[House Hearing, 112 Congress]
[From the U.S. Government Publishing Office]



 
   LESSONS FROM FORT HOOD: IMPROVING OUR ABILITY TO CONNECT THE DOTS 

=======================================================================

                                HEARING

                               before the

                       SUBCOMMITTEE ON OVERSIGHT,
                     INVESTIGATIONS, AND MANAGEMENT

                                 of the

                     COMMITTEE ON HOMELAND SECURITY
                        HOUSE OF REPRESENTATIVES

                      ONE HUNDRED TWELFTH CONGRESS

                             SECOND SESSION

                               __________

                           SEPTEMBER 14, 2012

                               __________

                           Serial No. 112-118

                               __________

       Printed for the use of the Committee on Homeland Security
                                     

               [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]

      Available via the World Wide Web: http://www.gpo.gov/fdsys/

                               __________

                        U.S. GOVERNMENT PRINTING OFFICE 

81-127 PDF                       WASHINGTON : 2013 

For sale by the Superintendent of Documents, U.S. Government Printing 
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; 
DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, 
Washington, DC 20402-0001 



                     COMMITTEE ON HOMELAND SECURITY

                   Peter T. King, New York, Chairman
Lamar Smith, Texas                   Bennie G. Thompson, Mississippi
Daniel E. Lungren, California        Loretta Sanchez, California
Mike Rogers, Alabama                 Sheila Jackson Lee, Texas
Michael T. McCaul, Texas             Henry Cuellar, Texas
Gus M. Bilirakis, Florida            Yvette D. Clarke, New York
Paul C. Broun, Georgia               Laura Richardson, California
Candice S. Miller, Michigan          Danny K. Davis, Illinois
Tim Walberg, Michigan                Brian Higgins, New York
Chip Cravaack, Minnesota             Cedric L. Richmond, Louisiana
Joe Walsh, Illinois                  Hansen Clarke, Michigan
Patrick Meehan, Pennsylvania         William R. Keating, Massachusetts
Ben Quayle, Arizona                  Kathleen C. Hochul, New York
Scott Rigell, Virginia               Janice Hahn, California
Billy Long, Missouri                 Ron Barber, Arizona
Jeff Duncan, South Carolina
Tom Marino, Pennsylvania
Blake Farenthold, Texas
Robert L. Turner, New York
            Michael J. Russell, Staff Director/Chief Counsel
               Kerry Ann Watkins, Senior Policy Director
                    Michael S. Twinchek, Chief Clerk
                I. Lanier Avant, Minority Staff Director
                                 ------                                

       SUBCOMMITTEE ON OVERSIGHT, INVESTIGATIONS, AND MANAGEMENT

                   Michael T. McCaul, Texas, Chairman
Gus M. Bilirakis, Florida            William R. Keating, Massachusetts
Billy Long, Missouri, Vice Chair     Yvette D. Clarke, New York
Jeff Duncan, South Carolina          Danny K. Davis, Illinois
Tom Marino, Pennsylvania             Bennie G. Thompson, Mississippi 
Peter T. King, New York (Ex              (Ex Officio)
    Officio)
                  Dr. R. Nick Palarino, Staff Director
                   Diana Bergwin, Subcommittee Clerk
              Tamla Scott, Minority Subcommittee Director



                            C O N T E N T S

                              ----------                              
                                                                   Page

                               STATEMENTS

The Honorable Michael T. McCaul, a Representative in Congress 
  From the State of Texas, and Chairman, Subcommittee on 
  Oversight, Investigations, and Management:
  Oral Statement.................................................     1
  Prepared Statement.............................................     3
The Honorable William R. Keating, a Representative in Congress 
  From the State of Massachusetts, and Ranking Member, 
  Subcommittee on Oversight, Investigations, and Management:
  Oral Statement.................................................     7
  Prepared Statement.............................................     8
The Honorable Bennie G. Thompson, a Representative in Congress 
  From the State of Mississippi, and Ranking Member, Committee on 
  Homeland Security:
  Prepared Statement.............................................     9

                               WITNESSES
                                Panel I

Mr. Douglas E. Winter, Deputy Chair, The William H. Webster 
  Commission:
  Oral Statement.................................................    10
  Prepared Statement.............................................    12
Ms. Ishrad Manji, Director, Moral Courage Project, New York 
  University:
  Oral Statement.................................................    20
  Prepared Statement.............................................    22
Mr. Michael E. Leiter, Former Director of the National 
  Counterterrorism Center:
  Oral Statement.................................................    23
  Prepared Statement.............................................    25

                                Panel II

Mr. Kshemendra Paul, Program Manager, Information Sharing 
  Environment, Office of the Director of National Intelligence:
  Oral Statement.................................................    42
  Prepared Statement.............................................    43

                             FOR THE RECORD

The Honorable Michael T. McCaul, a Representative in Congress 
  From the State of Texas, and Chairman, Subcommittee on 
  Oversight, Investigations, and Management:
  Statement of William H. Webster, Chair, The William H. Webster 
    Commission...................................................    28


