[House Hearing, 112 Congress] [From the U.S. Government Publishing Office] INTELLIGENCE SHARING AND TERRORIST TRAVEL: HOW DHS ADDRESSES THE MISSION OF PROVIDING SECURITY, FACILITATING COMMERCE, AND PROTECTING PRIVACY FOR PASSENGERS ENGAGED IN INTERNATIONAL TRAVEL ======================================================================= HEARING before the SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE of the COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED TWELFTH CONGRESS FIRST SESSION __________ OCTOBER 5, 2011 __________ Serial No. 112-49 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC] [TIFF OMITTED] CONGRESS Available via the World Wide Web: http://www.gpo.gov/fdsys/ __________ U.S. GOVERNMENT PRINTING OFFICE 73-736 WASHINGTON : 2012 ----------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 COMMITTEE ON HOMELAND SECURITY Peter T. King, New York, Chairman Lamar Smith, Texas Bennie G. Thompson, Mississippi Daniel E. Lungren, California Loretta Sanchez, California Mike Rogers, Alabama Sheila Jackson Lee, Texas Michael T. McCaul, Texas Henry Cuellar, Texas Gus M. Bilirakis, Florida Yvette D. Clarke, New York Paul C. Broun, Georgia Laura Richardson, California Candice S. Miller, Michigan Danny K. Davis, Illinois Tim Walberg, Michigan Brian Higgins, New York Chip Cravaack, Minnesota Jackie Speier, California Joe Walsh, Illinois Cedric L. Richmond, Louisiana Patrick Meehan, Pennsylvania Hansen Clarke, Michigan Ben Quayle, Arizona William R. Keating, Massachusetts Scott Rigell, Virginia Kathleen C. Hochul, New York Billy Long, Missouri Janice Hahn, California Jeff Duncan, South Carolina Tom Marino, Pennsylvania Blake Farenthold, Texas Robert L. Turner, New York Michael J. Russell, Staff Director/Chief Counsel Kerry Ann Watkins, Senior Policy Director Michael S. Twinchek, Chief Clerk I. Lanier Avant, Minority Staff Director ------ SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE Patrick Meehan, Pennsylvania, Chairman Paul C. Broun, Georgia, Vice Chair Jackie Speier, California Chip Cravaack, Minnesota Loretta Sanchez, California Joe Walsh, Illinois Brian Higgins, New York Ben Quayle, Arizona Kathleen C. Hochul, New York Scott Rigell, Virginia Janice Hahn, California Billy Long, Missouri Bennie G. Thompson, Mississippi Jeff Duncan, South Carolina (Ex Officio) Peter T. King, New York (Ex Officio) Kevin Gundersen, Staff Director Alan Carroll, Subcommittee Clerk Hope Goins, Minority Subcommittee Director C O N T E N T S ---------- Page Statements The Honorable Patrick Meehan, a Representative in Congress From the State of Pennsylvania, and Chairman, Subcommittee on Counterterrorism and Intelligence.............................. 1 The Honorable Jackie Speier, a Representative in Congress From the State of California, and Ranking Member, Subcommittee on Counterterrorism and Intelligence.............................. 3 Witnesses Mr. David Heyman, Assistant Secretary for Policy, U.S. Department of Homeland Security: Oral Statement................................................. 4 Joint Prepared Statement....................................... 7 Ms. Mary Ellen Callahan, Chief Privacy Officer, The Privacy Office, U.S. Department of Homeland Security: Oral Statement................................................. 12 Joint Prepared Statement....................................... 7 Mr. Thomas Bush, Executive Director of Automation and Targeting Office of Intelligence and Investigative Liaison, Customs and Border Protection: Oral Statement................................................. 14 Joint Prepared Statement....................................... 7 INTELLIGENCE SHARING AND TERRORIST TRAVEL: HOW DHS ADDRESSES THE MISSION OF PROVIDING SECURITY, FACILITATING COMMERCE AND PROTECTING PRIVACY FOR PASSENGERS ENGAGED IN INTERNATIONAL TRAVEL ---------- Wednesday, October 5, 2011 U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Counterterrorism and Intelligence, Washington, DC. The subcommittee met, pursuant to call, at 10:02 a.m., in Room 311, Cannon House Office Building, Hon. Patrick Meehan [Chairman of the subcommittee] presiding. Present: Representatives Meehan, Long, Speier, Hochul, and Hahn. Also present: Representative Jackson Lee. Mr. Meehan. The Committee on Homeland Security, Subcommittee on Counterterrorism and Intelligence will come to order. The subcommittee is meeting today to hear testimony regarding how the Department of Homeland Security addresses the mission of providing security, facilitating commerce, and protecting the privacy of passengers engaged in international travel. I would like to welcome everyone to today's subcommittee on counterterrorism and intelligence hearing. I look forward to hearing from today's witnesses on the value and efficacy of the Passenger Name Record program in our on-going mission to prevent terrorists and other dangerous criminals from entering the United States. I further look forward hearing and learning about the status of on-going negotiations with our partners in the European Union with regard to the 2007--I am going to refer to this from this point forward as PNR, the Passenger Name Record, so we don't have to continue to do it, but the 2007 PNR record as well as the privacy concerns that David raised. But before I begin, I think especially on a committee like this it is so appropriate to take a moment to recognize the tremendous victory that was achieved by our U.S. military intelligence communities in locating and killing Anwar Al- Awlaki last Friday. Awlaki was one of the worst perpetrators of terrorism and one of the United States' most real enemies. He was involved in multiple attacks against the U.S. homeland including the Fort Dix six plot, which occurred in my backyard; the Fort Hood attack; the Christmas day 2009 attack over Detroit; and the UPS cargo bomb which again landed in my airport. Or the airport in my district, it is not my airport. The world is a safer place now that Awlaki is no longer a part of it. The achievement is a great testament to the U.S. intelligence capabilities. It will send a clear message to those who seek to harm us that you won't hide, and you won't escape justice. Now today's hearing is aimed at educating our Members, and I think many at-large, about the ways in which the Department of Homeland Security collects, protects, and uses personal information on travelers attempting to come into the United States. Given the transnational nature of terrorism, and a desire of terrorist operatives to enter the United States from abroad, it is crucial that we act in partnership with other nationals around the world. We push it out a little bit further and make sure our skies and our ports are safe and secure from wrongful entry. In 2007 the United States and the European Union entered into an agreement to share with one another intelligence that would help all parties identify potentially dangerous individuals before they set foot on an aircraft, thus helping to disrupt the effort of terrorists and organized crime rings. Since 2007, the programs resulting from this agreement have proven to be an indispensible component in our strategy to thwart terrorists. In fact, in 2008 and 2009, PNR helped the United States identify individuals with potential ties to terrorism in more than 3,000 cases. Among these was the Mumbai attack plotter, David Headley, who was arrested in Chicago after U.S. authorities accessed his PNR data from a flight he had booked from the United States to Germany. Headley since pled guilty to a separate plot to murder journalists from a Danish newspaper. PNR data also identified Faisal Shahzad, the perpetrator of the failed Times Square bombing in May 2010, who was caught with the help of PNR as he attempted to escape the United States at JFK Airport. In 2010, approximately one-quarter of those individuals denied entry into the United States for having ties with terrorism, were initially tied through PNR data. Now in 2009, the European Union member states adopted the Treaty of Lisbon, and that gave greater power to the European Parliament. Thereafter, this parliament sought, under its new authority, to reject this E.U.-U.S. PNR agreement because the United States had negotiated bilateral memorandums of understanding rather than establish uniform rules with the European Union as a representative body. In addition, some members of the E.U. Parliament have begun to criticize the agreement for not providing stricter privacy protections--and I hope that you will go in to the privacy protections that we have--even though no violation of privacy rates, or breach of security, had been reported. I hope you will develop that point as well. The United States has been absolutely vigilant in assuring that individual privacy rights under both the U.S. and European law were respected. As many know, last month Attorney General Eric Holder traveled to Brussels to discuss with European lawmakers the collaborative efforts between the United States and the European Union to address mutual security concerns. Holder testified before the parliament's committee on civil liberties to attempt to assuage their fears. He argued that the debate over data protection is a purely academic one. Despite differences between the U.S. and European legal structures, both protect civil liberties effectively. Still, DHS and other components have been involved in on- going negotiations with the European Union to amend the PNR agreement, and it has been on-going since 2009. We have been through four rounds of such discussions. In fact they continue on these terms which were supposed to remain in effect until 2014. Our main concern in Congress, and part of the reason we are holding this hearing today, is to ensure that negotiations with the United Nations and European Union do not impact the effectiveness of this agreement. The PNR programs have been invaluable tool in our gathering of actionable intelligence over the course of the 4 years. It is a tool we cannot do without. The United States was built upon principles of freedom and civil liberty. This country has always been a leader among nations of upholding the rights of the individual person, and it will continue to be. It is for this reason that we must maintain our ability to prevent those who would seek to take those freedoms from us from carrying out their plans. Privacy is a right, but so is security. One relies on the other. I look forward to hearing from today's distinguished witnesses and on these matters. Now, the Chairman recognizes the Ranking Minority Member of the subcommittee, the gentlewoman from California, Ms. Speier, for any statements she may have. Ms. Speier. Mr. Chairman, thank you for holding today's hearing and having us focus on the PNR issue. I would like to associate myself with the comments you made about the successful efforts by the President, the military, and the CIA in actually putting al-Awlaki to his final demise. I would also like to welcome the witnesses here, and look forward to gaining insights into how the Department of Homeland Security uses the PNR, including how DHS protects travelers' privacy. It has got to be a key component of the utilization of this information. It is, in fact, one of the most powerful tools that we have to combat terrorist travel. There is obviously a very important balancing that must go on. As we know, analyzing PNR can highlight high-risk travel patterns such as popular routes used by human smugglers and terrorist facilitators. This may be the only way to flag potentially unknown suspects who aren't on any of the watch lists, and who on the surface appear like any other traveler. PNR can be immensely important in terrorism investigations. Investigators can use a terrorist suspect's past travel history to identify travel to terrorist-safe havens as well as co- travelers who may be associates, which can help to identify and disrupt the entire terrorism network. PNR has played a key role in many prominent