the Department 
and the Washington intelligence and law enforcement community, stating 
that Abdulmutallab may be involved with Yemeni-based extremists. In 
sending the cable and checking State Department records to determine 
whether Abdulmutallab had a visa, Embassy officials misspelled his 
name, and as a result of that misspelling, information about previous 
visas issued to him, and the fact that he held a valid U.S. visa, was 
not included in the cable.
    At the same time, the Consular Section entered Abdulmutallab's name 
into the Consular Lookout and Support System (CLASS), our on-line 
database of lookout information. This correctly spelled CLASS lookout 
was shared automatically with the primary lookout system used by the 
Department of Homeland Security (DHS) and accessible to other agencies. 
On the basis of this CLASS entry, DHS's U.S. Customs and Border 
Protection (CBP) determined, after the flight departed Amsterdam, that 
Abdulmutallab warranted secondary screening upon arrival in Detroit. 
Additional reporting on this case carried the correct spelling, with 
additional reports reaching the necessary agencies in Washington.
    To address the deficiencies identified in that review, including 
our concerns with the Visas Viper process, we took immediate action to 
improve the procedures and content requirements for Visas Viper cable 
reporting. We directed all Chiefs of Mission to ensure that the Visas 
Viper program functioned effectively at their posts, and that all 
appropriate agencies and offices at post contributed relevant 
information for Viper nominations. We instructed consular officers to 
include complete information about all previous and current U.S. visas 
in Visas Viper cables. The guidance cable included specific 
instructions on methods to comprehensively and intensively search the 
database of visa records so that all pertinent information is obtained. 
We also issued new instructions to officers regarding procedures and 
criteria used to revoke visas and reiterated guidance on consular 
officers' use of the discretionary authority to deny visas under 
section 214(b) of the Immigration and Nationality Act (INA), with 
specific reference to cases that raise security and other concerns. 
Instruction in appropriate use of this authority has been a fundamental 
part of officer training for several years.
    In addition to changes in standard procedures for searching visa 
records, we immediately began working to refine the capability of our 
current systems, with a particular focus on matching records of 
currently valid visas against new and emerging derogatory information, 
to support visa revocation in appropriate cases. For visa applications, 
we employ strong, sophisticated name-searching algorithms to ensure 
matches between names of visa applicants and any derogatory information 
contained in the 42 million records found in CLASS. This robust 
searching capability, which takes into account variations in spelling, 
has been central to our procedures since automated lookout system 
checks were mandated following the 1993 World Trade Center bombing. We 
constantly use our significant and evolving experience with searching 
mechanisms for derogatory information to improve the systems for 
checking our visa issuance records.
    CLASS has grown more than 400 percent since 2001--largely as a 
result of improved data sharing among the Department, Federal law 
enforcement agencies, and the intelligence community. Almost 70 percent 
of CLASS records come from other agencies, including information from 
the FBI, DHS, DEA, and the intelligence community. CLASS also includes 
unclassified records regarding known or suspected terrorists (KSTs) 
from the Terrorist Screening Database, which is maintained by the 
Terrorist Screening Center (TSC) and contains unclassified data on KSTs 
nominated by all U.S. Government sources. We automatically run all 
applicants' names against the Department's Consular Consolidated 
Database (CCD), which holds our historical visa records, as part of our 
on-going commitment to optimizing the use of our systems to detect and 
respond to derogatory information regarding visa applicants and visa 
holders. A system-specific version of the automated CLASS search 
algorithm runs the names of all visa applicants against the CCD to 
check for any prior visa applications, refusals, or issuances.
    The Department has been continuously matching new threat 
information with our records of existing visas since 2002. We have long 
recognized this function as critical to the way we manage our records 
and processes. This system of continual vetting evolved as post-9/11 
reforms were instituted, and is now performed in cooperation with the 
TSC. All records added to the Terrorist Screening Database are checked 
against the CCD to determine if there are matching visa records. 
Matches are sent electronically from the Department to TSC, where 
analysts review the hits and flag cases for possible visa revocation. 
In addition, we have widely disseminated our data to other agencies 
that may wish to learn whether a subject of interest has a U.S. visa.
    Cases for revocation consideration are forwarded to the Department 
by our consular offices overseas, CBP's National Targeting Center 
(NTC), and other entities. As soon as information is established to 
support a revocation (i.e., information that could lead to an 
inadmissibility determination), a ``VRVK'' entry code showing the visa 
revocation is added to CLASS, as well as to biometric identity systems, 
and then shared in near-real time (within about 15 minutes) with the 
DHS lookout systems used for border screening. As part of its enhanced 
``Pre-Departure'' initiative, CBP uses these VRVK records, among other 
lookout codes, to recommend that airlines should not board certain 
passengers on flights bound for the United States. Almost every day, we 
receive requests to review and, if warranted, revoke any outstanding 
visas for aliens for whom new derogatory information has been 
discovered since the visa was issued. Our Operations Center is staffed 
24 hours a day, 7 days a week, to address urgent requests, such as when 
a potentially dangerous person is about to board a plane. In those 
circumstances, the State Department can and does use its authority to 
revoke the visa, and thus prevent boarding.
    The Department has broad and flexible authority to revoke visas and 
we use that authority widely to protect our borders. Since 2001, the 
Department has revoked approximately 60,000 visas for a variety of 
reasons, including nearly 5,000 for suspected links to terrorism; 1,451 
of those occurring since the attempted attack on December 25, 2009. 
Following that incident, we reviewed the last 10 years of Visas Viper 
nominations, as well as ``P3B'' entries (potentially ineligible for a 
visa due to suspected ties to terrorism) in CLASS to determine whether 
Visas Viper subjects were properly watch listed, and to determine the 
visa status of all P3B subjects. The Department's Visa Office completed 
a review of all 2001-2010 data and revoked 30 visas.
    Most revocations are based on new information that has come to 
light after visa issuance. Because individuals' circumstances change 
over time, and people who once posed no threat to the United States can 
become threats, revocation is an important tool. We use our authority 
to revoke a visa immediately in circumstances where we believe there is 
an immediate threat. At the same time, we believe it is important not 
to act unilaterally, but to coordinate expeditiously with our National 
security partners in order to avoid possibly disrupting important 
investigations.
                 a more secure visa application process
    The Department constantly refines and updates the technology that 
supports the adjudication and production of U.S. visas. Under the 
Biometric Visa Program, before a visa is issued, the visa applicant's 
fingerprints are screened against DHS's Automated Biometric 
Identification System (IDENT), which has a watch list containing 
available fingerprints of terrorists, wanted persons, and immigration 
law violators; and against the FBI's Integrated Automated Fingerprint 
Identification System (IAFIS), which contains more than 50 million 
criminal history records. More than 10,000 matches of visa applicants 
with records on the IDENT watch list are returned to posts every month, 
normally resulting in visa refusals. In 2010, IAFIS returned more than 
57,000 criminal arrest records to posts. The Biometric Visa Program 
partners with the DHS US-VISIT Program to enable CBP officers at ports 
of entry to match the fingerprints of persons entering the United 
States with the fingerprints that were taken during visa interviews at 
overseas posts and transmitted electronically to DHS IDENT. This 
biometric identity verification at ports of entry has greatly enhanced 
CBP officers' ability to identify photo-substituted visas and the use 
of valid visas by imposters.
    We also use facial recognition technology to screen visa applicants 
against a watch list of photos of known and suspected terrorists 
obtained from the FBI's TSC, as well as the entire gallery of visa 
applicant photos contained in our CCD. Facial recognition screening has 
proven to be another effective way to combat identity fraud.
    The Consular Electronic Application Center (CEAC) is another major 
technological advance. CEAC is an electronic platform where applicants 
submit visa applications and photos via the internet, eliminating 
paperwork, decreasing visa application and adjudication times, and 
reducing the number of forms applicants must complete. The worldwide 
roll out of the on-line DS-160 nonimmigrant visa application form is 
complete, and we are currently piloting the on-line DS-260 immigrant 
visa application form. These new on-line forms provide consular and 
fraud officers the opportunity to analyze data in advance of the 
interview, enhancing their ability to make decisions, and soon will 
afford intelligence and law enforcement agencies opportunities to 
analyze visa application data before applicants appear for their 
interviews. The on-line forms offer foreign language support; however, 
applicants are required to answer in English, to facilitate information 
sharing between the Department and other Government agencies. The new 
application forms are ``smart,'' meaning that certain answers to 
questions will trigger subsequent questions. The system will not accept 
applications if the security-related questions have not been fully 
answered, and ``irregular'' answers are flagged to ensure that consular 
officers address them in the interview.
    In April 2011, we greatly enhanced the way we track visa fraud. We 
globally deployed a tool called the Enterprise Case Assessment Service 
that provides a platform to store fraud-related research that used to 
be stored outside of consular systems. This new tool associates fraud-
related information with visa records, making it available to consular 
officials around the world. Should fraud be confirmed during the course 
of a visa interview, consular officers can record that data in this new 
tool, where it can be easily referenced if the individual attempts to 
re-apply for a visa. Future iterations of this tool will track fraud in 
other consular services, such as U.S. passport applications, and will 
enable us to track the activities of third-party document vendors and 
visa fixers. We hope soon to be able to share this new data source with 
our U.S. Government partners to enhance interagency cooperation on 
fraud prevention.
                   student and exchange visitor visas
    I am aware that the Members of this committee have a keen interest 
in the processing of student and exchange visitor visas. Consular 
processing of these visa classes follows the same sequence of 
clearances as the other visa classifications, including collection of 
biometrics and submission of the on-line DS-160 form. All CLASS and 
other security checks apply.
    In addition, in order for an applicant to demonstrate that he/she 
is qualified to apply for a student or exchange visitor visa, the 
applicant must have been issued specific documentation, in addition to 
what is required for other visas classes, and present it to the 
consular officer at the time of interview. A student, for instance, 
must have been issued a Form I-20A-B by the school he/she will attend 
in order to apply for an F-1 student visa (or for dependants, an F-2 
visa), or a Form I-20M-N if the student has been accepted at a 
vocational school. In order to qualify for an exchange visitor visa (J-
1, dependent J-2), the applicant must present a Form DS-2019 issued by 
the designated sponsor of one of the 15 categories of exchange visitor 
programs.
    Upon acceptance to the chosen educational institution or 
organization, the student or exchange visitor is assigned a unique ID 
number in the Student and Exchange Visitor Information System (SEVIS), 
a DHS database. The individual retains the same number throughout his 
or her educational career.
    For an applicant to be found eligible for an F, M, or J visa, the 
student must meet the requirements specific to student or exchange 
visitor status (accepted at a school authorized by DHS to issue the 
Form I-20, pursuing a degree or certificate with sufficient finances, 
etc.) necessary to participate in the type of program chosen. In 
addition, the student must demonstrate the intent to engage only in 
approved activities for the visa class, the ability to meet the 
financial requirements of the activity undertaken, and demonstrate a 
present intent to depart the United States upon the completion of the 
chosen activity.
                                training
    Consular officers are trained to take all necessary steps during 
the course of making a decision on a visa application to protect the 
United States and its citizens. Every consular officer is required to 
complete the Department's Basic Consular Course at the National Foreign 
Affairs Training Center prior to performing consular duties. The course 
places strong emphasis on border security, featuring in-depth 
interviewing and name-checking technique training, as well as fraud 
prevention. Throughout their careers, consular officers receive 
continuing education in all of these disciplines to ensure they 
integrate the latest regulations and technologies into their 
adjudicatory decisions.
    To augment this training and strengthen the security of the visa 
program, in early 2010 the Department launched a program to provide 
consular officers overseas with enhanced security clearances. This 
allows them to participate more fully in posts' review of security 
issues that bear on the issuance of passports and visas, and the 
protection of U.S. citizens traveling and living abroad. In the past 
few months, a concerted push on this project resulted in the tripling 
of the number of highly-cleared consular officers (to more than 150) in 
key positions at high-threat posts. The Office of Counterintelligence 
and Consular Support, in the Bureau of Intelligence and Research, has 
increased its efforts to identify relevant reporting for review by 
those consular officers.
                       security advisory opinions
    The Department's Security Advisory Opinion (SAO) mechanism provides 
consular officers with the necessary advice and background information 
to adjudicate cases of visa applicants with possible terrorism 
ineligibilities. Consular officers receive extensive training on the 
SAO process, including modules on cultural and religious naming 
conventions, which assists them in identifying applicants who require 
additional Washington vetting. The SAO process requires the consular 
officer to suspend visa processing pending interagency review of the 
case and additional guidance. Most SAOs are triggered by clear and 
objective circumstances, such as nationality, place of birth, 
residence, or visa name check results. In addition, in cases where 
reasonable grounds exist regardless of name check results, consular 
officers may suspend visa processing and institute SAO procedures if 
they suspect that an applicant may be inadmissible under the security 
provisions of the INA.
                       the visa security program
    The Department of State believes that the Visa Security Program 
(VSP), under which DHS deploys U.S. Immigration and Customs Enforcement 
(ICE) special agents to conduct visa security screening and 
investigations at certain overseas consular posts, is a valuable 
component of the U.S. Government's overall policy of protecting our 
borders. We have a close and productive partnership with DHS, which has 
authority for visa policy under section 428 of the Homeland Security 
Act, and are fully supportive of the mission and future of the VSP, as 
well a number of data-sharing arrangements.
    The VSP increases the utility of the visa application and interview 
processes to detect and combat terrorism, criminality, and other 
threats to the United States and the traveling public. ICE special 
agents assigned to Visa Security Units provide timely and valuable on-
site vetting of visa applications and other law enforcement support to 
our consular officers. We work very closely with DHS to ensure that no 
terrorist receives a visa or is admitted into our country.
    Reports from our posts with ICE visa security operations suggest 
that, as the VSP has matured over the past few years, ICE special 
agents have, where resources permit, moved beyond a singular focus on 
visa application review. They have been able to contribute their 
expertise and resources to enhance our response to all kinds of threats 
to the visa and immigration processes--terrorism, human smuggling and 
trafficking, and trafficking in a wide variety of contraband. As 
reported by one of our missions, ``(i)n addition to their concerns with 
visa security, [ICE special agents'] efforts have also led to arrests 
and indictments in the areas of child pornography and countering the 
proliferation of controlled technology. This is a win-win 
partnership.''
    In Washington, we work very closely with our VSP colleagues on day-
to-day issues affecting the operations of the program, as well as 
longer-term issues related to the expansion of the program to select 
overseas posts. VSP special agents in Washington review our visa 
databases and advise posts of emerging information about visa holders. 
Another important aspect of our Washington partnership is the 
resolution of issues raised as the VSP expands to more posts. In 
January 2011, the Department's Bureaus of Consular Affairs (CA) and 
Diplomatic Security (DS) concluded a Memorandum of Understanding (MOU) 
with ICE. This MOU governs VSP-Department of State interactions within 
visa sections, procedures for resolving the very few disputed visa 
cases that emerge from the VSP review process, and collaboration 
between ICE special agents and their DS law enforcement colleagues 
assigned as Regional Security Officers (RSOs) or Assistant Regional 
Security Officer Investigators (ARSO-Is) assigned to consular sections.
    Under the umbrella of section 428 of the Homeland Security Act and 
the implementing Memorandum of Understanding between the Departments of 
State and Homeland Security, we work together to resolve cases. When 
warranted, DHS special agents assigned to the VSP will conduct 
targeted, in-depth reviews of individual visa applications and 
applicants prior to issuance, and recommend refusal or revocation of 
applications to consular officers. We work with DHS to ensure that 
terrorists do not receive visas and to expeditiously revoke visas as 
appropriate.
    The Department works collaboratively with DHS, pursuant to an 
October 2004 MOU between the Department and the VSP on the 
``Administrative Aspects of Assigning Personnel Overseas,'' and 
National Security Decision Directive 38 (NSDD-38). This directive 
outlines factors to be considered by Chiefs of Mission when considering 
requests by a U.S. Government agency to create a new position at a post 
abroad. NSDD-38 gives Chiefs of Mission responsibility for the size, 
composition, and mandate of U.S. Government agency staff under his or 
her authority.
    Currently, there are 19 visa-issuing posts in 15 countries with an 
ICE VSP presence. Before submitting an NSDD-38 request, ICE officials, 
with the support of senior State Department officers from CA and DS, 
conduct a post-specific, on-site assessment. The visit provides an 
opportunity for the team to consult with officials at post to validate 
the interagency assessment of the risk environment, determine the 
feasibility and timing of establishing an office, and brief the Chief 
of Mission on the role of the VSP.
                   layered security and data sharing
    The Department embraces a layered approach to security screening. 
In addition to our support of the VSP, over the past 7 years the 
Department and DHS have increased resources significantly, improved 
procedures, and upgraded systems devoted to supporting the visa 
function. DHS receives all of the information collected by the 
Department during the visa process. DHS's US-VISIT is often cited as a 
model in data sharing because the applicant information we provide, 
including fingerprint data, is checked at ports of entry to confirm the 
identity of travelers. DHS has broad access to our entire CCD, which 
contains more than 143 million records, related to both immigrant and 
nonimmigrant visas, covering the last 13 years. A menu of reports 
tailored to the specific needs of each particular unit is supplied to 
elements within DHS such as ICE's agents assigned to conduct visa 
security investigations overseas.
    We make all of our visa information available to other U.S. 
Government agencies for law enforcement and counterterrorism purposes, 
and we specifically designed our systems to facilitate comprehensive 
data sharing with these entities. We give other agencies immediate 
access to more than 13 years of visa data for these purposes, and they 
use this access extensively. For example, in May 2011, over 23,000 
officers from DHS, the Department of Defense (DoD), the FBI, DOJ, and 
the Department of Commerce submitted nearly 2 million queries on visa 
records in the course of conducting law enforcement and/or 
counterterrorism investigations.
    Working in concert with DHS, we have proactively expanded biometric 
screening programs and integrated this expansion into existing overseas 
facilities. In partnership with DHS and the FBI, we have established 
the largest biometric screening program on the globe. We were a pioneer 
in the use of facial recognition techniques and remain a leader in 
operational use of this technology. Currently, more than 146 million 
images are enrolled in our facial recognition database. In 2009, we 
expanded use of facial recognition from a selected segment of visa 
applications to all visa applications, and we are now expanding our use 
of this technology to passport records. We are testing use of iris 
recognition technology in visa screening, making use of both identity 
and derogatory information collected by DOD. These efforts require 
intense on-going cooperation from other agencies. We have successfully 
forged and continue to foster partnerships that recognize the need to 
supply accurate and speedy screening in a 24/7 global environment. As 
we implement process and policy changes, we are always striving to add 
value in both border security and in operational results. Both 
dimensions are important in supporting the visa process.
    In addition, every post that issues visas has a fraud prevention 
officer and locally employed staff devoted specifically to fraud 
prevention and document security. We have a large Fraud Prevention 
Programs office in Washington, which works closely with DS, and we have 
fraud screening operations using sophisticated database checks at both 
the Kentucky Consular Center in Williamsburg, Kentucky, and the 
National Visa Center in Portsmouth, New Hampshire. Their role in 
flagging questionable applications and applicants who lack credibility, 
present fraudulent documents, or give us false information adds a 
valuable dimension to our visa process.
    DS adds an important law enforcement element to the Department's 
visa procedures. There are currently 75 ARSO-I positions approved for 
73 consular sections overseas specifically devoted to maintaining the 
integrity of the process. In 2010, DS approved 48 additional ARSO-I 
positions to work in consular sections overseas. They are complemented 
by officers working domestically on both visa and passport fraud 
criminal investigations and analysis. These highly-trained law 
enforcement professionals add another dimension to our border security 
efforts.
    The multi-agency team effort, based upon broadly-shared 
information, provides a solid foundation for securing our borders. The 
interagency community continues to automate processes to reduce the 
possibility of human error while at the same time enhancing our border 
security screening capabilities.
    We face an evolving threat of terrorism against the United States. 
The people and the tools we use to address this threat must be 
sophisticated and agile and must take into account the cultural and 
political environment in which threats arise. Our officers must be 
well-trained, motivated, and knowledgeable. Information obtained from 
these tools must be comprehensive and accurate. Our criteria for taking 
action must be clear and coordinated. The team we use for this mission 
must be the best. The Department has spent years developing the tools 
and personnel needed to properly execute the visa function overseas and 
remains fully committed to fulfilling its essential role on the border 
security team.
                  training foreign passport officials
    As part of our fraud prevention efforts, CA is working with the 
International Narcotics and Law Enforcement Affairs (INL) Bureau 
through INL's International Law Enforcement Academy (ILEA) network to 
provide passport anti-fraud training to officials from foreign passport 
issuance agencies.
    The first class was piloted September 7-9, 2011 in El Salvador, for 
officials from various Central American countries. The training is 
designed to improve the integrity of other countries' passport issuance 
by helping them institute organizations, processes, and procedures for 
detecting fraudulent passport applications as part of their 
adjudication and issuance processes.
    We plan to offer this training in 2012 at the ILEAs in Botswana and 
again in El Salvador.
               foreign partner capacity-building programs
    The Department regularly engages our foreign partners bilaterally, 
regionally, and on a multilateral basis to address the issue of 
terrorist transit. This engagement involves a range of activities, 
including the exchange of information in a variety of security 
channels, the execution of capacity-building programs on border and 
document security, the provision of border screening programs like the 
Terrorist Interdiction Program/Personal Identification Secure 
Comparison and Evaluation System (TIP/PISCES), and regular 
consultations on broader issues. Our capacity-building efforts are 
intended to foster regional cooperation and collaboration, whether 
through participation in organized regional groupings, such as the 
Trans-Sahara Counterterrorism Partnership, which facilitate regional 
training and exercises, or through assistance programs, such as the 
Regional Security Initiative (RSI), which funds regional 
Counterterrorism (CT) training and cooperative efforts across all CT 
priority regions.
    The Department works in close coordination with the interagency 
community for the development and implementation of the full range of 
CT programming, through a range of fora. In addition to participation 
in regular National Security Council-led meetings, we have established 
mechanisms, such as the aforementioned RSI, which brings together our 
Embassy leadership with the full range of interagency representatives 
to discuss key issues of regional concern. This is replicated at the 
working level through the Regional Interagency Consultative Group. In 
North Africa, as already noted, we also have the Trans-Sahara 
Counterterrorism Partnership, through which State, DoD, and USAID 
cooperate and coordinate efforts to strengthen the counterterrorism 
capacity of our regional partners. The success of this approach has led 
to consideration of a similar construct for other regions. In addition 
to coordination through formal structures, we cooperate informally on a 
regular basis with the Departments of Defense, Justice, Homeland 
Security, and the Treasury on our counterterrorism efforts across the 
board.
            u.s. government efforts to stop terrorist travel
    The U.S. Government has many programs designed to thwart terrorist 
travel around the world. Many portions of the U.S. Government play a 
critical role in stopping terrorist travel--DHS and its components, 
DoD, the law enforcement and intelligence communities, and State 
Department consular officers.