   LESSONS FROM FORT HOOD: IMPROVING OUR ABILITY TO CONNECT THE DOTS

                              ----------                              


                       Friday, September 14, 2012

             U.S. House of Representatives,
    Subcommittee on Oversight, Investigations, and 
                                        Management,
                            Committee on Homeland Security,
                                                    Washington, DC.
    The subcommittee met, pursuant to call, at 9:12 a.m., in 
Room 311, Cannon House Office Building, Hon. Michael T. McCaul 
[Chairman of the subcommittee] presiding.
    Present: Representatives McCaul, Duncan, Keating, and 
Davis.
    Mr. McCaul. The committee will come to order.
    The purpose of this hearing is to examine information 
sharing across relevant intelligence and law enforcement 
agencies, specifically as it pertains to the report issued by 
the Webster Commission, which focused on the Fort Hood attack. 
As I mentioned, Mr. Winter, let me applaud you for your great 
work, and Mr. Webster, on that report.
    I now recognize myself for an opening statement.
    Before we begin today's hearing, we should pay tribute to 
our brave diplomats who serve our Nation abroad. Unfortunately, 
one of our ambassadors, Chris Stevens, and three of his 
colleagues were killed on Tuesday, the 11th anniversary of the 
9/11 attacks on the United States. These events and others 
should remind every American that we are a Nation under siege 
and must remain vigilant, doing all that we can to uncover and 
take action against terrorist plots, whether the danger 
confronts us here in the United States or abroad.
    In June 2009, FBI Director Robert Mueller acknowledged the 
immense challenge facing the Bureau, stating, ``It is not 
sufficient for us as an organization to respond to a terrorist 
attack after it has occurred. It is important for us as an 
organization to develop the intelligence to anticipate a 
terrorist attack, developing intelligence, developing facts. In 
the past, we looked at collecting facts for the courtroom. We 
now have to think of ourselves as gathering facts and painting 
a picture of a particular threat, understanding the risk and 
moving to reduce that risk.'' I couldn't agree more with the 
Director's statement.
    Then on November 5, 2009, a gunman walked into the Soldier 
Readiness Center at Fort Hood, Texas, and shouted the classic 
jihadist term ``Allahu Akbar'' and opened fire on unarmed 
soldiers and civilians. He killed 13 and wounded 42 others. 
This was the most horrific terrorist attack on U.S. soil since 
9/11.
    Today, we will examine the facts of the Fort Hood case as 
we know them to better understand how these facts that seem so 
obviously alarming now were so missed by seasoned professionals 
and to understand how the FBI and intelligence community as a 
whole can benefit from the lessons learned from this tragedy at 
Fort Hood.
    The suspect in the Fort Hood shooting is Major Nidal Hasan, 
a commissioned officer in the United States Army, who openly 
communicated with the Muslim cleric and No. 2 terrorist Anwar 
al-Awlaki. Hasan characterized himself as a soldier of Allah 
and who was assigned the task of counseling our soldiers coming 
home from the battlefield.
    Let's step back in time and examine the facts.
    On May 31, 2009, Hasan sent one of several emails to al-
Awlaki, one of the ones that I found most disturbing. The email 
read in part, ``I heard a speaker defending suicide bombings as 
permissible. He contends that suicide is permissible in certain 
cases. He defines suicide as one who purposely takes his own 
life but insists that the important issue is your intention. 
Then he compares this to a soldier who sneaks into an enemy 
camp during dinner and detonates his suicide vest to prevent an 
attack that is known to be planned the following day. The 
suicide bomber's intention is to kill numerous soldiers to 
prevent the attack to save his fellow people the following day. 
He is successful. His intention was to save his people, his 
fellow soldiers, and the strategy was to sacrifice his life. 
This logic seems to make sense to me,'' says Mr. Hasan.
    This email telegraphs almost precisely what happened that 
fateful day. This email was in the hands of the FBI before the 
attack.
    In another email to Anwar al-Awlaki, Hasan asked, ``Please 
keep me in your Rolodex in case you find me useful, and please 
feel free to call me collect.''
    So in December, 2008, the FBI's San Diego field office 
intercepted two emails from Hasan and al-Awlaki and identified 
the email as a product of interest. Over the course of the next 
several months, the San Diego field office and the Washington 
field office would exchange emails about how aggressively to 
investigate the Hasan lead.
    In June 2009, Washington sent the following email to San 
Diego: ``Given the context of his military and medical research 
and the content of his, to date, unanswered email messages from 
al-Awlaki, WFO does not currently assess Hasan to be involved 
in terrorist activities.''
    The FBI agent in San Diego described Washington's inquiry 
into Major Hasan as ``slim.''
    The case was dropped until November 5, when the media began 
circulating reports of the massacre. At that time, the San 
Diego agents knew exactly who the perpetrator was, saying, 
``You know who that is. That's our boy.''
    Years before the FBI knew of Nidal Hasan, the Army major 
was being noticed by his superiors and colleagues at Walter 
Reed Army Medical Center, where he was a resident in the 
psychiatric program being trained to care for soldiers coming 
home from war. Two fellow officers described Hasan as a, 
``ticking time bomb.''
    During his medical residency and post-residency fellowship, 
Hasan demonstrated evidence of violent extremism. On several 
occasions he presented sympathetic views towards a radical 
Islam view and wrote papers defending Osama bin Laden, actions 
that enraged his classmates and professors. Yet no action was 
taken. Instead, Major Hasan was rewarded for his work and 
promoted.
    His officer evaluation reports state, ``Among the better 
disaster and psychiatry fellows to have completed the master of 
public health at the Uniformed Services University. He has a 
keen interest in Islamic culture and faith and has shown 
capacity to contribute to our psychological understanding of 
Islamic nationalism and how it may relate to events of National 
security and Army interest in the Middle East and Asia.''
    These officer evaluation reports were inaccurate. These 
were all flags, none of which were acted upon. So many flags in 
this case. These reports did not present the facts about 
Hasan's character. In reality, Hasan was barely a competent 
psychiatrist, whose radical views alarmed his colleagues; and 
the irony to me is this is the very man who was to counsel our 
soldiers coming back from the field of battle.
    In the Hasan case, both the FBI and DOD had important 
pieces to the puzzle that, if put together, maybe just could 
have possibly saved the lives of 12 soldiers and one civilian.
    I want to personally express my sympathy to those impacted 
by the terrorist attack at Fort Hood. We should treat those who 
died and who were wounded as brave Americans and award each of 
them a Purple Heart medal.
    When I spoke with the victims' families at the Fort Hood 
memorial service, I saw first-hand the outrage and loss they 
felt, and I wanted to help them find answers. But I want these 
answers to serve as a catalyst to effect change and improve our 
intelligence community as a whole so we can stop these attacks 
before they occur. We have had great successes. We do look 
forward to hearing from the witnesses' testimonies to 
understand what went wrong in this case and how we can prevent 
such a tragedy from occurring in the future.
    With that, I now recognize the Ranking Member, the 
gentleman from Massachusetts, Mr. Keating.
    [The statement of Chairman McCaul follows:]
                Statement of Chairman Michael T. McCaul
                           September 14, 2012
    Before we begin today's hearing we should pay tribute to our brave 
diplomats who serve our Nation abroad. Unfortunately one of 
Ambassadors, Christopher Stevens, and three of his colleagues were 
killed on Wednesday, the eleventh anniversary of the 9/11 attacks on 
the United States. These events, and others, should remind every 
American that we are a Nation under siege and must remain vigilant 
doing all we can to uncover and take action against terrorists, whether 
the danger confronts us here in the United States or abroad.
    In June 2009, Federal Bureau of Investigation (FBI) Director Robert 
Mueller acknowledged the immense challenges facing the Bureau stating:

``The stages we are going through now I call mind-set changes. By mind-
set I mean understanding that it is not sufficient for us as an 
organization to respond to a terrorist attack after it has occurred. It 
is important for us as an organization to develop the intelligence to 
anticipate a terrorist attack. Developing intelligence is developing 
facts. In the past we looked at collecting facts for the courtroom. We 
now have to think of ourselves as gathering facts and painting a 
picture of a particular threat, understanding the risk and moving to 
reduce that risk.''

    On November 5, 2009, a gunman walked into the Soldier Readiness 
Center at Fort Hood, Texas, shouted ``Allah Akbar,'' and opened fire on 
unarmed personnel. He killed 13 and wounded 42 others. This was the 
most horrific terrorist attack on U.S. soil since 9/11.
    Today we will examine the facts of the Fort Hood case as we now 
know them--to better understand how these facts that seem so obviously 
alarming now were missed by seasoned professionals--and to understand 
how the FBI and intelligence community as a whole can benefit from the 
lessons learned from the tragedy at Fort Hood.
    The suspect in the Fort Hood shootings is Major Nidal Malik Hasan, 
a commissioned officer in the United States Army, who openly 
communicated with the terrorist Anwar al-Awlaki, who characterized 
himself as a soldier of Allah, and who was assigned the task of 
counseling our soldiers coming home from the battlefield. 

[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]

    Let's step back in time and examine the facts. On May 31, 2009, 
Hasan sent one of several emails to the radicalized Muslim cleric Anwar 
al-Alwaki. The email read:

``I heard a speaker defending suicide bombings as permissible . . . He 
contends that suicide is permissible in certain cases . . . He defines 
suicide as one who purposely takes his own life but insists that the 
important issue is your intention . . .  Then he compares this to a 
soldier who sneaks into an enemy camp during dinner and detonates his 
suicide vest to prevent an attack that is known to be planned the 
following day. The suicide bomber's intention is to kill numerous 
soldiers to prevent the attack to save his fellow people the following 
day. He is successful. His intention was to save his people/fellow 
soldiers and the strategy was to sacrifice his life. The logic seems to 
make sense to me . . . ''

[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]

    In another email to al-Awlaki, Hasan asks to ``Please keep me in 
your Rolodex in case you find me useful and feel free to call me 
collect.''
    In December 2008, the FBI San Diego Field Office intercepted two 
emails from Hasan to al-Awlaki and identified the email as ``Product of 
Interest.'' The lead was sent to the Washington field office because 
Hasan resided in the area. Over the course of the next several months 
the San Diego field office and the Washington field office would 
exchange emails about how aggressively to investigate the Hasan lead. 
In June 2009, the Washington field office sent the following email to 
the San Diego field office:

``Due to [redacted] HASAN'S email contact with AULAQI, HASAN was not 
contacted, nor were his command officials. Given the context of his 
military/medical research and the content of his, to date unanswered 
[from AULAQI] email messages, WFO does not currently assess HASAN to be 
involved in terrorist activities.''

[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]

    The FBI agent in San Diego described Washington's inquiry into 
Hasan ``slim''. The case was dropped until on November 5 when the media 
began circulating reports of the massacre--the San Diego agents knew 
immediately saying, ``you know who that is, that's our boy.''
    Years before the FBI knew of Nidal Hasan the Army Major was being 
noticed by his superiors and colleagues at Walter Reed Army Medical 
Center where he was a resident in the psychiatric program being trained 
to care for soldiers coming home from war. Two fellow officers 
described Hasan as a ``ticking time bomb''. During his medical 
residency and post-residency fellowship Hasan demonstrated evidence of 
violent extremism. On several occasions, he presented sympathetic views 
towards radical Islam and wrote papers defending Osama bin Laden--
actions that enraged his classmates and professors. Yet no action was 
taken.
    Instead, Major Hasan was rewarded for his work and promoted. His 
officer evaluation reports state:

`` . . . among the better disaster and psychiatry fellows to have 
completed the Master of Public Health at the Uniformed Services 
University''
`` . . . keen interest in Islamic culture and faith and has shown 
capacity to contribute to our psychological understanding of Islamic 
nationalism and how it may relate to event of National security and 
Army interest in the Middle East and Asia.''

[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]

    These officer evaluation reports were inaccurate. They did not 
present the facts about Hasan's character. In reality, Hasan was barely 
a competent psychiatrist whose radical views alarmed his colleagues.
    In the Hasan case, both the FBI and DOD had important pieces to the 
puzzle that if put together could have developed the picture more 
accurately and in my opinion, would've prompted a more thorough 
inquiry. Of course, we don't know if that could've changed the events 
at Fort Hood but we should strive to improve, for the victims and their 
families.
    I want to personally express my sympathy to those impacted by the 
terrorist attack at Fort Hood. We should treat those who died and were 
wounded as brave Americans and award each a Purple Heart Medal.
    When I spoke with the victims' families at the Fort Hood Memorial 
service, I saw first-hand the outrage and loss they felt and I want to 
help them find answers. But I want the answers to serve as a catalyst 
to affect change and improve our intelligence community as a whole so 
we can stop these attacks before they occur.
    We look forward to hearing the witness testimonies to better 
understand what went wrong and how we can prevent such tragedies in the 
future.