terror investigations including that of the 2008 Mumbai attack plotter, David Headley, and the attempted Times Square bomber, Faisal Shahzad. But we almost missed Shahzad when he attempted to leave the country. So the question that we must ask is: What enhancements to the system have been put in place to address the vulnerabilities exposed by that near miss? Effectively combating terrorist travel hinges on the timely sharing of information which requires working with the airline companies to get the PNR data quickly and efficiently. Have these increased demands for timely information placed an undue burden on the airline companies or to the traveling public is a question that must be answered. Equally important to our cooperation with the airlines is our relationship with our foreign partners. How can we maintain lasting and mutually-beneficial agreements with our foreign partners to ensure the timely sharing of PNR data continues? One such agreement that has been the subject of public scrutiny and some controversy is the one we share with the European Union. Many European airports serve as the last point of departure to the United States for many high-risk areas of origin including the Middle East, Africa, and South Asia. So it is of the utmost importance that we maintain the robust sharing of information on travelers flying from Europe to the United States. ``How will proposed changes to the agreement affect our screening operations?'' is yet another question we must ask. Many people, including privacy advocates both here and abroad, have expressed concern about the privacy implications that come with obtaining customers' data from the airlines for counterterrorism purposes. Although independent reviews of the PNR information-sharing program have determined that the usage of PNR data by DHS has never unlawfully violated travelers' privacy, we must be mindful of these privacy concerns and ensure that DHS continues to uphold stringent privacy restrictions. The traveling public has the right to a reasonable degree of privacy, and they have the right to be concerned. I think we need to do a better job of explaining to the public the parameters of the U.S. Government's usage of PNR data--why we need it, for how long, and how is it applied. I am eager to learn more about the protections in place. How exactly do we ensure that a traveler's personal information is protected? How might further future modifications to the agreement impact privacy? So I hope today that we can positively contribute to that discussion and clear up some misconceptions about how and why the Government uses PNR data. I am also looking forward to learning more about how far DHS has come since 9/11 to effectively analyze data sources such as PNR to identify and mitigate potential threats. With the system CBP and DHS has at its disposal now, could we avoid past failures such as the Christmas day attack? How important is PNR data to these efforts, and what challenges remain? With that, Mr. Chairman, I yield back. Mr. Meehan. Thank you, Ms. Speier. I want to have the other Members of the committee be reminded that any statements that they would like to make can be submitted for the record. We are pleased to have a distinguished panel of witnesses before us today on this important topic. Let me first turn to Mr. David Heyman. He is the assistant secretary for policy at the Department of Homeland Security. Mr. Heyman is an expert on terrorism, critical infrastructure protection, bioterrorism, and risk- based security. Previously, Mr. Heyman has served as a senior fellow and director of the CSIS Homeland Security Program where he led the research and program activities for that section. Additionally, Mr. Heyman has held a number of Government positions, including as a senior adviser to the U.S. Secretary of Energy and at the White House Office of Science and Technology policy on National security and international affairs. Mr. Heyman has testified before several committees in Congress and authored numerous publications, and appeared in various media outlets. I now recognize Secretary Heyman for his testimony, and ask that you do your best to stay within the 5-minute parameters. Thank you, Mr. Heyman. STATEMENT OF DAVID HEYMAN, ASSISTANT SECRETARY FOR POLICY, U.S. DEPARTMENT OF HOMELAND SECURITY Mr. Heyman. Thank you, Mr. Chairman, good morning Ranking Member Speier and distinguished Members of the subcommittee. We very much appreciate the opportunity to appear before you today to discuss how the Department of Homeland Security's prescreening of passengers, and in particular the use of PNR data, plays an important role in our Nation's work to prevent and counter terrorist and criminal threats to the homeland. Preventing terrorists from traveling to or remaining undetected in the United States remains a top priority of the Department, and I commend this committee for holding this hearing and for your support on the on-going efforts to renegotiate our agreement with Europe on the exchange of PNR data. Ten years ago screening passengers coming to the United States was limited to the Department of State's visa process and the inspection of a person by an immigration officer at the port of entry, plus whatever processes were applied at foreign airports and by foreign governments. If you were a terrorist seeking to come to the United States you would for all intents and purposes apply for a visa, purchase a ticket, and board an aircraft to America. There would most likely not have been checks to see if you were a known or suspected terrorist, no checks to see if you may be a risk to security based upon behavior, no checking to see if you were traveling on a lost or stolen passport, no screening of you or your luggage for explosives, little to no security on-board the aircraft, and no checking to see if you are even admissible to the United States. That has obviously all changed in the last 10 years. Back then provision of advance passenger information was voluntary, and even when provided by air carriers frequently contain inaccurate and inconsistent data. There was no biometric collection of visa applicants beyond photographs, nor for aliens seeking admission to the United States. There was very limited pre-departure screening of passengers seeking to fly to the United States. Today, a decade later, in response to both 9/11 and evolving threats and with the help and support of Congress, we have significantly adapted and enhanced our ability to detect and interdict travel threats at the earliest opportunity. PNR plays a central role in all of this. The term PNR refers to the data an airline receives from a traveler to book and manage travel plans, and may include the traveler's itinerary, payment method, and contact information. Just as fingerprinting was first used and became an important tool in criminal investigations in the beginning of the 20th Century, so too at the start of the 21st Century has PNR analysis become a vital tool for helping to identify terrorists and criminals. DHS analyzes PNR provided by the airlines to help identify, detect, and thwart terrorists and criminals attempting to blend into the traveling public, and before they commit criminal acts against innocent peoples. Our analysis of PNR data helps the U.S. Government to identify--as the Chairman has noted--over 1,700 unique suspicious activities or suspicious cases every year, and it has been vital in almost every high-profile terrorist investigation since 9/11. PNR data analysis has been proven to be a critical tool in identifying nearly every human smuggling case involving air travel. My colleague, Tom Bush, executive director for targeting and analysis for our customs and border patrol, will elaborate on the use and protection of PNR data international targeting programs this morning. In addition to the Department's PNR system being operationally effective, we also can be proud of our outstanding record of data privacy protection over the past decade. To ensure the protection of privacy and civil liberties, DHS use of PNR data is subject to oversight for multiple independent bodies including the Department's chief privacy officer, the DHS inspector general, the GAO, and as well as the United States Congress. In addition, periodic joint reviews with E.U. officials have confirmed the value of PNR data in protecting the traveling public. These reviews have confirmed our adherence to the highest data protection and privacy standards. My colleague, Mary Ellen Callahan, the Department's chief privacy officer, is here to elaborate further on our protection and privacy programs. Let me close by saying, over the past decade the use of PNR has evolved into a critical tool for ensuring the security of the traveling public, but also for identifying and prosecuting terrorists and criminals. The Department has accomplished all this while also demonstrating its firm commitment to protecting the privacy of travelers. Of literally billions of passengers traveling to and from the United States over the past decade, there has not been a single breach of use of PNR and violation of established privacy protections. In fact, the PNR system we have put in place has become a model internationally for other countries seeking to implement similar programs of which there is nearly a dozen now. We are seeing more and more countries seeking to establish their own PNR systems, including the European Union who we are in negotiations with right now. So let me again, thank the committee for this opportunity to discuss this matter, and to helping us ensure the commitment is maintained to achieve a security with the traveling public in exchange of data to accomplish that. I look forward to your questions. Thank you. [The joint prepared statement of Mr. Heyman, Ms. Callahan, and Mr. Bush follows:] Joint Prepared Statement of David Heyman, Mary Ellen Callahan, and Thomas Bush October 5, 2011 introduction Chairman Meehan, Ranking Member Speier, and distinguished Members of the subcommittee, thank you for the opportunity to appear before you today to discuss how the Department of Homeland Security (DHS) works to prevent individuals that may pose a risk to our National security from entering the country--all while facilitating legitimate travel and commerce and protecting the privacy of individuals engaged in international travel. Specifically, I want to highlight the Department's pre-screening of passengers, and in particular, the use of Passenger Name Record (PNR) data in our work to prevent and counter terrorist and criminal threats to the Homeland. PNR data and analysis play a unique role in enabling the U.S. Government to identify both known and unknown threats. Recent cases underscore the vital benefit of PNR and reflect its value today-- a value that has grown in recent years as the Department has improved and expanded its data matching and processes. We have been able to advance the development, implementation, and use of this tool, while also protecting travelers' data and privacy. Other countries, recognizing the utility of PNR, have expressed interest in developing their own PNR systems for screening travelers. Our on-going negotiation with the European Union over how PNR from flights with ties to the European Union is handled by DHS is one manifestation of our ability to advance security, data protection, and privacy together. I commend the subcommittee for holding this important hearing on this topic. Multiple Layers of Defense Since 9/11, we have learned that the exercise of immigration and border security authorities can be powerful resources used to identify and thwart terrorist operations at the earliest opportunity. We have significantly adapted and enhanced our ability to detect and interdict threats at the earliest opportunity by instituting a layered aviation and border security architecture, incorporating both seen and unseen assets. Accordingly, we have strengthened our security and