    U.S. passports and visas contain sophisticated security features 
that make them very difficult to forge. The electronic chips in our 
passports and the machine readable lines on our visas employ some of 
the most sophisticated technical security measures available. State 
Department consular officers work with our partners from CBP and ICE to 
train foreign border and airline personnel in the detection of 
fraudulent travel documents. The Department's Office of the Coordinator 
for Counterterrorism (S/CT) also helps foreign partners at risk for 
terrorist activity to establish their own computerized stop-list 
systems via the TIP/PISCES program.
    In the additionally critical areas of international travel document 
security and interoperability, we have intensified our work. With 
passport-issuing authorities of International Civil Aviation 
Organization (ICAO) member States around the globe, we have striven to 
ensure that, as with the U.S. ePassport, other issuing authorities meet 
internationally established standards for security and 
interoperability. This has included the cooperative and growing use of 
the Public Key Directory (PKD), which is centrally managed and overseen 
by a board of actively participating ICAO member states. The PKD is a 
directory used by a receiving state to verify the digital signature 
used by a travel document's issuing authority, thereby authenticating 
the passport in real time.
    The ePassports, which we have been issuing since December 2005, 
introduce a new class of security feature to identity documents: A 
digital signature. The validation of a signature guarantees that the 
chip contents, which include the facial image, are genuine and belong 
to the physical document. Only on this basis can it be proven that a 
specific ePassport was issued to the person that claims to be the 
rightful owner. The ICAO PKD is integral to the effort to have an 
efficient and commonly-accepted means of sharing and updating digital 
signatures (public keys) used by the world's ePassport-issuing 
authorities.
    Where validation using the ICAO PKD occurs during travel, whether 
at points of embarkation, transit, or upon entry, it provides much 
greater levels of assurance than are currently possible with 
traditional machine-readable travel documents. Border inspectors will 
be better able to identify inadequately documented travelers. Border 
inspectors worldwide can, in effect, assist the issuing authority in 
enhancing the integrity of all ePassports.
    The benefits of the ICAO PKD increase exponentially as the number 
of States participating, and the number of ePassports in circulation, 
increase. Participating States and entities stand to benefit most, 
because their participation in the ICAO PKD maximizes global coverage 
of validation of their travel documents.
    Electronically reading the PKI adds a third level of security for 
biometric passports, joining visual/tactile and laboratory features of 
the document, and scanner reading of the biometric content. This 
combination of features constitutes a tool bag for CBP officers to use 
in verifying the authenticity of the person and his/her passport when 
entering the United States.
    The U.S. Government's advanced information-sharing initiatives 
ensure that we and our international partners are in constant contact 
regarding the threat of terrorist travel. CBP's use of Advance 
Passenger Information (API) and Passenger Name Record (PNR) data are 
valuable tools in detecting travel patterns and co-travelers of 
terrorist suspects. The U.S. Government's agreements with foreign 
partners under Homeland Security Presidential Directive (HSPD) 6 allow 
us to share terrorist screening information with trusted partners, in 
order to interdict known and suspected terrorists.
    We also have entered into arrangements for the sharing of visa 
information with foreign governments, consistent with the requirements 
of section 222(f) of the INA. Since 2003, there have been arrangements 
in place with Canada for such sharing under certain circumstances. With 
DHS, the Department is participating in a pilot program, through the 
Five Country Conference (United States, Australia, Canada, New Zealand, 
and the United Kingdom) for identification of travelers based on 
biometric matching in some individual cases. We are in negotiation with 
the governments of Canada and the United Kingdom for agreements that 
would provide a legal basis for us to implement arrangements for the 
automated sharing of visa refusal data and for systematic confirmation 
of an applicant's identity through biometric matching. These 
arrangements would be limited to information regarding nationals of 
third countries. We expect both agreements to be completed this year, 
and similar agreements with Australia and New Zealand in 2012.
    The Department plays a key role in all of these international 
initiatives. With our partners at the TSC, we negotiate the HSPD-6 
agreements overseas. We are a close partner with DHS in API and PNR 
discussions overseas, in particular with respect to the current talks 
with the European Union on PNR. Together, all of these programs are 
helping achieve the goal of constraining terrorist mobility. This is 
our obligation to the American people.
                               conclusion
    We believe that U.S. interests in legitimate travel, trade 
promotion, and educational exchange are not in conflict with our border 
security agenda and, in fact, further that agenda in the long term. Our 
long-term interests are served by continuing the flow of commerce and 
ideas that are the foundations of prosperity and security. Acquainting 
people with American culture and perspectives remains the surest way to 
reduce misperceptions about the United States. Fostering academic and 
professional exchanges keeps our universities and research institutions 
at the forefront of scientific and technological change. We believe the 
United States must meet both goals to guarantee our long-term security.
    Our global presence, foreign policy mission, and personnel 
structure give us singular advantages in executing the visa function 
throughout the world. Our authorities and responsibilities enable us to 
provide a global perspective to the visa process and its impact on U.S. 
National interests. The issuance and refusal of visas has a direct 
impact on our foreign relations. Visa policy quickly can become a 
significant bilateral problem that harms broader U.S. interests if 
handled without consideration for foreign policy equities. The conduct 
of U.S. visa policy has a direct and significant impact on the 
treatment of U.S. citizens abroad. The Department of State is in a 
position to anticipate and weigh all those factors, while ensuring 
border security as our first priority.
    The Department has developed and implemented an intensive visa 
application and screening process requiring personal interviews, 
employing analytic interview techniques, incorporating multiple 
biographic and biometric checks, all supported by a sophisticated 
global information technology network. We have visa offices in 
virtually every country of the world, staffed by consular officers 
drawn from the Department's professional, mobile, and multilingual 
cadre of Foreign Service Officers. These officials are dedicated to a 
career of worldwide service, and provide the cultural awareness, 
knowledge, and objectivity to ensure that the visa function remains the 
frontline of border security. Each officer's experience and individual 
skill set are enhanced by an overall understanding of the political, 
legal, economic, and cultural development of foreign countries in a way 
that gives the Department of State a special expertise over matters 
directly relevant to the full range of visa ineligibilities.
    This concludes my testimony today. I will be pleased to take your 
questions.

    Mrs. Miller. Thank you very much. The Chairwoman now 
recognizes Mr. Cohen for his testimony.

      STATEMENT OF JOHN D. COHEN, DEPUTY COUNTERTERRORISM 
          COORDINATOR, DEPARTMENT OF HOMELAND SECURITY

    Mr. Cohen. Thank you, Chairwoman Miller, Ranking Member 
Cuellar, Mr. Thompson, Members of the subcommittee. Thank you 
for the opportunity to be here today to discuss efforts to 
prevent terrorists from exploiting our visa system. As you have 
heard and as you pointed out yourself, through a combination of 
expanded and recurrent vetting of visa applicants, visa 
holders, as well as improved capabilities that I will describe 
in just a bit of vetting potential overstays, the ability of 
terrorists to exploit our visa systems has been greatly 
diminished.
    Over the past 3 years Secretary Napolitano has made it a 
top priority for the Department through ICE, the efforts of ICE 
and CBP and US-VISIT, and our headquarters elements to improve 
our ability to vet prior to departure those traveling to the 
United States on visa or waiver country. We have made 
significant progress in leveraging the vast holdings of the 
intelligence community, the law enforcement community, and 
improve the information sharing and operational coordination 
between law enforcement, intelligence community, and those 
responsible for protecting our borders.
    Today what I am about to describe is the next step in that 
process, because we have embarked on an effort to automate data 
queries that in the past were carried out through manual 
database checks. This is important because in many respects a 
big part of the problem and one of the main reasons that we had 
what were commonly referred to as backlog was because of the 
time-consuming nature that these database queries required. By 
interlinking immigration, National security, and law 
enforcement information systems, and better using intelligence-
driven targeting capabilities such as those used at the 
National Targeting Center and through the automated targeting 
system, we have and will continue to bring greater efficiencies 
to this process, and this will allow for more effective use of 
personnel involved in investigations and analysis.
    You referred to earlier, Madam Chairwoman, to the 1.2--
750,000 records that had been unvetted. We began with 1.6 
million records and through an initiative began earlier this 
year that involved CBP, ICE, US-VISIT, NCTC, and others we were 
able to eliminate from that 1.6 million records approximately 
800,000 records that we were able to determine had actually 
departed the country or had changed their immigration status.
    That left approximately 839,000 records that we were then 
able to vet through the holdings of the NTC and leveraging 
CBP's technical capabilities through a variety of law 
enforcement databases. Each one of those 839,000 records has 
been vetted from a National security and public safety 
perspective. Let me repeat that, the entire set of records in 
that 839,000 data set has been vetted from the National 
security and public safety perspective. Through this process, 
this automated and manual process, we have been able to provide 
to ICE, CTCEU, and ICE investigations several thousand 
additional leads which they have fully vetted, fully 
investigated and are in the process of completing their 
investigative processes. This was a significant milestone. We 
learned from that effort that we could do more to automate the 
process. Over the next 6 to 12 months you will see a number of 
improvements. We will further enhance our ability to prevent an 
onerous, suspected terrorist from exploiting the visa system or 
visa waiver program because we will be bringing automated 
processes to our ability to determine the location and the 
immigration status. We are seeking to eliminate to the greatest 
degree possible all of those manual database checks that are 
carried out in this country, that are carried out by visa 
security agents abroad. We will improve US-VISIT's ability to 
determine whether a person is in overstay status and quickly 
identify and forward to ICE investigators overstays are of a 
National security or public safety concern.
    We will incorporate and enhance vetting capability that 
aggregates information for multiple systems into a unified 
electronic dossier, reducing the need for US-VISIT researchers 
and ICE agents to review multiple systems. We will be able to 
provide Congress country-by-country data on percentages of 
nationals who have overstayed their period of admission. We 
will establish a more complete, enhanced biographic exit system 
which includes expanded use of biometric data collected and 
retained in law enforcement immigration and DOD systems.
    In addition to providing enhanced biographic exit 
capability, we will have established the foundation for a 
biometric exit capability. As resources become available and 
biometric collection technology continues to mature in the 
coming years, we will integrate those advances into this 
biographic exit foundation.
    We are looking to leverage, as I pointed out, the same 
architecture into the visa protection program, allowing ICE to 
bring analytic responsibilities back home here to the United 
States, thereby allowing agents abroad to be more focused on 
investigative activities.
    I appreciate again the opportunity to be here today, and I 
look forward to answering any questions. Thank you.
    [The statement of Mr. Cohen follows:]
                  Prepared Statement of John D. Cohen
                           September 13, 2011
                              introduction
    Chairwoman Miller, Ranking Member Cuellar, and distinguished 
Members, I am pleased to appear before you to outline the efforts of 
the Department of Homeland Security (DHS) to both prevent terrorists 
from entering the United States and ensure that our Visa System is 
secure.
    I am testifying today in my role as the Principal Deputy 
Coordinator for Counterterrorism (CT) at the Department. In this 
capacity, I will address the Department's efforts to enhance the 
security of the Visa System, and also discuss the creation and 
evolution of the CT Coordination functions at DHS. In addition, I will 
describe specific actions being taken by the National Protection and 
Programs Directorate's (NPPD's) United States Visitor and Immigrant 
Status Indicator Technology (US-VISIT) Program to complement the 
efforts of U.S. Immigration and Customs Enforcement (ICE) and U.S. 
Customs and Border Protection (CBP), alongside whom I am pleased to be 
testifying today.
          enhancing visa security to prevent terrorist travel
    The Homeland Security Act of 2002 gave DHS the responsibility of 
preventing terrorists from entering the United States, providing the 
Department with the authority to establish and administer the rules 
that govern the granting of visas. This includes ensuring that the visa 
process is secure. Under this authority, DHS works closely with the 
Department of State to use the Visa System as a first layer of security 
to prevent known or suspected terrorists from traveling to the United 
States. Central to this mission is ensuring that consular officers at 
the State Department have necessary information, and then appropriately 
vet this information, which includes fingerprints and photographs, 
through the Department and our interagency partners.
    Since 9/11, DHS has enhanced our Nation's ability to detect 
individuals seeking to exploit the visa system through recurrent 
vetting of visa holders. In May 2010, CBP's National Targeting Center--
Passenger (NTC-P) implemented a new program to conduct continuous 
vetting of U.S. non-immigrant visas that have been recently issued, 
revoked, and/or denied. The Visa Hot List vetting ensures that changes 
in a traveler's visa status are identified in near real-time. If a 
violation is discovered, and the person is scheduled to travel to the 
United States, CBP will request that DOS revoke the visa and recommend 
to the airline that the person be denied boarding. If no imminent 
travel is identified, CBP will coordinate with DOS for a visa 
revocation, if appropriate. If the subject of an existing visa 
revocation initiated by the DOS or recommended by CBP is found to be in 
the United States, CBP will notify the Counterterrorism and Criminal 
Exploitation Enforcement Unit for further action.
    In addition, since December 25, 2009, we have accelerated our 
efforts to synchronize, streamline, and advance the Department's 
overall vetting capability, which both increases security and 
efficiency. In particular, the Department is currently working to 
enhance screening efforts for those who have potentially overstayed 
their period of admission and modernize and enhance the Department's 
Biographic Exit architecture.
    In May 2011, at the direction of Secretary Napolitano, DHS's CT 
Coordinator organized an effort to ensure that all overstays, 
regardless of priority, receive enhanced National security and public 
safety vetting by the National Counterterrorism Center (NCTC) and CBP.
    NPPD/US-VISIT used automated means to review all records in the 
backlog by checking ADIS, CLAIMS, and I-94 holdings to reduce the 
backlog. As a result of this review, we identified 843,000 visa 
overstays who were no longer in the country. Then, both NCTC and CBP 
vetted the remaining 757,000 potential in-country overstay leads, along 
with 82,000 previously vetted overstay leads. CBP used its Automated 
Targeting System to query multiple databases, and to compare records to 
CBP's intelligence-based threshold targeting rules to identify 
indicators such as suspicious travel patterns or irregular travel 
behavior. Simultaneously, NCTC vetted the backlogged records through a 
number of databases held by the intelligence community.
    By the end of July 2011, all of the previously un-reviewed possible 
overstays records had been reviewed from a National security and public 
safety standpoint and ICE is currently pursuing leads that meet our 
priorities.
    This effort has increased the standard of review of overstay leads, 
at reduced cost. The process allows ICE to better prioritize targets 
for investigation and removal. It is a prime example of how increased 
coordination can help our Department to better leverage information and 
capabilities spread across the Department and the Federal Government.
    The Department is nearing the final stages of developing a plan 
that not only institutionalizes these vetting enhancements, but also 
improves the current biographic exit system as well. We are focusing 
our efforts on improving information sharing, streamlining screening 
and vetting, and ensuring identification of potentially harmful 
individuals.
    This plan includes many enhancements, including those which will 
allow DHS to:
   Quickly identify and forward to ICE investigators overstays 
        that are of a National security concern.
   Integrate and leverage relevant CBP, ICE, and US-VISIT 
        information systems and operational processes to automate 
        manual data queries and to vet DHS-held immigration and travel-
        related information against a broad array of law enforcement 
        and IC data holdings.
   Incorporate an enhanced vetting capability that aggregates 
        information from multiple systems into a unified electronic 
        dossier reducing the need for US-VISIT researchers and ICE 
        agents to review multiple systems during their Validation and 
        Vetting processes.
   Take action against all overstays. DHS will forward 
        information to the State Department for the purpose of 
        cancelling visas of those who overstay. DHS will also eliminate 
        the ability of those who overstay from using the Visa Waiver 
        Program by cancelling any ESTA approvals or denying ESTA 
        submissions for those who have overstayed. DHS will also place 
        lookouts on individuals who overstay beyond certain statutory-
        identified time limits, so that they are inadmissible to the 
        United States. DHS believes this will create a deterrent 
        effect.
   Provide to Congress country-by-country data on percentages 
        of nationals who have overstayed their period of admission.
    DHS is committed to working with Congress to make these 
improvements.
    In addition to improving visa security, DHS has also implemented 
other measures to prevent another terrorist attack, including:
   Unifying immigration and border management systems to 
        implement a more effective capability to access and employ 
        biometric- and biographic-based information when reviewing 
        possible terrorist travel.
   Enhancing capabilities for identifying fraudulent documents 
        and imposters and implementing measures to confirm the 
        authenticity and validity of travel documents.
   Establishing interoperability and information-sharing 
        protocols with our Federal partners.
   Supporting State and local law enforcement agencies and the 
        intelligence community; using a more complete and accurate 
        picture of a person's immigration, terrorist, and criminal 
        history enables DHS to more effectively make connections in 
        determining who might pose a threat or use more than one 
        identity.
   Establishing and maintaining strategic partnerships with an 
        increasing number of international partners. In these 
        partnerships, we share appropriate information, provide 
        technical assistance, develop commonality in biometric 
        standards and best practices, and investigate and test emerging 
        biometric technologies.
            the role of the coordinator for counterterrorism
    Following the attempted bombing of Northwest flight 253 on December 
25, 2009, Secretary Napolitano gave NPPD's Under Secretary Rand Beers 
the additional role of CT coordinator. The Department's CT Coordinator 
is responsible for coordinating all counterterrorism activities for the 
Department and across its directorates, components, and offices related 
to the detection, prevention, response to, and recovery from acts of 
terrorism.
    In November 2010, DHS established the Counterterrorism Advisory 
Board (CTAB) to further improve coordination on counterterrorism among 
DHS Components. As the CT Coordinator, Under Secretary Beers serves as 
the chair of the CTAB, with the Under Secretary of Intelligence and 
Analysis (I&A) and the Assistant Secretary for Policy supporting the 
Board as Vice Chairs. Members include the leadership of TSA, CBP, ICE, 
the Federal Emergency Management Agency (FEMA), the U.S. Coast Guard 
(USCG), USCIS, the U.S. Secret Service (USSS), NPPD, and the Office of 
Operations Coordination and Planning (OPS). The DHS General Counsel 
serves as legal advisor to the CTAB.
    In December 2010, the Department also established a 
counterterrorism working group, known as the CTWG, to support the CT 
Coordinator, and Secretary Napolitano later appointed me as Principal 
Deputy CT Coordinator.
    The CTAB's mission is aligned with the Department's central 
mission: To prevent terrorist attacks and enhance security. The CT 
Coordinator, the CTAB, and the CTWG serve as the connective tissue that 
brings together the intelligence, operational, and policy-making 
elements within DHS Headquarters and the Components.
    We rely on I&A to provide an understanding of potential threats and 
to coordinate with intelligence components within the Department and 
intelligence community. We then facilitate a cohesive and coordinated 
operational response, through the CTAB and other mechanisms, to deter 
and disrupt terrorist operations.
    The CTAB is both headquarters- and Component-driven. Components 
have the opportunity to address the Secretary's priorities in an 
organized, coordinated fashion, but also use the CTAB to bring 
attention to their initiatives and priorities that need support from 
headquarters and other components. In addition, the CTAB fosters 
collaboration among Components and provides situational awareness of 
what each Component does and needs during a high-threat scenario. 
Similarly, we work with the DHS Office of Policy to address day-to-day 
and long-term strategy issues identified through this process and work 
to implement those changes.
    Let me provide the following examples of how this process has 
worked over the last few months, with the offer to provide greater 
detail in a classified setting.
                             nppd/us-visit
    One of NPPD/US-VISIT's most important roles is to identify visitors 
to this country and to assist in the overall security of our 
immigration system.
    NPPD/US-VISIT provides biometric identification and analysis 
services to distinguish people who pose a threat from the millions of 
people who travel for legitimate purposes. The program stores and 
analyzes biometric data--digital fingerprints and photographs--and 
links that data with biographic information to establish, and then 
verify, identities. NPPD/US-VISIT's IDENT, is the Department's 
biometric storage and matching service.
    IDENT contains a watch list of more than 6.2 million known or 
suspected terrorists, criminals, and immigration violators. This 
capacity enables US-VISIT to provide homeland security decisionmakers 
with critical information when and where they need it. For example, 
this system can be utilized during by CBP primary screening during to 
run the fingerprints of foreign nationals against the watch list, with 
results returned in fewer than 10 seconds.
    IDENT data, paired with biographic information from NPPD/US-VISIT's 
ADIS, supports decision-maker determinations as to whether foreign 
travelers should be prohibited from entering the United States; can 
receive, extend, change, or adjust immigration status; have overstayed 
or otherwise violated their authorized terms of admission; should be 
apprehended or detained for law enforcement action; or need special 
protection or attention, as in the case of refugees. Through ADIS, 
NPPD/US-VISIT can identify individuals who have overstayed their period 
of admission and then forward these leads to ICE for further action. In 
addition, IDENT plays a critical role in the biometric screening and 
identity verification of non-U.S. citizens for the State Department, 
ICE, CBP, USCIS, and the U.S. Coast Guard.
    NPPD/US-VISIT's IDENT is fully interoperable with the Federal 
Bureau of Investigation's (FBI's) 10-fingerprint-based Integrated 
Automated Fingerprint Identification System (IAFIS). Daily transactions 
of FBI fingerprint data shared between IAFIS and IDENT number in the 
tens of thousands, providing the capability for FBI and NPPD/US-VISIT 
customers to simultaneously match biometrics against our system and 
watch list, as well as FBI data.
    Enhanced interoperability with the FBI has enabled NPPD/US-VISIT to 
launch the Rapid Response capability, which allows CBP officers to 
search and receive a response against the FBI's entire criminal master 
file of more than 69 million identities, in near real-time, during 
primary inspection. Rapid Response is operational at four air ports of 
entry and is planned for Nation-wide deployment at air ports of entry 
next fiscal year.
    DHS is also working closely with the Department of Defense (DOD) to 
increase information sharing and establish interoperability between 
IDENT and DOD's fingerprint database, the Automated Biometric 
Identification System. We currently have manual methods for sharing 
this data, which has helped DOD identify foreign combatants and match 
latent fingerprints retrieved from objects such as improvised explosive 
device fragments or collected from locations where terrorists have 
operated.