    Mr. Keating. Thank you, Mr. Chairman.
    As we all pause to think of the families of the four 
Americans who were lost just this week in Libya and keep their 
families in our prayers and thoughts, it is significant that we 
come here today in dedication to find every piece of 
information we can find that will determine how better to keep 
the Americans that serve us so well safe as they try to keep us 
safe. So with that, Mr. Chairman, I thank you for holding 
today's hearing.
    Three years ago, on November 5, 2009, the Nation was 
shocked by the mass shooting that occurred at the Army 
Deployment Center located at Fort Hood, Texas. During the 
shooting, 13 lives were lost, 43 individuals were wounded, and 
the lives of so many others were forever changed.
    It later became evident that the warning signs existed well 
before the tragedy and should have, at a minimum, been further 
investigated. Both the FBI and the Department of Defense had 
knowledge of Major Hasan's potential as a threat to homeland 
security.
    The actions leading up to the massacre by Major Nidal Malik 
Hasan, the sole suspect in the murders, should have 
unequivocally sparked a greater concern on the part of 
officials. Yet dots were not connected, information was not 
shared, and the lack of formal policies and protocols led to a 
colossal breakdown in communication.
    In December, 2009, at the direction of the FBI director, 
the Webster Commission was created to examine the events that 
occurred before and after the shootings. The Final Report of 
the William H. Webster Commission on the FBI, Counterterrorism 
Intelligence, and the Events at Fort Hood Texas, which 
represent the work of the Commission, was released in July 
2012.
    The crucial recommendation mirrored in both the Webster 
Commission's report and the 9/11 Commission's report focused on 
the importance of information sharing to our Nation's security 
and the need to do away with a culture of territorialism that 
existed between the various levels of Federal, State, and local 
authorities. As a former Massachusetts district attorney 
myself, I was once at the bottom rung of the information-
sharing ladder and understand the consequences of inadequate 
lines of communication. For this reason, my first legislative 
measure signed into law was an amendment to the intelligence 
authorization that encouraged Federal authorities to utilize 
fusion centers and enlist all of the intelligence capabilities, 
including that of law enforcement, to secure our homeland.
    Since then, I have been following the progress of the 
recommendations set forth in the 9/11 Commission, and now the 
Webster Commission, in regard to intelligence sharing and am 
pleased that the administration has indicated that effective 
information sharing and access throughout the Government is a 
top priority.
    This all being said, I am interested in hearing from both 
our witness panels today on their thoughts and their own 
recommendations.
    With that, I yield back the balance of my time.
    [The statement of Ranking Member Keating follows:]
              Statement of Ranking Member William Keating
                           September 14, 2012
    Three years ago, on November 5, 2009, the Nation was shocked by the 
mass shooting that occurred at the Army deployment center located at 
Ft. Hood, Texas. During the shooting, 13 lives were lost, 43 
individuals were wounded, and the lives of so many others were forever 
changed. It later became evident that warning signs existed well before 
this tragedy and should have, at a minimum, been further investigated.
    Both the FBI and the DOD had knowledge of Major Hasan's potential 
as a threat to homeland security. The actions leading up to the 
massacre by Major Nidal Malik Hasan--the sole suspect in the murders--
should have unequivocally sparked greater concern.
    Yet, dots were not connected, information was not shared, and the 
lack of formal policies and protocols led to a colossal breakdown in 
communication.
    In December 2009, at the direction of the FBI Director, the Webster 
Commission was created to examine the events occurring before and after 
the shootings.
    The Final Report of the William H. Webster Commission on the FBI, 
Counterterrorism Intelligence, and the Events at Fort Hood, Texas which 
represents the work of the Commission was released in July 2012.
    The crucial recommendation mirrored in both the Webster 
Commission's report and the 9/11 Commission's report focused on the 
importance of information-sharing to our Nation's security and need to 
do away with the culture of territorialism that existed between the 
various levels of Federal, State, and local authorities.
    As a former Massachusetts District Attorney, I was once on the 
bottom rung of the information-sharing ladder and understand the 
consequences of inadequate lines of communication.
    For this reason, my first legislative measure that was signed into 
law was an amendment to the Intelligence Authorization that encouraged 
Federal authorities to utilize fusion centers and enlist all of the 
intelligence capabilities--including that of law enforcement--to secure 
our homeland.
    Since then I have been following the progress of the 
recommendations set forth by the 9/11 Commission, and now the Webster 
Commission, in regard to intelligence-sharing and am pleased that the 
administration has indicated that effective information sharing and 
access throughout the Government is a top priority. This all being 
said, I am interested to hear from both witness panels today on their 
thoughts and their own recommendations.

    Mr. McCaul. I thank the Ranking Member. Members are 
reminded that additional statements may be submitted for the 
record.
    [The statement of Ranking Member Thompson follows:]
             Statement of Ranking Member Bennie G. Thompson
                           September 14, 2012
    Three days ago, we marked the eleventh anniversary of the September 
11, 2001 terrorist attacks.
    That tragedy left us with a number of valuable lessons. As the 9/11 
Commission found, Government agencies charged with collecting 
intelligence and law enforcement data did not ``connect the dots'' that 
could have revealed that attacks of the proportion launched on 9/11 
were under way.
    Since that time, the importance of horizontal information sharing 
among Federal agencies and vertical information sharing from Federal 
agencies to State, local, and Tribal entities has been weaved into our 
homeland security efforts.
    However, on November 5, 2009, the tragic events that occurred at 
the Army base located in Fort Hood, Texas, once again revealed that the 
failure to connect the dots can lead to disastrous results.
    On that day, 13 people lost their lives and 43 individuals were 
wounded at the hand of a single gunman who was on the separate radars 
of the FBI and the DOD. Unfortunately, that information was not 
coordinated.
    In some of the reports and the rhetoric following the Ft. Hood 
shooting, there were claims that the failure to connect the dots was 
based on ``political correctness.''
    I strongly disagree. The information-sharing challenges that we 
faced then and continue to face now are more grounded in protecting 
turf than being timid.
    To conclude that the source of the missteps was based on the 
religion of the perpetrator takes us backwards and takes our eyes off 
the ball.
    Instead, our focus should be on ensuring that communication 
systems, information technology, training, and protocols are improved 
Government-wide.
    And most importantly, removing stovepipes.
    The Fort Hood shooting occurred nearly 3 years ago. Fortunately, 
since that time, information sharing has improved and we have the death 
of Osama bin Laden, the conviction of the New York City subway bomber, 
and other success stories as proof of this joint effort.