screening at points:During the travel planning phase, when a traveler seeks a visa or authorization to travel; Just prior to travel, when a person seeks to board an aircraft at a point of departure; and During travel, when a person seeks to enter the United States. PNR is one of five automated systems that assist the Department in identifying travelers likely to pose a risk. The five reinforcing systems are: PNR; the visa application process (conducted by the Department of State and supported by DHS); the Electronic System for Travel Authorization (ESTA) for travel under the Visa Waiver Program; the Advance Passenger Information System (APIS), and; Secure Flight. These are the systems DHS uses to begin conducting screening before an aircraft's departure and function in conjunction with physical security procedures such as checkpoint screening. passenger name record--pnr The term PNR refers to the data an airline receives from a traveler to book and manage travel plans, and may include the traveler's itinerary, payment method, and contact information. In light of the lessons learned from 9/11 about identifying and preventing terrorists traveling into and out of the United States, Congress mandated that carriers make PNR data available to the U.S. Government in the Aviation and Transportation Security Act of 2001 (ATSA, Pub. L. 107-71). Presently, all carriers flying to and from the United States provide DHS with PNR pursuant to ATSA and DHS implementing regulations. DHS analyzes PNR provided by the airlines to identify terrorists and criminals attempting to blend into the traveling public before committing criminal acts against innocent people. Our analysis of PNR data, reinforced through cooperation with Federal partners, has helped to identify approximately 1,750 unique suspicious cases every year, and has been vital in many of the United States' most well-known terrorism investigations since 9/11. To ensure the protection of privacy and civil liberties, DHS' use of PNR data is subject to oversight from multiple independent bodies, including the Department's Chief Privacy Officer, the DHS Inspector General, and the Government Accountability Office, as well as the U.S. Congress. In addition, periodic joint reviews with E.U. officials have confirmed the value of PNR data and our adherence to the highest data protection and privacy standards. The findings of these joint reviews are available on-line on the DHS and E.U. websites. Over the last decade, the Department has demonstrated its firm commitment to protecting the privacy of travelers. Of the literally billions of passengers traveling to and from the United States during the past 10 years, there has not been a single data breach or privacy violation of the PNR data. continued threat/risk of terrorist travel This year witnessed the deaths of both Osama bin Laden and Anwar al-Awlaki, as well as the 10-year anniversary of the deadly terrorist attacks of 9/11. As we reflect on the past decade, it is important to remain cognizant of the continued, evolving threat of terrorism to the traveling public. Since 9/11, the threat has changed to include not only large-scale attacks but also smaller operations with potentially catastrophic effects, including the continued targeting of the aviation sector. One of the most important responsibilities of government is the protection of its citizens, a duty this Department well recognizes and takes seriously. Passengers have a right to privacy and protection of their civil liberties and personal information, but also have a right to know that their government is doing everything it can to ensure their safety and security when they board an airplane. It is necessary, therefore, to ensure the continued use of proven and effective security measures. PNR is a proven asset in the fight against terrorism and other transnational crimes. evolution of u.s. prescreening efforts since 9/11 Ten years ago, screening of passengers coming to the United States was limited to the Department of State visa process, if applicable; the inspection of a person by an immigration officer at the port of entry; and any processes applied at foreign airports by foreign governments. Provision of advance passenger information was voluntary. There was very limited pre-departure screening of passengers seeking to fly to the United States, and there was virtually no screening of any kind for domestic flights beyond airport checkpoints. Today, in response to both 9/11 and evolving threats, and with the help and support of Congress, DHS has significantly adapted and enhanced its ability to detect and interdict threats at the earliest opportunity, including through the access to and analysis of PNR data as mandated by Congress. PNR data are analyzed in conjunction with other screening tools such as visa applications, the Advance Passenger Information System, and the Electronic System for Travel Authorization (ESTA). DHS analysis of PNR data is an indispensable layer in a comprehensive approach to security. Each tool plays a unique role in the screening process. ESTA and the visa issuance process (depending on the country and traveler) allow us to prevent a known criminal or terrorist from preparing to travel. Secure Flight and APIS help DHS decide how the carriers and CBP officers, respectively, should handle travelers as they prepare to board. PNR data further enable this decision with additional and earlier information. APIS and PNR then help DHS decide who warrants a secondary examination upon arrival. In all cases, trained DHS personnel review and analyze the results of these automated systems. As the 9/11 Commission pointed out, targeting terrorist travel is one of the most powerful weapons this country has to counter terrorist operations. Terrorists travel in order to: Identify and engage in surveillance of potential targets; plan attacks; receive training on tactics and operations; collect and transfer funds and documents; and communicate with other operatives. Every step along this pathway presents a vulnerability for would-be attackers, who must come out of the shadows and interact with the traveling public, the travel industry, and immigration and border security officials. At some point along the travel pathway, for example, many terrorists cross international borders--a step that often necessitates submitting advance passenger information, using a passport, and undergoing screening by immigration and border officials while at ports of entry. the role of pnr data within that system PNR data analysis can help identify individuals up to 72 hours prior to departure, including watch-listed individuals, non-watch- listed co-travelers, and terrorists or criminals adopting known illicit travel patterns. DHS is able to link previously unknown terrorists and criminals to known terrorists or criminals by matching contact information, flight patterns, and other data. After this analysis is complete, DHS works with foreign and industry partners to interdict illicit travelers prior to boarding or prioritizes resources for their inspection at U.S. ports of entry. PNR data collection and analysis also support terrorist and criminal investigations, including the three most prominent U.S. terrorist investigations in 2009 and 2010. Further, PNR served as a critical tool in supporting United States Government efforts to investigate 9/11 threats over the tenth anniversary weekend. The retention of PNR data after a flight allows DHS to unravel more complex plots by looking at travel practices over time. Data that does not appear to be relevant at the time of travel can be critically important when tied to a specific case later. Remember that the 9/11 plot was originally conceived in the early 1990s; an attempt on the World Trade Center occurred in 1993, and the actual 9/11 plot planning and execution began in earnest in 1996. This included numerous dry runs and practice flights, as well as travel for recruitment and planning. Retained travel data was important in securing convictions by the Department of Justice in a number of recent counter-terrorism cases, including the conviction of Mumbai plotter David Headley. Identifying Unknowns Following 9/11, the United States Government collected intelligence on al-Qaeda and its affiliate networks and established the FBI's consolidated Terrorist Screening Database (TSDB) of known or suspected terrorists. Today, we check travelers to the United States against the TSDB, no matter what mode of transportation they plan to use to come to the United States. As DHS has seen in recent cases, however, intelligence and law enforcement agencies may have limited or no derogatory information about individuals who pose a real risk to the United States. In fact, we know that some terrorist groups are deliberately looking to recruit individuals who are specifically unknown and can remain undetected by heightened security measures. Fortunately, PNR data analysis, particularly of historic records, allows us to help identify individuals who may be unknown to us as terrorists or criminals, but exhibit a pattern of behavior that is consistent with known or suspected terrorist or transnational criminal behavior. For example, a few years ago, two organized crime syndicates in Latin America devised a simple and effective way to smuggle kidnapped children into the United States for sale. They would pay women to fly to the United States with their own children's legitimate passports but with kidnapped babies. The women would then return alone. By looking for such a pattern in PNR records over a number of years DHS arrested 11 smugglers, removed 10 criminals and identified 37 victims. The same technique of analyzing travel patterns has proven effective against a myriad of crimes and terrorism. At the same time, DHS realizes that sometimes innocent travelers may adopt what may appear to be suspicious patterns. As a result, DHS has established automated procedures so if a traveler is repeatedly flagged for further inspection and found not to pose a risk, DHS will automatically ``de-flag'' the traveler in the future. Further, all pattern-based rules are evaluated quarterly by the DHS Chief Privacy and Civil Liberties Officers for effectiveness and appropriateness. A Customs and Border Protection (CBP) officer, however, may still determine that a closer inspection is warranted, depending on the individual circumstances and travel. Early Identification--Activation of IAP Teams CBP stations Immigration Advisory Program (IAP) officers at certain foreign airports to work with airlines and foreign officials to identify high-risk and improperly documented travelers before they board aircraft bound for the United States. At the invitation of foreign partners, IAP officers make ``no-board'' recommendations to airlines on the basis of passenger data analysis and a review of individual travel documents. To be most effective, several hours before a flight is scheduled to depart, an IAP officer must know who will likely be on a flight and whether they warrant further exam prior to departure. Frequently, PNR data analysis is the first information IAP officers receive to assist in making these determinations. CBP's National Targeting Center--Passenger (NTC-P) analyzes PNR data received up to 72 hours prior to departure and provides recommendations to the IAP officers. NTC-P later validates this analysis with APIS closer to departure. IAP officers are currently posted at 10 airports in 8 countries, and have recommended, in part based upon PNR data, a total of 2,875 no-boards in fiscal year 2011, including 9 No-Fly hits, 74 confirmed Terrorist Screening Database matches, and 109 cases of fraudulent document use. examples of pnr effectiveness Headley, Zazi, Shahzad I would like to take a little time to discuss some of the high- profile cases where PNR data analysis has been instrumental in critical National security investigations and prosecutions. As background, I