    The goal is to have the U.S. Government's three largest biometric 
systems--those of NPPD/US-VISIT, the FBI, and DOD--completely 
interoperable, thereby enriching our data sets by making information 
sharing more seamless and automating the biometric-checking process to 
make it far more efficient. Even after complete interoperability has 
been achieved, the three systems will continue to be maintained and 
governed by each agency's respective policies, including those that 
ensure appropriate privacy safeguards are in place.
              international cooperation and collaboration
    DHS works extensively with foreign governments to increase 
information sharing to prevent terrorist travel at the earliest point 
possible. The Department is focused on sharing appropriate information, 
increasing system interoperability, providing technical assistance, and 
establishing commonality in data and biometric standards and best 
practices. For instance, we are:
   Working with Mexican federal police and immigration 
        authorities to identify and stop dangerous people from 
        transiting to Mexico; enhancing efforts to combat transnational 
        crime and confront organizations whose illicit actions 
        undermine public safety, erode the rule of law, and threaten 
        National security; and supporting Merida Initiative capacity-
        building programs such as the incorporation of biometrics into 
        Mexico Immigration's Integrated System for Migration 
        Operations. DHS has supported non-intrusive inspection 
        equipment training, financial crimes investigative training, 
        canine enforcement training, assistance in transitioning the 
        Mexican Customs from a revenue-based institution to a law 
        enforcement-based institution, and improvements in immigration 
        control programs.
   Forging new partnerships with New Zealand, India, South 
        Africa, the Republic of Korea, Germany, Spain, Greece, and the 
        Dominican Republic to support their implementation of biometric 
        systems.
   Sending technical experts to the United Kingdom, Australia, 
        Canada, and, potentially, New Zealand, to help build biometric 
        capabilities and develop more systematic methods for 
        information sharing.
   Implementing the Preventing and Combating Serious Crime 
        agreements to formalize sharing of biometric and limited 
        biographic data under the U.S. Visa Waiver Program with 
        Germany, Spain, the Republic of Korea, and other countries.
   Working with the International Civil Aviation Organization, 
        the International Transport Association and INTERPOL to support 
        the exchange of information and best practices and the 
        establishment of standards in the areas of aviation security, 
        identity management, emerging technologies, document security 
        and verification, and fraud detection.
    The Immigration Advisory Program (IAP) is another example of 
partnership between the Department, foreign governments, and commercial 
air carriers to identify and prevent high-risk, improperly-documented 
travelers from boarding U.S.-bound flights. IAP is currently in 
operation at eight airports in six countries. IAP officers have 
established strong working relationships with foreign law enforcement 
and counterterrorism officials and facilitated a direct link and real-
time communication between foreign counterparts, the U.S. Embassy/
Consulate, and the National Targeting Center.
    DHS will continue to expand international coalitions to protect our 
Nation in the face of evolving terrorist threats, an increasingly 
interconnected global economy, and growing transnational crime. Along 
with our partners, we view cooperation, collaboration, and information 
sharing as critical in reaching our common goals of enhancing global 
security while facilitating legitimate travel and ensuring access to 
our economies.
                            success stories
    Information sharing among agencies and international partners 
continues to yield significant results, as demonstrated by these 
success stories:
   On February 3, 2011, the Australian Department of 
        Immigration and Citizenship submitted a batch of fingerprints 
        under the High Value Data Sharing Protocol of the Five Country 
        Conference for matching against IDENT. The fingerprints of a 
        subject applying for asylum in Australia matched an identity on 
        the IDENT biometric watch list as a known or suspected 
        terrorist in the FBI's Terrorist Screening Database. DHS 
        contacted the FBI Counterterrorism Division and its Terrorist 
        Explosives Device Analytical Center to confirm the subject's 
        derogatory information. The FBI then notified Australian 
        authorities. The individual was not granted asylum status in 
        Australia based on this information.
   In November 2010, DHS assisted in a case involving an 
        applicant for employment at a nuclear power plant. It was 
        determined that the subject was using a false document under a 
        false identity, in an attempt to demonstrate his legal status 
        to reside and work in the United States. The subject was 
        subsequently arrested by DHS law enforcement authorities as an 
        overstay and placed into Federal custody awaiting removal 
        proceedings.
   In October 2009, a vessel named Ocean Lady, transporting 76 
        undocumented persons, arrived off the coast of British 
        Columbia, Canada. The intent of all individuals on board was to 
        claim asylum status in Canada. The Canada Border Services 
        Agency (CBSA) intercepted the vessel and worked with the ICE 
        attache in Ottawa to determine whether information on the 
        identities of the individuals existed in U.S. systems. Pursuant 
        to an existing agreement between CBSA and DHS, the asylum 
        claimants' fingerprints were submitted to NPPD/US-VISIT for a 
        search. The fingerprint searches in IDENT identified two 
        subjects as known or suspected terrorists and members of the 
        Liberation Tigers of Tamil Eelam. Both subjects had also 
        previously applied for U.S. nonimmigrant visas in 2008 and had 
        been denied. Both subjects were denied asylum in Canada.
                               conclusion
    DHS is working hard to stop terrorists before they ever get to the 
United States. As we continue to work to address today's complex 
challenges, we will look for innovative ways to bridge gaps in 
information, technology, and human decision-making. Working with our 
partners; using common technologies, standards, and best practices; and 
sharing critical information will better protect us from those who seek 
to exploit our immigration systems. DHS is also cognizant that although 
physical security is of paramount concern and it is vital that we do 
everything possible to prevent terrorist travel, we must steadfastly 
seek to ensure that privacy, civil rights, and civil liberties are 
always protected. In developing and operating our programs, the 
Department's Office of Privacy and Office of Civil Rights and Civil 
Liberties are an integral part of the process.
    By strengthening and increasing coordination within the Department, 
across the Federal Government, and with our international partners, we 
will develop and implement comprehensive measures that make efficient 
use of limited resources. With the appropriate coordination and 
structure within DHS Headquarters, we can better support our 
Operational Components as they work to enhance the security of our 
immigration systems while facilitating legitimate travel. In my role as 
Principal Deputy CT Coordinator for the Department, I look forward to 
continuing to work with you to address the challenges that remain.
    Chairwoman Miller, Ranking Member Cuellar, and distinguished 
Members, thank you again for this opportunity to testify. I will be 
happy to answer any of your questions.

    Mrs. Miller. Thank you very much, Mr. Cohen. We look 
forward to questioning you on all of that new information you 
just gave us, so get ready.
    Next the Chairwoman recognizes Mr. Edge.

STATEMENT OF PETER T. EDGE, DEPUTY ASSOCIATE DIRECTOR, HOMELAND 
 SECURITY INVESTIGATIONS, IMMIGRATION AND CUSTOMS ENFORCEMENT, 
                DEPARTMENT OF HOMELAND SECURITY

    Mr. Edge. Good morning, Chairwoman Miller, Ranking Member 
Cuellar, and distinguished Members of the subcommittee. On 
behalf of Secretary Napolitano and Director Morton, thank you 
for the opportunity to discuss ICE's efforts to prevent the 
exploitation of our visa system by terrorists.
    Visa overstays and other forms of status violation bring 
together two critical areas of ICE's mission: National security 
and immigration enforcement. The importance of determining who 
to allow entry into the United States and ensuring compliance 
with the conditions of the such entry cannot be understated.
    We are proud of the good work we have done over the last 10 
years to protect the integrity of our visa system. ICE 
recognizes that those who pose National security threats often 
commit immigration benefit fraud while seeking to enter or 
remain in the United States, and we work hard to detect and 
deter immigration fraud by continually enhancing our anti-fraud 
efforts.
    Working closely with Citizenship and Immigration Services, 
or CIS, ICE exercises criminal authority in the detection and 
deterrence of immigration fraud. While recognizing CIS's 
administrative authority, this strategy allows ICE to 
concentrate its effort on major fraud conspiracies and other 
cases of National security or public safety interest while 
allowing CIS to address the bulk of immigration benefit fraud 
cases administratively.
    As you know, the Homeland Security Act of 2002 directs DHS 
to assist in the identification of visa applicants who wish to 
enter the United States for illegitimate purposes, including 
illegal immigration, criminal activities, and terrorism-related 
activities. The visa adjudication process is often the first 
opportunity to assess whether a potential non-immigrant visitor 
or immigrant presents a threat to the United States.
    The Visa Security Program is one of several ICE programs 
designed to minimize global risk. Our special agents in the 
Visa Security Program focus on select applicants who may have 
connections to terrorism or transnational criminal 
organizations. We then coordinate with the State Department to 
develop targeting plans based on the various threats. DHS does 
not participate in all of these adjudications, but rather 
becomes a part of the process following initial screening of an 
applicant where ICE's visa security operation happens to be 
present.
    DHS actions compliment the consular office's initial 
screening, applicant interviews, and reviews of the 
applications and supporting documentation. ICE now conducts 
visa security operations at 19 high-risk visa adjudication 
posts in 15 countries. In fiscal year 2011 to date the Visa 
Security Program has screened over 900,000 visa applicants and, 
in collaboration with our State Department colleagues, 
determined that 130,000 require further review. Following the 
review of these 130,000 applicants, ICE identified derogatory 
information on more than 10,400 applicants. In every instance 
the State Department followed ICE's recommendation concerning 
the visa applicant.
    A vulnerability that in the past had been exploited 
involved the acceptance of foreign students and visitors into 
the U.S. educational system. Helping to mitigate this 
vulnerability is ICE's Student and Exchange Visitor Program, or 
SEVP, which is a self-funded program based on fees collected 
from students, exchange visitors, and schools. This program 
certifies, recertifies, and decertifies schools' eligibility to 
sponsor foreign individuals for scholastic enrollment and other 
academic purposes. The SEVP acts as the bridge for Government 
organizations that have an interest in information on foreign 
students. SEVP helps DHS and the State Department to monitor 
schools and exchange programs regarding the visa 
classifications of F for academic and M for vocational and J 
for exchange category visitors.
    SEVP administers the F and M student visa categories, while 
the State Department manages the J exchange visitor program. 
SEVP collects, maintains, and provides the information so that 
only legitimate foreign students or exchange visitors gain 
entry into and remain in the United States. SEVP uses the 
Student and Exchange Visitor Information System, or SEVIS, to 
track and monitor schools and programs, student exchange 
visitors and their dependents approved to participate in the 
U.S. education system.
    SEVP interacts closely with ICE's Counterterrorism and 
Criminal Exploitation Unit, CTCEU, the first National program 
dedicated to the enforcement of nonimmigrant visa applications. 
Today through the CTCEU, ICE proactively develops cases for 
investigation and cooperation with SEVP and the US-VISIT 
program.
    As we move forward it is imperative that we expand the 
Nation's enforcement efforts concerning overstays and other 
status violations specifically regarding those who threaten 
National security or public safety. Accordingly, ICE is 
analyzing various approaches to this issue, including 
sharpening the focus of programs that address vulnerabilities 
exploited by visa violators.
    Ten years after the attacks of 9/11 ICE has made 
significant progress in preventing terrorists from exploiting 
the visa process.
    Thank you again for the opportunity to testify today, and I 
would appreciate your continued support of ICE and law 
enforcement. Thank you very much.
    [The statement of Mr. Edge follows:]
                  Prepared Statement of Peter T. Edge
                           September 13, 2011
                              introduction
    Chairwoman Miller, Ranking Member Cuellar, and distinguished 
Members of the subcommittee: On behalf of Secretary Napolitano and 
Director Morton, thank you for the opportunity to discuss U.S. 
Immigration and Customs Enforcement's (ICE) efforts to prevent the 
exploitation of our visa system by terrorists. Visa overstays and other 
forms of status violation bring together two critical areas of ICE's 
mission--National security and immigration enforcement, and the 
importance of determining whom to allow entry into the United States 
and ensuring compliance with the conditions of such entry cannot be 
understated. We are proud of the good work we have done over the last 
10 years to protect the integrity of our visa system, and I look 
forward to sharing with you both our successes thus far and the 
opportunities we see to improve our systems.
                       joint anti-fraud strategy
    We recognize that those who pose National security threats often 
commit immigration benefit fraud while seeking to enter or remain in 
the United States, and we work hard to detect and deter immigration 
fraud and to continually enhance our anti-fraud efforts. Working 
closely with U.S. Citizenship and Immigration Services (USCIS), ICE 
exercises criminal authority in the detection and deterrence of 
immigration fraud, while recognizing USCIS' administrative authority. 
This strategy allows ICE to concentrate its efforts on major fraud 
conspiracies and other cases of National security or public safety 
interest, while allowing USCIS to address the bulk of immigration 
benefit fraud cases administratively.
    Through the ICE Document and Benefit Fraud Task Forces (DBFTFs), we 
focus our efforts on detecting, deterring, and disrupting document and 
benefit fraud. DBFTF participants include USCIS, the Department of 
State, the Department of Labor, and the Social Security Administration. 
Task Force investigators with expertise in different aspects of fraud 
collaborate with U.S. Attorneys' Offices around the country to 
formulate a comprehensive approach in targeting the criminal 
organizations and the beneficiaries behind these fraudulent schemes.
                       the visa security program
    The Homeland Security Act of 2002 directs DHS to assist in the 
identification of visa applicants who wish to enter the United States 
for illegitimate purposes, including illegal immigration, criminal 
activities, and terrorism-related activities. The visa adjudication 
process is often the first opportunity to assess whether a potential 
non-immigrant visitor or immigrant presents a threat to the United 
States. The Visa Security Program (VSP) is one of several ICE programs 
focused on minimizing global risks.
    Our VSP Special Agents focus on select applicants and any 
connection the applicants may have to terrorism or transnational 
criminal organizations and coordinate with DOS to develop targeting 
plans based on assessed conditions and threats. The VSP ensures 
thorough reviews of applicants of concern in order to assess whether 
they pose a security threat to the United States. DHS does not 
participate in all visa adjudications, but rather becomes a part of the 
process following initial screening of an applicant in countries where 
an ICE visa security operation is present. DHS actions complement the 
consular officers' initial screening, applicant interviews, and reviews 
of applications and supporting documentation.
    ICE now conducts visa security operations at 19 high-risk visa 
adjudication posts in 15 countries. In fiscal year 2011 to date, the 
VSP has screened 900,000 visa applicants and, in collaboration with DOS 
colleagues, determined that 130,000 required further review. Following 
the review of these 130,000 applications, ICE identified derogatory 
information on more than 10,400 applicants. In every instance, DOS 
followed the VSP's recommendation concerning the visa applicant.
    In March 2010 Customs and Border Protection's National Targeting 
Center (NTC) implemented a program to conduct continuous vetting of 
U.S. non-immigrant visas that have been recently issued, revoked, and/
or denied. The continuous vetting ensures that changes in a traveler's 
visa status are identified in near real-time, allowing CBP to 
immediately determine whether to provide a no board recommendation to a 
carrier, recommend revocation of the visa to Department of State, or 
notify the ICE NTEU for individuals determined to be within the United 
States. Since the program's inception the Department of State has 
revoked more than 900 visas based on requests from CBP on information 
uncovered after a visa was issued.
    Additionally, ICE has deployed VSP personnel to the NTC to augment 
and expand current operations. The NTC provides tactical targeting and 
analytical research in support of preventing terrorist and terrorist 
weapons from entering the United States. The co-location of VSP 
personnel at the NTC has helped increase both communication and 
information sharing. The NTC conducts pre-departure screening of all 
travelers on flights bound for the United States. Screening identifies 
high-risk passengers who should be denied boarding, including those 
whose visas have been revoked.
            the student and exchange visitor program (sevp)
    The Student and Exchange Visitor Program (SEVP) is a self-funded 
program based on fees collected from students, exchange visitors, and 
schools. It also certifies, recertifies, and decertifies schools' 
eligibility to sponsor foreign individuals for scholastic enrollment 
and other academic purposes. SEVP oversees reporting requirements and 
policies related to foreign nonimmigrant students and exchange 
visitors, and provide overall guidance to schools regarding SEVIS.
    SEVP acts as the bridge for Government organizations that have an 
interest in information on foreign students. SEVP helps DHS and DOS 
monitor schools and exchange programs, as well as F (academic), M 
(vocational), and J (exchange) category visitors. SEVP administers the 
F and M student visa categories, while DOS manages the J exchange 
visitor program.
    SEVP collects, maintains, and provides the information so that only 
legitimate foreign students or exchange visitors gain entry to, and 
remain in, the United States. The result is an easily accessible 
information system that provides timely information to DOS, U.S. 
Customs and Border Protection, U.S. Citizenship and Immigration 
Services and ICE. SEVP has a mutual commitment of shared responsibility 
with the educational community to maintain support and cooperation. 
Currently, SEVP has certified over 10,360 schools.
    SEVP uses the Student and Exchange Visitor Information System 
(SEVIS) to track and monitor schools and programs, students, exchange 
visitors, and their dependents approved to participate in the U.S. 
education system.
      the counterterrorism and criminal exploitation unit (ctceu)
    The Counterterrorism and Criminal Exploitation Unit is the first 
National program dedicated to the enforcement of nonimmigrant visa 
violations. Today, through the CTCEU, ICE proactively develops cases 
for investigation in cooperation with the SEVP and the United States 
Visitor and Immigrant Status Indicator Technology (US-VISIT) Program. 
These programs enable ICE to access information about the millions of 
students, tourists, and temporary workers present in the United States 
at any given time, and identify those who have overstayed or otherwise 
violated the terms and conditions of their admission.
    Each year, the CTCEU analyzes records of hundreds of thousands of 
potential status violators, after analysis of data from SEVIS and US-
VISIT, along with other information. These records are resolved by 
further establishing potential violations that would warrant field 
investigations, establishing compliance, or establishing departure 
dates from the United States. Between 15,000 and 20,000 of these 
records are resolved by in-house analysts each month. Since the 
creation of the CTCEU in 2003, analysts have resolved more than 1.6 
million such records using automated and manual review techniques. On 
average, ICE opens approximately 6,000 investigative cases annually, 
and assigns them to our Special Agents in the field for further 
investigation, resulting in over 1,400 administrative arrests per year.
    Agents and analysts in ICE monitor the latest threat reports and 
proactively address emergent issues. This practice has contributed to 
ICE's counterterrorism mission by initiating or supporting high-
priority National security initiatives based upon specific 
intelligence. The practice is designed to detect and identify 
individuals exhibiting specific risk factors based on intelligence 
reporting, including international travel from specific geographic 
locations to the United States, and in-depth criminal research and 
analysis of dynamic social networks. This person-centric approach to 
nonimmigrant prioritization moves away from the traditional 
identification approach based upon country of birth, gender, and age.
    In order to ensure that the potential violators who pose the 
greatest threats to National security are given priority attention, ICE 
uses intelligence-based criteria, developed in close consultation with 
the intelligence and law enforcement communities. ICE assembles the 
Compliance Enforcement Advisory Panel (CEAP) on a tri-annual basis to 
ensure that it uses the latest threat intelligence to target 
nonimmigrant overstays and status violators who pose the greatest 
threats to National security and to discuss possible changes based on 
current threat trends.
    A recent ICE investigation in Las Cruces, New Mexico, highlights 
how the CTCEU functions. As a result of CTCEU data analysis and field 
investigation, in February 2010, ICE Special Agents arrested two 
foreign nationals who were admitted as F-1 nonimmigrant students and 
violated the terms and conditions of their admission. Both individuals 
were referred for investigation after their status was terminated in 
SEVIS for failure to maintain student status, as well as for possessing 
several indicators of National security concerns.
    Likewise, in March 2010, ICE's Counterterrorism and Criminal 
Exploitation Group in Miami, Florida, initiated ``Operation Class 
Dismissed,'' a criminal investigation that led to the indictment of the 
owner/operator of a Miami-based foreign language school and one of its 
employees on four counts of conspiring to commit a criminal offense 
against the United States. The owner and employee were suspected of 
fraudulently sponsoring foreign students by certifying student status 
to nonimmigrants, without requiring them to maintain full courses of 
study in order to comply with the terms of their admission. ICE's 
primary goal in these types of investigations is to focus on the 
criminal violations of the owner/operators of these businesses and the 
administrative violations on the students. This ICE investigation 
uncovered information that only approximately 5 percent of the school's 
students attended class on any given day. In addition to the 
indictment, follow-up investigation by ICE resulted in the 
administrative arrests of 116 student visa violators purported to be 
attending the school from countries including Thailand, Syria, 
Honduras, South Korea, Japan, Colombia, the Dominican Republic, 
Turkmenistan, Turkey, Indonesia, Venezuela, Brazil, and Kyrgyzstan.
    As we move forward, it is imperative that we expand the Nation's 
enforcement efforts concerning overstays and other status violations 
specifically regarding those who threaten National security or public 
safety. Accordingly, ICE is analyzing various approaches to this issue, 
including sharpening the focus of programs that address vulnerabilities 
exploited by visa violators.
          coordination with us-visit and other dhs components
    CTCEU also works in close collaboration with US-VISIT, part of the 
DHS's National Protection and Programs Directorate (NPPD). US-VISIT 
supports DHS's mission to protect our Nation by providing biometric 
identification services to Federal, State, and local government 
decisionmakers to help them accurately identify the people they 
encounter, and determine whether those people pose risks to the United 
States. DHS's use of biometrics under the US-VISIT program is a 
powerful tool in preventing identity fraud and ensuring that DHS is 
able to rapidly identify criminals and immigration violators who try to 
cross our borders or apply for immigration benefits under an assumed 
name. Biometric information sharing between the Federal Bureau of 
Investigation's Criminal Justice Information Services and US-VISIT is 
the foundation of ICE's Secure Communities IDENT/IAFIS Interoperability 
Program.
    Through Secure Communities, aliens--including those who have 
overstayed or otherwise violated their immigration status--who are 
encountered by law enforcement may be identified as immigration 
violators when criminally arrested by State and local law enforcement. 
Once individuals are identified through Secure Communities, ICE 
officials determine what enforcement action is appropriate, consistent 
with ICE's enforcement priorities. Currently, Secure Communities is 
deployed in over 1,500 jurisdictions in 44 States.
    US-VISIT also analyzes biographical entry and exit records stored 
in its Arrival and Departure Information System to further support 
DHS's ability to identify international travelers who have remained in 
the United States beyond their periods of admission by analyzing 
related biographical information.