    Mr. McCaul. We are pleased to have a very distinguished 
panel of witnesses here today, and I would like to introduce 
them.
    First, we have Mr. Douglas Winter. He is Deputy Chair and 
Editor-in-Chief of the William Webster Commission. He is a 
counsel and former partner in the law firm of Bryan Cave, where 
he is the head of the firm's electronic discovery unit. He 
served as law clerk to Judge William Webster on the U.S. Court 
of Appeals for the 8th Circuit. Also served as a captain in the 
U.S. Army and is a graduate of the U.S. Army Judge Advocate 
General school.
    Second, we have Ms. Irshad Manji. She is the Director of 
Moral Courage Project at New York University's Wagner Research 
Center for Leadership in Action. As Director, she equips 
students to become global citizens by speaking truth to power 
in their communities. As a reformist Muslim, Ms. Manji has 
written multiple books on the trends that are changing the 
world of Islam.
    It is so great to have you here today. Thank you for being 
here.
    Finally, I would say my colleague and friend from 
Department of Justice, Mr. Leiter. Michael Leiter is the Senior 
Counsel to the Chief Executive Officer of Palantir Technologies 
and the former Director of the National Counterterrorism 
Center.
    It is great to have you here today as well, Mr. Leiter.
    The Chairman now recognizes Mr. Winter for his testimony.