mentioned earlier that analysis of PNR data have proven to be the critical tool for annually identifying around 1,750 suspicious cases. PNR data have also aided nearly every high-profile terrorist investigation, including: David Headley, who pled guilty for his role in the 2008 Mumbai terrorist attacks; Najibullah Zazi, who pled guilty to plotting to bomb New York City subways; and Faisal Shahzad, who pled guilty to attempting to detonate a car bomb in New York's Times Square. Just as fingerprinting was first used and became an important tool in criminal investigations in the beginning of the 20th Century, so too at the start of the 21st Century has PNR analysis become a vital tool in terrorist and transnational criminal investigations. DHS has also relied on PNR data analysis in nearly every human smuggling case involving air travel. The case of Faisal Shahzad clearly demonstrates the effectiveness of DHS's prescreening programs. Early in this investigation, the Federal Bureau of Investigation (FBI) learned of Shahzad's cell phone number, but had little additional information. Through good interagency cooperation, the FBI asked DHS if it had encountered any individual who reported this phone number during border crossings. DHS searched its PNR database for the phone number, identified Shahzad, and learned other information he had provided to DHS. DHS then provided the additional data to the FBI. Later, Shahzad attempted to flee the United States, but DHS's analysis of departing passenger data identified him before departure and DHS removed him from the aircraft. strong record of privacy protection DHS provides robust privacy protections and strict safeguards over PNR data. Through a combination of law, policy, and oversight, DHS ensures its compliance with stringent standards of privacy and security in the collection and use of PNR data. DHS applies fair information practice principles to its collection and use of PNR, including data integrity, data security, purpose specification, auditing and accountability, individual access, and redress. Moreover, the Department is firmly committed to transparency when it comes to informing our partners and the public about its mission, including how we use and safeguard personally identifiable information such as PNR data. By leveraging the Congressionally-mandated authorities of the DHS Chief Privacy Officer, DHS is working diligently to assure all U.S. and international travelers that the highest standards are being applied to the protection of their personal information. The Chief Privacy Officer has managed two internal audits of DHS's use of PNR data and coordinated two joint reviews with the European Union since 2004. When preparing for the joint review that took place in February 2010, the DHS Privacy Office spent approximately 10 weeks of employee time analyzing and assessing DHS collection and use of PNR data and published two public reports related to that assessment. The reports from these audits are publicly available on the websites of the DHS Privacy Office and the European Union. The DHS Privacy Office found, and the European Union acknowledged, that there has not been a single incident involving the unauthorized use of PNR data. Individual travelers have many opportunities to learn how DHS handles PNR data. The PNR data rule, System of Records Notice, and Privacy Impact Assessment are all available for public review and comment. In addition, individuals, both U.S. and non-U.S. citizens, have multiple opportunities for access and redress. The U.S. Freedom of Information Act (FOIA) applies equally to U.S. citizens and non-U.S. citizens. Anyone can request his or her PNR data directly from DHS; DHS receives and answers these types of requests routinely. If the traveler seeks to change or delete information contained in his/her PNR, he or she can submit a request to DHS and changes deemed appropriate will be made. U.S. and non-U.S. citizens alike also have access to the DHS Traveler Redress Inquiry Program (DHS TRIP) to correct or amend records. More information on these programs can be found at www.dhs.gov/privacy. u.s.-e.u. pnr agreements Despite this operational and privacy success, last year, the European Union sought to re-negotiate our bilateral PNR Agreement to obtain further reassurance that data with ties to Europe is being handled properly by the United States. To protect U.S. industry partners from unreasonable lawsuits, as well as to reassure our allies, DHS has entered into these negotiations. The Agreement currently in force provisionally, negotiated in 2007, is not scheduled to sunset until 2014. The Agreement is operationally sound, but it is subject to ratification by the European Parliament, which instead directed the European Commission to renegotiate the Agreement. As a matter of good faith and out of respect for our E.U. partners and their evolving political structures following enactment of the Lisbon Treaty, Secretary Napolitano subsequently agreed to negotiate a new agreement only if the new text would not degrade the operational effectiveness of the 2007 Agreement and would permit additional security enhancements where necessary. We commenced the latest negotiations on December 4, 2010. As such, the United States is currently in its fourth negotiation over PNR with the European Union in 9 years--effectively a decade of negotiation. The Department is committed to concluding a new PNR agreement, first and foremost a security agreement, which upholds vital public interests in both security and privacy. We reached agreement with the European Commission for such a text on May 16, 2011. The text is an improvement over the 2007 Agreement, it protects both security and privacy and U.S. and European interests, it provides all relevant parties with legal certainty, and it is a reliable framework for an enduring deal. U.S. and E.U. negotiators worked to respond to the European Parliament's criticism of the 2007 Agreement, to improve passenger security and to provide air carriers a legally certain operating environment. To build support for this approach, DHS has met repeatedly with not only the European Commission, which negotiates on behalf of the European Union, but also with key Committees and Members of the European Parliament and representatives of individual Member States. The new agreement is clear, detailed, and transparent--in ways that some critics in Europe felt the previous Agreement was not. The text of the draft agreement defines key terms such as ``terrorism,'' and ``transnational crime'' consistently with United States, European Union, and international norms. A data retention period acceptable for U.S. security purposes is maintained, with additional safeguards to ensure privacy and data protection. The new agreement will require travel information to be transmitted to DHS with greater lead time than provided for in the 2007 Agreement, and thus will provide for greater analysis earlier in the passenger travel life-cycle. It also provides for a new method of data transmission (``real-time'' push). By restricting data transmission to the minimum necessary while ensuring data accuracy, the real-time push method of sharing data will enhance security and privacy protection at the same time. Lastly, the new agreement will expand opportunities for police and judicial cooperation between the U.S. and E.U. authorities. I want to thank this committee for its interest and support in our negotiations with the European Union. With the conclusion of PNR negotiations with the European Commission and, we hope, forthcoming signature and then support from the European Parliament, the United States and European Union will have made progress in strengthening the previous PNR Agreement from a privacy and security perspective. Success will be the result of 9 months of intense negotiations and build off 9 years of dialogue on how best to facilitate safe transatlantic travel and protect individual privacy. By all accounts, the new text is stronger than the 2007 Agreement; it addresses all E.U. concerns raised with the U.S. negotiating team, while also preserving and in some cases improving critical U.S. operational interests. We must build on our historic relationship, values, and interests, as we seek action by the European Commission, the European Council, and the European Parliament to finally conclude this PNR Agreement, which is without a doubt better for enhanced security, as well as for improved data and privacy protections. conclusion Chairman Meehan, Ranking Member Speier, and distinguished Members of the subcommittee, we look forward to working with you as we explore opportunities to advance our cooperation with our European partners to counter terrorism and transnational crime. Thank you again for this opportunity to testify. My colleagues and I are happy to answer your questions. Mr. Meehan. Thank you, Mr. Heyman, for your testimony and for your good work and service in your current position. Next, the Chairman would like to recognize Ms. Mary Ellen Callahan, who was appointed the chief privacy officer and chief freedom of information officer by DHS Secretary Napolitano in March 2009. In her role as chief privacy officer, Ms. Callahan is responsible for evaluating Department-wide programs, systems, technologies, and rulemakings for potential privacy impacts, and for providing mitigation strategies to reduce any privacy impact. She and her staff have extensive expertise in privacy laws both domestic and international that help inform privacy policy development both within the Department and in collaboration with the rest of the Federal Government. Prior to joining DHS, Ms. Callahan was a partner with the law firm of Hogan & Hartson where she specialized in privacy and data security law. In 2011, Ms. Callahan received the Federal 100 award which recognizes individuals in Government and industry that make significant contributions to the Federal I.T. community. I now recognize Ms. Callahan to testify for 5 minutes. STATEMENT OF MARY ELLEN CALLAHAN, CHIEF PRIVACY OFFICER, THE PRIVACY OFFICE, U.S. DEPARTMENT OF HOMELAND SECURITY Ms. Callahan. Thank you very much. Good morning, Chairman Meehan, Ranking Member Speier, and distinguished Members of the subcommittee. My name is Mary Ellen Callahan. I am the chief privacy officer at the Department of Homeland Security. As the Chairman acknowledged in his introduction, I am responsible for evaluating Department-wide programs, systems, and technology for potential privacy impacts including the Department's use of passenger name records--and I will take your cue and call it PNR--through Customs and Border Protection's Automated Targeting System. I will also refer to this as ATS. DHS provides privacy protections and strict safeguards over PNR data. DHS ensures its compliance with stringent standards of privacy and security in the collection of use of PNR. DHS applies fair information practice principles to its collection and use of PNR including data integrity, data security, purpose specification, auditing and accountability, individual access, and redress--the principles which I will detail in my testimony this morning. Moreover, the Department is firmly committed to transparency when it comes to informing our partners and the public about its mission, including how we use and safeguard personally identifiable information such as PNR data. My office has managed three internal audits of DHS' use of PNR data and coordinated two joint reviews with the European Union since 2004. For example, when preparing for the joint review that took place in February 2010, the DHS privacy office spent approximately 10 weeks of employee time analyzing and assessing DHS collection and use of PNR data, and published two reports totaling 65 pages related to that assessment. My staff conducted multiple interviews, reviewed the PNR data use in sharing audit trails, and SOPs for ATS. We also reviewed the logs in