[House Hearing, 112 Congress] [From the U.S. Government Publishing Office] DHS MONITORING OF SOCIAL NETWORKING AND MEDIA: ENHANCING INTELLIGENCE GATHERING AND ENSURING PRIVACY ======================================================================= HEARING before the SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE of the COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED TWELFTH CONGRESS SECOND SESSION __________ FEBRUARY 16, 2012 __________ Serial No. 112-68 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC] [TIFF OMITTED] CONGRESS.13 Available via the World Wide Web: http://www.gpo.gov/fdsys/ __________ U.S. GOVERNMENT PRINTING OFFICE 76-514 WASHINGTON : 2012 ----------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 COMMITTEE ON HOMELAND SECURITY Peter T. King, New York, Chairman Lamar Smith, Texas Bennie G. Thompson, Mississippi Daniel E. Lungren, California Loretta Sanchez, California Mike Rogers, Alabama Sheila Jackson Lee, Texas Michael T. McCaul, Texas Henry Cuellar, Texas Gus M. Bilirakis, Florida Yvette D. Clarke, New York Paul C. Broun, Georgia Laura Richardson, California Candice S. Miller, Michigan Danny K. Davis, Illinois Tim Walberg, Michigan Brian Higgins, New York Chip Cravaack, Minnesota Jackie Speier, California Joe Walsh, Illinois Cedric L. Richmond, Louisiana Patrick Meehan, Pennsylvania Hansen Clarke, Michigan Ben Quayle, Arizona William R. Keating, Massachusetts Scott Rigell, Virginia Kathleen C. Hochul, New York Billy Long, Missouri Janice Hahn, California Jeff Duncan, South Carolina Tom Marino, Pennsylvania Blake Farenthold, Texas Robert L. Turner, New York Michael J. Russell, Staff Director/Chief Counsel Kerry Ann Watkins, Senior Policy Director Michael S. Twinchek, Chief Clerk I. Lanier Avant, Minority Staff Director ------ SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE Patrick Meehan, Pennsylvania, Chairman Paul C. Broun, Georgia, Vice Chair Jackie Speier, California Chip Cravaack, Minnesota Loretta Sanchez, California Joe Walsh, Illinois Brian Higgins, New York Ben Quayle, Arizona Kathleen C. Hochul, New York Scott Rigell, Virginia Janice Hahn, California Billy Long, Missouri Bennie G. Thompson, Mississippi Peter T. King, New York (Ex (Ex Officio) Officio) Kevin Gundersen, Staff Director Zachary Harris, Subcommittee Clerk Hope Goins, Minority Subcommittee Director C O N T E N T S ---------- Page Statements The Honorable Patrick Meehan, a Representative in Congress From the State of Pennsylvania, and Chairman, Subcommittee on Counterterrorism and Intelligence.............................. 1 The Honorable Jackie Speier, a Representative in Congress From the State of California, and Ranking Member, Subcommittee on Counterterrorism and Intelligence.............................. 3 The Honorable Bennie G. Thompson, a Representative in Congress From the State of Mississippi, and Ranking Member, Committee on Homeland Security.............................................. 4 Witnesses Ms. Mary Ellen Callahan, Chief Privacy Officer, Department of Homeland Security: Oral Statement................................................. 10 Joint Prepared Statement....................................... 12 Mr. Richard Chavez, Director, Office of Operations Coordination and Planning, Department of Homeland Security: Oral Statement................................................. 16 Joint Prepared Statement....................................... 12 For the Record The Honorable Patrick Meehan, a Representative in Congress From the State of Pennsylvania, and Chairman, Subcommittee on Counterterrorism and Intelligence: Statement of Marc Rotenberg, President, and Ginger McCall, Staff Counsel, The Electronic Privacy Information Center (EPIC)....................................................... 6 Appendix Letter Submitted to Chairman Patrick Meehan From Mary Ellen Callahan and Richard Chavez.................................... 39 Questions Submitted by Ranking Member Bennie G. Thompson for Mary Ellen Callahan and Richard Chavez.............................. 40 DHS MONITORING OF SOCIAL NETWORKING AND MEDIA: ENHANCING INTELLIGENCE GATHERING AND ENSURING PRIVACY ---------- Thursday, February 16, 2012 U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Counterterrorism and Intelligence, Washington, DC. The subcommittee met, pursuant to call, at 10:04 a.m., in Room 311, Cannon House Office Building, Hon. Patrick Meehan [Chairman of the subcommittee] presiding. Present: Representatives Meehan, Cravaack, Quayle, Long, Speier, Thompson, and Hahn. Mr. Meehan. Good morning. I get to do this, which indicates that the Committee on Homeland Security's Subcommittee on Counterterrorism and Intelligence will come to order. The subcommittee is meeting today to hear testimony regarding tactics that are employed by the Department of Homeland Security to monitor social networking and media to enhance intelligence gathering, while at the same time protecting privacy. I would like to welcome everyone to today's hearing, and I look forward to hearing from today's witnesses on this very, very important issue. Over the last year, this subcommittee has had hearings on a multitude of terror-related threats, particularly focusing on those that have influence on the homeland, including those posed by Hezbollah, AQAP, and Boko Haram, to be specific. A common theme that has emerged among many of these is the groups' use of social media and networking to recruit, to plan, to plot attacks against the homeland or U.S. interests abroad. I emphasize that a lot of this was focused on foreign-based websites on which this activity was presumed to be taking place. In December, we held a hearing on the terrorists' use of social media. While there was disagreement among the witnesses on the effectiveness of that, we do know that terrorists use social media. All agreed that terrorist groups used these tools ultimately to their advantage. However, the use of social media isn't confined to terrorists. It is also a criminal issue and represents an entirely new operating space for all sorts of bad actors. I saw it as a Federal prosecutor. Social media is now used by individuals who share pictures with family and friends, but it is also used by terrorists or other kinds of criminals operating everything from frauds to other kinds of bad acts. I understand the importance of following leads wherever it may take investigators. So if there are leads on a social media or social network such as Twitter or Facebook, it may be appropriate to follow them, so long as the Government activity is consistent with the long-standing protections against improper intrusions into protected areas of personal privacy. Following leads means collecting intelligence, because, ultimately, no terrorism or criminal investigation can be effective without good intelligence. I understand and support intelligence collection within the rules of the law. In addition to following leads, social media provides a forum for the Government to have situational awareness of breaking events--something I know you spend a great deal of time--terrorist attacks, natural disasters--where the Department of Homeland Security is responsible for providing real-time situational awareness and information sharing across the Federal Government and down to the State and local enforcement level, to first responders as well, in the event of a terror attack or a natural disaster. For example, my good friend on the committee, Mr. Long, who experienced tornadoes in his district, may have an appreciation of the need for real- time communication, sort of the virtual 9-1-1. But, conversely, the Government can use tools to communicate with people about disasters to enhance situational awareness among the citizenry. In these cases, intelligence collection and dissemination is a win-win for the Government and the people. But a few weeks ago, it was reported that the Department of Homeland Security has instituted a program, and I quote: ``to produce short reports about threats and hazards using publicly available information.'' As I said, I support that. However, in what I view as something that we have to determine whether it crosses the line, these reports also revealed that DHS has tasked analysts with collecting intelligence on any media reports, ``that reflect adversely on the U.S. Government and the Department of Homeland Security, including both positive and negative reports on FEMA, CBP, ICE, among others.'' In one example, DHS used multiple social networking blogs, including Facebook and Twitter, three different blogs, and reader comments in newspapers to capture the reaction of residents to a possible plan to bring Guantanamo detainees to a local prison in Standish, Minnesota. In my view, collecting and analyzing, disseminating private citizens' comments could have a chilling effect on individuals' privacy rights and people's freedom of speech and dissent against their Government. I fully recognize that if an individual willingly uses Facebook, Twitter, or the comments section of a newspaper website, they, in effect, forfeit their right to an expectation of privacy. However, other private individuals reading your Facebook status updates is different than the Department of Homeland Security reading them, analyzing them, and possibly disseminating and collecting them for future purposes. My guess is that the average American has no problem with other private individuals reading their voluntary on-line writings and postings in open forums but may feel a bit of unease knowing the Federal Government may be doing the same. I fully recognize these are very complex and nuanced issues, and that is why we are holding today's hearing. I look forward to hearing from today's witnesses on how they are collecting intelligence to keep us safe and aware, yet also ensuring personal individual privacy. The Chair now recognizes the Ranking Minority Member of the subcommittee, the gentlewoman from California, Ms. Speier, for any comments that she may have. Ms. Speier. Thank you, Mr. Chairman. I would like to associate my comments with yours. I think that they were outstanding and really place a good frame on the discussion we are going to have today. I would also like to thank the witnesses who will be testifying today. You know, the explosion in the use of social media has changed communication as we know it. With just the touch of a button, millions of people can post and receive information through Twitter, Facebook, blogs, and text messaging in an instant. In just the short time that we have been sitting here in this hearing, there have been over 3 million comments that have been posted to Facebook and a half a million tweets that have been sent. Over the past year, we have seen the impact of using social media first-hand. Last year, the Arab Spring was driven by potesters who organized and communicated largely via social media. We have also seen the power of social media here in the United States over the past few months as protesters organize via Twitter and Facebook for the Occupy Wall Street movements throughout the country. We have seen bills before Congress stopped in their tracks by the power of social media. This growing universe of social networking presents great challenges and opportunities to the mission at the Department of Homeland Security as it works to keep our Nation safe. Through this hearing, we hope to learn how the Department of Homeland Security is harnessing the power of social media. Is it possible that DHS could use social media to communicate emergency recovery and response information to the general public? Can this information be generated quickly? How would such technology have improved the response to disasters like Hurricane Katrina? What about the case of a man-made disaster or a mass evacuation like we saw last year in the nuclear meltdown in Japan? Could Twitter and instant messaging be used to let people know where to evacuate and what to avoid? The vast amounts of publicly available data also present a potentially great resource for open-source information collection. In 2010, we saw alert citizens report suspicious activities in Times Square that led to the arrest of Faisal Shahzad. Could similar public reporting be done using social media? How can DHS fully exploit the benefits and opportunities of social media without impeding on the civil rights and civil liberties of those who choose to use social media? Can DHS actively and effectively monitor social media in an open and above-board way without being accused of spying on lawful activities? Last month, the press reported widely on a case where a couple from England was prevented from entering the United States because of a tweet. Was this an overreaction? Could or should a mere tweet or posting prevent a person from boarding a plane or entering the United States? I am looking forward to learning from the witnesses exactly how DHS uses social media and what DHS is doing to make sure that in its use of social media it is not being perceived as being a Big Brother. I want to learn from the witnesses what privacy protections are in place with regard to DHS's using social media and how the individual components are being trained on these protections. Further, I am very interested to find out today how the Department can even handle the sheer volume of open-source postings that may be found on any of the various social networking websites. Further, if the Department begins to use social media as open-source tools, as the Office of Intelligence and Analysis Under Secretary has indicated, how will its analysts be trained to continue to respect the civil liberties of those that choose to use social media? Social media could possibly be an integral tool in recognizing and preventing emerging threats. However, there has to be some specific systems in place that can manage this information while continuing to respect civil rights and civil liberties. I look forward to hearing what steps are being taken in this area. I yield back. Mr. Meehan. Thank you, Ranking Member Speier, for your observations, which I, as well, share. We are also pleased to have in attendance the Ranking Member of the committee. The gentleman from Mississippi, Mr. Thompson, is with us. As is the custom of the subcommittee where there are moments when we are graced with the presence of those Ranking and senior members, we give to them the opportunity to make an opening statement if they wish. So, at this minute, the Chair would recognize Mr. Thompson for any comments that he might have. Mr. Thompson. Thank you very much, Mr. Chairman, for your gracious introduction. I would like to thank you and the Ranking Member for holding this hearing today. I would also like to thank the witnesses for their testimony also. Social media outlets provide the general public with new avenues of discovering, reading, and sharing news, information, and other forms of content. With an increasing number of people relying on this form of technology as a primary information- gathering resource, social media has supplemented, and in some cases replaced, traditional media outlets as a source of news and information. Social media allows DHS to quickly and efficiently disseminate accurate and useful information to hundreds of thousands of people simultaneously. For instance, prior to a natural disaster such as a hurricane or a flood, State and local officials can use SMS to convey evacuation warnings and notices to people living in affected areas. After a disaster, the same means can be used to direct people to FEMA. Both the Majority and Minority of this committee have a Twitter page. I think we all agree that social media outlets are useful. However, usefulness alone is not the only criteria we value. Rapid deployment of accurate information, combined with the ability of the average citizen to interact with public officials, will ultimately increase DHS's trust and accountability. To ensure that accountability and trust are embraced as a value, DHS must employ proper safeguards, including guidelines on information-gathering activities and a clear policy on creating a profile or data-mining. If information-gathering activities should occur, clear protocols that adhere to the Constitution and the Privacy Act must be developed to direct such activities. The public must be confident that interacting with DHS on a website or blog or Facebook will not result in surveillance or a compromise of Constitutionally-protected rights. Further, the use of social media must not replace traditional methods of information distribution. When used appropriately, social media is an efficient and effective way to communicate with people. If used improperly by a Federal agency, public trust and confidence will be compromised or forever destroyed. Given the high stakes involved, DHS cannot afford to make a mistake. I trust that in your efforts to navigate the Department's journey in the world of social media, you will work closely with the committee and keep us informed of your activities. We look forward to being your GPS. With that, I yield back. Mr. Meehan. Thank you, Mr. Chairman, for that sense of direction. We will stop it there. Other Members of the committee are reminded that opening statements may be submitted for the record. We are pleased to have a distinguished panel of witnesses before us today on this very, very important topic. The first is Ms. Mary Ellen Callahan. She was appointed the chief privacy officer and the chief Freedom of Information Act officer by Department of Homeland Security Secretary Napolitano in March 2009. Created by Congress in 2002, the Department's privacy officer is the first statutorily mandated privacy office in any Federal agency, whose mission is to preserve and enhance privacy protections for all individuals, to promote the transparency of Homeland Security operations, and to serve as the leader in the Federal privacy community. Ms. Callahan is responsible for evaluating Department-wide programs, systems, and technologies, and rulemaking for potential privacy impacts, and for providing mitigation strategies to reduce any privacy impact. Prior to joining the Department, Ms. Callahan was a partner with the law firm of Hogan & Hartson, where she specialized in privacy and data security law. She serves as vice chair of the American Bar Association's Privacy and Information Security Committee of the Antitrust Division. Now as chief privacy officer, she co-chairs both the CIO Council's Privacy Committee and the Information-Sharing Environment Privacy Guidelines Committee. Thank you for being here today, Ms. Callahan. I would also like to recognize Mr. Richard Chavez, who is the director of Office of Operations Coordination and Planning at the Department of Homeland Security. He provides counsel directly to the Secretary of Homeland Security on a wide range of operational issues, to include prevention, protection, mitigation, response and recovery operations, continuity of operations, and planning. He leads an office of approximately 550 people who are responsible for monitoring the security of the United States on a daily basis and providing National situational awareness and developing the National common operating picture. His office provides vital decision support information to the Federal interagency, Governors, homeland security advisors, law enforcement, private-sector, and critical infrastructure operators in all States and territories and more than 50 urban major areas Nation-wide. Mr. Chavez has over 30 years of Government experience, serving with DHS and the Department of Defense as an Air Force officer and a senior civilian in the Office of the Under Secretary of Defense for Policy. Before I recognize you for your comments, I have before me on the table a report from the Electronic Privacy Information Center. I ask unanimous consent to insert in the record a statement from EPIC. Hearing no objection, so ordered. [The information follows:] Statement of Marc Rotenberg, President, and Ginger McCall, Staff Counsel, The Electronic Privacy Information Center (EPIC) Thank you, Mr. Chairman, for the invitation to submit this statement for the record for this hearing on ``DHS Monitoring of Social Networking and Media: Enhancing Intelligence Gathering and Ensuring Privacy'' to be held on February 16, 2012 before the House Subcommittee on Counterterrorism and Intelligence. We ask that this statement be included in the hearing record. EPIC thanks you and Members of the subcommittee for your attention to this important issue. The DHS monitoring of social networks and media organizations is entirely without legal basis and threatens important free speech and expression rights. Your decision to hold this hearing will help protect important American rights. The Electronic Privacy Information Center (EPIC) is a non-partisan, public interest research organization established in 1994 to focus public attention on emerging privacy and civil liberties issues. EPIC works to promote Government accountability and transparency particularly with respect to activities that implicate Constitutional rights and fundamental freedoms. EPIC has been analyzing law enforcement monitoring of social networks and on-line media for several years. In early 2011, EPIC submitted comments to the Department of Homeland Security on the agency's proposal to undertake monitoring of social network and news organizations.