 STATEMENT OF DOUGLAS E. WINTER, DEPUTY CHAIR, THE WILLIAM H. 
                       WEBSTER COMMISSION

    Mr. Winter. Thank you.
    Good morning, Chairman McCaul, Ranking Member Keating, and 
Members of the subcommittee. I am joined today by Adrian Steel, 
the commissioner who was responsible as governing authorities 
liaison with the Department of Justice and the FBI, and also 
staff member George Murphy.
    It is impossible in the time allotted to describe the 
lengthy and detailed investigation that is set forth in the 
final report. Director Mueller's terms of reference were 
extraordinary in scope.
    The factual background, as you know, is intricate and 
complex. There is no simple calculus of cause and effect here. 
The mistakes and shortcomings we identified were the products 
of cascading sets of circumstances that range from a lack of 
policy guidance, training, and adequate technology to a 
misleading set of Army personnel records and an error in 
interpreting an abbreviation.
    My written statement sets forth an overview of our analysis 
and our findings. Today, I will devote a review of the 
recommendations to help underscore the lessons of Fort Hood.
    The FBI has concurred in the principles underlying each of 
our 18 recommendations and in almost every instance has 
implemented or is implementing a responsive measure. We 
recommended that the FBI adopt seven policies to formalize FBI 
practices that were not followed in the Hasan matter or that 
would help assure information sharing in similar circumstances. 
The recommended policies concerned the counterterrorism 
command-and-control hierarchy at the FBI, restrictions on 
counterterrorism leads assigned to Joint Terrorism Task Force 
officers, and clearinghouse procedures for counterterrorism 
investigations and assessments of law enforcement personnel and 
other Government personnel.
    When Judge Webster was sworn in as director of the FBI, 
there were three analysts at the FBI. Today, the FBI relies on 
a cadre of more than 3,000 intelligence analysts with 
established career paths. We applauded the FBI's success in 
embedding analysts, creating fusion cells, and other analysis-
driven initiatives. We recommended further integration of 
analysts into FBI operational groups.
    A crucial lesson of Fort Hood is the ever-changing 
diversity and complexity of communications technologies and the 
impact of the ever-growing amount of electronic information on 
the FBI's ability to identify and combat terrorism. These 
change the ways in which the FBI will in the future need to 
acquire, store, review, manage, disseminate, and act on 
intelligence.
    We recommended that the FBI expedite and seek expanded 
funding for enterprise data management programs, with an 
emphasis on aggregating its primary investigative databases, 
collecting and storing data as a separate service from 
applications, and developing shared storage solutions across 
the U.S. intelligence community.
    We recommended that the FBI seek funding for acquisition of 
new hardware for its DWS-EDMS database system, which lacks the 
infrastructure to fulfill system demands and also lacks a live 
disaster recovery backup.
    Only two people, an FBI agent and an analyst, were charged 
with reviewing information in the al-Awlaki investigation. The 
crushing volume of information they confronted, the limited 
technology, and other factors forced those two people to review 
the 18 Hasan-al-Awlaki communications in a day-to-day context 
with 20,000 other items of electronic information they 
reviewed.
    We recommended that the FBI evaluate and acquire 
information technology that was automated and advanced that 
would assist personnel in reviewing and managing data.
    We also recommended that the FBI implement managed 
information review protocols for these types of large data 
collections. That would allow for case-specific review of the 
type that occurred in the al-Awlaki investigation, as well as 
strategic review by different review teams.
    An important reminder of Fort Hood is that Congress, the 
Justice Department, and the FBI must assure that the FBI's 
governing authorities strike an appropriate balance between 
protecting civil liberties and privacy interests and detecting 
and deterring threats like those posed by Major Hasan. We 
recommended, among other things, that the FBI should increase 
internal compliance reviews and audits and that its existing 
governing authorities should remain in effect.
    Training, we learned, is crucial, particularly in the task 
force context, where you have a diverse number of Federal, 
State, local, and Tribal agencies. The DCIS agent who conducted 
the Hasan assessment in the Washington field office did not 
even know that the DWS-EDMS database existed, leading him, and 
in turn his FBI supervisor, to believe that there were only two 
communications between Hasan and al-Awlaki. We recommended that 
the FBI require task force officers to complete database and 
computer training before they join the Joint Terrorism Task 
Force.
    In closing, I want to note that the final report focuses on 
what went wrong. But throughout our investigation we were 
witness to all that was right about the FBI. We saw patriotism, 
professionalism, dedication, and long hours of work in a 
context of constant threats and limited resources. Agents, 
analysts, and task force officers are confronted with decisions 
every day whose consequences may be life or death. These 
personnel need better policy guidance to know what is expected 
of them, better technology, resources, and training to navigate 
the ever-expanding flow of intelligence information. They also 
deserve our gratitude.
    Thank you.
    [The prepared statement of Mr. Winter follows:]
                Prepared Statement of Douglas E. Winter
                           September 14, 2012
    I first want to express, on behalf of Judge William H. Webster and 
my fellow Commissioners, our profound sympathy for the victims of the 
Fort Hood tragedy, their loved ones, families, and friends. Their loss 
is unimaginable. It is also America's loss.
    I also want to acknowledge the honor and privilege of working with 
Judge Webster. He is one of America's most distinguished public 
servants--a former U.S. Navy officer, U.S. Attorney, U.S. District 
Judge, U.S. Circuit Judge, Director of the Federal Bureau of 
Investigation, and Director of the Central Intelligence Agency. He is 
also an inspiration, a mentor, and a friend.
    In January 2010, Judge Webster asked me to join his independent 
investigation of the Federal Bureau of Investigation. At that time, we 
discussed the extraordinary scope of the Terms of Reference set out by 
FBI Director Robert S. Mueller III. We did not know then that our 
assignment would evolve and expand. We knew only the essential factual 
background, which I now describe.
                               background
    On December 17, 2008, U.S. Army Major Nidal Malik Hasan visited the 
website of radical Islamic cleric Anwar Nasser al-Awlaki (sometimes 
spelled ``Awlaki''). He sent a message to al-Awlaki. He sent another on 
January 1, 2009. The FBI Joint Terrorism Task Force (JTTF) in the San 
Diego Field Office, which led the FBI investigation of al-Awlaki, 
acquired the messages. An FBI Special Agent (SD-Agent) and Analyst (SD-
Analyst) reviewed the messages. Concerned by the content of the first 
message and implications that the sender was a U.S. military officer, 
SD-Agent set leads to the JTTF in the Washington, DC, Field Office 
(WFO) and to FBI Headquarters on January 7, 2009.
    Fifty days later, a WFO Supervisory Special Agent (WFO-SSA) read 
the lead and assigned it to a Defense Criminal Investigative Service 
(DCIS) Special Agent who served on the JTTF (WFO-TFO). Ninety days 
later, on May 27, 2009, WFO-TFO conducted an investigative assessment 
of Hasan, who worked as a psychiatrist at Walter Reed Army Medical 
Center. WFO-TFO queried certain FBI and Department of Defense (DoD) 
databases and reviewed the limited set of Army personnel records 
available to him. In the mean time, San Diego had acquired and reviewed 