ATS associated with whether sensitive data had ever been accessed by DHS. It had never been accessed. Through these two joint PNR reviews, the DHS privacy office found, and the European Union acknowledged, that there has not been a single privacy incident or data breach involving the unauthorized use of PNR data. These public compliance reviews conducted by my office confirm the original intent of the data collection, and provide public assurance that the information is being used for the purposes for which it had been collected. The pattern-based rules that are referred to in our written testimony, that DHS employees are also subject to my review, as well as that of the officer for civil rights and civil liberties, and the Office of General Counsel. On a quarterly basis, we review these pattern-based rules, the underlying intelligence that supports the rules, and the impact effectiveness and efficacy of the rules themselves. This periodic oversight and review allows DHS to perform its border security task in a privacy-protective way. In addition to my statutory authorities related to privacy compliance, the DHS privacy office is involved in data governance and information sharing in the Department through the chief information officer and his counsels, departmental compliance with FISMA, I.T. budget review, and the information sharing and governance board. This type of integrated, ex-anti and ex-post assessment and review by the DHS privacy office is one of the virtues of the senior position my office has within the Department, with visibility and oversight through the data life-cycles of DHS programs, systems, and technologies. As the committee knows, I have had the pleasure of serving as the Department's chief FOIA officer as well. One of the ways the Department supports the privacy fair information practice of individual participation is to provide travelers with multiple opportunities for access and redress. FOIA applies equally to U.S. citizens and non-U.S. citizens. Anyone can request their PNR directly from DHS. DHS receives and answers these types of requests routinely. Based on a recommendation by the European Commission in the 2010 review, we now track that number discretely. Since April 2011, DHS has received approximately 220,000 FOIA requests from around the world. In that same time period, we have received 69 FOIA requests from travelers seeking their PNR records. If a traveler seeks to change or delete information contained in his or her PNR, they can submit a request to DHS and changes deemed appropriate will be made. The administrative appeals through my office are also available. This existing opportunity was strengthened through the Department record amendment policy that was released earlier this year. Furthermore, U.S. citizens and non-U.S. citizens alike have access to the DHS traveler redress inquiry program to resolve travel-related inquiries such as the use of PNR. In sum, the DHS' collection and use of PNR, and my office's involvement throughout the PNR life-cycle, demonstrates the Department's commitment to embedding privacy principles within the Department's operations. I look forward to your questions, sir. Mr. Meehan. Thank you, Ms. Callahan. Last, let me turn to Mr. Thomas Bush, the executive director of automation and targeting for the Customs and Border Protection Office of Intelligence and Investigative Liaison. Mr. Bush and his staff are responsible for assessing and reporting the threats that the United States Customs and Border Patrol faces through research, evaluation, and dissemination of trend analysis, intelligence alerts, and assessments. Mr. Bush began his career as a program analyst for the Department of Defense strategic defense initiative and entered the United States customs service in 1994. In 2006 Mr. Bush joined the Office of Antiterrorism where he acted as executive director prior to the establishment of the Office of Intelligence and Operations Coordination in 2007. His numerous honors include the 1998 Commissioner's Unit Citation Award and the 2003 Commissioner's Annual Award for Innovation, and the 2008 Secretary's Award for Excellence. I now recognize Mr. Bush to testify for 5 minutes. Mr. Bush. STATEMENT OF THOMAS BUSH, EXECUTIVE DIRECTOR OF AUTOMATION AND TARGETING OFFICE OF INTELLIGENCE AND INVESTIGATIVE LIAISON, CUSTOMS AND BORDER PROTECTION Mr. Bush. Good morning Chairman Meehan, Ranking Member Speier, distinguished Members of the subcommittee. Thank you for this opportunity to provide background on PNR today. PNR is the data that an airline receives from travelers to book and manage their reservations. This can include the traveler's itinerary, payment method, and contact information. It is one of our most important tools in the on-going fight against terrorism, as well as narcotics smuggling, human trafficking, and other transnational crime. I will address how we get this data, how we use it, and how it has helped us in the past. CBPs predecessors, the U.S. Customs Service and the Immigration and Naturalization Service, began receiving PNR data from commercial airlines on a voluntary basis in the early 1990s. The carriers recognize that working closely with U.S. law enforcement to intercept high-risk travelers would in turn yield benefit for enhanced security on their flights. Shortly after September 11, 2001, Congress began mandating that the airlines provide PNR to U.S. Customs Service, now CBP. Since then, CBP has had electronic access to the PNR data of every airline with an electronic reservation system operating international flights to and from the United States. I would also like to add that CBP works closely with our partners in the Department of Homeland Security's oversight offices, the chief privacy officer, and the civil rights and civil liberties officer to ensure transparency in how we use PNR at CBP. We also have established clear guidelines for our officers and what they can and cannot do with the data. Not every employee in CBP needs to have access to PNR, but those that do respect PNR as a powerful tool in their decision-making process. CBP maintains PNR in our automated targeting system or ATS. The system parses the data into discrete elements, analyzing it in conjunction with other DHS traveler holdings. This allows CBP officers and analysts to use a variety of information, to identify those travelers posing the highest risk before they board airplanes overseas. CBP officers and analysts use PNR in conjunction with other data and law enforcement intelligence information to establish risk-based scenarios for the interception of previously unknown high-risk subjects--in other words, those not on the watch list. These scenarios, or pattern-based rules, allow officers to make faster and better-informed decisions about which travelers to interview and secondary examination. PNR data is also useful to trend analysis. It is unique and it allows CBP to see a traveler's full itinerary and contact information such as phone numbers and e-mail address. This can be very powerful in establishing connections with other travelers who may arrive from different locations or different times, and who may appear to be otherwise unconnected. I will cover a few of our success stories. One important example of it is the case of Najibullah Zazi. You may recall Zazi as the al-Qaeda-trained operative who planned to explode improvised explosive devices in New York City's subway system. Using PNR data, DHS and CBP worked closely with the FBI to cross-check the names of his co-travelers against open counterterrorism cases inside the United States, and determined his co-travelers were being trained during the same trips to Pakistan in the same training camps. Zazi was arrested on September 19, 2009 and the information from his PNR records were used in his questioning and his indictment. Zazi pled guilty in February 2010. Another example of CBP's ability to fully leverage PNR holdings--specifically about those we have very little information or those we call the unknowns. Law enforcement intelligence information implicated a specific person in the plotting of the 2008 Mumbai attacks as well as the possible attacks against a Danish newspaper office. Starting with the very common first name, David, a partial travel itinerary, and a very vague travel time frame, CBP was able to review its PNR data in connection with other DHS databases. Within 24 hours CBP was able to provide the FBI with the person's full name, address, passport number, travel history, and other information useful to law enforcement pursuing him. You may know that person as David Headley who pled guilty in March 2010. A third example of how CBP's use of PNR and has been successful also demonstrates when we receive the data. In the case of Faisal Shahzad, who attempted to use the car bomb in Times Square in May 2010, CBP used PNR in the first place to target him on his flight returning from Pakistan. It was also used to intercept him when he tried to flee the plot after it was unsuccessful. After a stay in Pakistan, in which was later determined Shahzad underwent terrorist training, Shahzad arrived in the United States and was flagged for screening based on information in his PNR. CBP conducted an examination and released him after finding no reason to further detain him. After the failed attack, the FBI, in coordination with DHS, learned of Shahzad's identity from a phone number in his attempt to purchase the car that was linked to the PNR data, and our reporting on that examination. Based on previous information, CBP created travel lookouts on Shahzad which enabled us to intercept him before he hurriedly booked his PNR in an attempt to leave the United States on a flight out of JFK. Shahzad confessed and was sentenced to life prison in June 2010. Two other examples that are in human smuggling are cases in Korea of sex trade--they also were connected to Sri Lanka. PNR was used for us to target the travel routes and the travel agencies used by those perpetrators in November 2009. A separate human smuggling case working with Interpol, we were able to use PNR data to detect payment address information and e-mail information that connected to Eastern European human smuggling cases. This was in August 2009. PNR uniquely and solely provides CBP with the ability to identify the true point of origin for travel. Without it CBP often mistakes the origin of travel at that last point of departure to the United States--take an example for Heathrow versus an originating travel in Pakistan. PNR also allows CBP to see all the stops along the way. PNR also affords CBP the opportunity to determine suspicious booking and payment methods such as last-minute ticket purchase, cash tickets, or one-way tickets. Mr. Meehan. Mr. Bush, can I ask you--these are all good things and perhaps these are some of the things you can develop for us in your testimony. Do you have a closing observation for your direct testimony? Mr. Bush. Other than I just noticed I was over. I apologize. Mr. Meehan. I can see you---- Mr. Bush. Part of the excitement. Thank you, sir. Mr. Meehan. It does. It is interesting stuff. Particularly, you are getting a chance to layout your trophy case and I think it is a significant record. I want to thank each of you for your testimony here. First, how inherently important it is because the record demonstrates the things that have been accomplished by virtue of the work that has been done with PNR. Second as you have testified here today, each of you in different parts there is a lot of work that has gone into protecting the integrity of this information, and the audits have shown that we haven't had violations. With that premise, we really do want to find the balance of assuring privacy while protecting the safety of Americans traveling. So, Mr. Heyman, let me start with you because this is the kind of a thing that if you aren't close to it and you drill down to it, you know, just the terminology