    ICE receives or coordinates nonimmigrant overstay and status 
violation referrals from US-VISIT Data Integrity Group (DIG) from three 
unique sources, which includes the typical overstay violation; a 
biometric watch list notification and a CTCEU Visa Waiver Enforcement 
Program (VWEP) nomination. The first type, Nonimmigrant Overstay Leads, 
is used by the CTCEU to generate field investigations by identifying 
foreign visitors who violate the terms of their admission by remaining 
in the United States past the date of their required departure.
    A second type of lead is generated from biometric data collected by 
US-VISIT. US-VISIT routinely receives fingerprint records from a 
variety of Governmental sources and adds them to a biometric watch list 
that includes individuals of National security concern. These new watch 
list records are checked against all fingerprints in the US-VISIT's 
biometric database, the Automated Biometric Identification System, or 
IDENT, managed by US-VISIT, to determine if DHS has previously 
encountered the individual. If US-VISIT identifies a prior encounter, 
such as admission to the United States, the information is forwarded to 
ICE for review and possible field assignment. Similarly, US-VISIT 
monitors records for individuals who, at the time of admission to the 
United States, were the subject of watch list records that did not 
render the individuals inadmissible to the United States. Therefore, if 
such individuals overstay their terms of admission, information on the 
subjects is forwarded to ICE for review and possible referral to 
investigative field offices for follow-up.
    The third type of lead pertains to the CTCEU's Visa Waiver 
Enforcement Program (VWEP). The Visa Waiver Program (VWP) is the 
primary source of nonimmigrant visitors from countries other than 
Canada and Mexico. Although the overstay rate from this population is 
less than 1 percent, ICE created a program dedicated to overstays 
arising from this VWP population given the large number of individuals 
in this category. Prior to the implementation of the VWEP in 2008, 
there was no National program dedicated to addressing overstays within 
this population. CTCEU provides a refined weekly list of individuals to 
US-VISIT for additional scrutiny, who have been identified as potential 
overstays who entered the United States under the VWP. In accord with 
its intelligence-based criteria, a relevant portion of this report is 
then imported into the CTCEU's internal lead tracking system for review 
and possible field assignment.
    Additionally, the CTCEU develops potential overstay and status 
violation leads from SEVIS and other sources, imports these leads 
directly from those databases, and applies its intelligence-based 
criteria to determine whether investigative referral is appropriate. 
Throughout its history, the integrity of SEVIS data and its 
applicability have been valued throughout the law enforcement.
                        ice's presence overseas
    Stopping a threat before it reaches our shores is an important 
priority that ICE supports internationally. Through our Office of 
International Affairs (OIA), we have personnel in 70 offices in 47 
countries. ICE personnel in these offices collaborate with our foreign 
counterparts and Federal partner agencies in joint efforts to disrupt 
and dismantle transnational criminal organizations engaged in money 
laundering, contraband smuggling, weapons proliferation, forced child 
labor, human rights violations, intellectual property rights 
violations, child exploitation, human smuggling and trafficking, and 
many other violations. Additionally, ICE facilitates the repatriation 
of individuals with final orders of removal, returning violators to 
their home countries.
                     overseas coordination with dos
    Effective border security requires broad information sharing and 
cooperation among U.S. agencies. On January 11, 2011, ICE signed a 
memorandum of understanding (MOU) outlining roles, responsibilities, 
and collaboration between ICE and the DOS Bureaus of Consular Affairs 
and Diplomatic Security. The MOU governs the day-to-day operations of 
ICE agents conducting visa security operations at U.S. embassies and 
consulates abroad. To facilitate information sharing and reduce 
duplication of efforts, ICE and DOS support collaborative training and 
orientation prior to overseas deployments. Once they are deployed to 
overseas posts, ICE and DOS personnel work closely together in: 
Participating in working groups; coordinating meetings, training, and 
briefings; and engaging in regular and timely information sharing. The 
VSP's presence at U.S. embassies and consulates brings an important law 
enforcement element to the visa review process. Additionally, this 
relationship serves as an avenue for VSP personnel to assist Consular 
Officers and other U.S. Government personnel to recognize potential 
security threats in the visa process.
    ICE continues to evaluate the need to screen and investigate 
additional visa applicants at high-risk visa issuing posts other than 
the 19 posts at which the agency currently operates, which were 
determined in collaboration between ICE and DOS. ICE will continue to 
conduct joint site visits with DOS to identify locations for deployment 
based on emerging threats. We are engaged with our counterparts at DOS 
in determining a common strategic approach to the broader question of 
how best to collectively secure the visa issuance process. We look 
forward to continuing to report back to you with updates on this 
process.
                            recent successes
    Working in tandem with other DHS personnel, as well as our 
international, Federal, State, local, and Tribal partners, we have 
enjoyed significant successes preventing visa fraud. I would like to 
elaborate briefly on a few of these cases.
    In December 2010, ICE Special Agents were involved in the 
identification and investigation of a transnational alien smuggling 
organization that facilitated the illegal travel of Somali nationals 
into Yemen and on to other Western locations including the United 
States. ICE Special Agents received information from the ICE Attache 
office in Amman, Jordan that two Somali nationals had been intercepted 
in Amman attempting to travel to Chicago using counterfeit travel 
documents, and contacted local officials in Yemen and Somalia to 
investigate how the counterfeit documents had been obtained and how the 
subjects had transited Yemen. The information developed was shared with 
other U.S. agencies at post in Sana'a via the Law Enforcement Working 
Group, as well as ICE domestic offices and the appropriate FBI Joint 
Terrorism Task Force. While the joint investigation is on-going, 
efforts to date have eliminated this scheme as a method of entry to the 
United States.
    More recently, in May 2011, ICE Special Agents within the VSP 
Security Advisory Opinion Unit (SAOU) investigated a Saudi Arabian 
national who obtained a nonimmigrant visa to enter the United States by 
concealing his true identity from DOS by using a variation of his true 
name. Through vetting efforts, the SAOU identified this individual's 
true identity and revealed that he was a known terrorist with 
significant ties to other known terrorists, and who was likely involved 
in the planning of a terrorist attack in 2003. Based on this 
investigation and at the request of the VSP and SAOU, DOS revoked the 
individual's visa on National security-related grounds and prevented 
him from traveling to the United States.
                               conclusion
    Ten years after the attacks of 9/11, ICE has made significant 
progress in preventing terrorists from exploiting the visa process. 
Thank you again for the opportunity to testify today and for your 
continued support of ICE and its law enforcement mission.
    I would be pleased to answer any questions you may have.

    Mrs. Miller. Thank you, Mr. Edge. You certainly do have our 
continued support, and now the Chairwoman recognizes Mr. Stana.

STATEMENT OF RICHARD M. STANA, DIRECTOR, HOMELAND SECURITY AND 
           JUSTICE, GOVERNMENT ACCOUNTABILITY OFFICE

    Mr. Stana. Thank you, Chairwoman Miller and Mr. Cuellar, 
for the invitation to testify at today's hearing about GAO's 
work on this very important topic, the integrity and security 
of our visa processes.
    As you know, each year millions of visitors come to the 
United States legally for a temporary visit. In the 6-year 
period from fiscal year 2005 to 2010 there were 36 million 
nonimmigrant visas issued for things like pleasure, business 
travel, student exchanges and so on, among other things. In 
addition, during that same period over 98 million visitors were 
admitted to the United States under the visa waiver program.
    While most visa abusers you might say are motivated by 
economic opportunities to enter the United States and work, 
there are other National security consequences. As was 
mentioned earlier, 5 of the 19, 9/11 hijackers were here on one 
or the other overstay category, and 36 of 400 individuals 
convicted in international terrorism-related investigations by 
the Department of Justice were overstays.
    As you have heard from the other panelists, both DHS and 
State have made some progress in shoring up our visa processes. 
I would like to discuss three areas from my prepared statement 
which could possibly add some context to what you have heard.
    First, let's talk about the problem. We have overstays 
whether the person was admitted to the U.S. on a valid visa or 
through the visa waiver program. As was previously mentioned, 
the Pew Hispanic Center has estimated that about 40 percent of 
the total illegal alien population in the United States came in 
legally through a visa. On average that is about 4 in 10 and 
contrast the resources that we spend on interior enforcement 
with what we spend on the 60 percent for border enforcement, a 
big difference.
    To its credit, as you heard, ICE uses a risk management 
approach to focus its limited resources on overstays leads that 
it considers most likely to pose a threat to National security 
or public safety. But that said, ICE averages only about 1,200 
overstay arrests per year and devotes a little more than 3 
percent of its investigative resources to overstays.
    Now to be fair, finding overstays can be difficult, they 
don't self-advertise. Sometimes they leave the United States, 
sometimes they are now on status, sometimes they simply cannot 
be located. There are other programs that ICE and other DHS 
components operate, like work site enforcement and secure 
communities that do address overstays or overstays are a 
component of those programs. But when you add it all up, you 
take all those programs together, we are not making much of a 
dent in that 40 percent of the illegal alien population.
    Moving forward, ICE expressed interest in increasing the 
resources to overstay investigations and assigning some 
responsibilities to ERO. But they haven't established time 
frames yet or identified the resources to make this happen.
    My second point involves the US-VISIT system. There's good 
news and not so good news. The good new is it is operating 300 
air, sea, and land ports of entry and it seems to be working 
well. It gathers biometric information which can enable DHS to 
identify travelers, check law enforcement databases, and 
prescreens others.
    The not-so-good news is that it has only a very limited 
capability to process exit records currently. The exit process 
now includes processing air carriers, electronic submissions of 
manifest data and other biographic information as well as 
inconsistent collection of 
I-94s. So all told, it is not in a position right now to 
reliably state who has overstayed their visa and remains in the 
country.
    As of July, this past July, US-VISIT obligated about $193 
million to develop air, sea, and land exit solutions since 
2002. They had different types of exit solutions and piloted 
them, but all have been determined to be insufficient and 
incomplete. There are some other arrangements being discussed 
now, such as with the Canadians, to make their exit as a person 
leaving the United States going into a Canada become our--their 
entrance become our exit and share information. But those 
agreements have not been formalized and there is more work that 
remains.
    Finally, let's turn to the issue of ensuring visa integrity 
and security overseas. ICE has deployed agents to certain 
embassies and consulates as part of its Visa Security Program, 
as you have heard, but at some posts we found that guidance, 
training, and standard operating procedures were not 
established, which led to tensions between ICE and State, as 
well as operational inconsistencies. We also found that while 
ICE had a presence at 19 posts in 15 countries; it did not have 
agents located at 11 of the top 20 high-risk posts. You know, 
expanding the program can be limited by embassy space and 
budget consideration, but ICE has not acted on possible 
alternatives. Although I am listening to some of my fellow 
panelists this morning, it sounds like perhaps that information 
is superseded and there are steps to be taken to expand their 
vetting and screening processes.
    On the positive side we heard about ESTA a few minutes ago. 
ESTA was implemented without many glitches. They are screening 
about 99 percent of the travelers coming into the United States 
on visa. However, there were about, I believe it was about 
350,000 travelers who were boarded on airplanes without having 
a verified ESTA document and of those about 650 of those it was 
later found should not have been permitted to board the 
airplane. DHS has yet to analyze these cases to see if these 
were of legitimate concern or there were systematic weaknesses 
that need to be addressed for the program.
    That concludes my statement. It is important to balance 
visa security responsibilities with a need to enhance travel, 
and we have made a number of recommendations to both State and 
DHS to help this happen.
    Thank you very much.
    [The statement of Mr. Stana follows:]
                 Prepared Statement of Richard M. Stana
                           September 13, 2011
                             gao highlights
    Highlights of GAO-11-910T, a testimony before the Subcommittee on 
Border and Maritime Security, Committee on Homeland Security, House of 
Representatives.
Why GAO Did This Study
    The attempted bombing of an airline on December 25, 2009, by a 
Nigerian citizen with a valid U.S. visa renewed concerns about the 
security of the visa process. Further, unauthorized immigrants who 
entered the country legally on a temporary basis but then overstayed 
their authorized periods of admission--overstays--could pose homeland 
security risks. The Department of Homeland Security (DHS) has certain 
responsibilities for security in the visa process and for addressing 
overstays. DHS staff review visa applications at certain Department of 
State overseas posts under the Visa Security Program. DHS also manages 
the Visa Waiver Program through which eligible nationals from certain 
countries can travel to the United States without a visa. This 
testimony is based on GAO products issued in November 2009, August 
2010, and from March to May 2011. As requested, this testimony 
addresses the following issues: (1) Overstay enforcement efforts, (2) 
efforts to implement a biometric exit system and challenges with the 
reliability of overstay data, and (3) challenges in the Visa Security 
and Visa Waiver programs.
What GAO Recommends
    GAO has made recommendations in prior reports that, among other 
things, call for DHS to strengthen management of overstay enforcement 
efforts, mechanisms for collecting data from foreign nationals 
departing the United States, and planning for addressing certain Visa 
Security and Visa Waiver programs' risks. DHS generally concurred with 
these recommendations and has actions planned or underway to address 
them.
    visa security: additional actions needed to strengthen overstay 
           enforcement and address risks in the visa process
What GAO Found
    Federal agencies take actions against a small portion of the 
estimated overstay population, but strengthening planning and 
assessment of overstay efforts could improve enforcement. Within DHS, 
U.S. Immigration and Customs Enforcement's (ICE) Counterterrorism and 
Criminal Exploitation Unit (CTCEU) is the lead agency responsible for 
overstay enforcement. CTCEU arrests a small portion of the estimated 
overstay population in the United States because of, among other 
things, ICE's competing priorities, but ICE expressed an intention to 
augment its overstay enforcement resources. From fiscal years 2006 
through 2010, ICE reported devoting about 3 percent of its total field 
office investigative hours to CTCEU overstay investigations. ICE was 
considering assigning some responsibility for noncriminal overstay 
enforcement to its Enforcement and Removal Operations directorate, 
which apprehends and removes aliens subject to removal from the United 
States. In April 2011, GAO reported that by developing a time frame for 
assessing needed resources and using the assessment findings, as 
appropriate, ICE could strengthen its planning efforts. Moreover, in 
April 2011, GAO reported that CTCEU tracked various performance 
measures, but did not have a mechanism to assess the outcomes of its 
efforts. GAO reported that by establishing such a mechanism, CTCEU 
could better ensure that managers have information to assist in making 
decisions.
    DHS has not yet implemented a comprehensive biometric system to 
match available information (e.g., fingerprints) provided by foreign 
nationals upon their arrival and departure from the United States and 
faces reliability issues with data used to identify overstays. GAO 
reported that while the United States Visitor and Immigrant Status 
Indicator Technology Program's biometric entry capabilities were 
operating at ports of entry, exit capabilities were not, and DHS did 
not have a comprehensive plan for biometric exit implementation. DHS 
conducted pilots to test two scenarios for an air exit solution in 
2009, and in August 2010, GAO concluded that the pilots' limitations, 
such as limitations not defined in the pilot evaluation plan like 
suspending exit screening at departure gates to avoid flight delays, 
curtailed DHS's ability to inform a decision for a long-term exit 
solution. Further, in April 2011, GAO reported that there is not a 
standard mechanism for nonimmigrants departing the United States 
through land ports of entry to remit their arrival and departure forms. 
Such a mechanism could help DHS obtain more complete departure data for 
identifying overstays.
    GAO identified various challenges in the Visa Security and Visa 
Waiver programs related to planning and assessment efforts. For 
example, in March 2011, GAO found that ICE developed a plan to expand 
the Visa Security Program to additional high-risk posts, but ICE had 
not fully adhered to the plan or kept it up to date. Further, ICE had 
not identified possible alternatives that would provide the additional 
security of Visa Security Program review at those high-risk posts that 
do not have a program presence. In addition, DHS implemented the 
Electronic System for Travel Authorization (ESTA) to meet a statutory 
requirement intended to enhance Visa Waiver Program security and took 
steps to minimize the burden on travelers to the United States added by 
the new requirement. However, DHS had not fully evaluated security 
risks related to the small percentage of Visa Waiver Program travelers 
without verified ESTA approval.
    Chairwoman Miller, Ranking Member Cuellar, and Members of the 
subcommittee: I am pleased to be here today to discuss the Department 
of Homeland Security's (DHS) programs and efforts to strengthen the 
security of the visa process, including efforts to identify and take 
enforcement against overstays--individuals who were admitted to the 
United States legally on a temporary basis--either with a visa, or in 
some cases, as visitors who were allowed to enter without a visa--but 
then overstayed their authorized periods of admission.\1\ The attempted 
bombing of Northwest Airlines flight 253 on December 25, 2009, by a 
Nigerian citizen in possession of a valid U.S. visa renewed concerns 
about the security of the visa process. Each year, millions of visitors 
come to the United States legally on a temporary basis. From fiscal 
year 2005 through fiscal year 2010, the Department of State issued over 
36 million nonimmigrant visas for business travel, pleasure, tourism, 
medical treatment, or for foreign and cultural exchange student 
programs, among other things.\2\ In addition, from fiscal year 2005 
through fiscal year 2010, over 98 million visitors were admitted to the 
United States under the Visa Waiver Program, which allows nationals 
from certain countries to apply for admission to the country as 
temporary visitors for business or pleasure without first obtaining a 
visa from a U.S. consulate abroad.\3\
---------------------------------------------------------------------------
    \1\ Visitors who are allowed to seek admission without a visa 
include citizens of Canada and the British Overseas Territory of 
Bermuda (and certain residents of other adjacent islands, such as the 
Bahamas) under certain circumstances, as well as Visa Waiver Program 
participants (see footnote 3). In-country overstays refer to 
nonimmigrants who have exceeded their authorized periods of admission 
and remain in the United States without lawful status, while out-of-
country overstays refer to individuals who have departed the United 
States but who, on the basis of arrival and departure information, 
stayed beyond their authorized periods of admission.
    \2\ Temporary visitors to the United States generally are referred 
to as ``nonimmigrants.'' For a listing and descriptions of nonimmigrant 
categories, see 8 U.S.C.  1101(a)(15); see also 8 C.F.R.  
214.1(a)(1)-(2). Generally, nonimmigrants wishing to visit the United 
States gain permission to apply for admission to the country through 
one of two ways. First, those eligible for the Visa Waiver Program 
apply on-line to establish eligibility to travel under the program 
prior to departing for the United States (unless they are seeking 
admission at a land port of entry, in which case eligibility is 
established at the time of application for admission). Second, those 
not eligible for the Visa Waiver Program and not otherwise exempt from 
the visa requirement must visit the U.S. consular office with 
jurisdiction over their place of residence or, in certain 
circumstances, the area in which they are physically present but not 
resident, to obtain a visa. Upon arriving at a port of entry, 
nonimmigrants must undergo inspection by U.S. Customs and Border 
Protection officers, who determine whether or not they may be admitted 
into the United States.
    \3\ In order to qualify for the Visa Waiver Program, a country must 
meet various requirements, such as entering into an agreement with the 
United States to report lost or stolen passports within a strict time 
limit and in a manner specified in the agreement. Currently, 36 
countries participate in the Visa Waiver Program: Andorra, Australia, 
Austria, Belgium, Brunei, Czech Republic, Denmark, Estonia, Finland, 
France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Japan, 
Latvia, Liechtenstein, Lithuania, Luxembourg, Malta, Monaco, the 
Netherlands, New Zealand, Norway, Portugal, San Marino, Singapore, 
Slovakia, Slovenia, South Korea, Spain, Sweden, Switzerland, and the 
United Kingdom.
---------------------------------------------------------------------------
    Further, the most recent estimates from the Pew Hispanic Center 
approximated that in 2006, out of an unauthorized resident alien 
population of 11.5 million to 12 million in the United States, about 4 
million to 5.5 million were overstays.\4\ In February 2008, we reported 
that most overstays are likely motivated by economic opportunities to 
stay in the United States beyond their authorized periods of 
admission.\5\ Individuals overstaying their authorized periods of 
admission could pose homeland security concerns. For example, in some 
instances overstays have been identified as terrorists or involved in 
terrorist-related activity, such as 5 of the 19 September 11, 2001, 
hijackers. Further, according to DHS data, of approximately 400 
individuals reported by the Department of Justice as convicted in the 
United States as a result of international terrorism-related 
investigations conducted from September 2001 through March 2010, 
approximately 36 were overstays.\6\
---------------------------------------------------------------------------
    \4\ Pew Hispanic Center, Modes of Entry for the Unauthorized 
Migrant Population (Washington, DC: May 22, 2006).
    \5\ GAO, Visa Waiver Program: Limitations with Department of 
Homeland Security's Plan to Verify Departure of Foreign Nationals, GAO-
08-458T (Washington, DC: Feb. 28, 2008).
    \6\ For more information on these convictions, see Department of 
Justice, National Security Division Statistics on Unsealed 
International Terrorism and Terrorism-Related Convictions (Washington, 
DC: March 2010).
---------------------------------------------------------------------------
    DHS has certain responsibilities for strengthening security in the 
visa process, including identifying and taking enforcement action to 
address overstays. Within DHS, U.S. Customs and Border Protection (CBP) 
is tasked with, among other duties, inspecting all people applying for 
entry to the United States to determine their admissibility to the 
country and screening Visa Waiver Program applicants to determine their 
eligibility to travel to the United States under the program. U.S. 
Immigration and Customs Enforcement (ICE) is the lead agency for 
enforcing immigration law in the interior of the United States and is 
primarily responsible for overstay enforcement, and within ICE, the 
Counterterrorism and Criminal Exploitation Unit (CTCEU) is primarily 
responsible for overstay investigations. The United States Visitor and 
Immigrant Status Indicator Technology Program (US-VISIT) within DHS's 
National Protection and Programs Directorate supports the 
identification of nonimmigrant overstays. In 2002, DHS initiated the 
US-VISIT Program to develop a comprehensive entry and exit system to 
collect biometric data from aliens traveling through U.S. ports of 
entry. In 2004, US-VISIT initiated the first step of this program by 
collecting biometric data on aliens entering the United States. 
Further, the Department of State is responsible for issuing visas to 
foreign nationals seeking admission to the United States. In addition, 
DHS has responsibility for managing the Visa Security Program and the 
Visa Waiver Program. Specifically, ICE oversees the Visa Security 
Program under which it deploys officials to certain U.S. embassies and 
consulates to strengthen the visa process by working with Department of 
State officials in reviewing visa applications.\7\ DHS is also 
responsible for establishing visa policy, including policy for the Visa 
Waiver Program.
---------------------------------------------------------------------------
    \7\ The Homeland Security Act of 2002 (Pub. L. 107-296, 116 Stat. 