\1\ EPIC has also pursued several Freedom of Information requests to obtain relevant documents so that the Members of your committee and the public would have the opportunity to meaningful assess the agency's activities. --------------------------------------------------------------------------- \1\ EPIC, Comments of the Electronic Privacy Information Center to the Department of Homeland Security ``Systems of Records Notice'' DHS- 2011-0003, March 3, 2011, available at: http://epic.org/privacy/ socialmedia/Comments%20on%20DHS-2011-0003-1.pdf. --------------------------------------------------------------------------- i. epic obtained documents that reveal that the dhs is monitoring social network and media organizations for dissent and criticism of the agency In April 12, 2011, EPIC submitted a Freedom of Information Act (``FOIA'') request to the Department of Homeland Security (``DHS'') seeking agency records detailing the media monitoring program. The request sought the following documents:All contracts, proposals, and communications between the Federal Government and third parties, including, but not limited to, H.B. Gary Federal, Palantir Technologies, and/or Berico Technologies, and/or parent or subsidiary companies, that include provisions concerning the capability of social media monitoring technology to capture, store, aggregate, analyze, and/or match personally-identifiable information. All contracts, proposals, and communications between DHS and any States, localities, Tribes, territories, and foreign governments, and/or their agencies or subsidiaries, and/or any corporate entities, including but not limited to H.B. Gary Federal, Palantir Technologies, and/or Berico Technologies, regarding the implementation of any social media monitoring initiative. All documents used by DHS for internal training of staff and personnel regarding social media monitoring, including any correspondence and communications between DHS, internal staff and personnel, and/or privacy officers, regarding the receipt, use, and/or implementation of training and evaluation documents. All documents detailing the technical specifications of social media monitoring software and analytic tools, including any security measures to protect records of collected information and analysis. All documents concerning data breaches of records generated by social media monitoring technology.\2\ --------------------------------------------------------------------------- \2\ EPIC FOIA Request, Apr. 12, 2011, available at: http:// epic.org/privacy/socialnet/EPIC-FOIA-DHS-Social-Media-Monitoring-04-12- 11.pdf; see also Olivia Katrandjian, DHS Creates Accounts Solely to Monitor Social Networks, ABC News, Dec. 28, 2011, available at: http:// abcnews.go.com/US/dhs-creates-fake-accounts-monitor-social-networks/ story?id=15247533#.- TzvuuONSQ3o. --------------------------------------------------------------------------- When the agency failed to comply with FOIA's deadlines, EPIC filed suit on December 23, 2011. As a result of this lawsuit, DHS disclosed to EPIC 285 pages of documents, including statements of work, contracts, and other agency records related to social network and media monitoring.\3\ --------------------------------------------------------------------------- \3\ DHS Social Media Monitoring Documents, available at: http:// epic.org/foia/epic-v-dhs-mediamonitoring/EPIC-FOIA-DHS-Media- Monitoring-12-2012.pdf; see e.g. Charlie Savage, Federal Contractor Monitored Social Network Sites, The New York Times, Jan. 13, 2012, available at: http://www.nytimes.com/2012/01/14/us/federal-security- program-monitored-public-opinion.html; Jaikumar Vijayan, DHS Media Monitoring Could Chill Public Dissent, EPIC Warns, Computerworld Jan. 16, 2012, available at: http://www.computerworld.com/s/article/9223441/ DHS_media_monitoring_could_chill_public_dissent_EPIC_warns; Ellen Nakashima, DHS Monitoring of Social Media Concerns Civil Liberties Advocates, Washington Post, Jan. 13, 2012, available at: http:// www.washingtonpost.com/world/national-security/dhs-monitoring-of- social-media-worries-civil-liberties-advocates/2012/01/13/ gIQANPO7wP_story.html. --------------------------------------------------------------------------- These documents reveal that the agency had paid over $11 million to an outside company, General Dynamics, to engage in monitoring of social networks and media organizations and to prepare summary reports for DHS.\4\ According to DHS documents, General Dynamics will ``Monitor public social communications on the internet,'' including the public comment sections of NYT, LA Times, Huff Po, Drudge, Wired's tech blogs, ABC News.\5\ DHS also requested monitoring of Wikipedia pages for changes \6\ and announced its plans to set up social network profiles to monitor social network users.\7\ --------------------------------------------------------------------------- \4\ EPIC, DHS Social Media Monitoring Documents at 1. \5\ EPIC, DHS Social Media Monitoring Documents at 127, 135, 148, 193. \6\ EPIC, DHS Social Media Monitoring Documents at 124, 191. \7\ EPIC, DHS Social Media Monitoring Documents at 128. --------------------------------------------------------------------------- DHS required General Dynamics to monitor not just ``potential threats and hazards,'' ``potential impact on DHS capability'' to accomplish its homeland security mission, and ``events with operational value,'' but also paid the company to ``Identify[] reports that reflect adversely on the U.S. Government, DHS, or prevent, protect, respond or recovery Government activities.''\8\ --------------------------------------------------------------------------- \8\ Attachment 1; EPIC, DHS Social Media Monitoring Documents at 51, 195. --------------------------------------------------------------------------- Within the documents, DHS clearly stated its intention to ``capture public reaction to major Government proposals.''\9\ DHS instructed the media monitoring company to generate summaries of media ``reports on DHS, Components, and other Federal Agencies: Positive and negative reports on FEMA, CIA, CBP, ICE, etc. as well as organizations outside the DHS.''\10\ --------------------------------------------------------------------------- \9\ EPIC, DHS Social Media Monitoring Documents at 116. \10\ EPIC, DHS Social Media Monitoring Documents at 183, 198. --------------------------------------------------------------------------- In one DHS-authored document, titled ``Social Networking/Media Capability Analyst Handbook'' the agency presented examples of good summary reports and flawed summary reports. One report held up as an exemplar was titled ``Residents Voice Opposition Over Possible Plan to Bring Guantanamo Detainees to Local Prison-Standish MI.''\11\ This report summarizes dissent on blogs and social networking cites, quoting commenters who took issue with the Obama administration's plan to transfer detainees to the Standish Prison. --------------------------------------------------------------------------- \11\ EPIC, DHS Social Media Monitoring Documents at 118. --------------------------------------------------------------------------- These documents clearly show an agency program that aims to document legitimate on-line dissent and criticism. The agency has not established any legal basis for this program. News media reports indicate that the Department of Homeland Security is not the only agency engaging in this sort of monitoring. Recent news stories confirm that the Federal Bureau of Investigation has also been developing a similar social network and media monitoring program.\12\ --------------------------------------------------------------------------- \12\ Marcus Wohlson, FBI Seeks Digital Tool to Mine Entire Universe of Social Media, Chicago Sun Times, Associated Press, Feb. 12, 2012, available at: http://www.usatoday.com/USCP/PNI/Nation/World/2012-0213- PNI0213wir-FBI-social-media_ST_U.htm. --------------------------------------------------------------------------- ii. there is no legal basis for the dhs' social network and media monitoring program The agency has demonstrated no legal basis for its social network and media monitoring program, which threatens important free speech and expression rights. Law enforcement agency monitoring of on-line criticism and dissent chills legitimate criticism of the Government, and implicates the First Amendment. Freedom of Speech and Expression are at the core of civil liberties and have been strongly protected by the Constitution and the U.S. courts.\13\ Government programs that threaten important First Amendment rights are immediately suspect and should only be undertaken where the Government can demonstrate a compelling interest that cannot be satisfied in other way.\14\ Government programs that note and record on-line comments, dissent, and criticism for the purpose of subsequent investigation send a chilling message to on-line commenters, bloggers, and journalists--``You are being watched.'' This is truly what George Orwell described in 1984. --------------------------------------------------------------------------- \13\ See e.g. United States v. Stevens, 130 S. Ct. 1577, 1585, 176 L. Ed. 2d 435 (2010) (holding that the ``First Amendment itself reflects a judgment by the American people that the benefits of its restrictions on the Government outweigh the costs''). \14\ See e.g. NAACP v. Button, 83 S.Ct. 328 (1963); Citizens United v. Fed. Election Comm'n, 130 S. Ct. 876 (2010). --------------------------------------------------------------------------- As EPIC has stated in prior comments to DHS, the agency's social network and media monitoring program would also violate the Privacy Act.\15\ The Privacy Act requires agencies to: --------------------------------------------------------------------------- \15\ EPIC, Comments of the Electronic Privacy Information Center to the Department of Homeland Security ``Systems of Records Notice'' DHS- 2011-0003, March 3, 2011, available at: http://epic.org/privacy/ socialmedia/Comments%20on%20DHS-2011-0003-1.pdf. ``establish appropriate administrative, technical, and physical safeguards to insure the security and confidentiality of records and to protect against any anticipated threats or hazards to their security or integrity which could result in substantial harm, embarrassment, inconvenience, or unfairness to any individual on whom information is maintained.''\16\ --------------------------------------------------------------------------- \16\ 5 U.S.C. 552a(e)(10) (2010). The DHS program, as described in the agency's own documents, would involve collecting information, including Personally Identifiable Information (``PII''). While the agency acknowledges that PII are covered under the Privacy Act and seeks to limit some collection, the documents obtained by EPIC also reveal that there are several exceptions to the ``no PII'' rule, including allowances for collection of PII of anchors, newscasters, or on-scene reporters who . . . use traditional and/or social media.\17\ This would allow the agency to build files on bloggers and internet activists, in violation of the Privacy Act. --------------------------------------------------------------------------- \17\ DHS Social Media Monitoring Documents at 107. --------------------------------------------------------------------------- The Privacy Act imposes limitations on the dissemination of personal information collected by an agency. As EPIC has noted in its comments the DHS, the agency's social network and media monitoring program permits the collection and disclosure of information that contravenes the text and purpose of the Privacy Act.\18\ DHS has indicated that it plans to regularly relay the records to Federal, State, local, Tribal, territorial, foreign, or international government partners.\19\ The DHS Chief Privacy Officer (``CPO'') has stated that the records would be transferred both by ``email and telephone'' to contacts inside and outside of the agency.\20\ The CPO has also stated that ``[n]o procedures are in place'' to determine which users may access this system of records.\21\ --------------------------------------------------------------------------- \18\ EPIC, Comments of the Electronic Privacy Information Center to the Department of Homeland Security ``Systems of Records Notice'' DHS- 2011-0003, March 3, 2011, available at: http://epic.org/privacy/ socialmedia/Comments%20on%20DHS-2011-0003-1.pdf. \19\ EPIC, Comments of the Electronic Privacy Information Center to the Department of Homeland Security ``Systems of Records Notice'' DHS- 2011-0003, March 3, 2011, available at: http://epic.org/privacy/ socialmedia/Comments%20on%20DHS-2011-0003-1.pdf; DHS Social Media Monitoring Documents at 139, 207. \20\ Department of Homeland Security, Privacy Impact Assessment for the Office of Operations Coordination and Planning Publicly Available Social Media Monitoring and Situational Awareness Initiative, 8, Jan. 6, 2011. \21\ Department of Homeland Security, Privacy Impact Assessment for the Office of Operations Coordination and Planning Publicly Available Social Media Monitoring and Situational Awareness Initiative, 10, June 22, 2010, DHS Social Media Monitoring Documents at 156, 145. --------------------------------------------------------------------------- DHS' program also fails to comply with Privacy Act requirements that agencies make ``reasonable efforts to assure that records are accurate, complete, timely, and relevant for agency purposes'' prior to their dissemination outside of the Federal Government. DHS has readily admitted that its social media monitoring initiative explicitly relies on unverified sources of information to construct the records that DHS will then disseminate to State, local, Tribal, territorial, foreign, or international government partners. As the DHS CPO has stated, ``[u]sers may accidentally or purposefully generate inaccurate or erroneous information. There is no mechanism for correcting this.''\22\ The agency unlawfully shifts responsibility for verifying the agency's information onto the social media users the agency plans to follow: ``the community is largely self-governing and erroneous information is normally expunged or debated rather quickly by others within the community with more accurate and/or truthful information.''\23\ --------------------------------------------------------------------------- \22\ DHS Social Media Monitoring Documents at 156, 145. \23\ DHS Social Media Monitoring Documents at 156, 145. --------------------------------------------------------------------------- As EPIC has previously stated in comments to DHS, the collection of information about individuals obtained from social networks and the monitoring of media organizations falls outside of the agency's statutory authority. The agency has failed to cite any statutory provision that would indicate that Congress gave the DHS authority to engage in intelligence collection, let alone to violate the Constitutional rights of individuals using the internet to express criticisms of the agency or the U.S. Government. In fact, the one statutory provision cited by the agency only allows the DHS Secretary to ``access, receive, and analyze law enforcement information, intelligence information, and other information from agencies of the Federal Government, State and local government agencies and private sector entities.'' (Emphasis added). It does not authorize the agency to initiate a program to gather or collect that information itself. The only relevant provision that does mention gathering narrows the term to ``incident management decision making.'' Hence, DHS' monitoring and gathering of social network and media information is not within the agency's delegated duties. DHS monitoring of stories or individuals that ``report adversely'' on the agency (or the Government more broadly) is even further outside of its delegated duties. The agency has failed to establish any legal basis for this program.