can overwhelm you. Effectively, what kind of information are we using when we are engaged with PNR? Isn't it in many ways the kind of information that the people should have an expectation that they are already currently sharing? It is just using that information in a more effective manner than we have in the past. Mr. Heyman. Thank you, Chairman. You are absolutely right. The balancing act that we have sought to accomplish, and I think frankly effectively have, is the balance that says passengers have a right to privacy and protection of their civil liberties and personal information. But when they get on the airplane they also have a right to know their Government is doing everything they can to make sure that that flight is going to be safe. We do that through a number of different things that I have outlined, but included and most important, the PNR record. The PNR record is basically the information that you provide an air carrier when you book a travel plan. So it is your seat number. It is your destination. It is your routing. It is perhaps how you purchased the ticket. There are about 19 types of fields that are included and include personal information such as your name and---- Mr. Meehan. But not inherently private information per se, right? Mr. Heyman. Well, I will let my privacy officer speak to the specifics about how privacy is accounted for. But it is information that you share with the airlines and then they share it with the Government for the purposes of the evaluation about whether an individual presents a risk getting on that aircraft. We take that responsibility quite seriously. We have data protection for ensuring that only the information of those 19 fields are preserved. The specifics about sensitive information that people are concerned about, we do not use that. It is our policy not to use sensitive information---- Mr. Meehan. Well, let me drill down to that for a moment because that is the essence of what we are really talking about, I think. We have demonstrated over a course of period of time the effectiveness of PNR and the importance that it plays. You have also been able to create a record in which it has withstood scrutiny up to this point in time. So what is really at play here with the European Union now coming back and challenging what has been a program which I am presuming has not only worked effectively, but my assumption is you developed more fields of information that its effectiveness only grows? Mr. Heyman. Well, that is a great question. What is at play? There is a lot of play here, some of it having to do with institutional reform in Europe post-Lisbon where the parliament now has a responsibility for approving agreement. Previously the pathway to an agreement with the United States would be the commission negotiates an agreement and member states sign off on it. Now, the parliament also must vote on it. Seven-hundred-plus members of the European parliament will vote thumbs up or thumbs down. Parliament for the last decade or so has made past resolutions in Europe requesting and urging the commission to provide more for data protection on these types of information- sharing agreements. Now that they have an opportunity to vote up or down in this past year, they requested that the commission come back to the United States and seek a renegotiation of the---- Mr. Meehan. The point of it is, individually many of these member nations have not only appreciated the significance of the protections afforded to safety, but they have agreed and participated with you in the zones of information that should be shared. Is that right? Mr. Heyman. In fact, yes. I believe it is 23 or 24 of the 27 member states ratified the 2007 or re-passed the 2007 agreement. Mr. Meehan. Do we share information with them in a return capacity because there are people that fly through airlines that either go through the United States or from the United States to their countries? Mr. Heyman. Yes. We may on a case-by-case basis share information. At this point the Europeans as a group don't have a PNR system. They proposed one which may take several years to stand up. Some member states--the Brits in particular--have begun to stand up their own PNR system in which case we would have that type of exchange. Mr. Meehan. Well---- Mr. Heyman. Protected also--protected with the same data protection and privacy protections that we seek in our own agreements. Mr. Meehan. My time has expired for now. But I know that there is an interest in the broad spectrum that all of us will--have to share. So I turn it over to the Ranking Member, Ms. Speier. Ms. Speier. Thank you, Mr. Chairman. So let me follow up on the Chairman's questioning. Does the 2007 agreement stay in place pending the negotiations on the 2011 agreement? Mr. Heyman. Yes, it is provisionally in effect. Ms. Speier. All right. We prefer the 2007 agreement to the 2011 agreement? Mr. Heyman. Well, let me just give a little background on-- Secretary Napolitano, when she agreed to renegotiate the agreement, agreed with two fundamental principles that we must adhere to. The members here are part of the negotiating team here--your witnesses. So No. 1, she directed us that we have to maintain the same operational effectiveness as 2007. So there is no degradation in existing operational capabilities. The 2007 agreement provides us with exceptional operational capability. No. 2, that a new text must permit additional security enhancements where necessary or appropriate, so we have been given guidelines or direction that we will have no degradation and operational---- Ms. Speier. Mr. Heyman, excuse me for interrupting. I am trying to get to what the crux of the issue is with the 2011 agreement. Would you say that the expectation of the European Union to have greater privacy protections is what is stalling the negotiations? Mr. Heyman. The Europeans seek--what has stalled--the negotiations have proceeded as directly as we can. We concluded what we believe is a good text in May this past year. They have a number of institutional hoops that they must go through. The commission must now get the member states onboard. The member states then pass it, and they have to give it to the parliament. There are some institutional things that must get accomplished. But as far as we are concerned with perhaps a couple of other discussions, we are pretty much satisfied with the text as created in May 2011. Ms. Speier. So there are no disputes pending? Mr. Heyman. The Europeans have to go through their own institutional requirements, and so there is still discussions going on. Ms. Speier. Okay. Can you just tell me if there is anything outstanding? Mr. Heyman. From the European side there are, yes. Ms. Speier. Okay. What are they? Mr. Heyman. The Europeans have a legal opinion that has been put forward by the commission that says that the May text that was leaked to the public is not proportionate, which is a standard by which data protection and data use must be adhered to. So, they are working through that challenge right now. We are open to hearing their proposals for how to fix that problem. But it is on the European side. Ms. Speier. What do you mean by proportional? Mr. Heyman. So--why don't you---- Ms. Callahan. The proportionality is a concept that is in the European law particularly vis-a-vis the member states to the European Union. It is one that has been incorporated into the data protection or privacy directive of 1995. Proportionality is actually a concept that has multiple meanings within Europe. One meaning is you should only take the information that you need in order to do your job. So the number of fields that you collect from the airline, the 19 fields that Mr. Heyman spoke about. Another concept of proportionality that we have heard discussed is that you only collect information from the people that you need to collect the information from. From, for example, the bad guys, from the criminals. Now that of course, as Mr. Bush elaborated on we don't know who all the bad guys are. We have unknown terrorists out there, and so that is not necessarily possible. Then there is proportionality in terms of the scope of the enforcement and the application. Each time we talk about proportionality, we hear a different definition. So the definition in European Union law is quite broad, which is why to say that the, ``agreement'' is not proportionate is difficult to pin down in terms of how to-- -- Ms. Speier. Okay. What are the 19 fields? Can someone just rattle those off for us? Ms. Callahan. Mr. Bush. Mr. Bush. I can try to do most of them, ma'am, and get you---- Ms. Speier. All right. I have got 30 seconds so---- Mr. Bush. Travel itinerary, which covers a few of the 19 fields: Name, date of birth, payment information, e-mail address, phone number. If you have associates, co-travelers on your ticket, you are sharing, travel agency, travel agency address. Ms. Callahan. Co-chair. Mr. Bush. Co-chair if it splits. So if United needs to share with another airline as an example. I think that covers-- bags and seat assignment. Ms. Speier. All right, thank you. Mr. Bush. We can get you the full details. Mr. Meehan. Thank you, Ms. Speier. The Chairman now recognizes the gentlelady from California, Ms. Hahn. Ms. Hahn. Mr. Chairman and Ranking Member Speier, this has been a very interesting hearing. Thank you for your testimony. It is certainly--and, you know, I have a statement that I can enter into the record. I won't give it now. But clearly PNR is an important tool that I think we use in this country to clearly, as was stated, to connect the dots. I guess the key is making sure we have the right dots, and then the real work begins on connecting those dots. But we have certainly had some pretty impressive success stories to tell which I think is important. You know, reading some of the background materials, I think the real problem is parliament. You know, when you read some of the quotes from the members of parliament, they are the ones that look like they could very well veto this or block it. It doesn't seem like there is some real instances of abuse that they can point to after we have collected this information. But it is just a basic overall belief that data collection has sort of gotten to an extreme, and privacy, just on that basis, for them it sounds like to be violated. So I think that is going to be the real issue--is their parliament. You know, one of the things--you know, my district in California borders Los Angeles International Airport. It also borders the Port of Los Angeles. Now, I am wondering--you know, the airport police in many of our airports in this country, certainly are sort of a separate law enforcement agency. I am wondering how this information is communicated to our airport police and vice versa--our airport police, agencies across this country in an information-sharing loop with the Department? The other thing I was certainly wondering, it is always my concern is I think our real vulnerable points of entry into this country are our sea ports. Wondering, does this also include--does the PNR also include passengers who would be coming into this country through cruise ships, for instance? Is that an area of concern? Because it is for me, and wondering where we are in really looking at information for those who come into this country on, you know, some major cruise ships certainly from Europe--so just kind of two questions. Mr. Heyman. Thank you, Congresswoman. Let me say that first of all in the broader context, also to the Ranking Member's question, that we are satisfied with the text as we have negotiated and look forward to the commission advancing that to the council for approval. We look forward to the council approving it and giving it to the parliament and voting positively on that. In terms of a law enforcement cooperation, we have added into the new text some ability to facilitate greater cooperation in law enforcement. But as it