2135) established DHS and gave the Secretary of Homeland Security 
authority to issue regulations with respect to the issuance and refusal 
of visas. Section 428 of the Homeland Security Act authorizes the 
Secretary of Homeland Security to assign DHS employees to consular 
posts overseas to support the visa process through various functions. 
See 6 U.S.C.  236(e).
---------------------------------------------------------------------------
    As requested, my testimony will cover the following key issues: (1) 
Efforts to take enforcement action against overstays and reported 
results; (2) DHS's efforts to implement a biometric exit system and the 
reliability of data used to identify overstays; and (3) challenges and 
weaknesses in the Visa Security and Visa Waiver programs. This 
testimony is based on our prior work on overstay enforcement efforts, 
the US-VISIT program, the Visa Security Program, and the Visa Waiver 
Program. We issued reports from these efforts in April 2011, August 
2010 and November 2009, March 2011, and May 2011, respectively.\8\ For 
these reports, we examined program documentation, such as standard 
operating procedures, guidance for investigations, and implementation 
plans. We also interviewed DHS and Department of State officials. 
Additional details on the scope and methodology are available in our 
published reports. We conducted this work in accordance with generally 
accepted government auditing standards.
---------------------------------------------------------------------------
    \8\ GAO, Overstay Enforcement: Additional Mechanisms for 
Collecting, Assessing, and Sharing Data Could Strengthen DHS's Efforts 
but Would Have Costs, GAO-11-411 (Washington, DC: April 15, 2011); 
Homeland Security: US-VISIT Pilot Evaluations Offer Limited 
Understanding of Air Exit Options, GAO-10-860 (Washington, DC: Aug. 10, 
2010); Homeland Security: Key US-VISIT Components at Varying Stages of 
Completion, but Integrated and Reliable Schedule Needed, GAO-10-13 
(Washington, DC: Nov. 19, 2009); Border Security: DHS's Visa Security 
Program Needs to Improve Performance Evaluation and Better Address Visa 
Risk Worldwide, GAO-11-315 (Washington, DC: Mar. 31, 2011), and Visa 
Waiver Program: DHS Has Implemented the Electronic System for Travel 
Authorization, but Further Steps Needed to Address Potential Program 
Risks, GAO-11-335 (Washington, DC: May 5, 2011).
---------------------------------------------------------------------------
    In summary, DHS has taken action to strengthen security in the visa 
process, but operational and management weaknesses have hindered the 
effectiveness of these efforts. First, ICE investigates and arrests a 
small portion of the estimated overstay population in the United States 
because of, for example, competing enforcement priorities. ICE also 
reported allocating a small percentage of its investigative work hours 
to overstay investigations since fiscal year 2006, but the agency has 
expressed an intention to augment the resources it dedicates to 
overstay enforcement efforts moving forward. However, ICE does not yet 
have a target time frame for completing its planning efforts for 
augmenting overstay enforcement resources, and it lacks mechanisms for 
assessing the effectiveness of its enforcement efforts. Second, DHS has 
not yet implemented a comprehensive biometric entry and exit system for 
collecting biometric data on foreign nationals when they depart the 
United States. In the absence of such a system, DHS uses primarily 
biographic data to identify overstays. However, unreliable data hinder 
DHS's efforts to accurately identify overstays. Third, ICE has deployed 
agents to certain embassies and consulates as part of the Visa Security 
Program, but has not performed mandated training, has faced staffing 
challenges, and has not fully adhered to its program expansion plan. 
DHS has taken action to strengthen the security of the Visa Waiver 
Program, but has not fully analyzed program risks or completed required 
reports on participating countries' security risks in a timely manner. 
We made a number of recommendations to DHS to strengthen its efforts in 
these areas, such as improving its management and assessment of 
overstay enforcement efforts, planning for a biometric exit capability 
and mechanisms for collecting data from foreign nationals departing the 
United States at land ports of entry, and addressing risks in the Visa 
Security and Visa Waiver programs. DHS concurred with these 
recommendations and has actions planned or under way to address them.
federal agencies take actions against a small portion of the estimated 
                          overstay population
ICE Investigates Few In-Country Overstays, but Its Efforts Could 
        Benefit from Improved Planning and Performance Management
    As we reported in April 2011, ICE CTCEU investigates and arrests a 
small portion of the estimated in-country overstay population due to, 
among other things, ICE's competing priorities; however, these efforts 
could be enhanced by improved planning and performance management. 
CTCEU, the primary Federal entity responsible for taking enforcement 
action to address in-country overstays, identifies leads for overstay 
cases; takes steps to verify the accuracy of the leads it identifies 
by, for example, checking leads against multiple databases; and 
prioritizes leads to focus on those the unit identifies as being most 
likely to pose a threat to National security or public safety. CTCEU 
then requires field offices to initiate investigations on all priority, 
high-risk leads it identifies.
    According to CTCEU data, as of October 2010, ICE field offices had 
closed about 34,700 overstay investigations that CTCEU headquarters 
assigned to them from fiscal year 2004 through 2010.\9\ These cases 
resulted in approximately 8,100 arrests (about 23 percent of the 34,700 
investigations), relative to a total estimated overstay population of 4 
million to 5.5 million.\10\ About 26,700 of those investigations (or 77 
percent) resulted in one of these three outcomes:\11\ (1) Evidence is 
uncovered indicating that the suspected overstay has departed the 
United States; (2) evidence is uncovered indicating that the subject of 
the investigation is in-status (e.g., the subject filed a timely 
application with the United States Citizenship and Immigration Services 
(USCIS) to change his or her status and/or extend his or her authorized 
period of admission in the United States); or (3) CTCEU investigators 
exhaust all investigative leads and cannot locate the suspected 
overstay.\12\ Of the approximately 34,700 overstay investigations 
assigned by CTCEU headquarters that ICE field offices closed from 
fiscal year 2004 through 2010, ICE officials attributed the significant 
portion of overstay cases that resulted in a departure finding, in-
status finding, or with all leads being exhausted generally to 
difficulties associated with locating suspected overstays and the 
timeliness and completeness of data in DHS's systems used to identify 
overstays.
---------------------------------------------------------------------------
    \9\ CTCEU also investigates suspected Visa Waiver Program 
overstays, out-of-status students and violators of the National 
Security Entry-Exit Registration System, a program that requires 
certain visitors or nonimmigrants to register with DHS for National 
security reasons. For the purpose of this discussion, these 
investigations are referred to collectively as ``overstay'' 
investigations. In addition to CTCEU investigative efforts, other ICE 
programs within Enforcement and Removal Operations may take enforcement 
action against overstays, though none of these programs solely or 
directly focus on overstay enforcement. For example, if the Enforcement 
and Removal Operations Criminal Alien Program identifies a criminal 
alien who poses a threat to public safety and is also an overstay, the 
program may detain and remove that criminal alien from the United 
States.
    \10\ The most recent estimates from the Pew Hispanic Center 
approximated that, in 2006, out of an unauthorized resident alien 
population of 11.5 million to 12 million in the United States, about 4 
million to 5.5 million were overstays. Pew Hispanic Center, Modes of 
Entry for the Unauthorized Migrant Population (Washington, DC: May 22, 
2006).
    \11\ Investigations resulting and not resulting in arrest do not 
total 34,700 due to rounding.
    \12\ With regard to the second outcome, that the subject is found 
to be in-status, under certain circumstances, an application for 
extension or change of status can temporarily prevent a visitor's 
presence in the United States from being categorized as unauthorized. 
See Donald Neufeld, Acting Associate Director, Domestic Operations 
Directorate, USCIS, ``Consolidation of Guidance Concerning Unlawful 
Presence for Purposes of Sections 212(a)(9)(B)(i) and 
212(a)(9)(C)(i)(I) of the [Immigration and Nationality] Act,'' 
memorandum, Washington, DC, May 6, 2009.
---------------------------------------------------------------------------
    Further, ICE reported allocating a small percentage of its 
resources in terms of investigative work hours to overstay 
investigations since fiscal year 2006, but the agency expressed an 
intention to augment the resources it dedicates to overstay enforcement 
efforts moving forward. Specifically, from fiscal years 2006 through 
2010, ICE reported devoting from 3.1 to 3.4 percent of its total field 
office investigative hours to CTCEU overstay investigations. ICE 
attributed the small percentage of investigative resources it reported 
allocating to overstay enforcement efforts primarily to competing 
enforcement priorities. According to the ICE Assistant Secretary, ICE 
has resources to remove 400,000 aliens per year, or less than 4 percent 
of the estimated removable alien population in the United States. In 
June 2010, the Assistant Secretary stated that ICE must prioritize the 
use of its resources to ensure that its efforts to remove aliens 
reflect the agency's highest priorities, namely nonimmigrants, 
including suspected overstays, who are identified as high-risk in terms 
of being most likely to pose a risk to National security or public 
safety. As a result, ICE dedicated its limited resources to addressing 
overstays it identified as most likely to pose a potential threat to 
National security or public safety and did not generally allocate 
resources to address suspected overstays that it assessed as non-
criminal and low-risk. ICE indicated that it may allocate more 
resources to overstay enforcement efforts moving forward and that it 
planned to focus primarily on suspected overstays whom ICE has 
identified as high-risk or who recently overstayed their authorized 
periods of admission.
    ICE was considering assigning some responsibility for noncriminal 
overstay enforcement to its Enforcement and Removal Operations (ERO) 
directorate, which has responsibility for apprehending and removing 
aliens who do not have lawful immigration status from the United 
States. However, ERO did not plan to assume this responsibility until 
ICE assessed the funding and resources doing so would require. ICE had 
not established a time frame for completing this assessment. We 
reported in April 2011 that by developing such a time frame and 
utilizing the assessment findings, as appropriate, ICE could strengthen 
its planning efforts and be better positioned to hold staff accountable 
for completing the assessment. We recommended that ICE establish a 
target time frame for assessing the funding and resources ERO would 
require in order to assume responsibility for civil overstay 
enforcement and use the results of that assessment. DHS officials 
agreed with our recommendation and stated that ICE planned to identify 
resources needed to transition this responsibility to ERO as part of 
its fiscal year 2013 resource-planning process.
    Moreover, although CTCEU established an output program goal and 
target, and tracked various performance measures, it did not have a 
mechanism in place to assess the outcomes of its efforts, particularly 
the extent to which the program was meeting its mission as it relates 
to overstays--to prevent terrorists and other criminals from exploiting 
the Nation's immigration system. CTCEU's program goal is to prevent 
criminals and terrorists from exploiting the immigration system by 
proactively developing cases for investigation, and its performance 
target is to send 100 percent of verified priority leads to field 
offices as cases.\13\ CTCEU also tracks a variety of output measures, 
such as the number of cases completed their associated results (i.e., 
arrested, departed, in-status, or all leads exhausted) and average 
hours spent to complete an investigation. While CTCEU's performance 
target permits it to assess an output internal to the program--the 
percentage of verified priority leads it sends to field offices for 
investigation--it does not provide program officials with a means to 
assess the impact of the program in terms of preventing terrorists and 
other criminals from exploiting the immigration system. We reported 
that by establishing such mechanisms, CTCEU could better ensure that 
managers have information to assist in making decisions for 
strengthening overstay enforcement efforts and assessing performance 
against CTCEU's goals. In our April 2011 report, we recommended that 
ICE develop outcome-based performance measures--or proxy measures if 
program outcomes cannot be captured--and associated targets on CTCEU's 
progress in preventing terrorists and other criminals from exploiting 
the Nation's immigration system. DHS officials agreed with our 
recommendation and stated that ICE planned to work with DHS's National 
security partners to determine if measures could be implemented.
---------------------------------------------------------------------------
    \13\ Verified leads are leads that CTCEU has determined to be 
accurate and viable by analyzing information from Government and 
commercial databases containing information related to immigration 
status. For example, these procedures are intended to verify that an 
individual suspected of overstaying has not departed the country or 
been granted an extension of stay by USCIS.
---------------------------------------------------------------------------
The Department of State and CBP Have Taken Action to Prevent Ineligible 
        Out-of-Country Overstays from Returning to the United States
    In addition to ICE's overstay enforcement activities, in April 2011 
we reported that the Department of State and CBP are responsible for, 
respectively, preventing ineligible violators from obtaining a new visa 
or being admitted to the country at a port of entry. According to 
Department of State data, the Department denied about 52,800 
nonimmigrant visa applications and about 114,200 immigrant visa 
applications from fiscal year 2005 through fiscal year 2010 due, at 
least in part, to applicants having previously been unlawfully present 
in the United States for more than 180 days, according to statute.\14\ 
Similarly, CBP reported that it refused admission to about 5,000 
foreign nationals applying for admission to the United States from 
fiscal year 2005 through 2010 (an average of about 830 per year) 
specifically because of the applicants' previous status as unlawfully 
present in the United States for more than 180 days.\15\
---------------------------------------------------------------------------
    \14\ State Department data indicate that a total of about 36.5 
million nonimmigrant visas and about 2.7 million immigrant visas were 
issued from fiscal year 2005 through 2010.
    \15\ CBP data indicates that, in total, about 1.3 million foreign 
nationals were determined to be inadmissible to the United States by 
the CBP Office of Field Operations from fiscal year 2005 through 2010. 
As is the case with the State Department, CBP is unable to isolate and 
quantify the number of aliens it has determined to be inadmissible 
because of the aliens having overstayed by 180 days or less, because 
actions taken against these aliens are recorded under grounds of 
inadmissibility that may apply to, but are not limited to, overstays.
---------------------------------------------------------------------------
 dhs has not implemented a reliable exit system and faces reliability 
                issues with existing visa overstay data
DHS Has Not Yet Implemented a Comprehensive Biometric Exit System
    DHS has not yet implemented a comprehensive biometric system to 
match available information provided by foreign nationals upon their 
arrival and departure from the United States. In August 2007, we 
reported that while US-VISIT biometric entry capabilities were 
operating at air, sea, and land ports of entry, exit capabilities were 
not, and that DHS did not have a comprehensive plan or a complete 
schedule for biometric exit implementation.\16\ In addition, we 
reported that DHS continued to propose spending tens of millions of 
dollars on US-VISIT exit projects that were not well-defined, planned, 
or justified on the basis of costs, benefits, and risks.\17\ Moreover, 
in November 2009, we reported that DHS had not adopted an integrated 
approach to scheduling, executing, and tracking the work that needed to 
be accomplished to deliver a comprehensive exit solution as part of the 
US-VISIT program. We concluded that, without a master schedule that was 
integrated and derived in accordance with relevant guidance, DHS could 
not reliably commit to when and how it would deliver a comprehensive 
exit solution or adequately monitor and manage its progress toward this 
end. We recommended that DHS ensure that an integrated master schedule 
be developed and maintained. DHS concurred and reported, as of July 
2011, that the documentation of schedule practices and procedures is 
on-going, and that an updated schedule standard, management plan, and 
management process that are compliant with schedule guidelines are 
under review.
---------------------------------------------------------------------------
    \16\ The purpose of US-VISIT is to provide biometric (e.g., 
fingerprint) identification--through the collection, maintenance, and 
sharing of biometric and selected biographic data--to authorized DHS 
and other Federal agencies.
    \17\ GAO, Homeland Security: U.S. Visitor and Immigrant Status 
Program's Longstanding Lack of Strategic Direction and Management 
Controls Needs to Be Addressed, GAO-07-1065 (Washington, DC: Aug. 31, 
2007).
---------------------------------------------------------------------------
    More specifically, with regard to a biometric exit capability at 
land ports of entry, we reported in December 2006 that US-VISIT 
officials concluded that, for various reasons, a biometric US-VISIT 
exit capability could not be implemented without incurring a major 
impact on land facilities.\18\ In December 2009, DHS initiated a land 
exit pilot to collect departure information from temporary workers 
traveling through two Arizona land ports of entry. Under this pilot, 
temporary workers who entered the United States at these ports of entry 
were required to register their final departure by providing biometric 
and biographic information at exit kiosks located at the ports of 
entry. DHS planned to use the results of this pilot to help inform 
future decisions on the pedestrian component of the long-term land exit 
component of a comprehensive exit system.
---------------------------------------------------------------------------
    \18\ GAO, Border Security: US-VISIT Program Faces, Strategic, 
Operational, and Technological Challenges at Land Ports of Entry, GAO-
07-248 (Washington, DC: Dec. 6, 2006).
---------------------------------------------------------------------------
    With regard to air and sea ports of entry, in April 2008, DHS 
announced its intention to implement biometric exit verification at air 
and sea ports of entry in a Notice of Proposed Rule Making.\19\ Under 
this notice, commercial air and sea carriers would be responsible for 
developing and deploying the capability to collect biometric 
information from departing travelers and transmit it to DHS. DHS 
received comments on the notice and has not yet published a final rule. 
Subsequent to the rule making notice, on September 30, 2008, the 
Consolidated Security, Disaster Assistance, and Continuing 
Appropriations Act, 2009, was enacted, which directed DHS to test two 
scenarios for an air exit solution: (1) Airline collection and 
transmission of biometric exit data, as proposed in the rulemaking 
notice and (2) CBP collection of such information at the departure 
gate.\20\ DHS conducted two pilots in 2009, and we reported on them in 
August 2010. Specifically, we reported that the pilots addressed one 
statutory requirement for a CBP scenario to collect information on 
exiting foreign nationals. However, DHS was unable to address the 
statutory requirement for an airline scenario because no airline was 
willing to participate. We reported on limitations with the pilots, 
such as the reported scope and approach of the pilots including 
limitations not defined in the pilot evaluation plan like suspending 
exit screening at departure gates to avoid flight delays, that 
curtailed their ability to inform a decision for a long-term air exit 
solution and pointed to the need for additional sources of information 
on air exit's operational impacts.\21\ We recommended that the 
Secretary of Homeland Security identify additional sources of 
information beyond the pilots, such as comments from the Notice of 
Proposed Rule Making, to inform an air exit solution decision. DHS 
agreed with the recommendation and stated that the pilots it conducted 
would not serve as the sole source of information to inform an air exit 
solution decision. In July 2011, DHS stated that it continues to 
examine all options in connection with a final biometric air exit 
solution and has recently given consideration to using its authority to 
establish an advisory committee to study and provide recommendations to 
DHS and Congress on implementing an air exit program.
---------------------------------------------------------------------------
    \19\ 73 Fed. Reg. 22,065 (Apr. 24, 2008).
    \20\ Pub. L. No. 110-329, 122 Stat. 3574, 3668-70 (2008).
    \21\ GAO, Homeland Security: US-VISIT Pilot Evaluations Offer 
Limited Understanding of Air Exit Options, GAO-10-860 (Washington, DC: 
Aug. 10, 2010).
---------------------------------------------------------------------------
More Reliable, Accessible Data Could Improve DHS's Efforts to Identify 
        and Share Information on Overstays
    In the absence of a comprehensive biometric entry and exit system 
for identifying and tracking overstays, US-VISIT and CTCEU primarily 
analyze biographic entry and exit data collected at land, air, and sea 
ports of entry to identify overstays. In April 2011, we reported that 
DHS's efforts to identify and report on visa overstays were hindered by 
unreliable data. Specifically, CBP does not inspect travelers exiting 
the United States through land ports of entry, including collecting 
their biometric information, and CBP did not provide a standard 
mechanism for nonimmigrants departing the United States through land 
ports of entry to remit their arrival and departure forms. 
Nonimmigrants departing the United States through land ports of entry 
turn in their forms on their own initiative. According to CBP 
officials, at some ports of entry, CBP provides a box for nonimmigrants 
to drop off their forms, while at other ports of entry departing 
nonimmigrants may park their cars, enter the port of entry facility, 
and provide their forms to a CBP officer. These forms contain 
information, such as arrival and departure dates, used by DHS to 
identify overstays. If the benefits outweigh the costs, a mechanism to 
provide nonimmigrants with a way to turn in their arrival and departure 
forms could help DHS obtain more complete and reliable departure data 
for identifying overstays. We recommended that the Commissioner of CBP 
analyze the costs and benefits of developing a standard mechanism for 
collecting these forms at land ports of entry, and develop a standard 
mechanism to collect them, to the extent that benefits outweigh the 
costs. CBP agreed with our recommendation and stated it planned to 
complete a cost-effective independent evaluation.
    Further, we previously reported on weaknesses in DHS processes for 
collecting departure data, and how these weaknesses impact the 
determination of overstay rates. The Implementing Recommendations of 
the 9/11 Commission Act required that DHS certify that a system is in 
place that can verify the departure of not less than 97 percent of 
foreign nationals who depart through U.S. airports in order for DHS to 
expand the Visa Waiver Program.\22\ In September 2008, we reported that 
DHS's methodology for comparing arrivals and departures for the purpose 
of departure verification would not inform overall or country-specific 
overstay rates because DHS's methodology did not begin with arrival 
records to determine if those foreign nationals departed or remained in 
the United States beyond their authorized periods of admission.\23\ 
Rather, DHS's methodology started with departure records and matched 
them to arrival records. As a result, DHS's methodology counted 
overstays who left the country, but did not identify overstays who have 
not departed the United States and appear to have no intention of 
leaving. We recommended that DHS explore cost-effective actions 
necessary to further improve the reliability of overstay data. DHS 
reported that it is taking steps to improve the accuracy and 
reliability of the overstay data, by efforts such as continuing to 
audit carrier performance and work with airlines to improve the 
accuracy and completeness of data collection. Moreover, by statute, DHS 
is required to submit an annual report to Congress providing numerical 
estimates of the number of aliens from each country in each 
nonimmigrant classification who overstayed an authorized period of 
admission that expired during the fiscal year prior to the year for 
which the report is made.\24\ DHS officials stated that the Department 
has not provided Congress annual overstay estimates regularly since 
1994 because officials do not have sufficient confidence in the quality 
of the Department's overstay data--which is maintained and generated by 
US-VISIT. As a result, DHS officials stated that the Department cannot 
reliably report overstay rates in accordance with the statute.
---------------------------------------------------------------------------
    \22\ 8 U.S.C.  1187(c)(8).
    \23\ GAO, Visa Waiver Program: Actions Are Needed to Improve 
Management of the Expansion Process, and to Assess and Mitigate Program 
Risks, GAO-08-967 (Washington, DC: Sept. 15, 2008).
    \24\ 8 U.S.C.  1376(b).