12 additional messages and emails from Hasan to al-Awlaki and two 
emails from al-Awlaki to Hasan. San Diego did not connect these 
communications to the lead.
    WFO-TFO did not know about or review these additional 
communications. WFO's assessment concluded that Hasan was not 
``involved in terrorist activities.'' San Diego advised WFO that its 
assessment was ``slim.'' Neither JTTF took further action. Hasan sent 
his last message to al-Awlaki on June 16, 2009. al-Awlaki did not 
respond.
    In July 2009, the Army assigned Hasan to Fort Hood, Texas. In 
October 2009, the Army notified Hasan that he would be deployed to 
Afghanistan. On November 5, 2009, Hasan entered the Fort Hood 
deployment center carrying two handguns. He shouted ``Allahu Akbar!''--
Arabic for ``God is great!''--and opened fire, killing 12 U.S. soldiers 
and one DoD employee, and injuring as many as 43 others.
    This bare-bones summation veils an intricate and complex factual 
background.
    The FBI conducted an internal investigation of how San Diego and 
WFO handled the Hasan-al-Awlaki communications. The FBI took specific 
steps to improve its ability to deter and detect threats like Hasan. 
Director Mueller determined that an additional, independent 
investigation of the FBI's actions was appropriate.
                 the webster commission's investigation
    Judge Webster's written statement provides the subcommittee with an 
overview of our lengthy and detailed investigation, our findings, and 
our recommendations as set forth in the Final Report of the William H. 
Webster Commission on the Federal Bureau of Investigation, 
Counterterrorism Intelligence, and the Events at Fort Hood, Texas on 
November 5, 2009.
    To fulfill Director Mueller's Terms of Reference, the Commission 
conducted inquiries into violent radicalization; the FBI's Joint 
Terrorism Task Force Program; the FBI's governing authorities; the 
FBI's information technology and document review infrastructure; the 
FBI's investigation of al-Awlaki; the FBI's assessment of Hasan; and 
the FBI's pre- and post-Fort Hood data holdings on Hasan.
    Our analysis of the FBI's actions addressed knowledge and 
information sharing; ownership of the Hasan lead; WFO's assessment of 
Hasan; the FBI's information technology and review workflow; and 
training. Director Mueller also asked us to assess the FBI's remedial 
actions in the aftermath of the shootings, and to analyze whether the 
FBI's governing authorities strike an appropriate balance between 
protecting individual privacy rights and civil liberties and detecting 
and deterring threats such as that posed by Hasan. The investigation 
did not probe the shootings, which are the subject of a U.S. Army-led 
inquiry and military criminal proceeding against Hasan.
    Director Mueller promised, and the FBI provided, full cooperation 
and support. No request was denied. No question went unanswered. The 
Commission had personal contact with more than 100 FBI Agents, 
Analysts, and Task Force Officers assigned to investigate al-Qaeda and 
other organizations linked with violent Islamic extremism. We spent 
many days in interviews, briefings, operational meetings, and 
conversations with personnel from at least 7 different Field Offices/
JTTFs, FBI Headquarters, and the National Counterterrorism Center. We 
conducted a lengthy ``no limits'' field visit with a WFO 
counterterrorism unit of our choice that was not involved in the Hasan 
matter. We had direct access to the FBI's computer systems and to all 
personnel involved in the events at issue.
    The Commission found shortcomings in FBI policy guidance, 
technology, information review protocols, and training. I summarize our 
analysis here. I caution the reader, however, against reaching 
conclusions based solely on this summary, which lacks the factual and 
analytical context of the Final Report. I also emphasize that we could 
not base our analysis on what we learned about Hasan or al-Awlaki on 
and after November 5, 2009. Our review was based on information known 
or available to the FBI at the time the actions were taken in the 
context of the FBI's then-existing policies and procedures, operational 
capabilities, and technological environment. Finally, we recognized our 
limited ability to predict what might have happened if different 
policies or procedures were in effect or personnel had made different 
decisions or taken different actions. We chose not to speculate. We 
examined instead the reasonableness of what did happen, in order to 
identify and recommend, when appropriate, better and corrective 
policies and procedures for the future.
                        analysis of fbi actions
I. Knowledge and Information Sharing
            A. The FBI's Understanding of Violent Radicalization
    The FBI's understanding of violent radicalization is consistent 
with the contemporary views of the psychiatric community. Before the 
events at issue, the FBI had provided training on its radicalization 
model to Agents, Analysts, and Task Force Officers, including all 
personnel involved in the Hasan assessment. That training has expanded 
in the aftermath of the Fort Hood shootings.
            B. The FBI's Knowledge About Anwar al-Awlaki
    In early 2009, the FBI knew Anwar al-Awlaki as an English-speaking, 
anti-American, radical Islamic cleric and the subject of an FBI 
counterterrorism investigation. San Diego believed that al-Awlaki was 
developing ambitions beyond radicalization. WFO viewed him as merely 
inspirational. The FBI's full understanding of al-Awlaki's operational 
ambitions developed only after the attempted bombing of Northwest 
Airlines Flight 253 on Christmas day 2009.
            C. The FBI's Knowledge About Nidal Malik Hasan
    Our searches of the FBI's data holdings confirmed that San Diego's 
lead contained all of the FBI's actionable knowledge about Hasan as of 
January 7, 2009. The FBI's knowledge grew, or should have grown, over 
the next 5 months as San Diego acquired and reviewed 14 further 
messages from Hasan to al-Awlaki and two emails from al-Awlaki to 
Hasan. That knowledge also grew, or should have grown, as WFO conducted 
its assessment of Hasan on May 27, 2009, and San Diego reviewed that 
assessment in June 2009.
            D. Information Sharing
    The FBI did not share the Hasan information with any DoD employees 
other than DCIS and NCIS personnel assigned to the San Diego and WFO 
JTTFs.
    Notice of the Hasan Assessment.--Prior to Fort Hood, FBI Field 
Offices informally shared information with DoD on a regular basis about 
counterterrorism assessments or investigations of members of the U.S. 
military, DoD civilian personnel, and others with known access to DoD 
facilities. However, there was no formal procedure or requirement to 
advise DoD about these assessments and investigations.
    When San Diego set the lead to WFO, the FBI did not know whether 
the sender of the messages was a U.S. Army officer. In conducting its 
assessment of Hasan, WFO identified Hasan as a military officer but 
decided not to contact his chain of command. WFO's assessment concluded 
that Hasan was not involved in terrorist activities. Under these 
circumstances, the failure of either JTTF to advise DoD about the 
assessment was not unreasonable. However, the absence of a formal 
policy on notifying DoD of assessments or investigations of its 
personnel was unreasonable.
    The Decision Not to Issue an Intelligence Information Report.--FBI 
policy is to share intelligence when dissemination has the potential to 
protect the United States against threats to National security or 
improve the effectiveness of law enforcement. San Diego decided not to 
issue an Intelligence Information Report (IIR) to DoD and other U.S. 
intelligence community members because of a mistake in interpreting 
Hasan's Defense Employee Interactive Data System (DEIDS) record. A DCIS 
Agent assigned to the San Diego JTTF (SD-TFO3) read the DEIDS 
abbreviation ``Comm Officer'' to mean ``Communications Officer'' rather 
than ``Commissioned Officer.'' SD-Agent, who led the al-Awlaki 