pertains to U.S. law enforcement, the provisions that would be most important really apply to our Federal law officials. When somebody gets off an airplane from another country they go through customs and borders. So the information PNR records are evaluated in advance of arrival, as is other information so that if there is additional screening that is required, our customs officials take that into account. Then the third point, on sea ports, we do look at PNR for people coming in to our ports. Ms. Hahn. Is it as extensive as--are we connecting the dots as much in that area, do you believe? Mr. Bush. PNR as an industry tool is not as well-developed in the sea environment, but we do have the same ability to connect the dots and do run the same pattern-based rules and use the automated targeting system on cruise ships. Ms. Hahn. I just want to go on record to say, again, my concern will always be on this committee as well as Homeland Security Committee--I mean, on the subcommittee, is that our sea ports, I believe are still an extremely vulnerable entry way into this country, both with cargo and with passengers. I just want to go on record saying that. Mr. Meehan. Thank you, Ms. Hahn. The Chairman now recognizes the gentlelady from New York, Ms. Hochul. Ms. Hochul. Thank you, Mr. Chairman, Ranking Member. My district is on the border of Canada. What standards are in place with respect to airlines that come in from Europe, stop in Toronto and continue to the United States? We have a different set of standards for Canadian and Mexican-originated flights versus what is considered at the European Union or identical standards. You can just enlighten me a little bit on that before I ask my next question. Mr. Heyman. We have the same standards and requirements for all of those flights. The secure flight program that the Department of Homeland Security put in place also requires information are provided for all the flights. So, if a flight were to go to Canada but not to the United States, we would still be able to do the risk assessment for U.S. security. Ms. Hochul. Have any of our other partner nations outside the European Union raised any privacy concerns or any issues or is this it? Ms. Callahan. With regard to privacy concerns and the use of passenger name records, it has exclusively been a conversation with the European Union. Mr. Heyman. Let me elaborate. Actually, there are 250 some-odd last points of departure where we require, because of Congressional law, passenger name records to be provided in advance of a flight. Some of those are in Europe, but the bulk of them are outside of Europe. The European agreement is the only one that we have for that. Ms. Hochul. If we are not successful in negotiating this agreement with the European Union, what is the effect? The 2007 agreement stays in effect until 2014? Is that how it is? Okay. So we are not bumping up against a wall just yet. You are just having these negotiations at the stage that we are not under the gun. We are not going to have this program suspended any time soon, correct? Mr. Heyman. That is correct. The Europeans have said that the agreement is provisionally in effect until negotiations are concluded. Ms. Hochul. I know that some have suggested that we suspend the visa waiver program for European countries if we are unable to negotiate, that. Given that about 16 million people come in from Europe to our country, do you think you could handle that additional workload if that would be the case? Yes. I didn't think so. [Laughter.] Ms. Hochul. What would be the effect? Would that compromise the program we have in place with the additional workload? What is your opinion? Mr. Heyman. Actually, first of all it would be terrific if we were to expand our trade-travel opportunity for people who come to the United States. I think it would be a good investment in America. So I think it is a positive step in the right direction. I don't have the technical specifications in terms of our data analysis capabilities. That is why I was looking over to Tom. But I suspect first of all this would be ramped up over a period of time, and so we would in fact be able to match the increase if there was a need. But right now, I think we have the capacity for additional expansions. Is that right? Ms. Hochul. I am very pleased with how this program is working. But how often do you get the situation where you do get someone who is innocent or has the same name, who has to go through additional scrutiny. Are you able to quickly correct those? I know you talked about the people who can file the FOIA request and they can correct their record. Early stories were not that simple. I mean people from my district, it took a long time to get themselves off the list just because I have a community--the Yemenites in my community, others were getting more trouble. Again, I am supporting what you do. I don't want to compromise the heart of your program. But I just want to make sure--you said you have made progress in having people removed from that list who have the same name, but have no other reason to be tracking them or giving them additional secondary or additional screening. Ms. Callahan. DHS takes the issue of providing people appropriate redress and opportunities. The traveler redress inquiry program, I mentioned briefly in my oral statement, has really helped to assist to have a Department-wide process. For example, you may think that you had a problem at the border because it was a passenger name record issue. But indeed it was something unrelated, therefore they transitioned it. That has shown great improvement in that we do think that is effective in getting innocent people to have appropriate redress. Ms. Hochul. Okay. Thank you very much. I yield back the balance of my time, Mr. Chairman. Ms. Speier. Mr. Chairman, I would like to request unanimous consent that the gentlewoman from Texas, the Ranking Member on the subcommittee on transportation security, Congresswoman Jackson Lee, be allowed to participate in this hearing. Mr. Meehan. Without objection, so ordered. The Chairman now recognizes the gentlelady from Texas, Ms. Jackson Lee. Ms. Jackson Lee. First order of business is to thank you for your courtesies and to acknowledge the importance of this hearing to the Ranking Member and Chairman, and express my interest because of the subcommittee that I have been involved in as it relates to this important issue. So, I would like to just--well, first of all welcome the witnesses and ask maybe a question that has already been asked. We know that--though may not be directly related but we know that travel has generated, by a number of culprits, incidences that have harmed the homeland, from the shoe bomber to the trial that is going on in Detroit as we speak that was a traveler and decided to use methods that we had not confronted in the past. So I guess I am going to ask this general question in helping us in transportation security--since we deal with the international travel as well. Focusing mainly on passenger travel--is the kind of framework that we see going forward in the 21st Century, and the climate that we are in, and where we are seeing individual actors--I consider terrorism now a franchise. There is no battalion that shows up at your doorstep, maybe just an individual. How do we pierce that? Do we pierce that veil with the human resource intelligence or do we need more armor? Do we need more armor and intelligence at the gateway? In this instance, I am talking about planes, though I know that trains are in the eye of the storm too. But is it more of a focus on human resource or human intelligence rather? If I could get that answer from all three of the witnesses, please. Mr. Heyman. Thank you, Congresswoman. That is really one of the most important questions, is: How do we look forward in the 21st Century to securing air travel and travel in general? The Department of Homeland Security takes this issue very seriously. We have put in place over the last decade, I think, an approach which attempts to achieve exactly what you have set forth. No. 1, we have to have multiple layers from the authorization of travel visas, ESTAs, Advanced Electronics Travel Authorization. That needs to be scrutinized. From the decision to book travel, PNR records and the other pre-travel engagement that a traveler makes, we can do scrutiny there. Checkpoints at the airports is another layer. When a person gets on an aircraft we have security on planes. Then before they get to the United States there is additional scrutiny. So we have a number of layers of defense that we have put in place to ensure that we prohibit, and prevent, and detect those who seek to do harm from even getting on a plane to begin with. That is with a system that Congress has helped put together through a number of laws and appropriations over the last decade. I think the PNR system that we have now have been discussing today plays a central role in that. It allows for us to do not just detection of those who are known or suspected terrorists by going up against the--matching against the watch list that we have, the terrorist database. But allows through certain analysis to detect those who may be unknown to us, but exhibit certain behavior that can allow us to then prevent them from getting on a plane or doing additional screening at a time, so a number of different layers. Information sharing is critical to that and so that is why we are having the negotiations and having relationships with third parties and other countries to ensure that we have that information exchanged. Ms. Jackson Lee. There is only a little bit more time. Maybe in your answer you would also include whether we are invading a person's privacy on the behavioral aspect, but I think you are talking about utilizing as well. Ms. Callahan. So, I can take that one up, ma'am. With regard to information sharing, with regard to screening at the border, I think that we have done--the developments in the past decade have been extraordinary. But at the same time what has been important is the Department has included privacy protections as they develop these programs. I think that that is crucial for going forward. Mr. Bush. Yes, ma'am. I think you hit it on--right away the difference between the intelligence and information sharing and the need for the armor. I think both have to come in. Obviously with the increasing attempted acts of terror by those not on the watch list really stresses the need for the intelligence information sharing within the Federal Government, but also with our foreign partners. But once we identified a likely suspect, how can we then detect if they have something on them or attempting to get on a plane are two equally challenging areas. Ms. Jackson Lee. Thank you. I yield back. Mr. Meehan. Thank you, Ms. Jackson Lee. I have a couple of follow-up questions. I will certainly open the courtesy to the other Members of the committee who are here today if they would so like. But may I ask--well first, I want to follow up with what the gentlelady just said. The two important points, that aviation continues to be an area that is targeted to be sure, and the, you know, the concern we have that individuals will try to exploit that. But, Ms. Callahan, there has already been a great deal of work that has been done in terms of protecting the privacy of information as we move along. This has been part of the DHS mission. We constantly move forward and seek information. Oftentimes there is not enough attention paid to what we are doing with that information behind us or assuring that there are protections that are done. I think simply the fact that we are having this hearing identifies Congress' appreciation and desire to participate in this. As I have researched this and looked at this particular issue, there is something called fair information practice principles and other standards that are in place. Could you explain to us just