---------------------------------------------------------------------------
    In addition, in April 2011 we reported that DHS took several steps 
to provide its component entities and other Federal agencies with 
information to identify and take enforcement action on overstays, 
including creating biometric and biographic lookouts--or electronic 
alerts--on the records of overstay subjects that are recorded in 
databases. However, DHS did not create lookouts for the following two 
categories of overstays: (1) Temporary visitors who were admitted to 
the United States using nonimmigrant business and pleasure visas and 
subsequently overstayed by 90 days or less; and (2) suspected in-
country overstays who CTCEU deemed not to be a priority for 
investigation in terms of being most likely to pose a threat to 
National security or public safety. Broadening the scope of electronic 
lookouts in Federal information systems could enhance overstay 
information sharing. In April 2011, we recommended that the Secretary 
of Homeland Security direct the Commissioner of Customs and Border 
Protection, the Under Secretary of the National Protection and Programs 
Directorate, and the Assistant Secretary of Immigration and Customs 
Enforcement to assess the costs and benefits of creating biometric and 
biographic lookouts for these two categories of overstays. Agency 
officials agreed with our recommendation and have actions under way to 
address it. For example, agency officials stated that they have met to 
assess the costs and benefits of creating lookouts for those categories 
of overstays.
additional steps needed to address risks in the visa security and visa 
                            waiver programs
Visa Security Program
    As we reported in March 2011, the Visa Security Program faces 
several key challenges in implementing operations at overseas posts. 
For example, we reported that Visa Security Program agents' advising 
and training of consular officers, as mandated by section 428 of the 
Homeland Security Act, varied from post to post, and some posts 
provided no training to consular officers. We contacted consular 
sections at 13 overseas posts, and officials from 5 of the 13 consular 
sections we interviewed stated that they had received no training from 
the Visa Security Program agents in the last year, and none of the 
agents we interviewed reported providing training on specific security 
threats. At posts where Visa Security Program agents provided training 
for consular officers, topics covered included fraudulent documents, 
immigration law, human smuggling, and interviewing techniques. In March 
2011, we recommended that DHS issue guidance requiring Visa Security 
Program agents to provide training for consular officers as mandated by 
section 428 of the Homeland Security Act. DHS concurred with our 
recommendation and has actions under way to address it.
    Further, in March 2011 we reported that Visa Security Program 
agents performed a variety of investigative and administrative 
functions beyond their visa security responsibilities, including 
criminal investigations, attache functions, and regional 
responsibilities. According to ICE officials, Visa Security Program 
agents perform non-program functions only after completing their visa 
security screening and vetting workload. However, both agents and 
Department of State officials at some posts told us that these other 
investigative and administrative functions sometimes slowed or limited 
Visa Security Program agents' visa security-related activities. We 
recommended that DHS develop a mechanism to track the amount of time 
spent by Visa Security Program agents on visa security activities and 
other investigations, in order to determine appropriate staffing levels 
and resource needs for Visa Security Program operations at posts 
overseas to ensure visa security operations are not limited. DHS did 
not concur with our recommendation, stating that ICE currently tracks 
case investigation hours through its data system, and that adding the 
metric to the Visa Security Program tracking system would be redundant. 
However, DHS's response did not address our finding that ICE does not 
have a mechanism that allows the agency to track the amount of time 
agents spend on both investigation hours and hours spent on visa 
security activities. Therefore, we continue to believe the 
recommendation has merit and should be implemented.
    Moreover, we found that ICE's use of 30-day temporary duty 
assignments to fill Visa Waiver Program positions at posts created 
challenges and affected continuity of operations at some posts. 
Consular officers we interviewed at 3 of 13 posts discussed challenges 
caused by this use of temporary duty agents. The Visa Security 
Program's 5-year plan also identified recruitment of qualified 
personnel as a challenge and recommended incentives for Visa Security 
Program agents as critical to the program's mission, stating, ``These 
assignments present significant attendant lifestyle difficulties. If 
the mission is to be accomplished, ICE, like State, needs a way to 
provide incentives for qualified personnel to accept these hardship 
assignments.'' However, according to ICE officials, ICE had not 
provided incentives to facilitate recruitment for hardship posts.\25\ 
ICE officials stated that they have had difficulty attracting agents to 
Saudi Arabia, and ICE agents at post told us they have little incentive 
to volunteer for Visa Security Program assignments. Thus, we 
recommended that DHS develop a plan to provide Visa Security Program 
coverage at high-risk posts where the possibility of deploying agents 
may be limited. DHS agreed with our recommendation and is taking steps 
to implement it.
---------------------------------------------------------------------------
    \25\ The Department of State has designated roughly two-thirds of 
its 268 overseas posts as hardship posts. Staff working in such 
locations often encounter harsh environmental and living conditions 
that can include inadequate medical facilities, limited opportunities 
for spousal employment, poor schools, high levels of crime, and severe 
climate.
---------------------------------------------------------------------------
    In addition, ICE developed a plan to expand the Visa Security 
Program to additional high-risk visa-issuing posts, but ICE had not 
fully adhered to the plan or kept it up to date. The program's 5-year 
expansion plan, developed in 2007, identified 14 posts for expansion 
between 2009 and 2010, but 9 of these locations had not been 
established at the time of our March 2011 report, and ICE had not 
updated the plan to reflect the current situation. Furthermore, ICE had 
not fully addressed remaining visa risk in high-risk posts that did not 
have a Visa Security Program presence. ICE, with input from the 
Department of State, developed a list of worldwide visa-issuing posts 
that are ranked according to visa risk. Although the expansion plan 
stated that risk analysis is the primary input to Visa Security Program 
site selection and that the expansion plan represented an effort to 
address visa risk, ICE had not expanded the Visa Security Program to 
some high-risk posts. For example, 11 of the top 20 high-risk posts 
identified by ICE and Department of State were not covered by Visa 
Security Program at the time of our review. The expansion of the Visa 
Security Program may be limited by a number of factors--including 
budget limitations and objections from Department of State officials at 
some posts--and ICE had not identified possible alternatives that would 
provide the additional security of Visa Security Program review at 
those posts that do not have a program presence. In May 2011, we 
recommended that DHS develop a plan to provide Visa Security Program 
coverage at high-risk posts where the possibility of deploying agents 
may be limited. DHS concurred with our recommendation and noted actions 
under way to address it, such as enhancing information technology 
systems to allow for screening and reviewing of visa applicants at 
posts worldwide.
Visa Waiver Program
    As we reported in May 2011, DHS implemented the Electronic System 
for Travel Authorization (ESTA) to meet a statutory requirement 
intended to enhance Visa Waiver Program security and took steps to 
minimize the burden on travelers to the United States added by the new 
requirement.\26\ However, DHS had not fully evaluated security risks 
related to the small percentage of Visa Waiver Program travelers 
without verified ESTA approval. DHS developed ESTA to collect passenger 
data and complete security checks on the data before passengers board a 
U.S.-bound carrier. DHS requires applicants for Visa Waiver Program 
travel to submit biographical information and answers to eligibility 
questions through ESTA prior to travel. Travelers whose ESTA 
applications are denied can apply for a U.S. visa. In developing and 
implementing ESTA, DHS took several steps to minimize the burden 
associated with ESTA use. For example, ESTA reduced the requirement 
that passengers provide biographical information to DHS officials from 
every trip to once every 2 years. In addition, because of ESTA, DHS has 
informed passengers who do not qualify for Visa Waiver Program travel 
that they need to apply for a visa before they travel to the United 
States. Moreover, most travel industry officials we interviewed in six 
Visa Waiver Program countries praised DHS's widespread ESTA outreach 
efforts, reasonable implementation time frames, and responsiveness to 
feedback but expressed dissatisfaction over ESTA fees paid by ESTA 
applicants.\27\
---------------------------------------------------------------------------
    \26\ See 8 U.S.C.  1187(h)(3).
    \27\ In September 2010, the U.S. Government began to charge ESTA 
applicants a $14 fee when they applied for ESTA approval, including $10 
for the creation of a corporation to promote travel to the United 
States and $4 to fund ESTA operations.
---------------------------------------------------------------------------
    In 2010, airlines complied with the requirement to verify ESTA 
approval for almost 98 percent of the Visa Waiver Program passengers 
prior to boarding, but the remaining 2 percent--about 364,000 
travelers--traveled under the Visa Waiver Program without verified ESTA 
approval. In addition, about 650 of these passengers traveled to the 
United States with a denied ESTA. As we reported in May 2011, DHS had 
not yet completed a review of these cases to know to what extent they 
pose a risk to the program. DHS officials told us that, although there 
was no official agency plan for monitoring and oversight of ESTA, the 
ESTA office was undertaking a review of each case of a carrier's 
boarding a Visa Waiver Program traveler without an approved ESTA 
application; however, DHS had not established a target date for 
completing this review. DHS tracked some data on passengers that travel 
under the Visa Waiver Program without verified ESTA approval but did 
not track other data that would help officials know the extent to which 
noncompliance poses a risk to the program. Without a completed analysis 
of noncompliance with ESTA requirements, DHS was unable to determine 
the level of risk that noncompliance poses to Visa Waiver Program 
security and to identify improvements needed to minimize noncompliance. 
In addition, without analysis of data on travelers who were admitted to 
the United States without a visa after being denied by ESTA, DHS cannot 
determine the extent to which ESTA is accurately identifying 
individuals who should be denied travel under the program. In May 2011, 
we recommended that DHS establish time frames for the regular review 
and documentation of cases of Visa Waiver Program passengers traveling 
to a U.S. port of entry without verified ESTA approval. DHS concurred 
with our recommendation and committed to establish procedures to review 
quarterly a representative sample of noncompliant passengers to 
evaluate, identify, and mitigate potential security risks associated 
with the ESTA program.
    Further, in May 2011 we reported that to meet certain statutory 
requirements, DHS requires that Visa Waiver Program countries enter 
into three information-sharing agreements with the United States; 
however, only half of the countries had fully complied with this 
requirement and many of the signed agreements have not been 
implemented.\28\ Half of the countries entered into agreements to share 
watch list information about known or suspected terrorists and to 
provide access to biographical, biometric, and criminal history data. 
By contrast, almost all of the 36 Visa Waiver Program countries entered 
into an agreement to report lost and stolen passports. DHS, with the 
support of interagency partners, established a compliance schedule 
requiring the last of the Visa Waiver Program countries to finalize 
these agreements by June 2012. Although termination from the Visa 
Waiver Program is one potential consequence for countries not complying 
with the information-sharing agreement requirement, U.S. officials have 
described it as undesirable. DHS, in coordination with the Departments 
of State and Justice, developed measures short of termination that 
could be applied to countries not meeting their compliance date.
---------------------------------------------------------------------------
    \28\ See 8 U.S.C.  1187(c)(2)(D), (F).
---------------------------------------------------------------------------
    In addition, as of May 2011, DHS had not completed half of the most 
recent biennial reports on Visa Waiver Program countries' security 
risks in a timely manner. In 2002, Congress mandated that, at least 
once every 2 years, DHS evaluate the effect of each country's continued 
participation in the program on the security, law enforcement, and 
immigration interests of the United States. The mandate also directed 
DHS to determine based on the evaluation whether each Visa Waiver 
Program country's designation should continue or be terminated and to 
submit a written report on that determination to select Congressional 
committees.\29\ According to officials, DHS assesses, among other 
things, counterterrorism capabilities and immigration programs. 
However, DHS had not completed the latest biennial reports for 18 of 
the 36 Visa Waiver Program countries in a timely manner, and over half 
of these reports are more than 1 year overdue. Further, in the case of 
2 countries, DHS was unable to demonstrate that it had completed 
reports in the last 4 years. DHS cited a number of reasons for the 
reporting delays. For example, DHS officials said that they 
intentionally delayed report completion because they frequently did not 
receive mandated intelligence assessments in a timely manner and needed 
to review these before completing Visa Waiver Program country biennial 
reports. We recommended that DHS take steps to address delays in the 
biennial country review process so that the mandated country reports 
can be completed on time. DHS concurred with our recommendation and 
reported that it would consider process changes to address our concerns 
with the timeliness of continuing Visa Waiver Program reports.
---------------------------------------------------------------------------
    \29\ See the Enhanced Border Security and Visa Entry Reform Act of 
2002.
---------------------------------------------------------------------------
    This concludes my prepared testimony statement. I would be pleased 
to respond to any questions that Members of the subcommittee may have.

    Mrs. Miller. Thank you very much, Mr. Stana. I appreciate 
all the testimony of all the witnesses. I know we have a lot of 
questions.
    One of the things that struck me as you all were testifying 
was the common theme about sharing information, et cetera, and 
working together with your sister agencies, with your partners 
and having good partnerships. That is a theme in my office and 
I think certainly most Members' offices, that was a critical 
element of the 
9/11 Commission recommendations about moving from the need to 
know to the need to share and getting out of our respective 
silos, et cetera, et cetera. We talk about that all the time. 
It is very important certainly. I think that is why our 
committee staff put you all so close together. You are just 
smashed together.
    As I mentioned, the first and foremost responsibility of 
the Federal Government to provide for the common defense is 
actually in the Constitution; securing our borders is a 
Constitutional mandate of the Congress, and that is what this 
committee is all about. So we want to work with the 
administration in every way possible to secure our borders. I 
really do not look at it as a Republican or Democratic issue. I 
see this in very nonpartisan terms. I am delighted that because 
this committee has been very, very vocal about continuing the 
presence of the National Guard as a force multiplier for CBP 
and Border Patrol along the Southern border the administration 
just recently has agreed to do so for some period of time. I 
think we could use more, but still it is a very, very 
excellent, positive step forward, I think.
    Mr. Cohen, as you are outlining today, I don't know whether 
serendipity or whatever, you don't need to comment on that, but 
certainly the timing of having the administration talk about 
things that this committee has been pushing for for some period 
of time in regards to the visa program, announcing those today 
as we are having this hearing does strike me as a bit 
interesting and very welcome, very welcome. So we are delighted 
to hear about those kinds of things.
    I guess I would start, Mr. Cohen, with you. I was trying to 
take some notes as you were outlining this. So there may be a 
couple of questions in this. But you mentioned that you had 1.6 
million names that you started with and about 800,000 of those 
you found then had left, which was an interesting number. So we 
really didn't know about that until you started this, which is 
okay, and then 839,000 left to vet, which you have done so, 
several thousand sent to ICE. I am trying to understand where 
we are in this whole vetting process, if you would flesh out 
your testimony a little bit with that, because you mentioned 
also that Congress would get the data for instance by country 
and some of the other metrics that you outlined. I am 
interested to know when that might be. I thought you said 6, 12 
months. I am interested in that.
    I guess just generally there is no secret about the painful 
economic transition that is happening Nationally and all of us 
are concerned about the budget deficit, and what we want to do 
of course is prioritize our expenditures so that we are doing 
what we need to do with the resources that we have. I think by 
using technology--that was going to be a question I had before 
you outlined here about the biometric forms, and some of the 
biometric and biographic information, of course using the 
biographic information, but the biometric forms whether that is 
iris scan or retinal scanning or fingerprints, all of these 
different kinds of things. I am a big believer in utilizing 
technology as a cost-effective, cost-efficient, in this case 
National security efficiency matrix as well has been overlayed. 
So I was delighted to hear you talk about that.
    So I don't know if I am making my question clear, but I am 
trying to understand exactly what it is that you have outlined 
for us today, because what you said is essentially what we have 
been trying to get at as a committee.
    Mr. Cohen. Thank you, Madam Chairwoman. I think you are 
right, there are a couple of factors that have come into play 
that have allowed us to come here today and be able to describe 
what I think is a pretty fully based approach to how to deal 
with this issue. I think the level of cooperation that has 
matured across not only the Department, but across the Federal 
interagencies, across the law enforcement community, the 
intelligence community as well as the immigration community, 
coupled with quite frankly a maturation of information systems. 
Whether it is the information systems of the NCTC, the 
information systems of the intelligence community, the 
information systems used by US-VISIT, ICE, and CBP and State 
Department, there has been a maturation over the last several 
years. I would argue that what I started to describe earlier 
probably could not have occurred several years ago.
    So how do we get to where we are today? Earlier this year, 
for many of the reasons you all have outlined earlier, the 
Secretary pulled CBP, ICE, US-VISIT together and said, we need 
to vet the 1.6 million records that are commonly referred to as 
the overstay backlog from a National security and public safety 
perspective. We have to get it done and we have to get it done 
now. That meant we all came together and we reached out to our 
intelligence community colleagues and we came up with a way to 
leverage existing technical capabilities to vet from a public 
safety and National security perspective those records.
    The first step was US-VISIT running through their systems 
that 1.6 million records. That is how they were able to 
eliminate the first tranche of that data to determine that they 
had left the country or they had actually changed their 
immigration status.
    The remaining records, a portion of those were considered 
confirmed potential overstays. Based on existing protocols 
those 82,000 records would have been more fully evaluated under 
the preexisting manual database checks and protocols that 
existed through the ICE prioritization process.
    What we did this time is we took those 82,000 records and 
the remaining 757,000 records, which under the prior paradigm 
would never have been fully vetted, and we ran them through the 
NCTC system and then we then leveraged the capabilities of 
automated targeting system to query not only law enforcement 
and other immigration databases but we leveraged the 
intelligence-driven targeting rules that ICE--that CBP utilizes 
in the course of their general business. Out of 839,000 records 
we were able to identify a subset that were potentially public 
safety or National security threats. Working with ICE and CBP 
and the intelligence community, we were able to essentially go 
through each and every one of those 2,000 records.
    A subset of those, several hundred, were potential leads 
that ICE eventually ran down to the point where we were talking 
about dozens. So we started with 1.6 million records and ended 
up with dozens of new investigations. Now some of those, 
several hundred, were preexisting investigations, some had 
died, some were in jail. Which think they were overstays 
because they were actually in jail. Some we determined had left 
the country because we were querying different databases like 
Interpol databases, et cetera. But we were able to automate 
that public safety and national security vetting process.
    We brought the same group together to say, okay, can we do 
the same thing from a location and immigration status 
perspective? Current capabilities did not allow that. To be 
able to vet those 757,000 records from a location and 
immigration status perspective would have required time-
consuming manual databases--database queries, excuse me. So we 
put this team--we focused this team on coming up with a design 
on how to automate those processes as well. That work has been 
underway for several months now. I think we have come up with a 
concrete plan. As we looked at what would result when we put 
that plan into motion, we estimate will take between 6 to 12 
months, we will have phased in results along that time period. 
We not only will be able to fully vet from an on-going basis 
any other potential overstays, or visa applicants, or visa 
holders, or people requesting other immigration benefits from a 
public safety or National security perspective, but we will 
also have enhanced biographic exit capability from added 
biometric features, such as better utilization of fingerprint 
identification numbers and other biometrics. If we couple that 
with research being done by our S&T on biometric data 
collection capabilities from an exit perspective, you have the 
foundation for a biometric exit capability in the future.
    Mrs. Miller. Well, I for one cannot tell you how much 
better I feel now than I did at the beginning of this hearing 
listening to your explanation and as you have been talking 
about your process here. I guess one follow-up, when you talk 
about follow-on, sometimes ``follow up'' are the two most 
important words in the English language. You have this large 
group that you began with, 1.6 million, and you went through 
various iterations down to a couple of hundred apparently that 
are continuing with some sort of investigative process there. 
How will you do in following up so we never get to that huge 
backup again? So you will be able to--maybe you told me that, 
but I didn't quite get it. How are you going to continue to do 
this so it will not happen in the future, we will be able to in 
real time understand if there is a significant threat to 
National security--not 6 months after the fact.
    Mr. Cohen. So, for me, one of the most exciting parts of 
this has been to watch how as we have brought more clarity to 
the technological capabilities that can come when we interlink 
these systems, that that has caused a parallel excitement on 
the operational side. ICE has, working with CBP and others, has 
been rethinking the way that they track day-to-day. So instead 
of us being reactive, an overstay list being--a potential 
overstay list being created, it being prioritized best based on 
preexisting prioritization standards, CBP and the technologists 
will be working developing essentially a hot sheet, which on 
day-to-day will look at new derogatory information coming in, 
new immigration information coming in, new travel information 
coming in and will essentially create a dashboard available to 
ICE on a day-to-day basis that will provide them insights about 
those public safety and National security risks that are either 
overstays or existing visa holders.
    So ICE is actually--this has provided an opportunity for 
ICE, as they are able to free up more personnel from these 
database queries, to be more imaginative and creative in how 
they use their existing investigative resources.
    Maybe I would defer to Mr. Edge if he wants to add any more 
to that.
    Mrs. Miller. Mr. Edge.
    Mr. Edge. Thank you very much, Chairwoman Miller.
    That is certainly a very accurate assessment. The part that 
US-VISIT begins we are able to take after all these leads have 
been fully evaluated and vetted through various databases, and 
then we farm those leads out to our various offices in the 
field. We have 265 offices on the domestic side and 70 offices 
internationally. So once those leads are sent out to the field, 
our agents are able to conduct investigations and very detailed 
investigations, based on the quality of the information that we 
have received.
    So it certainly has worked very well. We certainly see that 
it is going to continue to work. We also have received well 
over 194,000 leads, not only from US-VISIT, but from the SEVIS 
process as well. We have initiated 7,272 investigations as a 
result, and that is pretty significant, certainly something 
that we haven't been doing over the past--since the inception 
of the agency and us trying to combat terrorism.
    As a result, we have also been able to make 2,194 arrests. 
So the information that we are getting now has really been 
analyzed carefully, resulting in some significant results. As 
Mr. Cohen indicated, we are able to conduct some quality 
investigations by gathering this information and sending it to 
additional databases in the intelligence community as well as 
our counterparts in the law enforcement world.
    Mrs. Miller. Thank you very much.
    I would just conclude my questioning here by once again 
observing that this is really how Congress is supposed to act, 
where we are doing oversight, we are asking various questions, 
hopefully getting the agencies to respond.
    You certainly are responding and I think in a very 
appropriate manner. So I am appreciative to hear all of this 
today.
    With that, I would like to recognize our Ranking Member, 
Mr. Cuellar, for his questions.
    Mr. Cuellar. Thank you very much, Chairwoman.
    I have two sets of questions. One has to do with the time 
that after an alien is ordered to be removed, how long it takes 
for that person to stay.
    Members, I would ask you to look at the handouts, and I 
believe Diana is going to put an overhead also. What is the 
average time to get the travel documents issuance before they 
are removed? So it involves a little bit of the State 
Department.
    [The information follows:]
    


    
    The other one is an issue I brought up at the committee 
last week, I believe, about a Mexican-based school that taught 
students how to fly. They were in south Texas. Instead of being 
there on student visas, they were there learning--being taught 
on tourist visas it sells. Again, the way this came about, 
because one of the Mexican pilots, training pilots, went over 
and buzzed some of the boaters at one of the places and had to 
create that type of activity to bring this up.