\24\ --------------------------------------------------------------------------- \24\ The Attorney General has established elaborate Guidelines for domestic investigations. The Attorney General Guidelines for Domestic FBI Investigations, available at www.justice.gov/ag/readingroom/ guidelines.pdf. While EPIC does not necessarily endorse the standards set out in the DIOG, we note that they require at a minimum a predicate that justifies a Federal investigation. Expressing criticism of the Government or a particular Federal agency alone can simply never be the basis for a Federal investigation under the Attorney General Guidelines. Circumstances Warranting Investigation A predicated investigation may be initiated on the basis of any of the following circumstances: a. An activity constituting a Federal crime or a threat to the National security has or may have occurred, is or may be occurring, or will or may occur and the investigation may obtain information relating to the activity or the involvement or role of an individual, group, or organization in such activity. b. An individual, group, organization, entity, information, property, or activity is or may be a target of attack, victimization, acquisition, infiltration, or recruitment in connection with criminal activity in violation of Federal law or a threat to the National security and the investigation may obtain information that would help to protect against such activity or threat. c. The investigation may obtain foreign intelligence that is responsive to a foreign intelligence requirement. Id. at 21. See, generally, EPIC, ``The Attorney General Guidelines,'' available at http://epic.org/privacy/fbi/ --------------------------------------------------------------------------- iii. epic's recommendations The problems described above are significant and far-reaching. An agency that was established to help protect the United States against future foreign attacks is now deploying its significant resources to monitor political opposition and the work of journalists within the United States. It has no legal basis to do so, and in pursuing the monitoring of social networks and media organizations for activities that ``reflect adversely'' on the agency and the U.S. Government, it has transformed its purpose from protecting the American public to protecting simply itself. We specifically recommend that the subcommittee take the following steps to address the immediate risks to Constitutional liberty: Require that the DHS immediately and permanently cease the practice of monitoring social networks and media organizations for the purpose of identifying political and journalistic activities that ``reflect adversely'' on the agency or the Federal Government. Require that the DHS suspend the social network and media organization monitoring program until safeguards are put into place which will ensure oversight, including annual reporting requirements. Require that other agencies, including the Federal Bureau of Investigation, which have developed or are in the process of developing similar programs provide publicly available, annual reports to Congress that set out in the detail the legal standard for this activity and describe how Constitutional rights will be safeguarded. iv. conclusion EPIC respectfully requests that the subcommittee take the steps outlined in this statement, including requiring the immediate and permanent end to DHS' practice of monitoring for dissent; adopting guidelines for greater oversight of the DHS' social network and media monitoring program, and imposing the same oversight requirements on similar social network and media monitoring programs at other agencies. Thank you for your consideration of our views. We would be pleased to provide any further information the Committee requests. Mr. Meehan. Now, for all panelists, I know you gave us some detailed testimony in written form. If you could do your best to summarize your submitted testimony, we would appreciate that. I now welcome back Ms. Callahan and recognize her first for her testimony. Thank you. STATEMENT OF MARY ELLEN CALLAHAN, CHIEF PRIVACY OFFICER, DEPARTMENT OF HOMELAND SECURITY Ms. Callahan. Thank you very much, sir. Good morning. Chairman Meehan, Ranking Member Speier, Ranking Member Thompson, and Members of the committee, thank you for this opportunity to discuss the Department of Homeland Security's uses of social media and the privacy protections my office has embedded into all of these uses. As described in our written testimony, communications and social media provide important benefits to the American public and to the Department. With that said, as the Chairman and the Ranking Member acknowledged, there is a great deal of personal information that, although publicly available, is not necessary for the Department to see or use. Let me be clear: DHS recognizes the use of social media by Government actors must occur with appropriate privacy, civil rights, and civil liberties protections. For this reason, DHS has created Department-wide standards designed to protect privacy in each category of its use. There are essentially three uses of social media by the Department of Homeland Security: First, external communications and outreach between the Department and the public; second, awareness of breaking news and events and situations related to homeland security, known as situational awareness; and third, when DHS has the appropriate authorities to use social media for operational use such as law enforcement and investigations. In each category, the Department has established standards that are designed to incorporate privacy protections ex ante, to create uniform standards across the components and Department, and to be transparent about the scope of our activities. The Department utilizes the opportunity social networking presents to provide the public with robust information. For example, DHS has a presence on many of the major social networking platforms. FEMA, of course, is well-known for utilizing social media effectively for education and in emergencies. DHS established Department-wide standards for use of social media for communications and outreach purposes through the development and publication of two Privacy Impact Assessments, known as PIAs. All DHS profiles and communications via social media must adhere to these PIAs. As my colleague Mr. Chavez will describe, the Office of Operations Coordination and Planning has a statutory responsibility to provide situational awareness and establish a common operating picture for the Federal Government. The Privacy Office and Operations work together closely and develop detailed standards and procedures associated with reviewing social media, launched three pilots, and then did a privacy compliance review of those pilots. Together, the National Operations Center and the Privacy Office designed a holistic set of privacy protections to be implemented whenever social media is being reviewed for situational awareness, and then memorialized them in a publicly available PIA in June 2010. Several months later, as part of a mandated privacy compliance review, my office determined that the PIA should be updated to allow for the collection and dissemination of personally identifiable information in a very limited number of situations. After January 2011, limited personally identifiable information on a few categories of individuals may be collected only when it lends credibility to the report or facilitates coordination. The categories are essentially: Public figures who make public statements or are part of an event; or people who are in potential life-or-death circumstances. The first weekend that personally identifiable information was allowed to be collected and disseminated was the weekend that Congresswoman Giffords was shot in Arizona. Learning immediately who was the impacted Member of Congress was very useful for the Department, for the Federal Government, and facilitated rapid coordination. There may also be situations where particular programs within the Department or its components may need to access material on social media or individual profiles in support of authorized missions such as law enforcement. Given the breadth of the Department's mission and the fact that access, collection, and use of social media or other publicly available information is governed by specific legal authorities rather than Department-wide standards, the Department takes a different approach to embedding privacy protections into this type of social media, implementing privacy protections through a policy and management directive. The Department is finalizing a management directive for privacy protections in the operational use of social media, which will systematize the previous component policies, be enforceable throughout the Department, and will identify the authorities, restrictions, and privacy oversight related to the use of social media for operational purposes. The directive will also provide instructions on how to embed privacy protections into the operational use of social media and in each investigation performed by Departmental personnel. Essentially, the standard is, if you can't do it off-line, you can't do it on-line. In light of the scope and availability of information, including personal information, found in social media, the Privacy Office intends to continue to monitor the Department's use of social media in all three categories. The Department has established a comprehensive compliance regime. It is every employee's responsibility to adhere to those standards, and the Privacy Office will seek to confirm that compliance in order to protect the public's trust in the Department's use of social media. Thank you, sir. [The joint statement of Ms. Callahan and Mr. Chavez follows:] Joint Prepared Statement of Mary Ellen Callahan and Richard Chavez Chairman Meehan, Ranking Member Speier, and Members of the subcommittee, we appreciate the opportunity to be here today to discuss the Department of Homeland Security's (DHS) use of social media, and the privacy protections the DHS Privacy Office has put into place. Social media are web-based and mobile technologies that turn communication into an interactive dialogue in a variety of on-line fora. It may be appropriate for the Government, including DHS, to use social media for a variety of reasons. The President has challenged his administration to use technology and tools to create a more efficient, effective, and transparent Government.\1\ DHS recognizes that the use of social media by Government actors must occur with appropriate privacy, civil rights, and civil liberties protections; whether DHS is disclosing its information and press releases via social media platforms like Twitter and Facebook, reviewing news feeds for situational awareness, or researching identified, discrete targets for legitimate investigatory purposes. Accordingly, DHS has created Department-wide standards designed to protect privacy, civil rights, and civil liberties in each category of its use. --------------------------------------------------------------------------- \1\ President Barack Obama, Memorandum on Transparency and Open Government (January 21, 2009), available at http://www.gpoaccess.gov/ presdocs/2009/DCPD200900010.pdf; OMB Memorandum M-10-06, Open Government Directive (December 8, 2009), available at http:// www.whitehouse.gov/omb/assets/memoranda_2010/m10-06.pdf. --------------------------------------------------------------------------- There are three general ways in which DHS utilizes social media, and each has associated privacy protections: External communications and outreach between the Department and the public; Awareness of breaking news of events or situations related to homeland security, known as ``situational awareness;'' and Operational use, when DHS has the appropriate authorities, such as law enforcement and investigations. In each category, the Department has established and enforces standards that incorporate privacy protections ex ante, create uniform standards across the components and Department, and are transparent with regard to the scope of our activities. external communications and outreach Consistent with the President's 2009 Memorandum on Transparency and Open Government, the Office of Management and Budget's (OMB) Open Government Directive \2\ and OMB's Memorandum M-10-23, Guidance for Agency Use of Third-Party Websites and Applications,\3\ the Department uses the social networking medium to provide the public with robust information through many channels. For example, DHS currently has a presence on many of the major social networking platforms, including Facebook, Twitter, and YouTube. In addition, FEMA launched a FEMA app for smartphones that contains preparedness information for different types of disasters. Similarly, the Transportation Security Administration has MyTSA Mobile Application, which enables the traveling public access to relevant TSA travel information, such as types of items that may be carried through TSA security checkpoints, or estimated wait times. --------------------------------------------------------------------------- \2\ See supra note 1. \3\ http://www.whitehouse.gov/sites/default/files/omb/assets/ memoranda_2010/m10-23.pdf. --------------------------------------------------------------------------- In 2009, the Department established a Social Media Advisory Group, with representatives from the Privacy Office; Office of General Counsel; Chief Information Security Officer; Office of Records Management; and Office of Public Affairs to ensure that a variety of compliance issues including privacy, legal, security, and records management issues are addressed as DHS uses social media. This group governs and provides guidance on social media initiatives related to external communications and public outreach by reviewing recommendations from Components and offices and evaluating Terms of Service agreements and Terms of Use policies. The group also developed a social media use plan, while working to ensure compliance issues are addressed and resolved before the first Department use of a particular application of social media. DHS also established Department-wide standards for use of social media for communications and outreach purposes through the creation, and development of, two Privacy Impact Assessments (PIAs). The PIAs address two types of uses of social media within the communications/ outreach category: (1) Interactive platforms where the Department has official identities, using those profiles to provide information about the Department and its services, while having the ability to interact with members of the public such as allowing them to post comments on the official Department page or profile;\4\ and (2) unidirectional social media applications encompassing a range of applications, often referred to as applets or widgets, that allow users to view relevant, real-time content from predetermined sources, such as podcasts, Short Message Service (SMS) texting, audio and video streams, and Really Simple Syndication (RSS) feeds.\5\ --------------------------------------------------------------------------- \4\ http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia- dhs_socialnetworkinginter- actions.pdf. \5\ http://www.dhs.gov/xlibrary/assets/privacy/ privacy_pia_dhswide_unidirectionalsocial- media.pdf. --------------------------------------------------------------------------- The PIAs analyze the Department's use of social media and networking for communications purposes, if and how these interactions and applications could result in the Department receiving personally identifiable information (PII), and the privacy protections in place. The PIAs describe the information the Department may have access to, how it will use the information, what information is retained and shared, and how individuals can gain access to and correct their information. For example, official DHS accounts across social media and networking websites and applications must be identified by the component or Department seal as well as an anonymous, but easily identifiable user name account displaying a DHS presence, such as ``DHS John Q. Employee.'' Both the communications and outreach PIAs also include periodically-updated appendices that identify the specific Department-approved profiles and applications. In addition, the PIAs contain provisions that Department-approved profiles are subject to Privacy Compliance Reviews by the DHS Privacy Office. situational awareness The Office of Operations Coordination and Planning (OPS), National Operations Center (NOC), has a statutory responsibility (Section 515 of the Homeland Security Act (6 U.S.C. 321d(b)(1))) to provide situational awareness and establish a common operating picture for the Federal Government, and for State, local, Tribal governments as appropriate, in the event of a natural disaster, act of terrorism, or other man-made disaster, and (2) ensure that critical terrorism and disaster-related information reaches Government decision-makers. Traditional media sources, and more recently social media sources, such as Twitter, Facebook, and a vast number of blogs, provide public reports on breaking events with a potential nexus to homeland security. By examining open-source traditional and social media information, comparing it with many other sources of information, and including it where appropriate into NOC reports, the NOC can provide a more comprehensive picture of breaking or evolving events. To fulfill its statutory responsibility to provide situational awareness and to access the potential value of the public information within the social media realm, in 2010, the NOC launched the first of three pilots using social media monitoring related to specific natural disasters and international events. Beginning with the pilots, the reason the NOC utilizes social media tools is to identify breaking or evolving incidents and events to provide timely situational awareness and establish a more complete common operating picture. The NOC views information from a variety of sources to include open-source reporting and a variety of public and Government sources. The NOC synthesizes these reports for inclusion in a single comprehensive report. These reports are then disseminated to DHS components, interagency partners, and State, local, Tribal, territorial, and private-sector partners with access to the NOC's common operating picture. The content of the reports may be related to standing critical information requirements, emerging events potentially affecting the homeland, or special events such as the Super Bowl or the United Nations General Assembly. Prior to implementing each social media pilot, the Privacy Office and the Office of Operations Coordination and Planning developed detailed standards and procedures associated with reviewing information on social media websites. These standards and procedures are documented through a series of pilot-specific PIAs.\6\ --------------------------------------------------------------------------- \6\ The NOC and the Privacy Office developed three PIAs in the pilot stage of the NOC Media Monitoring Initiative: Haiti Social Media Disaster Monitoring Initiative, January 21, 2010, available at http:// www.dhs.gov/xlibrary/assets/privacy/privacy_pia_ops_haiti.pdf; 2010 Winter Olympics Social Media Event Monitoring Initiative February 10, 2010, available at http://www.dhs.gov/xlibrary/assets/privacy/ privacy_pia_ops_2010winterolympics.pdf; and April 2010 BP Oil Spill Response Social Media Event Monitoring Initiative, April 29, 2010, available at http://www.dhs.gov/xlibrary/assets/privacy/ privacy_pia_ops_bpoilspill.pdf. --------------------------------------------------------------------------- The NOC pilots occurred during the 2010 Haiti earthquake response, the 2010 Winter Olympics in Vancouver, British Columbia; and the response to the April 2010, Deepwater Horizon Gulf Coast oil spill. For each of these pilots, the NOC utilized internet-based platforms to provide situational awareness and develop a common operating picture directly related to the response, recovery, and rebuilding efforts in Haiti by reviewing information on publicly-available on-line fora, blogs, public websites, and message boards. Following the three discrete social media monitoring pilots by the NOC, the Privacy Office did a thorough (and public) Privacy Compliance Review of the NOC's implementation of the PIAs' privacy protections.