what they are and how they help to secure the privacy of individuals both within the United States and outside? Ms. Callahan. Absolutely. Absolutely, sir, thank you for that question. The fair information practice principles are core elements of essentially all privacy laws throughout the world that has privacy laws. A basis of it was originally in the Privacy Act of 1974 which was the first National privacy act in the world. It is also embedded in the OECD Privacy Principles of 1980 which, of course, is the genesis for both the European privacy law as well as the U.S. law. The Department of Homeland Security embeds the Fair Information Practice Principles, or the FIPPs within each of its activities associated with programs, technologies, systems, and information sharing. That is what my office does. The Fair Information Practice Principles include transparency, individual participation, purpose limitation, data security, data usage, access auditing and accountability, and redress. All of those elements are important cornerstones that I tried to address in my oral testimony to explain how PNR is an example of the Fair Information Practice Principles as implemented. Mr. Meehan. Can you give me an example of one of those and how that serves as a check against the abuse of that information? Ms. Callahan. Well, one of the points that the Ranking Member had said is wanting to be more clear with what we are doing with information. We have tried to be very transparent with the passenger name records and what we are doing. I look forward to any other opportunities to discuss it in order to do that. In addition, for example, the purpose limitation, to make sure that we are using passenger name records for terrorism, transnational serious crimes, as well as to identify individuals with whom we may want to have more border security to not have the potential for mission creep for example. Those are important elements and that is what my three audits that are available in my website all show that we are indeed adhering to the principles that we said we would when we first set up the program. That is a very important part of the Department. Mr. Meehan. One of the principles you identified was redress which allows an individual to challenge the information that is in there. So there is already, as I understand it under the FOIA, of the ability to obtain your own record and to request that there be changes in inaccurate information with respect to your own record. Did I understand your testimony correctly that there are some 220,000 foreign requests for FOIA? Ms. Callahan. Let me clarify. Two hundred and twenty thousand FOIA requests that we received from across the world. Of those we received them from 100-plus countries. But in terms of proportion, I can't tell you the proportion whether they are U.S. citizens here in the United States or also overseas. Mr. Meehan. Oh, but that may include U.S. citizens---- Ms. Callahan. It absolutely does include U.S. citizens. Mr. Meehan. But that would be an important thing. I mean, I don't know that I need you to do this just to do it. But if there is some way to analyze and identify the breakdown that may be relevant to this question, I would like to know if we are seeing a disproportionate amount of requests from foreign nations. Ms. Callahan. The majority--about 75 percent of the FOIAs that we receive actually go to citizenship and immigration services associated with alien files, with their immigration records to obtain information about that. Mr. Meehan. That may be relevant to their interest in trying to obtain citizenship or other kinds of benefits. Ms. Callahan. Exactly. So I can tell you that that is where the majority of the requests come in. But a lot of those people are also naturalized U.S. citizens or legal permanent residents who are seeking their information. With regard to PNR, I can give you the breakdown for the 69---- Mr. Meehan. I just wanted to see if there was a dramatic imbalance for some particular reason. This last issue---- Ms. Callahan. There doesn't appear to be---- Mr. Meehan. But the redress is sufficient. Or I am seeing some concerns that somehow we should open up the courts for further redress in some--what is your position on that? Ms. Callahan. As I mentioned earlier, the traveler redress inquiry program that DHS has stood up is designed to be a one- stop shop available on-line to multiple individuals regardless of where you are and for free. I think it is a very efficient and effective process that 140,000 people have already sought redress through. With that said, the European standard thinks that a judicial redress opportunity would be one that would be better. If you go through a TRIP, you actually have the opportunity to go to court to challenge it. So therefore, I think that to request judicial redress, particularly with the use of PNR, it is probably not necessary because it already is available in the U.S. system. Mr. Meehan. Right. Well, thank you. My time has expired. I will now turn it over to the Ranking Member for any further questions she may have. Ms. Speier. Thank you, Mr. Chairman. Along those same lines, Ms. Callahan, of the 69 requests that you have had for redress, could you make the specifics of those cases or a handful of those cases available to the Chairman and the committee so that we can see what it is they are objecting--I would like to get a better sense of what the concern is. Because based on the 19 fields that you just listed--and I am a privacy queen. I mean, I have spent a good part of my career trying to protect people's privacy. I am not seeing where there is a potential even for abuse based on the information that is being shared. So, either you are taking this information and using it with other information you get from other sources, which if you are you need to explain that to us, or I am missing something. Ms. Callahan. If I could clarify what the 69 requests were. They are the request for FOIAs, so just to receive access to their information. Of those 69 FOIA requests--so we don't know if there is a redress problem with it per se. Of those 69 requests, about half of them come from American citizens who were seeking their own access. About a quarter of them come from the European Union, Canada, and Mexico, and a quarter come from the rest of the world. So it is just an interesting breakdown to see how it evolved. It originally was more heavily weighted towards Europeans, but now we are getting more from the rest of the world. With regard to the use and with regard to the access, as Mr. Heyman and Mr. Bush noted, the fields that are being provided are the fields that are being provided to an airline, and therefore they don't inherently have sensitive information in it. With that said, it is commercial data that the United States is acquiring as part of this Federal border security. So I do think it is important to note that when the U.S. Government acquires commercial information, we need to treat it very carefully. I think that that may be some of the reservations that people think because it was originally a commercial information, that that is the problem with it. With that said, the protections that we had put in place, I think, are very robust, very sufficient, and helped to ameliorate that concern, but also help us protect our borders in the ways that Mr. Bush described. Ms. Speier. But do you take that information and overlay it with other information you have within a database you have internally? Ms. Callahan. We do compare passenger name records with other datasets that Mr. Heyman talked about including ESTA, APIS--which is the Advanced Passenger Information System, the terrorist screening database, and a few other data fields--and criminal records as well. That is all disclosed in all of our public documents. Ms. Speier. A FOIA request by an individual would be able to access that information that you have? Ms. Callahan. If they asked for their passenger name records, it would not have that because the information is overlaid, compared, and then they go back to their separate databases. It is not stored in a unique setting. So it is not a Federal record under FOIA. With that that said they could ask for the information that Customs and Border Protection utilizes in order to make the border decisions. That is a way of having a broader aperture on the FOIA. Ms. Speier. Now, let us go back to the Shahzad case. He went through a series of screenings, still got on the plane. It was about to leave before he was apprehended. So where were the failings in the existing system? What kinds of changes have been made to make sure that doesn't happen again? Mr. Bush. I think the first improvement, ma'am, was the increased watch list service out of the Terrorism Screening Center. It had previously taken up to 24 hours to get someone watch-listed. That has now been streamlined and is real-time. So the soonest he would have checked in his name would hit on the watch list and I think it would have stopped there. The second thing is the time of which PNR is being submitted to the United States has intervals. It is not real- time every time someone books a ticket or makes some changes. You had asked earlier, I believe--I apologize, if it wasn't you ma'am--the differences between this agreement and the previous ones. That is an example of an improvement. We are trying to get any change to the PNR in real time. We are trying to explain the value of that to the Europeans. Ms. Speier. So does the European Union object to that? Mr. Bush. I don't think they understand it yet to object to it. I think they are still trying to understand does that mean more data being provided, when we were saying if you originally purchased your ticket and you only change it one time, well then we don't need to have continual submissions of the same PNR. They are trying to understand that. I shouldn't say it is an objection at this point, but I can defer. Mr. Heyman. They are not objecting to it. I think they are just trying to understand it. It is a new concept, the idea of having real-time data. It is--for data minimization, so it is good for privacy. It is real-time accuracy, so it is good for data security--for National security. Ms. Speier. You know, for those in the European parliament that appear to be objecting to this negotiated agreement, I would argue that they are better served by this agreement than by the agreement that we are operating under, which to your perspective is broader and has less privacy protection. So I am kind of mystified by their logic. But, I will leave it at that. I yield back. Mr. Meehan. Mr. Heyman is not taking the bait. [Laughter.] Mr. Meehan. Ms. Hahn, do you have any follow-up questions? All right, well, I want to express my deep appreciation. It is a remarkable topic. I don't think most of America woke up this morning thinking that PNR was the first thing that was on their mind, but a few of us did. It does show the importance. You have identified the key role that this plays. I also really appreciate the interest of the committee in looking to assure that we are protecting the privacy interests as well. I think that is similarly a mission for this committee. I thank you for the work that you are doing on both. Just one following comment. Mr. Bush, we didn't get into the work that you are doing not just with terrorism, but I am impressed by the work that is done with human smuggling and other kinds of things looking at the pattern activity, and do believe that that is an area that we ought to keep working on. So I want to thank the witnesses for their valuable testimony, and the Members for their questions. The Members of the committee might have some additional questions for the witnesses, and we will ask that you respond to those in writing. The hearing record will be open for 10 days. So without objection, the committee stands adjourned. [Whereupon, at 11:15 a.m., the subcommittee was adjourned.]