    So I will go first with the travel. As you know, when an 
alien other than a Mexican national is ordered removed from the 
United States, a consular officer from the alien's country of 
origin must issue a travel document. This travel document 
allows the alien to return to his or her country and are 
necessary to effect the order removal of aliens from the United 
States. There are some countries, like Guatemala, Honduras, and 
the DR that have electronic travel documents that make that to 
move a lot faster. Of course, with Mexico overall we have a 
good working relationship where they will take them rather 
quickly.
    But as you can see up there, there are certain countries, 
and this is only just a few: Pakistan takes 92 days. This is 
after--just to get the travel documents. China, 147 days; 
India, 160 days; Bangladesh, 192 days; Zimbabwe, 257; Cambodia, 
300 days; Vietnam, 337; Iraq, 391 days. Again, I know from the 
State Department, because--and I want to thank John Morton, 
because he is the one that brought up this issue about a year 
ago. We sat down with the State Department, and we were given 
the diplomatic reasons why the State Department couldn't move 
on.
    But at the same time, keep in mind that that will cost us 
money, because any time they stay here in the United States, it 
is going to cost us money. This is from the time an order was 
given. This is not before the time; this is after. So if you 
add all of those, it is going to cost the taxpayers thousands 
and thousands and thousands of dollars to keep those folks 
here.
    The chart, as I mentioned, those are the recalcitrant 
countries that are just slow in accepting their nationals back, 
and they will give up different reasons. They are good at 
giving information so they can get their visas. But when we 
want to send them back, they will give you all these reasons.
    My only thing is this: If we can be given the reasons again 
why it is difficult to get these countries to get them to 
accept the folks back and what is being done by the United 
States, and are those delays a consideration when determining 
whether to issue visas to individuals for certain countries? My 
thing is, if they are taking a hard time to take back those 
folks, then when we give them visas, why are we continuing to 
give them visas when at the end, they are going to take their 
time? I really think that the State Department should consider 
that. Should we consider restricting visa issuance to those 
countries until they begin to accept their nationals in more 
timely visas? Again, I am a Georgetown Graduate School of 
Foreign Service, I understand all the diplomatic reasons. But 
again, as a taxpayer and as a Member of Congress that 
represents all those folks, I think that is something that we 
need to play a little bit more hardball with those countries 
that are taking their time and costing us a lot of money.
    The second part of the question is the situation that we 
had in south Texas. How can students that come in, take flying 
lessons in small planes--and we know what happened in 9/11. You 
know they are coming in to learn. They are here on tourist 
visas and not student visas. Then of course, when we talk to 
the FAA and Homeland Security, everybody will say, well, we 
don't do this, we don't do this, we don't do that. That is 
their responsibility, not our responsibility. It goes to what 
the Chairwoman and Chairman Thompson has been and all of us 
have been talking about, all Members of the committee, is: 
Where is the coordination?
    I mean, at the end of the day, the American taxpayer 
doesn't want to know what agencies blame what agency. They want 
to know: What are the results and how are you keeping us safe? 
The first part of the question is the recalcitrant agent 
countries. I guess we will start with the State Department.
    Mr. Ramotowski. Thank you, Congressman.
    Let me first say that the State Department is acutely aware 
of the seriousness of this issue. We share your concern. We are 
taking all possible steps to improve the situation with respect 
to recalcitrant countries. Together with our interagency 
partners we have established a high-level working group to work 
out a strategy for dealing with the most egregious countries. 
In addition to that, former Under Secretary Burns, now deputy 
secretary, instructed all our chiefs of mission to do what they 
could to produce positive responses in the recalcitrant 
countries.
    Mr. Cuellar. Could I ask you a question? Since April--I 
think it was in April 2011 that we met in my office with the 
State Department and John Morton. Has anything been done except 
establish a working task force--with all due respect. I mean 
that with all respect. I appreciate all the help that you and 
Secretary Clinton are doing. Anything been done since that time 
besides incur more taxpayers' dollars? Is the task force the 
only thing that has been done?
    Mr. Ramotowski. Well, these issues are also being addressed 
case by case with the foreign consulate officers here in 
Washington. Again, our staff works with ICE and the other 
agencies involved to try to encourage the foreign countries to 
take back more of these individuals. But as you have 
recognized, it is a difficult process. There are many issues at 
stake, and the progress hasn't been as rapid as we would all 
like.
    I would point out, too, that our new ambassador to China, 
former Secretary of Commerce Gary Locke, is personally aware of 
and engaged in this issue and is determined to see more 
progress with respect to China. So we are doing everything that 
we can. Let me close by saying that for us, this is a very 
serious issue.
    Mr. Cuellar. I appreciate that. Could we put a little bit 
more pressure on them at the beginning instead of the end?
    Mr. Ramotowski. We will try our best, sir.
    Mr. Cuellar. We will follow up on the second question on 
the second round on that. Just keep thinking about that 
particular case in south Texas.
    Thank you, Madam Chairwoman.
    Mrs. Miller. I thank the gentleman.
    The Chairwoman now recognizes the other gentleman from 
Texas, Mr. McCaul.
    Mr. McCaul. Thank you, Madam Chairwoman.
    Fifteen of the hijackers came from Saudi Arabia. When I 
look at the Visa Security Program, it does not have 11 of the 
top 20 high-risk posts included, including Saudi Arabia, which 
seems sort of interesting to me.
    So Mr. Edge and Mr. Cohen, can you explain to me why Saudi 
Arabia is not on this--part of this program?
    Mr. Edge. I believe Saudi Arabia is a part of the program 
as we speak today.
    Mr. McCaul. They are?
    Mr. Edge. Yes, they are.
    Mr. McCaul. Then perhaps I had some misinformation.
    Let me continue with Mr. Cohen. I am glad that after 10 
years later, we are making progress on our exit program. When 
do you plan to have that fully implemented?
    Mr. Cohen. We anticipate that the capabilities that I 
described earlier will be implemented within 6 to 12 months.
    Mr. McCaul. Will that include also biometric?
    Mr. Cohen. It will include enhanced biographic with certain 
biometric elements included. As I referenced earlier, more 
expanded use of information captured on the front end, 
fingerprints, et cetera. We are also--it will also include 
within that same time period more advancements in research on 
biometric technologies we can use here as part of the exit 
program.
    Mr. McCaul. I agree with Madam Chairwoman. That is 
certainly good news. That is where the Congress in our 
oversight working with you actually is a positive experience.
    Let me move on to visa overstays. The Secretary announced 
that criminal aliens are a high priority for deportation. As a 
former Federal prosecutor, I certainly understand that with 
limited resources. On the other hand, she seemed to infer that 
noncriminal aliens that were having visa overstays could stay 
in this country and apply for work permits.
    First of all, Mr. Edge, can you respond to that; is that 
the administration's position?
    Mr. Edge. Well, our position as a law enforcement agency is 
to take the information that we acquire from the SEVIS program 
and US-VISIT and focus on those overstays that pose the most 
threat and potentially are the most dangerous to our country.
    Mr. McCaul. I get that, and I agree with that. But I was 
disturbed by the inference that the noncriminal aliens 
overstaying could stay here and apply for work permits. Was 
that an accurate statement on the part of this administration?
    Mr. Edge. I am not familiar with that statement. I would 
have to defer to the Department.
    Mr. McCaul. Okay. Perhaps I need to ask the Secretary 
herself that question.
    Mr. Stana, if that is the policy of this administration, do 
you think that would pose a threat in any way to our security?
    Mr. Stana. Well, given with the theme of the hearing, the 
integrity of the visa process, you would certainly call it into 
question.
    Listening to the new program that ICE and DHS is putting 
together, I think it is a step in the--I would welcome the 
opportunity to take a look at it. It raises a whole host of 
questions. But if we are still going to focus on the National 
security and public safety folks, which is the thing to start 
with, it still leaves the vast majority of people untouched, 
and it gives the impression that once you are in the country, 
you are in, unless you act out, and then you might get caught.
    Mr. McCaul. Because as I look at some of these, whether it 
is hijackers or high-profile terrorist violators, many of them 
were noncriminal aliens here on a visa overstay.
    Mr. Stana. Well, and the fact that the Christmas day bomber 
went through the visa processes, many of which were in place in 
December 2009, apparently got in on the airplane and got a 
visa, just calls into question how much question has to be 
raised before you deny boarding.
    Mr. McCaul. Mr. Edge, I hope you can get back to me on that 
question in terms of what is the administration's position.
    [The information follows:]

    A typical scenario is someone enters legally, overstays, marries a 
United States Citizen and applies for adjustment of status. I believe 
in this case the person may qualify for an Employment Authorization 
Document (EAD) based on the pending I-485, Application to Adjust 
Status. Here are some other examples under which an individual, like an 
overstay, would get an EAD:

   Deferred Action;
   Temporary Protected Status;
   Withholding of Removal;
   Applicant for Cancellation of Removal;
   Certain Asylum applicants (where applications have been 
        pending for more than 180 days);
   Certain individuals who are subject to Final Removal Orders 
        can also apply for employment authorization if they cannot be 
        physically removed for some reason or if they are the sole 
        supporters of other family members.
[Ruth Tintary, Associate Chief Legislative Branch for USCIS provided 
this answer to ICE, Office of Congressional Relations]

    Mr. McCaul. Or perhaps, Mr. Cohen, you may have an answer 
to that.
    Mr. Cohen. Yes, Congressman, if I may.
    So, first and foremost, because of resource issues 
primarily, the administration prioritizes the targeting of 
those visa overstays that represent a National security or 
public safety risk. Through the capabilities that I have 
described earlier, as we are better able to identify people who 
are actually confirmed overstays, meaning we have assessed that 
they are actually located in this country and they have not 
changed their immigration status, we then, as we do now, will 
have the ability to provide that information so they can be 
inputted by CBP and others into their systems and State 
Department into their systems. So if there is a second 
encounter, meaning they are arrested, meaning that they seek to 
apply for another visa, they seek to apply for other types of 
entry, the information that they are an overstay will be 
available to those CBP officers or others.
    Mr. McCaul. Well, again, a majority of the hijackers were 
overstay noncriminal aliens. The Blind Sheik responsible for 
the 1993 World Trade Center bombing was a visa overstay without 
a criminal record. So I think it is important, and I am 
concerned--and that is why I look forward to hearing from the 
administration--I am concerned about sending a message out 
there that if you are a noncriminal alien, it is okay to stay; 
in fact, you can apply for a work permit as well.
    Mr. Cohen. If I may, Congressman, one last point. You make 
an excellent point about whether information about the 
hijackers was in databases like NCIC because they have been 
arrested. What there was on many of the hijackers, or on 
several hijackers, was derogatory information or other law 
enforcement information that under this new construct would 
come to the attention of authorities; information in FinCEN, 
information that may reside in other repositories of the 
intelligence community, other than say the TSDB. So what we are 
seeking to do is expand our ability to vet visa information or 
information regarding potential overstays against a much 
broader set of law enforcement or intelligence information than 
we have done so in the past.
    Mr. McCaul. I look forward to working with you on that, and 
thank you for your testimony.
    Mrs. Miller. Thank you.
    The Chairwoman now recognizes the gentleman from Virginia, 
Mr. Rigell.
    Mr. Rigell. Thank you, Madam Chairwoman.
    Thank you all to our panel. I appreciate the work that you 
are doing.
    You know, that we have had no major domestic terrorist 
attack since 9/11 certainly is a high degree of success, and we 
recognize that. Now, also, though, at the same time that we 
have approximately 4.5 million illegal immigrants here who came 
here on a visa and then overstayed, that is unquestionably a 
failure. I am going to in my short time here try to see how we 
link performance with--and accountability with performance 
here.
    Mr. Ramotowski--I, too, have a difficult last name to 
pronounce--what is the approximate number of countries who 
citizens are eligible to apply for a visa to come to the United 
States?
    Mr. Ramotowski. Well, the citizens of all countries are 
eligible to apply to travel to the United States.
    Mr. Rigell. Okay. So any country?
    Mr. Ramotowski. Yes.
    Mr. Rigell. Now, among that range of countries then, surely 
there is some disparity between those countries whose citizens 
have a higher percentage of violating our visa conditions than 
others, right?
    Mr. Ramotowski. That is correct.
    Mr. Rigell. Okay. Could you please identify for us then 
those top five countries?
    Mr. Ramotowski. I don't have statistics here, sir, on the 
number of visa overstays by country. We would have to get back 
to you on that.
    Mr. Rigell. Okay. If you would, please. Not so much by 
the--well, I would like it to be the actual number, but also as 
a rate, a percentage. Because those countries who--it would 
indicate to me that if we have the top five countries, I would 
say, what is taking place at our offices there, our State 
Department offices there, our embassies, to understand what is 
taking place there?
    Now, on that, as a follow up, with the actual personnel 
side, actually approving a visa is by definition a judgment 
call. We are trying to predict future human behavior, 
inherently difficult. We have some mechanisms that help us with 
that and the biometrics that we are working on, on all of those 
things, but at the end of the day, it is a judgment call. It 
would stand to reason, wouldn't it, that some folks are better 
at that than others, wouldn't it?
    Mr. Ramotowski. That is correct.
    Mr. Rigell. Okay. What processes and procedures do we have 
in place that would help us discriminate in the most positive 
sense of the word those personnel who are really good at this 
and others who clearly aren't very good at it?
    Mr. Ramotowski. Well, again, Congressman, we have a layered 
approach to the training of our personnel. As I mentioned in my 
statement, they receive an intensive basic consular course when 
they join the Foreign Service that includes training in 
interview techniques, behavior detection and all of our 
consular automated systems. Many of them also do consultations 
with other law enforcement agencies before they go out to their 
post. When they arrive in country--and I should also point out 
that they are given training in the language and culture and 
area studies of the regions to which they are sent. When they 
arrive in country, senior consular personnel are charged with 
overseeing their professional development and monitoring their 
work.
    Mr. Rigell. I appreciate that.
    I really don't want to be rude by interrupting you. We have 
such little time here, and this is a very important question 
for me. Let's say, for example, that there are 500 visas 
approved by a particular person and their failure rate is in 
the 12 percent range, and generally, you would say, well, that 
is pretty good compared to maybe the average for that country. 
But there is another person over time who you see has a 42 
percent failure rate, that is 42 percent of the visas he or she 
approves actually end up overstaying. I am trying to--I am 
trying to help our Government have this culture of 
accountability. So you have described a lot of things there, 
but I did not hear how we circle back around and try to track 
performance, not to punish someone, but to help those--to 
elevate those who are doing well, and maybe if we do have a 
person who is not having a particularly good track record on 
this, that we either help them become better or, frankly, we 
remove them.
    Mr. Ramotowski. Well, Congressman, as I was saying, we do 
have a process for evaluating our personnel. It is a continuous 
process. Individuals who do not perform to the Service's 
expectations can be denied tenure and removed from Service.
    Mr. Rigell. Thank you, sir. I just would circle back maybe 
around on some written questions that I will submit to 
understand better the metrics of that, if there are actual 
metrics of violations.
    Thank you, Madam Chairwoman.
    Mrs. Miller. Thank the gentleman.
    The Chairwoman will now recognize the gentleman from 
Florida, Mr. Bilirakis.
    Mr. Bilirakis. Thank you, Madam Chairwoman.
    I appreciate you giving me the opportunity to participate 
today.
    According to the Homeland Security Department's numbers, 
more than 7,300 foreign students have left school early for 
various reasons but illegally remain in the United States. More 
than 800,000 students in the United States participate in the 
Student and Exchange Visitor Program. Most of them come here 
for noble intentions. While not all would-be terrorists come to 
the United States under the guise of a student visa, we have 
seen examples where several have. I know everyone--well, we 
have examples right here.
    For this reason, I have long advocated for legislation of 
the Student Visa Security Improvement Act, which I introduced 
to ensure that student visas are issued to those genuinely 
interested in obtaining an education. It seeks to ensure that 
once allowed into the country on a student visa, students are 
actually here to study and do not drop off the radar. So I have 
a couple of questions here.
    Secretary Ramotowski, to what extent does the State 
Department coordinate with DHS to review and screen student 
applications for security concerns?
    Mr. Ramotowski. Congressman, student visa applicants are 
screened through the same intensive process that all these 
applicants are screened with, with some additional features. 
They have their fingerprints taken and screened through our 
biometric fingerprint systems. We also use facial recognition 
technology to screen those applicants. We conduct an intensive 
visa interview with consular officers in the local language or 
in English. In addition to that, we utilize extensively the 
Immigration and Customs Enforcement SEVIS system to ensure that 
the student is attending a registered school and has in fact 
completed the registration process at that school.
    As I mentioned in my remarks, after the visa is issued, 
there is a continuous vetting process of all issued visas, such 
that if at any time derogatory information surfaces from any 
source, law enforcement or intelligence, it can be promptly 
analyzed and the visa can be reviewed for possible revocation. 
So, yes, we work very closely with Homeland Security and our 
other partner agencies on these cases.
    Mr. Bilirakis. Well, why is it then that we have 7,300 
students that are here--or former students that are here 
illegally in the United States? How can we help you with that 
issue?
    Mr. Ramotowski. I think, Congressman, and I obviously can't 
speak for them, but individuals overstay for a variety of 
reasons. We are continually reviewing our processes at our 
posts abroad to ensure that if there is a change in the 
country, perhaps economic activity, an economic crisis or 
something of that sort, that our officers are fully aware when 
they make their visa adjudication decisions that there might be 
other factors encroaching on an individual's decision whether 
to comply with our immigration laws or not. We will never 
knowingly issue anyone who is unqualified or has an intention 
to overstay in the United States a visa.
    Mr. Bilirakis. Are we searching for those individuals, 
those 7,300, that are located here in the United States? Do we 
have any idea where they are?
    Mr. Ramotowski. I will defer to my Homeland Security 
colleagues on that one.
    Mr. Edge. If I may, Congressman, ICE is working very 
closely with the Department of State in sharing our various 
databases. Currently we have more than 10,364 institutions as a 
part of the SEVP program, and we follow up with the various 
institutions on a regular basis to determine if these students 
are remaining in school. So those students that certainly are 
out there as overstays, their names are being vetted through 
the various systems that we highlighted earlier in our 
testimony today, and they are being prioritized. We certainly 
would be looking for the most egregious ones, those that pose a 
threat to our National security.
    Mr. Bilirakis. Thank you.
    For the entire panel, to what extent are some fraudulent 
educational institutions able to serve as visa mills and as a 
back door into the country? What tools exist or are needed to 
close this loophole, for the entire panel?
    Mr. Stana. Well, I will start off. I think what my other 
panelists said was probably what we all wish for. We all hope 
that the information provided by the educational institutions 
is accurate and there is no fraud. Our work has shown, however, 
that that is just not the case. Sometimes information which ICE 
depends on to do its casework is submitted late into SEVIS or 
not at all. The students themselves don't update the 
information that they have to update about their job status, so 
it may appear that they are still in school.
    There is fraud involved, Mr. Bilirakis. I think you 
mentioned that is what you alluding to, at universities. There 
was one in the paper I think, and I am not saying this was 
fraudulent, but University of Northern Virginia, that was 
alleged to be of the type that you are saying.
    So I think that we have to take more steps than we have in 
the past to make sure that this is as seamless as we would like 
it to be. Right now it is not. There are too many inaccuracies 
in the data, and there are too many cases of fraud in 
connection with these schools, other people taking the 
students' tests for them, people not checking photo IDs when 
they should, and so on.
    Mr. Ramotowski. I would just like to add, Congressman, that 
that underlines the importance of the personal interview that 
our officers conduct and our embassies and consulates. Because 
although someone may submit a fraudulent test paper, a highly 
trained consular officer can often note discrepancies in the 
interview that would open a line of inquiry and lead to the 
denial of that visa.
    In our high-fraud posts, we also have fraud prevention 
units and fraud prevention managers. They are dedicated to 
ensuring the integrity of the visa system. They investigate 
questionable cases and provide the results of those 
investigations back to the visa officers. So we take this 
concern very seriously, and we work closely, again, with 
Homeland Security in maintaining the integrity of the process.
    Mr. Bilirakis. Madam Chairwoman, I know my time has 
expired. I have one additional question, but I will wait for 
the second round.
    Mrs. Miller. Okay. Thank the gentleman.
    The Chairwoman now recognizes the gentleman from South 
Carolina, Mr. Duncan.
    Mr. Duncan. Thank you, Madam Chairwoman, and thank you for 
the timeliness of this hearing.
    It never ceases to amaze me that when we schedule a hearing 
on a topic like this, that we see the administration react in a 
positive manner, and then that is a good thing.
    There was an article today in the AP, ``Broader Security 
Checks to Reduce Visa Overstays.'' It may have been brought up 
earlier, but it is a good thing that we are having an impact, 
so thank you for that.
    I want to address my question, I guess it could go to Mr. 
Edge or Mr. Cohen or Mr. Stana, but visa overstay is definitely 
a topic that concerns folks in my home State of South Carolina, 
because we know that we have got to do a better job than what 
we do in this country. When you see statistics, such as a 
backlog of 1.6 million people have overstayed their visas in 
the United States--and recently you all have vetted those 
through multiple channels, which I will talk about in a minute, 
there are still 839,000 people here that I think Mr. Cohen said 
the Department vetted everyone for potential National security 
and public safety concerns. But there are still 839,000 people 
here that have overstayed their visa in violation of the 
sovereignty of the United States of America, and I just have to 
say, why? Why do we still have 839,000 people here who are here 
illegally?
    Mr. Cohen. Great question, Congressman, and you have made a 
really important point.
    The sad fact is that we do not know until we go through a 
manual vetting process what number of that 839,000 actually are 
either still in this country or have changed immigration 
status. That is why the capabilities I described earlier are so 
important, because in the past, because of resource issues and 
the lack of technical capability, it required US-VISIT, ICE, to 
manually do a series of manual database checks that was 
incredibly time-consuming, so there were large numbers of 
records that were never evaluated. Now, those people may have 
left. They may have changed status; we just did not know that.
    Mr. Duncan. Can you pause right there and explain to me as 
a freshman Congressman what ``change in status'' is, what you 
mean by that?
    Mr. Cohen. Change of status means they came into the 
country under a visa, they may have changed their immigration 
status. They may have extended their visa. They may have 
reapplied for a new visa. They may have applied for a new visa 
with a slight variant in their name.
    Mr. Duncan. Would not we know if they applied for a change 
in status that they are no longer here as a student and they 
have changed and you take them out of that category, wouldn't 
that be automatic?