\7\ The Privacy Office's review found that the NOC's social media monitoring activities did not collect PII, did not monitor or track individuals' comments, and complied with the stated privacy parameters set forth in the underlying PIAs. --------------------------------------------------------------------------- \7\ http://www.dhs.gov/xlibrary/assets/privacy/privacy-privcomrev- ops-olympicsandhaiti.pdf. Three Privacy Compliance Reviews have been completed and published by the Privacy Office, available at: http:// www.dhs.gov/files/publications/gc_1284657535855.shtm. --------------------------------------------------------------------------- Given the positive assessment of the three pilots, OPS and the Privacy Office designed a holistic set of privacy protections to be implemented whenever information made available through social media is being reviewed for situational awareness and establishing a common operating picture. In June 2010, the Department released its Publicly Available Social Media Monitoring and Situational Awareness Initiative PIA, incorporating these protections.\8\ This PIA describes how the NOC uses internet-based platforms that provide a variety of ways to review information accessible on publicly-available on-line fora, blogs, public websites, and message boards. Through the use of publicly- available search engines and content aggregators, the NOC reviews information accessible on certain heavily-trafficked social media sites for information that the NOC can use to provide situational awareness and establish a common operating picture, all without monitoring or tracking individuals' comments or relying on the collection of PII, with very narrow exceptions, discussed below. --------------------------------------------------------------------------- \8\ http://www.dhs.gov/xlibrary/assets/privacy/ privacy_pia_ops_publiclyavailablesocial- media.pdf. --------------------------------------------------------------------------- The NOC does not: (1) Actively seek PII except for the narrow exceptions; (2) post any information on social media sites; (3) actively seek to connect with internal/external social media users; (4) accept internal/external personal users' invitations to connect; or (5) interact on social media sites. The NOC is, however, permitted to establish user names (consistent with the criteria established in the communications and outreach PIAs) and passwords to form profiles and follow relevant Government, media, and subject matter experts on social media sites as described in the June 2010 PIA; and to use search tools under established criteria and search terms that support situational awareness and establishing a common operating picture. As part of the publication of the June 2010 PIA, the Privacy Office mandates Privacy Compliance Reviews every 6 months. After conducting the second Privacy Compliance Review, the Privacy Office determined that this PIA should be updated to allow for the collection and dissemination of PII in a very limited number of situations in order to respond to the evolving operational needs of the NOC. After January 2011, this PII on the following categories of individuals may be collected when it lends credibility to the report or facilitates coordination with Federal, State, local, Tribal, territorial, and foreign governments, or international law enforcement partners: (1) U.S. and foreign individuals in extremis, i.e., in situations involving potential life or death circumstances; (2) Senior U.S. and foreign government officials who make public statements or provide public updates; (3) U.S. and foreign government spokespersons who make public statements or provide public updates; (4) U.S. and foreign private-sector officials and spokespersons who make public statements or provide public updates; (5) Names of anchors, newscasters, or on-scene reporters who are known or identified as reporters in their posts or articles, or who use traditional and/or social media in real time to provide their audience situational awareness and information; (6) Current and former public officials who are victims of incidents or activities related to homeland security; and (7) Terrorists, drug cartel leaders, or other persons known to have been involved in major crimes of homeland security interest, (e.g., mass shooters such as those at Virginia Tech or Ft. Hood) who are killed or found dead.\9\ --------------------------------------------------------------------------- \9\ The most recent PIA update (authorizing these narrow PII categories collection) was finalized January 6, 2011, and is available at: http://www.dhs.gov/xlibrary/assets/privacy/ privacy_pia_ops_publiclyavailablesocialmedia_update.pdf. --------------------------------------------------------------------------- For this narrow category of individuals, DHS may only collect the full name, affiliation, position or title, and publicly-available user ID, when it lends credibility to the report. DHS determined that this information improves the efficacy and effectiveness of the social media monitoring initiative without an unwarranted invasion of privacy of individuals in each of these categories. For this narrow category of individuals the PII is only stored in the narrative report in which it is used, and is not tracked for any other reason. DHS published a System of Records Notice \10\ that describes the creation of these seven exceptions for the collection of PII and narrowly tailored, how much information can be collected, and how the information can be used. Furthermore, the Privacy Office is commencing its semi-annual Privacy Compliance Review in late February to ensure that the NOC continues to adhere to the privacy protections identified in the PIA. --------------------------------------------------------------------------- \10\ http://edocket.access.gpo.gov/2011/2011-2198.htm. --------------------------------------------------------------------------- operational use There may be situations where particular programs within the Department or its components may need to access material on social media or individual profiles in support of authorized missions. Given the breadth of the Department's mission, and the fact that access, collection, and use of social media and other publicly-available information is governed by specific legal authorities, rather than Department-wide standards, the Department has taken a different approach in embedding privacy protections into Department use of social media for operational purposes, with authority-based requirements implemented through policy and Management Directives. For example, components of DHS such as U.S. Customs and Border Protection, U.S. Immigration and Customs Enforcement, Federal Protective Service, Federal Air Marshals Service, U.S. Coast Guard, and U.S. Secret Service have the authority to engage in law enforcement activities which may include the use of on-line and internet materials. Other DHS offices and components may be authorized to utilize social media for specific law enforcement purposes such as investigating fraud. The Office of Intelligence and Analysis also has some overt collection authorities for intelligence purposes which may include the use of on-line and internet materials. DHS has established objective criteria by which those investigatory components can access publicly-available information. DHS components cannot review individuals' information unless they have appropriate underlying authority and supervisory approval. Moreover, Office of Operations Coordination and Planning and Office of Intelligence and Analysis have additional specific policies on the use of social media for operational purposes. One of DHS' responsibilities is to confirm our work is being done under the appropriate legal framework for Federal law enforcement activities. However, with increased access to individuals' personal information posted on the internet and social media sites, these DHS components have been reminded that they must also be conscious of privacy considerations. At DHS, we work every day to strike a balance between our need to use open-source internet and social media information for all purposes, but particularly law enforcement and investigatory purposes to further our mission, while protecting First Amendment rights, Fourth Amendment rights, and privacy. In 1999, the Department of Justice issued guidelines for Federal law enforcement agents that outline on-line investigative principles that are applicable, but do not explicitly reference, social media. In 2011, the Office of the Director of National Intelligence issued guidelines that outline how intelligence community professionals should use technology, including social media. Both guidelines address the following topics: Obtaining information from publicly-available media under the same conditions that apply to obtaining information from other sources generally open to the public; passively observing and logging real-time electronic communications on media open to the public under the same circumstances in which these activities could be undertaken when attending a public meeting; and retaining the contents of a stored electronic message, such as on-line traffic, if that information would have been retained had it been written on paper. Moreover, Federal law enforcement agents communicating on-line with witnesses, subjects, or victims must disclose their affiliation with law enforcement when DHS guidelines would require such disclosure if the communication were taking place in person or over the telephone-- they may communicate on-line under a non-identifying name or fictitious identity if DHS guidelines and procedures would authorize such communications in the physical world.\11\ Finally, Federal law enforcement agents may not access restricted on-line sources absent legal authority permitting entry into a private space. Until a Department-wide Management Directive on using social media for operational purposes is finalized, the Secretary has instructed all components to adhere to the DOJ or ODNI guidelines as appropriate. --------------------------------------------------------------------------- \11\ See, e.g., On-line Investigative Principles for Federal Law Enforcement Agents (Department of Justice, 1999) and Civil Liberties and Privacy Guidance for Intelligence Community Professionals: Properly Obtaining and Using Publicly Available Information (Office of the Director of National Intelligence, 2011). --------------------------------------------------------------------------- In light of the varying authorities and responsibilities within the Department, instead of having a Privacy Impact Assessment with general standards (such as for communications and situational awareness purposes), the Department is developing a Management Directive for Privacy Protections in Operational Use of Social Media. The Management Directive will be enforceable throughout the Department, and will identify the authorities, restrictions, and privacy oversight related to use of social media for operational purposes. The Management Directive will also provide instructions on how to embed privacy protections into the operational use of social media and each investigation performed by Department personnel. The Privacy Office has already investigated one component's use of social media for investigatory purposes; its conclusions are informing the Management Directive. Consistent with the Department's approach to embed privacy protections throughout the life cycle of Department activities, the Privacy Office will conduct a Privacy Compliance Review or assessment of the Department's adherence to the social media Management Directive approximately 6 months after the Directive is implemented. conclusion In light of the scope and availability of information including PII found in social media venues, the Privacy Office intends to continue to monitor the Department's use of social media in all three categories-- communications and outreach, situational awareness, and operational use--to ensure privacy protections are built-in and followed. Mr. Meehan. Thank you, Ms. Callahan. Now I recognize Mr. Chavez for his testimony. STATEMENT OF RICHARD CHAVEZ, DIRECTOR, OFFICE OF OPERATIONS COORDINATION AND PLANNING, DEPARTMENT OF HOMELAND SECURITY Mr. Chavez. Good morning, Chairman Meehan, Ranking Member Speier, and Members of the subcommittee. I also would like to thank you for inviting me here today to talk to you about the National Operations Center use of social media monitoring to provide real-time or near-real-time situational awareness of potential occurring events or incidents that may impact the safety, security, and resilience of the homeland. As stated in Section 515 of the Homeland Security Act, as amended, the National Operations Center is the principal operations center for the Department of Homeland Security and shall provide situational awareness and a common operating picture for the entire Federal Government and for State, local, and Tribal governments as appropriate in the event of a natural disaster, act of terrorism, or other man-made disaster, and ensure that critical terrorism and disaster-related information reaches Government decision-makers. In order to fulfill these statutory responsibilities, the National Operations Center, also known as the NOC, gathers reports from multiple sources, to include open-source media reporting. Media reporting is often the first indication of a potential incident. For this reason, the NOC utilizes and incorporates media reporting into its incident reports. The primary focus of our reporting is on what is happening, and not who is reporting the event. As previously stated, the NOC gathers reports from a variety of sources and synthesizes them into one single comprehensive incident report that is distributed again to the DHS leadership, DHS components, and other Federal, State, local, Tribal, territorial, and non-governmental and private- sector partners for action as appropriate. The after-action assessments relating to the Government's response during Hurricane Katrina highlighted the importance of real- and near-real-time information from media reporting to enable a more timely response during a dynamic catastrophic event. In 2006, following Hurricane Katrina, the NOC began assessing the incorporation of media reporting for major media networks into incident reports to provide responders with real- time information. To date, incorporating media reporting into the NOC's incident reports has enabled our partners to have greater awareness during events and incidents. Here is a real-world example of how the NOC incorporates media reporting. In early January 2012, the media in Charlotte, North Carolina, was first on scene reporting damage after severe weather erupted across multiple counties near Charlotte. The media reports were combined with reporting from State and local sources. The end result, again, was a more timely incident report that provided specific and comprehensive information to our partners, enabling them to make informed decisions. The NOC incorporates media reporting into incidents across the full spectrum of Homeland Security operations: Prevent and protect, respond and recover. Another real-world example of how NOC incorporates media reporting into its incident reports also occurred in early January 2012. The incident occurred in Austin, Texas. The media in Austin posted incident information about evacuation of a high school after a suspicious device was seen in a vehicle on campus. The media reported that, according to county sheriff's office spokesmen, sheriff's deputies were responding to an explosive device in a car. Through additional Government reporting, the NOC learned that the scene was secured and that no explosive device was found by law enforcement officials. Again, I would like to emphasize that it is the ``what,'' not the ``who,'' that is relevant for NOC reporting purposes. The NOC adheres to strict enforcement of privacy guidelines with regard to media reports. The NOC, in coordination with the DHS Office of Privacy, evaluates processes and incident reports on a recurring basis to ensure our privacy guidelines are being complied with. Again, thank you for the opportunity to speak with you today, and I am happy to answer any questions you may have. Mr. Meehan. Well, thank you for your testimony, Mr. Chavez. As I said in my opening statement, I am concerned about some of the news reports and materials related to DHS monitoring of social media and the networks. So I will now recognize myself for a few minutes of questioning. The testimony has been revealing in the sense of giving us the overall perspective. I think all of us appreciate the ability for the Governmental entities to broadcast through the various pieces so people know about what you are doing. Mr. Chavez, you talked a lot about, sort of, media monitoring. There is an expectation on the part of many of those who are reporters and otherwise, they know they are putting their product out so that it can be reviewed. So I think we can go past those kinds of things. We also appreciate, as I said in my opening statement, about the opportunity to avail ourselves in real time of breaking information that can be communicated in certain ways that are now available so that there is the ability to keep those that need to make the decisions up on the latest information. But you are sensitive--we are here today because where we are trying to find is where that line is where the public citizen--it is not just the expectation of privacy, because we know they are communicating in public fora or even quasi-public fora. But we are talking now about monitoring on-line information in blogs, in websites, in message boards. Some of these have, you know, the indicia of, sort of, quasi-privacy communities, so to speak. So my real question for you is to help us understand what you are doing to assure that individual communication is not leading to individuals being identified by the Government and what you are doing to assure that we are not creating a chilling effect so that somebody in a community who is concerned about a particular issue will be more reluctant to write a letter to the editor, to post something on a blog. I will close my opening comments--and I know you have come prepared to answer these, but we are all very concerned about a couple of the circumstances that have happened. Most specifically, what looks as if it is a directive within the contract you have with a private contractor who is employed to help you disseminate or gather information. It is identifying media reports that reflect adversely on the U.S. Government, DHS, or prevent, protect, respond, or recovery activities. So, in effect, we are asking somebody to go out and let us know what people are saying that is negative about us. This appears to be what was asked for in the contract with General Dynamics. So I would like you to tell me what it is that we are doing to assure that private commentary is not being misused and what we can do to assure that the activities of monitoring are not going to create some kind of a chilling effect on individuals' willingness and readiness, not only to comment, but, frankly, to make comments which may be critical of the Government. Ms. Callahan. Ms. Callahan. Thank you, sir. With regard to the privacy protections that the Department has implemented specifically with regard to situational awareness, to be very clear, as Mr. Chavez said, it is the ``what,'' not the ``who,'' that is being identified and that we are concerned with. As you are aware, my office not only mandated privacy compliance reviews every 6 months to make sure that indeed we are just focusing on the event, on the situation, to know what is going on, and not worried about the individual; in addition to that, the National Operations Center has very robust auditing capability, that they go and review both the sites that are being done, how long they are on it, and what information is being implemented into the report. We take these issues very seriously, sir. We absolutely understand and agree that these are---- Mr. Meehan. Who is directing what is being monitored? Ms. Callahan. Mr. Chavez. Mr. Chavez. The key words, I guess, or the mechanism that we use to identify information that is coming across the media, whether it be social or the traditional media that is out there, again, these are key words associated with events that have happened in the past and also with the equities of the Department of Homeland Security, again, looking at the safety, security, and resilience missions that are out there. So, as you said in your opening statement, I believe, that there are any number of blogs going on at any one time and a plethora of information that is flowing through there, there is no way we could look at all of it. So we use the tools, again, with these keyword searches that are commercially available for looking at search items, particularly, again, keywords, that we can pull out of there and look at, again, what the situation is that is evolving. Mr. Meehan. But you are looking at keywords, but my question is, are there circumstances under which--who is the one that is waking up in this vast array of information out there? Because the limited number of people that you have working for you, unquestionably, without some sense of direction, they could be spending limitless time, in effect, floating on a sea without any kind of product that is produced. So there has to be some sense of direction. Where does the line get drawn with regard to overlooking, sort of, general words out there versus looking at specific incidents, specific issues, and identifying people, as happened in Michigan? Mr. Chavez. There are guidelines for sites that the individuals within the Media Monitoring Center can monitor. Again, those sites are submitted for approval through the Privacy Office, and they are strictly adhered to by the individuals who are actually looking at the information that is coming across there and gathering them for us. So there is a series of checks and balances. Ms. Callahan. If I can, sir, in order to be transparent about this, in the Privacy Impact Assessment we have a list of the representative keywords. The Privacy Office reviews that list every 6 months and makes sure that we stay within it. The list is ``disaster,'' it is, you know, ``flood,'' ``tornado,'' and things like that. With regard to individuals, as I indicated in my oral testimony, we don't collect information on individuals. We do not monitor them with regard to any First Amendment activity. But individuals may be the first person at the scene, and so they may go and report there has been a train derailment in Michigan. We do not then go and say that, ``Mary Ellen Callahan reported a train derailment.'' We then corroborate it with another source that is identified---- Mr. Meehan. My time has expired, so I am hoping some others will pick this up. We know about the disasters. I don't think we are worried about the disasters. What we are worried about are the individual circumstances where there may be issues out there. I point back again to the Michigan circumstance where there was a controversial decision by the Government, and DHS played a role in assessing community response to that incident. That wasn't a natural disaster; that was an incident that was created by the Government, and the Government then was monitoring the community response. That is where I want to--who is going to make the decisions? Who is making the protections against circumstances under which the Government is playing a role in not just analyzing but filtering back, recording, and reporting about things that people in the community have said about Governmental activity? Ms. Callahan. I would be happy to answer the Standish question whenever the Members have given me the time to do so. Mr. Meehan. Thank you so much. I will turn it over to the Ranking Member, Ms. Speier. Ms. Speier. Thank you, Mr. Chairman. I am deeply troubled by the document that has just been put into the record by EPIC.org. While you have probably not had the opportunity yet to review it, Mr. Chairman, I would like to request that after they do review it, that they report back to this committee and provide us with answers to the questions raised. But I am going to start with a couple of them. They made a FOIA request back in April. DHS ignored it. Then EPIC filed a lawsuit on December 23, 2011, when the agency failed to comply with the FOIA deadlines. As a result of filing the lawsuit, DHS disclosed to EPIC 285 pages of documents. So I am just making note of that. You shouldn't stonewall. When a FOIA request is made, you should comply with it within the deadlines. No entity should be required then to file a lawsuit. So I am just putting you on notice about that. But what is interesting about what they have pointed out is that, while you say there is no personally identifiable information in this contract that General Dynamics has, in fact they point out that there are some exceptions to the no-PII rule. One of them allows for the collection of personally identifiable information of anchors, newscasters, or on-scene reporters who use traditional and/or social media. This would allow the agency to build files on bloggers and internet activists, in violation of the Privacy Act. I find that outrageous. I would like to ask you to amend the contract with General Dynamics to exempt that kind of information from being collected. Ms. Callahan. First, ma'am, with regard to the FOIA response, I completely agree. It did not meet my standards in terms of the timeliness of the response, and I have taken action to look into why it was delayed. That was unacceptable, and I completely concur with your statement. With regard to the reporters, to clarify, the reporter's information is collected--and, as noted in my written testimony, the only information we collect on the reporters, if at all, is the name, their affiliation, their title, if any, and their publicly available identification. We are only collecting the information if it adds to the credibility of the report or allows coordination. So it is very rare that we actually collect any information about the reporters. But it could be a circumstance where you link to a reporter's blog who is at a news site. For example, in Michigan and the train derailment, if the person posted it on his personal blog, we may be authorized to link to it. We would not be authorized to collect it or use it for a personal--an individual, but only if the reporter is relevant and adds credibility to the report itself. Furthermore---- Ms. Speier. I am---- Ms. Callahan [continuing]. To clarify, ma'am, just to clarify, the reporter information is only stored in that report. We are not cutting across the different reports. We are not saying how many different reporters do it. It is information that is publicly available, and it is not associated with their opinions but instead with the situation or the event that is occurring. Ms. Speier. I am suggesting to you that it is irrelevant, you do not need it, and you should suspend that part of the contract. Now, this document also suggests that you are capturing public reaction to major Government proposals. Now, again, if this is, in fact, true, if this is part of the contract, I believe that should be suspended as well. This is not a political operation; it should not be a political operation. Capturing public reaction to major Government proposals is not something you should be doing. Ms. Callahan. I completely agree with you, ma'am. I 100 percent agree with you, which is why the report that they point to on page 118 in the FOIA report actually was never a live report. It was never disseminated by the National Operations Center. It would not have met the privacy standards that are in the five publicly available Privacy Impact Assessments we have done. Furthermore, it is an example of an early August 2009 example of what could be possible. We, together with the National Operations Center, agreed that that is well outside the scope. In fact, if you look at the document, it is within a very early, February 2010, training manual as an identification of a weekly report, because it is a compilation of other elements. If you look at the previous pages, you can see that they identify, like, ``This is not acceptable,'' ``This is not appropriate,'' ``Redact the personally identifiable information.'' That Standish, Michigan, report is one that only appears-- actually, the only place it exists in the Department is in my files because of the privacy compliance review we did before launching the initiative. It is---- Ms. Speier. All right. My time is about to expire, so let me suggest the following. EPIC makes three recommendations at the end of their report. They recommend you cease collecting information on journalists' activities, that you suspend the social network and media organization monitoring program until safeguards are put in place, and that you comply with providing Congress with an annual report that sets out in detail the legal standards for this activity. I, for one, wholeheartedly agree with their recommendations. Mr. Chairman, I actually think we should have EPIC and others in the privacy community come and testify. I am deeply troubled by what we have heard so far this morning. The fact that you agree with me but yet much of this conduct continues is deeply troubling. I yield back. Mr. Meehan. Thank you, Ranking Member Speier. At this point in time, I would like to turn it over to the gentleman from Mississippi, the Ranking Member of the committee, Mr. Thompson, for questions he may have. Mr. Thompson. Thank you very much, Mr. Chairman. Ms. Callahan, will you provide the committee with a copy of the FOIA information that you provided to EPIC? Ms. Callahan. Of course. Absolutely, sir. Mr. Thompson. Thank you. Also, will you provide us with your analysis of why the FOIA request went unresponded to and what did you do in that situation but also what will you do going forward so that other requests won't be treated so cavalierly? Ms. Callahan. Absolutely, sir. Mr. Thompson. Mr. Chavez, do we create log-ons to monitor individuals in this process? Mr. Chavez. Actually, we do not monitor individuals at all. What we are looking for, again, as I talked about, the keywords. Within the keywords you won't find anyone's name. Like, say, they are all verbs, those types of things that we are looking for. So, no, we don't create log-ins for individuals to do that, and we are not looking or monitoring individuals. Mr. Thompson. Are there any times that you take down names of individuals? Mr. Chavez. Again, given the seven criteria that we have for life-saving, those type of circumstances, are the only time that we would collect the names, use the PII. Mr. Thompson. Who makes that determination? Mr. Chavez. That is part of our training course that we do for the individuals who are doing the media monitoring. We look at those processes. Again, they are audited twice a year. The most recent one was just done in November. Mr. Thompson. Who is ``we'' doing the training? Mr. Chavez. Actually, the National Operations Center, in coordination with the Privacy Office. Mr. Thompson. All right. How does this interface with the General Dynamics contract? Mr. Chavez. Those are the individuals who are doing the media monitoring for us. Mr. Thompson. So let me get this straight. DHS is training a private contractor to do the media monitoring? Mr. Chavez. Part of it, yes, on their privacy rules and those types of things, indeed, we are. Mr. Thompson. Why are we training private contractors? Mr. Chavez. Well, to collect--their skill set, to collect the information we are. But what they don't come with is, again, the DHS guidance that we have to give them. Mr. Thompson. I thought private contractors generally had an expertise that we didn't have internally as an agency, and we would go outside to pick that capacity up. But now what you just said is for some reason we are training the outside people to do the internal work. Mr. Chavez. It is not overall training. Again, they do have those skill sets that they use. What we add from the Department, again, are those checks that we use to ensure, again, that the privacy guidelines are complied with. That is the part of the training that we do, and that is it. Mr. Thompson. Well, explain to me what skill sets General Dynamics, with an $11 million contract, would have outside of DHS's capabilities. Mr. Chavez. Well, what they offer, again, is the 24/7 monitoring of those sites. They are skilled technicians in surfing the web and also doing an analysis of the information that they get when they do get hits on websites and producing synopsized reports that, again, comply with the privacy guidelines that are out there, and pushing those out to us so we can send those out to our partners. Mr. Thompson. So your testimony is we don't have the skill sets at DHS to monitor websites? Mr. Chavez. We do. Right now, again, we have that as part of one of our contracts that is out there. Mr. Thompson. Is it a sole source contract? Mr. Chavez. No, it is not. Mr. Thompson. Well, will you provide the committee with the procurement document? How long has it been out there? Mr. Chavez. I will get back with you on that. I will give you the full details on it. Mr. Thompson. Was the original contract for the $11 million a sole source contract? Mr. Chavez. I do not know. I will have to check on that for you, sir. Mr. Thompson. How long have you been working with the agency? Mr. Chavez. Two years. Mr. Thompson. How long has this General Dynamics contract? Mr. Chavez. In the 2 years I have been there. Mr. Thompson. So you inherited the General Dynamics contract? Mr. Chavez. Yes, sir. Mr. Thompson. All right. Well, please get it to me. The questions raised by the EPIC insertion, as well as what everyone has commented, raise significant issues around safeguards. Mr. Chairman, I think you would help a lot of people if at some point we could, as Ranking Member Speier suggested, maybe bring those individuals and others who might have an interest before the committee to talk about it. I yield back. Mr. Meehan. Thank you, Mr. Ranking Member. We appreciate your presence here today on the subcommittee. The Chairman now recognizes the gentleman from Minnesota, Mr. Cravaack. Mr. Cravaack. Thank you, Mr. Chairman. Thank you for coming here today and briefing us. I think what everybody is really concerned about here is our Constitutional rights. Because we in the United States, we have this great document called the Constitution, and we have to walk this fine line of data attainment to protect the United States but to, at the same time, make sure that we have safeguards in place that we have freedom of speech, which we value highly. So, with that said, what safeguards are in place that when the DHS does collect and distribute personally identifiable information, PIIs, outside a specific narrow event such as a life-or-death situation, can you kind of expand upon that a little bit? Then with that said, what would be the penalty associated with distributing that information illegally? Have there been any cases where that has occurred? Is there a report currently going from General Dynamics to you, to Congress that would also, when these people are identified, that Congress is aware of that? So, with that, Ms. Callahan, could you start off? Ms. Callahan. Absolutely, sir. Thank you very much for that question. As I have described and Mr. Chavez has described, the only personally identifiable information that can be collected are these seven very narrow categories: Public officials or in a public event or making a public statement or life-or-death, as you pointed out. As part of the review by the National Operations Center, every week they go and check to make sure no personally identifiable information is provided. I review each of the media monitoring that I receive as part of the ordinary course of business, just to see if they continue to comply with the privacy protections that we describe in our five publicly available Privacy Impact Assessments and privacy compliance reviews. We then do these semi-annual reviews of the entire system to look at all the processes therein. Prior to me authorizing any personally identifiable information, there were, to my recollection, two circumstances where public officials were named in the circumstance--for example, President Obama. There was no circumstance with regard to individuals who are not in a public capacity who have been named. Actually, that example of having a public official like the President is why we agreed to have those seven very narrow categories that could be disclosed. Again, identifying Gabrielle Giffords as the target of the attack in Arizona actually helped coordinate the response more quickly, because we had that authorization. With regard to the penalty, if, indeed, that had taken place, there would be significant penalties. There would be training and possibly taking them off the job if, indeed, there was a recidivist behavior. We have not yet seen that. With regard to a report from General Dynamics, I don't know of that, but I do know that we have been doing these semi- annual privacy compliance reviews, which are available on our website, for exactly the reason that everyone has identified: To make sure that we are following the privacy protections that we have identified and that we are not monitoring, reviewing, or collecting First Amendment-protected speech. Mr. Cravaack. Mr. Chavez, do you have any comment on that, as well? Mr. Chavez. No, that is exactly it. Again, we follow the guidelines that the Privacy Office sets forth. We do audit on a regular basis the individuals who are doing those types of things. We have a series of individuals that are reviewing the data, again, to make sure that the PII is not inappropriately passed on, displayed, or stored. Mr. Cravaack. Okay. I would like to dovetail on what the Ranking Member said. Why did you pick General Dynamics, for example, to be the contractor for monitoring social sites and not keep it in- house, so to speak? Mr. Chavez. Sir, again, that was before my