    Mr. Cohen. In some cases, yes. In some cases, the way that 
the systems had been designed in years past, that information 
was not immediately apparent, and it would require an 
individual, an investigator, or a researcher, to go into 
multiple systems to determine that.
    Mr. Duncan. So if Tom Davis comes into this country from 
Ireland and he realizes he is here on a student visa, he 
overstays his visa, he has gotten a job or he is now consulting 
for a company, and he wants to change that status to here for 
business reasons or whatever, and he comes to your office and 
says, I want to change my immigration status, Tom Davis from 
Ireland, here is my Social Security Number, here is my whatever 
identifying factor that you have, you can't electronically with 
all the abilities we have today take that Tom Davis out of that 
category and put him in another, and he would not be listed in 
the 839,000 people that we are talking about now? Is that that 
difficult?
    Mr. Cohen. The way systems were designed in the past, yes, 
sir, and that is what we are fixing.
    There is one example I can talk to you about the 839,000 
records that we did vet, where we found an individual who came 
based on a visa applied for by her husband. She then changed 
status and got a visa on her own. She is a very good student at 
a southern university. The system would not have automatically 
picked that up and did not. That is what we will be fixing 
through this new capability, this interlinking of systems that 
I referred to earlier, Congressman.
    Mr. Duncan. It is very obvious to me that we have got a 
broken visa system for overstays based on these numbers when 
you vetted over half of them through multiple channels and 
said, okay, those guys have gone back to their country; we 
still have 839,000, 2,000 of which warrant further 
investigation because they are probably here for maybe God 
knows what. But I believe that we have got to pursue in this 
Nation, in my last seconds here, a biometric countercheck so 
that we know when someone leaves this country that they have 
left. If they haven't shown up and left the country within 
their stated time, then we put them in a category that they are 
here illegally and we start running down their last address and 
we start taking care of securing our country.
    The sovereignty of this Nation is very, very important to 
me. It is no wonder we see instances like we recently saw with 
a member of a certain family who has been here, overstayed a 
visa for a very, very long time, so very timely. Thank you.
    I yield back.
    Mrs. Miller. I thank the gentleman for those comments.
    I think the gentleman has demonstrated a frustration that 
many of us feel that when you see an administration who has 
just recently announced their policy that say they are not 
going to deport illegal aliens, known illegal aliens, unless 
they think they are a public safety threat.
    So that is a very unfortunate backdoor amnesty, however you 
want to characterize. It is an end-run around the legislative 
process.
    I am now speaking to other Members of Congress. I don't 
expect any comment from any of our panelists. I am talking 
about an administration-announced policy that I have vehemently 
stated I have a lot of problems with. I think that is going to 
add to our problem. It is going to incentivize others to get 
here, stay here, and knowing that unless they really do 
something criminal, even a DUI, which apparently is not enough 
criminal activity to be a public safety threat to deport an 
individual. That is a significant problem I believe to our 
National security here and to the political will of the 
American people who have demonstrated over and over again they 
want to secure our borders and they want to get rid of a lot of 
the illegal aliens who are here, whether they are overstays or 
what have you.
    I would just comment to Mr. Stana, because you have 
mentioned here--one thing that you said that I felt was very 
interesting, when you said the amount of the budget that we are 
spending to protect, secure our borders and yet here we have 40 
percent plus of all the illegals that are in the country are 
overstays from their visa. You just mentioned specifically with 
ICE that you are only spending 3 percent of your budget on 
these overstays when they are 47 percent of some of the 
problems that we have.
    So I would just ask Mr. Stana, you mentioned about the 
information Mr. Cohen gave today and you looking forward to 
evaluating that. Will the GAO just go ahead and evaluate this? 
Or are you looking for a letter from our subcommittee, or what 
will trigger your analysis and recommendation?
    Mr. Stana. What would trigger a study would be a letter 
from the subcommittee or committee.
    Mrs. Miller. You are going to have it very shortly then.
    Mr. Stana. If both sides would do it, it would be 
advantageous.
    There are a number of questions that were raised. I think 
this is definitely a step in the right direction, but there are 
questions about timeliness and reliability when you are using 
biographic versus biometric. The rest of the system has to be 
resourced to be able to move people along the line to 
deportation, if that is the goal. Of course, you mentioned the 
immigration impact aside from the National security impact, and 
when that part of the tail would be resourced as well. So there 
are lots of questions. As I say, it is a step in the right 
direction. It is something that I am sure you have been looking 
for for awhile. I just would like to see how reliable the 
system would be.
    Mrs. Miller. Very good. That letter will be forthcoming.
    I also want to mention again about the Christmas day 
bomber. Obviously, I come from southeast Michigan. That 
particular incident has sort of faded from the National radar 
screen, but I will tell you, it has not faded in my media 
market, because as we speak, the Christmas day bomber, who is 
now his own attorney, he is his own attorney, and they are 
going through jury selection. It makes me crazy every day I am 
watching this guy going--after we Mirandized him, sent him to 
the University of Michigan, the best burn center in the entire 
Nation, and now he is going through this entire process, and 
how much the city of Detroit actually is having to pay for 
security, et cetera, for this guy going through our system when 
he should be, in my opinion--again I am talking to other 
Members of Congress; I am not looking for any comment from any 
of you, this is an administrative-stated policy--this 
individual in my estimation should be treated as an enemy 
combatant. They are looking at the battlefield in asymmetrical 
terms, and on that particular day, the battlefield was seat 19A 
of that Northwest flight, and that was a battlefield in his 
mind.
    I think we hurt ourselves by not appropriately responding 
to that. But I guess this is a question in regards to him, 
because it is my understanding that running the name through 
the NCIC database, et cetera, that his name as it was 
introduced after his father came to the embassy in Nigeria, et 
cetera, was misspelled. So how has that--I mean, will that 
happen again? What steps have we taken to correct that?
    Mr. Ramotowski. Madam Chairwoman, we have taken a number of 
steps to ensure that that will never happen again. The database 
that we use to store the records for issued visas has fuzzy 
logic for name searches such that a future search, a current 
search with a misspelling will still return all possible 
records and close matches. In addition to that, our embassy in 
Nigeria had forwarded a telegram, as was noted here, to 
Washington indicating that the father had come in and had 
concerns about his son's dealings with extremists in Yemen. 
That was sent as a Visas Viper message. At that time, the 
interagency watch listing guidance did not call for the 
automatic watch listing of that sort of information. That has 
been changed, and at this point, I have no doubt whatsoever 
that Mr. Abdulmutallab would have been watch listed, would be 
watch listed now. The State Department in turn has changed its 
revocation policy. Upon receipt of a Visas Viper message of 
that kind now, we automatically review the issued visa for 
revocation and act upon it, unless a law enforcement or 
intelligence agency has formally asked us not to take action.
    So we have corrected many--all of the State Department 
issues that were identified in the aftermath of the Christmas 
day bomber, and most important of all is the continuous vetting 
of issued visas. Like I mentioned in my remarks, at any time, 
the watch listing system can be updated with new derogatory 
information from whatever source, and that will be vetted 
against the databases of issued visas, so if there is any match 
to a possible visa holder, we will review that and revoke it.
    Mrs. Miller. Thank you very much. I appreciate that 
information, and am very comforted to hear of those corrections 
being made. My final question I would ask of Mr. ICE--excuse 
me, Mr. Edge from ICE. You mentioned about the visa security 
units being in 19 countries, et cetera, and I know you talked a 
little bit about how that is happening in some of the high-risk 
embassies and the consulates, et cetera.
    I thought it was interesting listening to Mr. Ramotowski 
talk about the Department of State and how you handle your 
agents in regards to language skills and various kinds of 
things. I am just wondering how you do with having your agents 
with language skills in these various areas. Also because, 
again, we are talking about budgetary considerations, I am not 
sure, but I would guess that it is very, very expensive to set 
up, to stand up such a unit in any of the consulates or 
embassies, and is there any way of replicating, maybe not 100 
percent, but doing--I am not sure how many others you would 
like to have in a perfect world, what your optimal number 
actually is, is there any way of replicating that State-side to 
assist you from a budgetary standpoint, but really helping us 
prioritize again from a National security perspective?
    Mr. Edge. Well, certainly, the agency could always do more 
with more, but the Congress has been very, very helpful to us 
in setting up the current visa security programs in the various 
countries that we have them in.
    Also hearing my counterparts' statements a little while ago 
from the consular perspective of the interviews that take 
place. During those interviews and the high-risk posts around 
the world, we would certainly have an ICE agent, special agent 
who is highly trained in investigations and interview 
techniques to sit with our Department of State counterpart. It 
would be a joint effort to determine whether or not 
admissibility should be granted and a visa should be issued.
    As far as the expansion of the program, it costs about $2.2 
million to open up an office and $2.2 million to continue the 
full operation of such a post. So we are doing the best we can, 
and we would welcome the continued support of the Congress in 
meeting the requirements of our mission. But our attempt to 
push the borders out and do a lot of this work overseas, as 
well as a lot of the vetting that we spoke about earlier on the 
domestic side, will certainly bolster our borders in countless 
ways.
    Mrs. Miller. Thank you.
    Perhaps GAO could take a look at how that might happen 
State-side as well to do some of those kinds of things, not to 
tell you your business.
    Mr. Stana. Actually, we have. We have looked at some of the 
efforts they have to not only do their work overseas but try 
domestically to do some of the screening via computer matches. 
There was one item, which I think was dropped from the budget 
before it went to OMB, I think it was a $17 million line item, 
which would have enabled a match--matching law enforcement 
databases to visa applications, which would have done the 
initial screening worldwide, $17 million. Given the numbers he 
was talking about, it seems like it might be a bargain. We 
haven't looked at it to see if it was a bargain, but the 
numbers were right.
    Mrs. Miller. Very good. I appreciate you outlining that. I 
am sure my staff has taken a note of that. We are going to look 
at that as we proceed through our budgetary process here in the 
future.
    At this time, the Chairwoman would now recognize Mr. 
Cuellar, our Ranking Member, for his questions.
    Mr. Cuellar. Thank you.
    Before I ask my question, just to be fair to this current 
administration, everything depends on resources. I think what 
President Bush saw, what President Clinton and Bush No. 1 also 
saw the same thing; you can do as much as what Members of 
Congress give you, isn't that correct?
    Mr. Edge. That is correct, Congressman.
    Mr. Cuellar. Isn't it true also that the current 
administration has deported more criminal aliens than any other 
administration?
    Mr. Edge. That is correct, sir.
    Mr. Cuellar. By a lot larger number, is that correct?
    Mr. Edge. That is correct.
    Mr. Cuellar. All right. Thank you.
    Let me go back to the original question I had, but before I 
ask you this thing about the flight training school in south 
Texas. Mr. Stana, I appreciate everything GAO. I am a big fan 
of what you all do. In your testimony, Mr. Stana, you stated 
that the 2010 airlines complied with the requirements that 
verify ESTA approval for almost 98 percent of the Visa Waiver 
Program's passengers prior to boarding. However, the remaining 
2 percent, about 364,000 travelers travel without this Visa 
Waiver Program--without ESTA approval. Tell me what happened 
here in your opinion.
    Mr. Stana. What seems to have happened in those cases--
first off, the statistic went up to 99 percent. I think when we 
looked at that program, the 98 percent figure was from slightly 
prior, so it is getting better all the time.
    In that case, I think it was a computer glitch where the 
computer was down, they couldn't get the ESTA verifications in 
on time. I have no idea how many of these ESTA inquiries result 
in a ``do not board'' or a stop for people. I don't think that 
data is tracked. I might be mistaken, but I don't think that 
data is tracked. But what we did see is that there were about 
650 out of the number you cited that caused enough concern 
that, upon reflection, they said that they shouldn't have been 
allowed to board. But the computer was down; they couldn't get 
the assurances before the person boarded the plane.
    Also, I should note that there is a timing issue here. You 
could submit the ESTA paperwork up to 2 years before a flight, 
and something could happen to you within those 2 years, you get 
a drunk driving conviction or something, which would result in 
an inability to board. All this really means is you have got to 
go to the consulate to get a visa manually as if this were not 
a visa waiver country.
    Mr. Cuellar. Gentlemen, for the other questions dealing 
with the south Texas----
    Mr. Winkowski. If I could just add just a little clarity 
there. When we started up with the ESTA system, we relied on 
the carriers to program this system so they could get a ``no 
board'' message. That took a little while, No. 1. No. 2, all 
ESTA applications are vetted on a continuing basis, like the 
visa. So if you have an individual that has applied for an 
ESTA, the ESTA is good for 2 years, and something happens in 
between that time that individual then is denied the ESTA and 
is notified to go to the embassy for a visa.
    Mr. Cuellar. Thank you.
    Talk to me about south Texas. How do foreigners coming to 
the United States go to a flying school, training school on a 
tourist visa instead of a visa, and then how do we get agencies 
who start pointing the finger to each other and we can't seem 
to coordinate? Apparently, there were no terrorist ties to 
these students, at least from what I have been told, but it is 
just a little concerning that some other country can come in 
and do--you know, somebody from another country could come in 
and do the same thing and get some flight training. Whoever 
wants to handle this.
    Mr. Edge. In this particular instance, Ranking Member 
Cuellar, certainly the SEVP program didn't provide us with the 
information because the flight school was not registered with 
the program. You know, Praat was not a certified school at the 
time in September. What we have to do a better job of certainly 
is to communicate with our fellow Federal agencies, in this 
case the FAA, when they recognize that there are in fact people 
who are here on visitors' visas, a B-1 or B-2, who are enrolled 
in flight school when that should certainly be a F visa, N visa 
or a J visa, which would be more appropriate for that type of 
training.
    If that were the case, we certainly would have had a little 
more vetting, and we would have been able to take a closer look 
at things. What we are doing now is taking a look at the flight 
school itself and conducting an investigation, the particulars 
of which I would be more than happy to offer you a briefing on 
outside of the scope of this hearing to give you a complete in-
depth update, but there is certainly work to be done.
    Mr. Cuellar. Thank you.
    I appreciate it. I appreciate a briefing at a later time on 
that. I would ask you to do that.
    Gentlemen, my time is up. I want to thank all of you. I 
know that from the GAO, and I hope they listen to your good 
recommendations, and hopefully that you will take that in a 
constructive way what the GAO has given you. To all of you I 
really appreciate what you all do to keep our country safe. 
Thank you.
    Thank you, Madam Chairwoman.
    Mrs. Miller. Thank the gentleman.
    The Chairwoman now recognizes the gentleman from Florida.
    Mr. Bilirakis. Thank you, Madam Chairwoman. I appreciate it 
very much.
    For the panel or whoever would like to respond, what 
percentage of visa applicants are interviewed personally?
    Mr. Ramotowski. Congressman, I will have to take that 
question back. It varies by country, and there is no set 
percentage that we apply. Most first-time applicants in most 
countries are interviewed. Renewal applicants under certain 
circumstances can qualify for a waiver of that interview if 
they are renewing their visa in the same category within 12 
months of the prior visa's expiration. So it would vary by 
country and by post.
    Mr. Bilirakis. If you could get that information to me, I 
would really appreciate it very much.
    Mr. Ramotowski. Yes, sir.
    Mr. Bilirakis. Okay. With regard to the question that the 
Chairwoman asked with regard to the visa security units, I 
understand there are about 50 high-risk units identified by 
DHS, and it is ICE and the Department of State, and there are 
19 in place. Can you please provide this committee with a 
progress report regarding the updated MOU between DHS and 
State?
    Mr. Edge. Certainly, sir, we would be able to provide that 
in writing at your request. We do have 57 high-risk issuing 
posts, and 19 are fully operational at this point in time.
    Mr. Bilirakis. Okay. If you could get that to me, I would 
really appreciate it. Thank you.
    I yield back, Madam Chairwoman.
    Mrs. Miller. Thank the gentleman.
    The Chairwoman now recognizes the gentleman from South 
Carolina.
    Mr. Duncan. Thank you, Madam Chairwoman.
    First off, let me say, I am Scotch-Irish, and I used 
Ireland earlier in an example only. I don't want the folks in 
Ireland to say I was targeting their country. That happened one 
time when I mentioned the Northern border, and the Canadian 
press wrote something that I was talking of--it gets 
misconstrued. So no ire intended to Ireland at all.
    Gentlemen, let me say first also that my ire is not 
directed at you or the agencies, but rather, I reflect the very 
passionate frustration of many, many Americans when it comes to 
immigration issues. It is in particular something that should 
be easier for us. From the folks in South Carolina looking at 
what Government does, they say this issue, visa-related 
immigration, should be easy because we are allowing guests to 
come into our country. We are giving them access through the 
visa process. It is not like they are just walking across our 
Southern border coming here, and that is a whole other issue of 
immigration, but we are issuing a visa. So it should be easier 
to make sure they don't overstay because we are giving them the 
ability to come here. I know I am simplifying matters in a lot 
of ways.
    Mr. Winkowski, you have been sitting down there very 
patiently. I don't have a question for you, but I want to say 
thank you to you also. I met Chief Fisher a number of times, 
and I appreciate what you guys do.
    My staff would like me to ask you a question, but I am 
really interested in the fact that if we have got Visa Security 
Program, if it is designated to be risk-based and the program 
is supposed to be active in the riskiest of countries, why are 
11 of the top 20 high-risk posts not included? At high-risk 
posts where there are no visa security agents, what is the 
consular process for ensuring terror threats do not receive a 
visa?
    I guess I will direct that to Mr. Edge.
    Mr. Edge. Well, the process to determine what posts are 
high-risk certainly is determined by the funding that is 
available. We also work very closely with the Department of 
State to determine at what posts would warrant based on the 
visa applications and other metrics, what posts would warrant a 
visa security unit overseas.
    Mr. Ramotowski. Let me follow up, Congressman, if I could, 
from the State Department's perspective. We screen all our 
applicants as if they are high-risk in the sense that you can't 
guarantee where the next threat will come from. So all of our 
posts and all of our officers are trained to use our systems, 
to conduct intensive interviews and to be prepared to refuse 
visas to individuals who seek to do us harm, regardless of 
where in the world they actually apply for a visa. In this era 
of globalization, you can't predict where the next case will 
come from.
    Mr. Duncan. Mr. Stana, what checks are not done with that 
regard?
    Mr. Stana. You mean if the VSU is not at a post?
    Mr. Duncan. Yes, sir.
    Mr. Stana. It is just like Mr. Ramotowski said, they do a 
certain amount of vetting. The added security from the ICE 
person being there comes from their ability to use their law 
enforcement experience to maybe query another data set that 
isn't normally queried or ask the kinds of questions that a law 
enforcement background should give you.
    But I would like to make one other point, Mr. Duncan. I 
think your point is a good one with the 11 of 20 high-risk 
posts not being staffed by VSUs. On the other end, there is a 
large number of the bottom 25 percent posts that are staffed 
with VSUs. I mean, there might be a rational reason why they 
would be there, but it would be good to reexamine that in the 
light that maybe some of those folks in the bottom 25 percent 
risk category, at least some of them, might be better served 
being in the top-risk posts.
    Mr. Duncan. I know overseas service is very expensive, and 
so we have got CBP folks at overseas locations and consular 
affairs. Is there a way or are you looking at maybe bringing 
some of those people home that are stationed there and working 
more closely with U.S.-based? It is a flat world. We have got 
X-rays being looked at, they are taken here, looked at 
overnight in another country; it is a 24-hour cycle. So are we 
considering some of that to make it more cost-efficient? I will 
ask Mr. Winkowski that.
    Mr. Winkowski. Congressman, that is a very good question. 
What we have done in Customs and Border Protection is we have 
taken a hard look at our immigration advisory program that we 
have in eight countries of about 40 officers. We continue to 
evaluate the need to have officers in certain locations as well 
as the need to have them in different locations. So, for 
example, in Korea, we had made the decision that we did not 
need to have individuals at the airport in Korea, rather we 
could handle virtually, your point of the world being flat, 
that we could handle it out of our regional carrier liaison 
group out of Honolulu. So what happens is as that advanced 
information and that pre-departure information is sent through 
the system, that particular unit looks at that, identifies 
individuals that we believe are high-risk, perhaps has a visa 
that has been revoked, perhaps is a TSDB, perhaps has some type 
of admissibility issue, and we coordinate with the host 
government and the airlines to prevent that person from going 
on the aircraft.
    Conversely, there are other locations, for example 
Heathrow, very active, a lot of feeder flights in from areas of 
strategic importance, and we see a need to have those people 
there. So we are continuing to evaluate on a regular occurring 
basis, because as you point out, it is very, very expensive.
    Mr. Duncan. So you have got a good relationship with the 
host countries is what you are saying?
    Mr. Winkowski. Yes, we do. We have a very, very good 
relationship.
    Mr. Duncan. Madam Chairwoman, is there a way we can get the 
GAO to make sure, or request and to make sure that the 
ultimate--the most technology is being used to keep the costs 
down, but at the end of the day, we don't want any undie bomber 
to get on a plane and come to this country and create harm. So 
I appreciate what they do, but I also want to make sure we are 
getting the most bang for the buck for the taxpayer.
    Mrs. Miller. Absolutely. We will talk to the GAO about that 
and perhaps incorporate some of those requests in this letter 
that we will be drafting very shortly.
    I thank the gentleman.
    I thank certainly all of the panelists. I think this has 
been an excellent hearing. As we started at the outset talking 
about here we are on the 10th anniversary of the horrific, 
horrific attacks of our Nation on 9/11 and whether or not 
terrorists continue to exploit our visa system. It is clear 
from the testimony that we have had today that we have come a 
very long way, and I think we are making enormous progress and, 
again, as Mr. Cohen has outlined today a huge step forward.
    But you know the largest room is always a room for 
improvement, and we have to continue to do that. Again, it is 
Congress' responsibility to provide the oversight to the 
various agencies, and it is our responsibility as well to 
budget the dollars and to make sure that the agencies 
understand our priorities and that we all work together 
cooperatively. I think we need to obviously continue to 
highlight some of our progress, but also not be afraid to take 
a very candid focus on what we need to do as a Nation to 
continue to secure our borders, to, as I mentioned at the 
outset, under our Constitution, our Constitutional 
responsibilities to secure our borders and to keep our citizens 
safe.
    So I would also mention to the Members that if they have 
any additional questions, the hearing record will be held open 
for 10 days, and they can submit those questions for the 
record. Again, we thank all of our witnesses for coming today. 
The committee is adjourned.
    [Whereupon, at 12:00 p.m., the subcommittee was adjourned.]