time. That is the contract I inherited. But I can get you the information on that. Mr. Cravaack. Okay. Who in DHS issued the directive for this establishment of this committee? You know, I agree, you have to get resource information and intelligence anywhere you can possibly get them, for various reasons. But who initiated the directive to initiate this social networking? Mr. Chavez. DHS did, again, before my time, right after Hurricane Katrina. Again, with the advantages of looking at the media to get a more timely response, see what is going on, provide greater situational awareness, the decision was made to monitor the social--or the media monitoring, traditional media. Then later on it evolved into the social media. Mr. Cravaack. Okay. One of the things that did kind of raise a red flag for me is reports on DHS components and other Federal agencies, positive or negative reactions to certain Federal organizations. Who gave that directive? Ms. Callahan. As I understand, sir, that is part of the General Dynamics contract. As was said, it predates Mr. Chavez. The purpose of that is not to keep track of what they are negatively saying, but for operational purposes to understand whether or not the Department is candidly meeting its standards. If, indeed, there is a long line as TSA, we don't care who is in the long line, but if someone tweets and says there is a long line, we then convey that information to TSA. It is part of the operational awareness that the National Operations Center does. Mr. Cravaack. Okay. My time has expired. I do have an issue with that, but I will yield back at this time. So thank you. Mr. Meehan. Thank you. Thank you, Mr. Cravaack. So, at this moment, the Chair will recognize the gentleman from--it is ``Missoura'' where you are from, right, not ``Missouri''? Mr. Long. Right. You bet. Mr. Meehan. Mr. Long. Mr. Long. Thank you, Mr. Chairman. Mr. Chavez, what can the agency point to as your legal basis for your social network and media monitoring program, which a lot of us I think today have expressed concerns threaten important free speech and expression rights? What legal basis can you point us to that either this activity could even be concerned with---- Mr. Chavez. It was, again, Section 515 of the Homeland Security Act, as amended, to provide situational awareness and, again, that common operating picture. Mr. Long. That is the legal basis for it? Mr. Chavez. Yes, sir, that is the legal basis. Mr. Long. Okay. Ms. Callahan, I, as a lot of us today, are very concerned about the chilling effect on our core First Amendment rights to political speech and free speech in general. Are there--what can you point us to? Are there protections to ensure that only necessary personal data is used and retained no longer than necessary to protect against accidental or deliberate misuse? Ms. Callahan. I, too, sir, am very concerned about the First Amendment and want to make sure that that is wholly protected with regard to this activity. We spent 9 months designing this program and have detailed it in the public Privacy Impact Assessments and compliance reviews. The standard by which we operate is, again, not the ``who'' but the ``what is taking place.'' What is the event that is going on? If an individual alerts us to that event, then that is the first report, but not the exclusive report. The way, sir, that we have the privacy protections embedded into the program is to make sure that no personally identifiable information is collected or disseminated unless it meets those seven categories. Mr. Long. No what information? Ms. Callahan. Personally identifiable information. Mr. Long. Okay. Ms. Callahan. No personally identifiable information is collected except for those public figures or in a life-or-death circumstance. The National Operations Center goes and very robustly audits that, and then we go in every 6 months to make sure that, indeed, the representations are correct. The personally identifiable information, the very narrow topics--which, again, are public figures making public statements or part of an event, or a life-or-death circumstance--are stored only in the report. We are not doing a table or an analysis of each of the different reports. They are only stored in that. In fact, I published a System of Records Notice, which is required under the Privacy Act. It was not necessary for me to do this; the general System of Records Notice for operations would have covered this activity. But for transparency purposes, when I finally authorized the use of personally identifiable information, we published that System of Records Notice to go and say, these are the seven categories that we are doing--public figures at public events, or life-or-death circumstances--in order to be very clear about what we are doing with information and, candidly, sir, what we are not doing with information. Mr. Long. So, in your mind, you are convinced that what you are doing is consistent with existing DHS policy? Ms. Callahan. Consistent with DHS policy, consistent with the Privacy Act, and consistent with the First Amendment, yes, sir. Mr. Long. Okay. I have another question for you, Ms. Callahan. As the public becomes aware of Government activity monitoring social media to gain rapid understanding of events, what are the risks of people or groups trying to affect those events, I guess-- say, people with bad intentions using the different platforms of social media to manipulate the Government understanding to their advantage? What can be done to guard against this problem? Ms. Callahan. My colleague Mr. Chavez may also have some thoughts about that. But I think that, because we don't rely on just one individual source but we actually confirm the sources and look for making sure that we have multiple sources identifying, for example, the train wreck in Michigan, would be one element. Also, to confirm, the National Operations Center, the situational awareness, is not attempting to investigate or confirm the validity of the event, just that an event has been reported. Mr. Chavez. Mr. Chavez. Ms. Callahan is absolutely right. No single source of information ever provides us with a complete picture. Oftentimes we use multiple sources--or, all the time we use multiple sources of information to corroborate information that we are getting in. So it is all part of the big picture. In order to get the big picture, again, in this environment, we look to multiple sources that are out there, not a single source, to corroborate that information that is being produced. Mr. Long. How does that affect people trying to I guess put a different spin or take advantage of---- Mr. Chavez. There is always that--yes, there is always that deception. Mr. Long. That was kind of my question. Mr. Chavez. If it doesn't match up with the preponderance of information coming in that is counter to the information we are receiving, then we can pretty much write off that. Plus we are not investigating that information, we are turning that over to the appropriate law enforcement or Government agency to look at what is happening again and is it really happening. Mr. Long. Okay. I have no time to yield back, but if I did, I would. Mr. Meehan. Well, thank you, Mr. Long. Thank you for your questions. I am going to exercise the prerogative to ask a couple of follow-up questions and certainly would make that opportunity available to anybody who would like to as well or not. Ms. Callahan, you spent some time talking about the circumstances in Michigan and about some protections. I know you haven't stated it today I spent time going through your written testimony and other sorts of things. I know you suggested that this is an anomalous circumstance. This is being identified as an event that happened, but maybe the statement would be but it wouldn't happen today. You have a moment, tell me how you have cured that kind of a circumstance and how we would not have a repeat where there is an incident that occurs in which the Government begins to be looking for the information that was disseminated, collected, and disseminated in Michigan. Ms. Callahan. Yes, thank you, sir. To clarify slightly, that information was never disseminated, it was never a live report, it does not meet the standards of the privacy impact assessments and would not have actually been done. It was an early example of what could possibly be done. Together with the National Operations Center, we both agreed that we don't care about First Amendment speech, we don't care about the events. Mr. Meehan. Well, you do care. What you are trying to say is that is not what you are inquiring about? Ms. Callahan. We care about the events, not the First Amendment elements. Right, we care about the events. Candidly even in that example, Guantanamo Bay and the transition of any prisoners from Guantanamo Bay is actually not within the Homeland Security mission. So it wouldn't even have met that threshold question. That is the current threshold standard that we implemented since January 2010, making sure it is a Homeland Security mission and an event and a situation. So for those two that is kind of a threshold point. We then would not--as I said, no element of First Amendment protected speech is collected, disseminated, or analyzed. We also make sure that--as I said, I review the media monitor reports when I receive them to make sure that they continue to be compliant, that we are only reporting on the what and not the who. So I think all of these multiple levels are an example of why that Standish, Michigan, to give an example, is an anomaly. It is obsolete, and it only is in the handbook that was done, that is 2 years old, and was quickly replaced once we started to work on the pilots and to fine-tune to make sure that we can provide situational awareness and protect privacy. Mr. Meehan. Let me go back then to prospectively where we may be looking at other kinds of events, as you say the who, not the what. Now I know there were attempts to look at things like the Olympics, there was an effort to track information that may be related to that. I can foresee a number of other events, conventions, are you going to be monitoring activity around conventions? Ms. Callahan. Again, I turn it over to Mr. Chavez, but we do monitor National security special events to make sure. For example, we monitored the Super Bowl. But again it is not about the who, but the what. How are the roads moving, how are the processes, are there any suspicious activities? Mr. Meehan. You are not calling in the plays for Bill Belichick, are you? Ms. Callahan. I abstain on which--who I was supporting in the Super Bowl, but it is the what, it is the event. Mr. Chavez. Holistically we are monitoring the whole Homeland Security enterprise, not just the events. We are looking for the same, again, keywords criteria that would indicate any type of action---- Mr. Meehan. You keep saying keywords. What I am trying to get to is who begins the process of identifying what should be analyzed. I guess the what, not the who, but who is it that is saying to go after the what. I don't know where this has begun. Mr. Chavez. Right. It is not the National Operations Center. Again the National Operations Center is the messenger. Mr. Meehan. Who is giving the direction? I want your analysts to look into X. Where does that come from? Mr. Chavez. That again does not come from the National Operations Center. Mr. Meehan. I know it doesn't. Ms. Callahan. So if I can just step back for a second, sir. The National Operations Center is to provide situational awareness for the entire Homeland Security enterprise. The way that we implemented the Social Media Initiative was to provide these keywords that you can use on publicly commercially available software that you can basically refine, no see individual Tweets, but see what is trending and what is happening and if there are elements. The keywords, as I said, are disclosed in my privacy impact assessment. Mr. Meehan. But when your analysts start work in the morning, do they just pick up a keyword book and start going out looking for---- Ms. Callahan. No, it is programmed in all the time, is what I was going to say. It is programmed in all the time. We don't modify the keywords, disaster, flood, tornado, train wreck, derailment, those sorts of things. Mr. Meehan. You keep talking to me about incidents that are disasters, and I get that. We are going to put that aside. Part of the mission here was to monitor activities that may be--we are Homeland Security, we are worried about the potential that there could be someone acting in some capacity that would threaten our homeland and cause harm to the American citizens. I get that, too. We are also worried about the fine line in which people may be talking about things they don't like about their Government, it is legitimate protest. So where are there activities that are taking place that it could be a collaboration of individuals from outside the country that are meeting at a convention all over the world. Does somebody say, hey, let's watch what is happening there. I need to know where this process begins, who's telling people to track the what? Mr. Chavez. The individual Government agencies we provide, we will call them our customers, are the ones who determine whether or not the data is actionable or not, whether or not to pursue a follow-up, each of those executing their own authorities to do the investigations to collect intelligence in those type things. Often again the reports we provide through the social media monitoring are a supplement to getting the information to these organizations. Mr. Meehan. So it might be a legitimate investigative agency that has the capacity to in their own right but using legitimate investigative tools and protections, they are asking you to get secondary publicly available information that fills a gap or something of some sort? Mr. Chavez. Most definitely. Again once the reports come in we very seldom get the direction from an outside organization to look for specific things because under their own authorities they can drill down farther than the National Operations Center can on information that was provided. Mr. Meehan. Where does the top of the line come from; is this a career professional that makes these decisions or public appointee in the DHS who may be overseeing what is being looked at? Mr. Chavez. Let me take an example of the intelligence field with their skill sets they have in the enterprise. There are individuals, both political appointees and senior officials, that again take a look at the information they have and decide whether or not to take action on to pursue investigations to open up whatever, again under their authorities, they can do to defend the homeland and produce that information in these reports. Ms. Callahan. If I could summarize, sir. The Situational Awareness Initiative we have been talking about is essentially breaking news, here is what is happening. To your point, if indeed someone receiving a report of breaking news and they have the underlying authority to investigate it, then they go off on their own track and the operations nor does the Privacy Office know they are doing it separate and apart from we are going to do audits and reviews of social media when the management directive is final. So they are breaking news and then other there are other authorities in the Department and also throughout the Federal Government. Mr. Meehan. Final question. Breaking news, the Attorney General just decides he is going to try Guantanamo detainee in New York City. There is a lot of news about that now. Is it possible that you would be contacted by somebody who said follow what is happening, report to us what the reaction is to that? Mr. Chavez. In the history of the time I have been at the National Operations Center, no, sir, that has not happened. Mr. Meehan. What would be your protection against that kind of request? How to you tell a political appointee who is high up in the administration that is not appropriate for us to monitor? Mr. Chavez. It is not only appropriate, it is not under our authority. It is illegal to do that. Mr. Meehan. Well, that is a good answer to any kind of a political appointee. At this point I have gone well over my time. Mr. Thompson. Mr. Thompson. Yes, I do. Ms. Callahan, you talked about taking 9 months to put this program together. Ms. Callahan. Yes, sir. Mr. Thompson. Did you vet the program with any outside stakeholders or was it strictly an internal process? Ms. Callahan. Actually, sir, with regard to the situational awareness I discussed it in my quarterly meeting with advocates that takes place, I believe after the initiative launched but before it became a program, so during the three pilot phrases. In addition, one of my staff testified in front of my FACA committee, the Data Privacy and Integrity Advisory Committee early in the process. In fact in December I had hoped to have one of Mr. Chavez's colleagues testify in front of the Data Privacy and Integrity Advisory Committee, but unfortunately--he was there, he was prepared to testify about this very issue because of the importance of the issue but we ran out of time. But yes, we have discussed this publicly and gotten advice on it. Mr. Thompson. Well, I am concerned that given what I am picking up that there are a lot of people who have interest in privacy and this whole area that has not been included in the discussion. What I would like for to you do is provide us with those organizations or individuals who you have collaborated with over that 9 months to develop this program. Ms. Callahan. To be clear, sir, I did not discuss this outside the Department until it was launched as a pilot under the Haiti earthquake, but then I did discuss it, as I said, in several advocate meetings, that I have quarterly advocate meetings with advocates and we did discuss it publicly in the FACA committee. But we are happy to provide you that information. Yes, sir. Mr. Thompson. Whoever the advocate, whoever attended, how broad that attendance is, all that, just please get it to us. Ms. Callahan. Absolutely. Mr. Thompson. The other concern I have is taken off of from what the Chairman was talking about, is the notion of identifying political and journalistic activities that reflect adversely on the agency or the Federal Government. Ms. Chavez, it is your testimony that you don't do this? Mr. Chavez. Indeed, we don't do that. What we do do again is if there are long lines at the airport, at the screening centers, those types of things, those would come up to us, and we would pass it on to the appropriate DHS component for action again through corroboration, is this really happening, what is happening and what we need to do to fix that. But identifying individuals again or an individual that is making that would be irrelevant to us. There is something happening, go check it out. Mr. Thompson. Well, okay. I will go back to the General Dynamics contract again. Obviously some of us are troubled by it. Why would you ask them to look at the Drudge Report or New York Times or L.A. Times? Mr. Chavez. We don't focus again on any one media source. There are many that are out there. It all goes back to the information that they are providing, not the provider of that information. Mr. Thompson. So they are the only source of--so in other words, they have this expertise that they can look at the blogs and read the newspapers better than the Department if that is what you want to do? Mr. Chavez. Well, you have to look at it also. We are not in here currently watching television or looking at the media reports that are coming in. We all have a vested interest in this Homeland Security. So what we are providing is a service where we are looking at individual action or actions that could be happening around the United States and elsewhere that again we see and push that information out to the Federal Government and our State and local partners, the entire homeland security enterprise, to let them know that something is happening. They may already see it and be acting on it, in which case we would receive information from those agencies on here is what is currently going on with this also. Mr. Thompson. Ms. Callahan, to your knowledge are there any other branches of the Federal Government who are doing similar kind of programs? Ms. Callahan. I don't have a comprehensive knowledge of this, but I do know that National Operations Center has a unique statutory responsibility to provide situational awareness to the Federal Government. So I am not aware that anyone else is doing that given the NOC's authorities. Mr. Thompson. FBI, DOD, nobody to your knowledge? Ms. Callahan. I believe they are operating within their own authorities consistent with what I discussed with the Chairman. Mr. Thompson. I just asked you. Ms. Callahan. I don't know, sir, sorry. Mr. Thompson. So you don't know--you designed the program without any review of whether or not another agency is doing it? Ms. Callahan. As I said, sir, I believe the NOC's statutory authority is unique. Mr. Thompson. No, no, no, just answer the question. Ms. Callahan. I do not have any other knowledge. Mr. Thompson. You said it took 9 months to put the program together, and I just want to know as part of your due diligence did you check and see whether or not another agency within the Federal Government was doing something just like this. I would assume that the FBI would be doing something like this, I would assume that DOD would be doing something like this, just given their mission. If you say you don't know, I don't think that is the right answer from a due diligence standpoint. Ms. Callahan. I can check with my staff, and maybe Mr. Chavez is aware of what other people are doing in this. We are trying to be very transparent about what we are doing and perhaps the other departments have not necessarily taken that tack. Mr. Chavez. I am not aware of anyone else that is doing the social media monitoring at again the unclassified level. The intelligence community with their skill craft may, but no, I don't. Mr. Thompson. I yield back, Mr. Chairman. Mr. Meehan. Thank you, Mr. Thompson. It appears to me as we have been going through this issue I have got the very difficult recognition that as I chastise my children about spending significant time on Facebook, they are now going to be saying to me, well, dad, it can be a career. At this point let me turn it over to the gentleman from Minnesota for a few follow-up questions. Mr. Cravaack. Thank you, Mr. Chairman. Does DHS use any other contractors to monitor to the best of your knowledge? Mr. Chavez. Right now, no, we don't, sir. Mr. Cravaack. Is there any plans to? Mr. Chavez. Right now we have got all we need with, again, the services being provided. Mr. Cravaack. Just kind of dovetailing what the Ranking Member was saying, one of the things I read is that you want to capture public reaction to major Government proposals. You are monitoring positive or negative reports on FEMA, CIA, ICE. Mr. Thompson. Would the gentleman yield? Mr. Cravaack. Yes, sir, I will yield. Mr. Thompson. I asked you a question about the General Dynamics contract. You told me there was an RFP out right now. That was your answer to me on social monitoring. You look back to the gentleman, you said it wasn't sole source, it was open. That was your answer to me then. Mr. Chavez. It is a firm fixed contract, not sole source. Mr. Thompson. But you said there is an RFP out right now. Mr. Chavez. RFP. I am sorry, I am not familiar. Mr. Thompson. Request for proposal. We talked about the General Dynamics contract. We asked about it. Your conversation talked about whether or not it was sole sourced or it was open, and you indicated that we are going out looking for another contract right now. Mr. Chavez. No. If I did, sir, I apologize, sir. I stand corrected. It is a firm, again, fixed contract and again not sole sourced. Mr. Thompson. How long is this fixed for? Mr. Chavez. Actually, I don't have that information. I don't have the fixed. Mr. Thompson. Thank you. Thank you for yielding. Mr. Cravaack. Yes, sir. I will reclaim my time. Going back, it was mentioned some of the--you know, FEMA, CIA, CBP, ICE-- these are organizations that are outside of DHS. Now if somebody--if there was an organization outside of DHS requesting this information, would you provide it to them? Mr. Chavez. We don't normally get, again, requests for information. We just take it from the media and push it to the organizations that are out there because they have their own information authorities, gathering authorities and those types of things that they use. So they use our media monitoring reports to supplement what they have already got. Mr. Cravaack. The thing I am really having problems with I guess is the Government proposals, reactions to Government proposals and then feeding that information to different organizations within the Government. You are using a public sector source that may be used for private individual attainment of information for other reasons then that would benefit the public. That is what I am concerned with and how would you go about preventing this from occurring? Mr. Chavez. That specific purpose of the media monitoring I have never encountered. Again, the only kind of evaluation, if you will, of the departments or other Government agencies is just, as I said, there is a service that is being provided, that again there is a hold-up at the airports, as Ms. Callahan said also, but to go out and solicit that information or to collect it. I have not seen this in my tenure at DHS. Mr. Cravaack. Well, now this hearing has occurred, I think you have a higher profile. But my question would be what are the checks and balances in there from ensuring that this is not used for private initiatives? Mr. Chavez. Again, with the information that comes in it is reviewed by a number of individuals throughout the National Operations Center and Operations Coordination and Planning to ensure that the compliance with the PIIs out there and the distribution lists also are pre-approved so that it doesn't get out to sectors, again so we don't compromise proprietary information and those types of things. Mr. Cravaack. Can you give me an example of what kind of information you have been gleaning thus far in regard to Government proposals? Mr. Chavez. I am not aware of any information we have gathered on Government proposals. Mr. Cravaack. Okay. All right. Say I am ICE or say I am those who would be interested in the gun walking down in Mexico and I want to get information in regards to what is the public reaction to this. Say I am an organization, I am just trying to use broad general terms so we don't have to get into another area, a realm. How would you go about that request? Mr. Chavez. Again, that would not be a request that was appropriate or a function of the National Operations Center. Given our, again, authority under the Homeland Security Act for a situational awareness or operating picture, we are not a pollster, we don't again solicit for opinion. We are putting down actual incidents that are happening at any one time. Mr. Cravaack. Okay, I am the Attorney General, I am asking for this information. Mr. Chavez. Okay. Mr. Cravaack. What are you going to tell him? Mr. Chavez. Again, that is not the appropriate mission or within our authorities for the National Operations Center to gather that information. There are other organizations within in the Federal Government who do have the authority to gather that information more thoroughly, again, than we do. Mr. Cravaack. Mr. Chavez, you are telling the Attorney General that I cannot acquire this information, this is a vital need for American security. Mr. Chavez. It would be outside the skill set of what we actually do. We are not the source for that. So I would not be afraid to tell the Attorney General that we are not the organization that does that. Mr. Cravaack. You are an Air Force officer, aren't you? Mr. Chavez. Yes, sir. Mr. Cravaack. Hooray. With that, I yield back. Mr. Meehan. Mr. Long, do you have follow-up questions? Mr. Long. Well, you know that, sure. Thank you, and to my friend from Minnesota Mr. Chavez may be better known after this hearing but I just checked Twitter and we are not yet a trending topic on there. The longer I sit here I think the more confused I get. The title of what we are supposed to be talking about today is ``Department of Homeland Security Monitoring Social Networking and Media: Enhancing Intelligence Gathering and Ensuring Privacy.'' We are all kind of in agreement on that? Ms. Callahan. Yes, sir. Mr. Chavez. Yes, sir. Mr. Long. Of course we had a classified briefing yesterday and I came away from that thinking what we were trying to do is protect the homeland and watch for events that may affect the security of citizens here in this country. But yet today I keep hearing about breaking news, which Twitter is pretty good for that. So either one of you can answer this if you want. I appreciate you being here today, but what is your charge? I have a disconnect with the breaking news, trying to follow that up. I mean that is history, breaking news has happened. Prevention and protecting the citizens while ensuring their Constitutional rights is a whole different can of worms. So both of you can answer this: What is your charge? What do you visualize your job and the agency job as far as--am I completely off-base that we are supposed to be trying to protect the homeland while ensuring privacy, as they say? Ms. Callahan. You are correct that that is our mission. That is the point of this hearing. I think the disconnect perhaps is that, as I pointed out in my oral testimony, there are three uses of social media. We have been focusing on the second, which is the situational awareness, which is the breaking news element, to know there is an event that could impact the homeland. The third element, which is the operational use you spoke to the under secretary yesterday, about when we would do it consistent with our authorities for law enforcement or other investigatory purposes using social media if there was a predicate, some sort of reasonable suspicion or elements for that. That is kind of the third element on the prevention side. Mr. Chavez and I have been speaking a lot about the situational awareness, which is the second of the three uses that the Department uses social media for. Mr. Chavez. The National Operations Center again is part of the bigger picture out there. We are one of the tools that again the agencies use to again monitor the homeland and those types of things, again that they do under their own authority. So to put the intelligence piece in there with the Nation Operations Center, we are providing through the National Operations Center another piece of information that again those individuals who can use intelligence under their authorities or enhance their operations as with ICE, as was brought up in the other departments or components of DHS, that is what they do with it. We provides one piece of the information, the total information that is out there that they can use and that source again is the media portion of that. Also, because the intelligence and all those other communities that are out there looking at it, again may not see something happening because they are executing a mission that is out there. What we do again is provide that service that something is happening, turn it over to the appropriate Government agency, to include State---- Mr. Long. That is all after the fact, correct? Mr. Chavez. Indeed. There are other organizations that again that are looking at the prevention piece and looking, doing assessments to determine what threats may be coming at us. We are dealing with the here and now. Mr. Long. I am sure there is something I am missing because I can't believe that we would go to all this effort to look into breaking news. Ms. Callahan, another question for you to wrap up. I am going to try this, can you describe the Department's on-going privacy and civil liberty protection oversight process that is in place now to ensure citizens' Constitutional rights are not violated during the execution of the Department's social media monitoring? Ms. Callahan. Yes, sir. Thank you very much for that question. The Congress has been very generous with my oversight authority, and as I have described earlier, we have been doing mandated, required privacy compliance reviews that we publish on the website. To be clear about what is going on with regard, we are doing these reviews every 6 months, in fact February we started again. We are also authorized to do investigations into individual types of use of social media, as I said kind of that third category in an operational sense. We are finalizing a management directive to make sure that everyone complies with privacy protections across the board with regard to investigations and operational use. In there we are requiring audits every 3 months, as well as specific investigation by my office. So we take this issue very seriously and we try to be as diverse and robust in working with the Office of Civil Rights and Civil Liberties in all three categories in which the Department uses it--communication, situational awareness, and operational use. Mr. Long. During those 3-month and 6-month checkups are you finding things that are of concern to you about people's Constitutional rights? Ms. Callahan. We have not. No, with regard to the situational awareness, the second use that the Department uses, the National Operations Center has been very consistent with the public-private protections that we have identified. Mr. Long. Thank you all for being here today and I yield back. Ms. Callahan. Thank you, sir. Mr. Meehan. Thank you, Mr. Long. I want to express my appreciation to the panel for being with us here today. I think we have begun an important discussion, and there is appreciation of the difficult charge that you share with some of the other agencies here who not only protect our homeland but American interests around the world. I am grateful for your service in that capacity. I think all Americans appreciate the huge challenge of fulfilling the responsibility of having the imagination to appreciate what could happen and connecting the dots real-time, all of things we are asking you to do to prevent another issue of terrorism here on American soil, but we also appreciate that you are one of the real protectors of the individual's rights to privacy, what it means to be an American, and this is a delicate and difficult area that I think we have to continue to explore. I am asking you to continue to use your diligence and most assuredly to assure that there isn't inappropriate interference politically, especially inappropriate political interference in which somebody takes your mission and uses it for another purpose, and that every effort be made to safeguard the rights, the privacy rights of individuals. We may have another opportunity to follow up on things we did not get into because, as I say, I appreciate what you are doing at the DHS level. I am cognizant in my own State of Pennsylvania of the historic context in which State-run but related fusion centers and otherwise have conducted these same kind of inquiries, and that information found its way not just to Governmental entities but to private contractors, private businesses who were using it for their own purpose. So this whole question of, you know, who is collecting what information, what are we doing to safeguard it and what are we doing to assure that at some appropriate time it disappears. There is a lot here. I know it is part of your job. I thank you for the work that you are doing, but we are going to continue to ask these tough questions because it is vital to the protection of the most fundamental thing we have, which is our Constitutional rights as American citizens to privacy and to be free from inappropriate Governmental intrusion. Thank for your work and thank you for your testimony. The Members of the committee may have additional questions for witnesses. If they do, we will ask you to respond in writing. I know there are some things that were asked that you go back and do your best to be responsive to the questions that the committee did ask. The hearing record will remain open for 10 days. So without objection the committee stands adjourned. [Whereupon, at 11:35 a.m., the subcommittee was adjourned.] A P P E N D I X ---------- Letter Submitted to Chairman Patrick Meehan From Mary Ellen Callahan and Richard Chavez March 1, 2012. The Honorable Patrick Meehan, Chairman, U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Counterterrorism and Intelligence, Washington, DC 20515. Dear Representative Meehan: Thank you for the opportunity to testify before you and your subcommittee on February 16, 2012 about Department of Homeland Security (DHS) review of publicly available social media websites. DHS remains fully committed to providing the subcommittee with all of the information it requires on this topic. We ask that our letter, along with the enclosed attachment, be incorporated into the official record for the February 16, 2012 hearing before your subcommittee. At the hearing, questions were raised regarding contract language that appeared to permit the use of social media websites to track First Amendment-protected speech by collecting information on public dissent or disagreement on Government activities. As detailed in our written testimony DHS does not now, and has never collected or used, social media reporting for such purposes. We will modify the existing contract and all DHS documentation to clarify and align guidance language with the Privacy Impact Assessments (PIAs). To further illustrate this point, this week Director Chavez issued the enclosed memorandum to the National Operations Center (Attachment 1) stating that the Office of Operations Coordination and Planning and the Privacy Office are currently reviewing the 2011 Media Monitoring Analyst's Desktop Binder to ensure alignment with the PIAs. Although the media monitoring efforts are in accordance with the privacy guidelines outlined in the PIAs it is important that all documentation relating to media monitoring be similarly aligned. The Privacy Office will complete its fourth Privacy Compliance Review in mid-March 2012 and this alignment will be part of the review. Director Chavez's memorandum to the National Operations Center also reiterates the privacy guidelines that have been in place since the start of this program: Collection of personally identifiable information from social media websites is permitted only in specific circumstances and is limited to the categories described in our written testimony and in the January 6, 2011 PIA. The information that is collected may be retained only in the report that is generated, and is not cross-referenced or tracked in any other way. We appreciate the subcommittee's interest in our efforts in this regard. We would be happy to meet with subcommittee staff or Members individually the week of March 5, 2012 to provide you with any further information or discussion of these issues you may require. NOC media monitoring reports are also available for your review. Sincerely, Mary Ellen Callahan, Chief Privacy Officer, U.S. Department of Homeland Security, Richard Chavez, Director, Office of Operations Coordination and Planning, U.S. Department of Homeland Security. MEMORANDUM FOR: National Operations Center FROM: Richard Chavez, Director, Office of Operations Coordination and Planning SUBJECT: Media Monitoring Guidance Reminder As part of the fourth Privacy Compliance Review that is scheduled to occur in mid-March 2012, the National Operations Center (NOC), in coordination with the DHS Privacy Office, will review the 2011 Media Monitoring Analyst's Desktop Binder, any associated standard operating procedures, and the existing media monitoring support services contract to ensure conformity with all Publicly Available Social Media Monitoring and Situational Awareness Initiative Privacy Impact Assessments (PIAs) and to ensure the scope and purpose of the NOC Media Monitoring Capability (MMC) are accurately reflected and recommend clarifications and updates to the language if necessary. In the interim, the NOC will continue to use the PIAs as the authoritative source to guide the program. The NOC MMC should continue to limit the review, use, collection, and dissemination of non-personally identifiable information and the seven narrow categories of personally identifiable information to information that affect the operations of the Department of Homeland Security (memorialized in the January 2011 PIA). No First Amendment- protected speech relating to dissent or disagreement with the Department and its activities should be reviewed, used, collected, or disseminated. The MMC can review, use, collect, and disseminate information intended to provide guidance on DHS programs and initiatives that inform the general public. An example would be the Transportation Security Administration's PreCheck program. The MMC can also review, use, and collect information related to oversight reports about DHS components such as DHS Inspector General Reports or Government Accountability Office Reports. The MMC cannot review, use, collect, or disseminate information related to individuals' positive or negative opinions or reports on the Department, but for the narrow circumstance where the MMC reviews and informs the relevant Component of an operational issue adversely impacting the Component. Examples of these issues include security violations at airports or ports of entry. In this narrow operational circumstance, no personally identifiable information can be collected, stored, or disseminated to the relevant Component. ______ Questions Submitted by Ranking Member Bennie G. Thompson for Mary Ellen Callahan and Richard Chavez Question 1. Please explain the circumstances under which DHS might collect information on journalists. Answer. DHS does not collect information on journalists (other than recording the name of the author when saving a particular article so as to ensure proper attribution, or including a individual journalist's name that is part of that journalist's social media internet link). As described below, DHS collects information on events. In support of its statutory mission to provide situational awareness and a common operating picture for the Federal Government and for other homeland security enterprise partners, the National Operations Center (NOC) within the DHS Office of Operations Coordination and Planning reviews publicly available traditional and social media postings to gain an enhanced awareness of rapidly emerging or evolving incidents and events concerning homeland security, emergency management, and National health. If a journalist posts a report on a publicly available social media site about a breaking news incident relevant to homeland security, the NOC's media monitoring analysts may use the information posted to build a report that is distributed to DHS leadership and other homeland security partners including Federal interagency, State, local, Tribal, and territorial government entities. The NOC may include reporters' names and affiliations in the reports as described below. The NOC includes a particular journalist's name with recorded media in accordance with the guidelines set forth in the Publicly Available Social Media Monitoring and Situational Awareness Initiative Privacy Impact Assessment (PIA) (dated June 22, 2010) and its January 6, 2011 update. As stated in the PIA update and the February 1, 2011 System of Records Notice, personally identifiable information on seven narrow categories of individuals may be collected when it lends credibility to the report or facilitates coordination with Federal, State, local, Tribal, territorial, foreign, or international government partners. In such instances DHS will only collect the following limited pieces of information from journalists: Names, titles, and organizational affiliation of anchors, newscasters, or on-scene reporters who are known or identified as reporters in their post or article or who use traditional and/or social media in real time to keep their audience situationally aware and informed. Frequently with breaking news on social media, the individual journalist's name or names of other key individuals will be part of the story's internet link. In order to disseminate these publically available links, the NOC must include the personally identifiable information contained in the link address. Removing the PII from the link address will render the link, and thus the story, unusable. All National Operations Center (NOC) social media initiative PIAs are available to the public at www.dhs.gov/privacy. Question 2. Please explain how DHS came to report on information related to citizens' opinions on moving Guantanamo Bay Detainees to Standish, MI, and whether this is an appropriate use of social media by DHS. Answer. The DHS Office of Operations Coordination and Planning (OPS) never reported on potential plans to move detainees to Standish, MI. During the development of the Media Monitoring capability, OPS developed a Social Networking/Media Capability Analyst Handbook also known as a Desktop Binder. The purpose of the Desktop Binder was to serve as a desk reference for media monitoring analysts. In an early draft version of the Desktop Binder, an example was created based on actual information related to citizens' opinions regarding moving Guantanamo Bay Detainees to Standish, MI. This document was part of a ``weekly report example,'' not an actual report in a very early, and obsolete version of the Desktop Binder. This version of the Desktop Binder was created while OPS was still in the midst of developing its media monitoring processes, and before the media monitoring reports were ever distributed. This example has been removed from the Desktop Binder, and this information was never released through the situational awareness reporting channels. To maintain a capability focused on reviewing incident and event information, OPS trains analysts to review information in compliance with the parameters set forth in the Privacy Impact Assessments (PIAs). During the report production process, reports are reviewed multiple times to ensure PII is not inadvertently included. Reports are reviewed at least twice, once by the analyst generating the report and then again by the analyst's counterpart. Each report is then checked by the media monitoring lead prior to dissemination. All reports distributed during each 24-hour period are checked by a media monitoring capability senior reviewer, and the media monitoring capability's quality control leads conduct weekly reviews of all distributed reports to ensure any inadvertent PII inclusions are identified and corrective action is taken. As described previously, the Privacy Office conducts Privacy Compliance Reviews every 6 months to ensure OPS is complying with the PIAs. Question 3. Please explain the terms of the contract and the rationale for contracting with General Dynamics to conduct social media situational awareness reporting. Answer. To fulfill the National Operations Center's (NOC) statutory responsibility to provide situational awareness, the NOC examines publicly available traditional and social media, compares it with many other sources of information, and includes it where appropriate into NOC reports. At the time the contract was awarded, the Office of Operations Coordination & Planning (OPS) did not have available Federal employees to complete this task. OPS procured contracted services to fulfill this function. Additionally, OPS has not ascertained if this service will be required on a permanent basis, making it more economical to utilize contractor services in the interim. OPS is continuing to assess current performance to determine the most efficient and effective mechanism for performing the media monitoring function in light of operational needs and budgetary direction. The Media Monitoring contract was competed for and awarded to General Dynamics Advanced Information Systems (GDAIS) on May 27, 2010, under the GSA Mission Oriented Business Integrated Services (MOBIS) contract vehicle. The Period of Performance (POP) for this contract is July 1, 2010 through December 31, 2014, and the total contract value is $11.3 million. The contract includes tasks to monitor open sources for incidents relating to potential and emerging threats and hazards to the homeland. In accordance with the Federal Acquisition Regulation, the award to GDAIS was based on the Evaluation Team's review and assessment of the qualifications of multiple vendors that submitted a quotation in response to the Request for Quotation (RFQ). The Evaluation Team made a recommendation to the Source Selection Authority (SSA) that GDAIS offered the best value quote for fulfilling the Department's social media situational awareness reporting requirement. After a thorough review of the Evaluator's assessment which included an evaluation of the strengths, weaknesses, and risks of the quotes received, the SSA determined that GDAIS would provide superior performance of the Government's objectives, and was the most technically competent contractor that had submitted a quotation. Question 4. Please describe the way that DHS solicited feedback from the privacy community regarding DHS' use of social media. Answer. In addition to the five Privacy Impact Assessments (dealing with the three pilots, the program, and the update to include seven narrow categories of personally identifiable information) and three Privacy Compliance Reviews, the DHS Privacy Office has engaged in dialogue with the privacy community regarding DHS' use of social media in a number of ways. These include several quarterly advocate outreach meetings (Privacy Information for Advocates), Chief Privacy Officer Testimony before the Data Privacy and Integrity Advisory Committee (DPIAC) in public meetings, DHS Privacy Office staff testimony before the DPIAC, and inter-agency and intra-agency discussions. The Privacy Impact Assessments and other documentation are available at www.dhs.gov/privacy. The Chief Privacy Officer invites privacy organizations and privacy advocates (who have requested to participate) to quarterly informational meetings during which the Chief Privacy Officer provides updates on DHS privacy issues. To date, 24 distinct organizations have requested invitations. The quarterly Privacy Information for Advocates meetings allow the Chief Privacy Officer and privacy advocates to discuss privacy issues that impact DHS and individuals. In 2010 and 2011, Chief Privacy Officer Mary Ellen Callahan spoke in depth about DHS's use of social media and the situational awareness initiative at four of the quarterly meetings. Additionally, the March 2012 Privacy Information for Advocates meeting provided an opportunity to update advocates on the social media situational awareness initiative at length, including discussing examples, as well as clarifying misconceptions. The DPIAC was established by the Secretary of Homeland Security as a discretionary committee under the Federal Advisory Committee Act to provide advice to the Secretary and to the DHS Chief Privacy Officer, upon request, on policy, programmatic, operational, administrative, and technological issues within DHS that relate to personally identifiable information, as well as data integrity and other privacy-related matters. Committee members are individuals from the private sector, academia, non-governmental organizations, and State government who have expertise in privacy, security, and emerging technologies. The DPIAC holds several public meetings throughout the year to receive updates from the DHS Privacy Office, learn more about how DHS components have implemented privacy, and gain information on specific DHS programs that have privacy implications. In 2010 and 2011, Chief Privacy Officer Mary Ellen Callahan provided public testimony on the development, progression, and modification of the social media situational awareness initiative at four of these meetings. Additionally, DHS Privacy Office staff publicly testified at DPIAC meetings on the social media situational awareness initiative. In September 2010, one of the Associate Directors for Privacy Compliance testified on the development of Privacy Compliance Reviews generally, and how public Privacy Compliance Reviews focusing on the social media situational awareness initiative function. In March 2011, another Associate Director for Privacy Compliance publicly testified on the social media situational awareness initiative, focusing on the addition of the seven narrow categories of personally identifiable information that would be collected. Finally, in December 2011, staff from the National Operations Center (NOC), which runs the social media situational awareness initiative, was scheduled to publicly testify on the social media situational awareness initiative and the associated Privacy Compliance Reviews. However, the testimony was postponed due to extended deliberations by the DPIAC on pending recommendations from the committee to the Department. Information about DPIAC, and the publicly available meetings, can be found at www.dhs.gov/privacy. Throughout 2010-2012, the DHS Privacy Office also provided information about DHS' use of social media, whether for public communications and outreach, situational awareness, or operational use, to interagency privacy groups, including the Innovation and Emerging Technologies Subcommittee of the CIO Council Privacy Committee. These briefings were provided as examples of ways to embed privacy protections in Government use of social media generally, including developing Privacy Impact Assessments and System of Records Notices as necessary. In addition to providing information via interagency fora, in 2011, the DHS Privacy Office hosted an intra-agency privacy compliance meeting where staff from the National Operations Center updated DHS Component Privacy Officers on the social media situational awareness initiative and corresponding Privacy Compliance Reviews, as well as fielded questions from the Component Privacy Officers about the initiative. Question 5. Please explain who/what determines what the NOC looks at and searches for on social media sites. Answer. The Senior Watch Officer (SWO) within the National Operations Center (NOC), as guided by the Privacy Impact Assessments (PIAs), determines the NOC's search parameters. There are 13 broad Items of Interest (IOI) that focus analysts' efforts when searching publicly available social media sites. The IOI categories provide a general framework for the NOC's searches. The following are the categories: (1) terrorism (includes media reports on the activities of terrorist organizations in the United States and abroad); (2) weather/natural disasters, emergency management (includes all- hazard reports, such as reports on hurricanes, tornadoes, flooding, and earthquakes); (3) fire (includes reports on the ignition, spread, response, and containment of wildfires, industrial fires, and explosions); (4) trafficking/border control issues (includes reports on the trafficking of narcotics, people, weapons, and goods into and out of the United States); (5) immigration (includes reports on apprehension of illegal immigrants and border control events or incidents); (6) HAZMAT (includes reports on chemical, biological, and radiological hazardous materials discharges); (7) nuclear (includes reports terrorist attempts to obtain nuclear materials, security incidents at nuclear facilities, and potential threats to nuclear facilities); (8) transportation security (includes reports on security breaches and incidents or threats involving rail, air, road, and water transit); (9) infrastructure (includes reports on attacks or failures in transportation networks, telecommunications networks, energy grids, utilities, domestic food and agriculture, Government facilities, and financial infrastructure); (10) National and international security (includes reports relating to threats against American citizens, political figures, military installations, embassies, and consulates); (11) National and international health concerns (includes reports on outbreaks of infectious diseases and recalls of food or other items dangerous to public health); (12) public safety (includes reports on public safety incidents, building lockdowns, bomb threats, mass shootings, and building evacuations); and (13) cybersecurity (includes reports on cybersecurity matters such as cyber attacks, computer viruses, and the use of technology for terrorism purposes). There were originally 14 IOI categories. IOI 14 was ``Reports on DHS, Components, and other Federal agencies: Includes both positive and negative reports on FEMA, CIS, CBP, ICE, etc. as well as organizations outside of DHS.'' This IOI has been subsequently eliminated in order to prevent misunderstandings about the intended use of this information. Analysts conduct searches using publicly available streaming media and news-based search engines. These tools allow analysts to search by keyword or a collection of terms. The keywords and terms that inform searching are pre-loaded onto the publicly available search tools. The core social media websites utilized by the NOC are listed in Appendix A of the January 6, 2011 Privacy Impact Assessment that is available to the public via www.dhs.gov/privacy. The core search terms, or keywords, utilized by the NOC are listed in Appendix B of the same publicly available document.