investigation, thus believed that, if the sender was in fact Hasan, he 
might have access to IIRs. To protect the al-Awlaki investigation, he 
decided not to issue an IIR.
    SD-TFO3's misinterpretation of the DEIDS record was understandable; 
others had made the same mistake. WFO's response to San Diego corrected 
this mistake and identified Hasan as an Army physician. Given WFO's 
identification of Hasan and its assessment that he was not involved in 
terrorist activities, San Diego had no reason to revisit the question 
of issuing an IIR.
II.Ownership of the Lead
    The FBI's operational actions suffered from a lack of clear 
ownership of the Hasan lead. After setting the lead, San Diego believed 
that WFO was responsible for Hasan. WFO acted as if San Diego were 
responsible. The confusion resulted from the nature of Discretionary 
Action leads, a lack of policy guidance, the differing investigative 
interests of San Diego and WFO, a lack of priority, a misguided sense 
of professional courtesy, undue deference to military TFOs, and an 
inversion of the chain of command.
            A. FBI Policy and Practice
    In 2009, no FBI written policy established ownership of interoffice 
leads. In FBI practice, the receiving office was responsible for taking 
action in response to the lead and determining what, if any, additional 
investigative steps were warranted.
            B. The Leads
    San Diego's primary purpose in conducting the al-Awlaki 
investigation was to gather and, when appropriate, disseminate 
intelligence about him. The ``trip wire'' effect of the investigation 
in identifying other persons of potential interest was, in SD-Agent's 
words, a ``fringe benefit.''
    SD-Agent set a Routine Discretionary Action lead to WFO and an 
Information-Only lead to FBI Headquarters that included Hasan's 
messages. The messages contained no suggestion of imminent violence and 
no overt threat. Because the lead did not demand action within 24 
hours, FBI policy required SD-Agent to set a Routine lead. Because FBI 
practice was to give the receiving office discretion in assessing 
potential threats in its Area of Responsibility, the lead was ``[f]or 
action as deemed appropriate.''
    The decision to set a Routine Discretionary Action lead was 
reasonable under the circumstances and existing policies. The follow-
up, however, was not adequate.
            C. The Response
    San Diego set the lead on January 7, 2009. At that time, there was 
no formal policy guidance on the assignment or resolution of Routine 
leads. The timing of assignments depended on the practice of the 
receiving supervisor.
    At WFO, the receiving Supervisory Special Agent (WFO-SSA) did not 
read and assign the lead until February 25, 2009, nearly 50 days after 
the lead was set.
    No formal FBI policy set a deadline for the completion of work on 
Routine leads. Because file reviews occur on a quarterly basis, 
informal FBI policy required personnel to complete work on Routine 
leads within 90 days of assignment.
    WFO-SSA assigned the lead to a DCIS Agent detailed to the JTTF 
(WFO-TFO). WFO-TFO waited 90 days--until May 27, 2009, the day his work 
on the lead was supposed to be completed--to read it and take action. 
The 90-day delay in even reading the lead, let alone taking action, was 
unreasonable. That delay may have affected the shape, scope, and 
outcome of WFO's assessment of Hasan, which took place in 4 hours on 
that 90th day.
    Five months passed before WFO responded to San Diego's lead. The 
delay pushed Hasan further from the minds of SD-Agent and SD-Analyst, 
and may have contributed to their failure to connect other Hasan 
communications with the lead.
            D. The Impasse
    Although the lead identified a potential threat in the Washington, 
DC, area, WFO-SSA and WFO-TFO treated Hasan as part of San Diego's 
investigation of al-Awlaki. This perspective appears to inform their 
apprehension about interviewing Hasan and conducting a more expansive 
assessment without first checking with San Diego. Yet WFO declined to 
take further action even after San Diego criticized the assessment as 
``slim,'' and instead offered to ``re-assess'' if San Diego, 
``request[ed] any specific action.''
            E. Deference to Military Task Force Officers
    SD-Agent engaged DCIS and NCIS Task Force Officers (TFOs) in San 
Diego in researching Hasan's military status and deciding whether to 
circulate an IIR. Those actions were reasonable and prudent. 
Interagency synergy is a prime reason for the JTTF Program.
    That synergy weakens, however, when TFOs assume sole responsibility 
for investigating members of their own departments or agencies. WFO-
SSA's assignment of the lead to WFO-TFO had practical advantages. As a 
DCIS Agent, WFO-TFO had access to DoD resources and databases that were 
not available to the FBI. He also had an insider's knowledge of DoD 
practices and procedures that could prove vital to an assessment of a 
service member. However, he also brought the subjectivity of an insider 
to the assessment. That subjectivity may have caused undue deference to 
the Army chain of command and undue concern about the potential impact 
of an interview on Hasan's military career, which appear to have driven 
the decision not to interview Hasan or contact his superiors.
            F. An Inverted Chain of Command
    The JTTF synergy also weakens when the FBI looks to TFOs to resolve 
disputes between offices. Here, after SD-Agent reviewed WFO's response 
to the lead, he asked SD-TFO3 to contact WFO-TFO, DCIS Agent to DCIS 
Agent.
    SD-Agent should have called WFO-SSA. If they could not resolve 
matters, SD-Agent should have raised the dispute up the FBI chain of 
command to his supervisor, who could have reviewed the matter and 
contacted WFO-SSA's supervisor. If disagreement continued, the 
supervisors could have turned to FBI Headquarters for resolution. This 
is how the FBI has routinely handled interoffice disputes and 
disagreements, but only as a matter of unofficial policy.
            G. The Lack of Formal Policies
    The lack of formal policy guidance defining ownership of this lead 
and requiring elevation of interoffice disputes caused or contributed 
to a situation in which two JTTFs effectively disowned responsibility 
for the lead--each believing that the other office was responsible. 
That belief affected, in turn, each JTTF's sense of priority when it 
came to the assessment, the search for additional Hasan-al-Awlaki 
communications, and how the conflict between the offices should be 
resolved.
III. The Assessment
    WFO-SSA and WFO-TFO erred in the process they followed to conclude 
that Hasan's communications with al-Awlaki were benign and acceptable. 
They also erred in failing to search the database in which electronic 
communications were stored, if only to determine whether al-Awlaki had 
replied to Hasan's messages. Their assessment of Hasan was belated, 
incomplete, and rushed, primarily because of their workload; the lack 
of formal policy setting deadlines for the assignment and completion of 
Routine counterterrorism assessments; WFO-TFO's lack of knowledge about 
and training on DWS-EDMS; the limited DoD personnel records available 
to WFO-TFO and other DoD TFOs; and the delay in assigning and working 
on the lead, which placed artificial time constraints on the 
assessment.
            A. The Records Check
    WFO-TFO assessed Hasan using the limited Army Electronic Personnel 
File that WFO-TFO had authority to access. Those records praised 
Hasan's research on Islam and the impact of beliefs and culture on 
military service, and showed that he held a security clearance and had 
been promoted to Major weeks earlier. WFO-TFO thus believed--and WFO-
SSA agreed--that the Army encouraged Hasan's research and would approve 
of his communications with al-Awlaki.
    Based on this simple records check, those conclusions may have been 
reasonable. Hasan's two messages solicited Islamic opinions. He made no 
attempt to disguise his identity and used an email address that 
revealed his proper name.
    The Army records available to WFO-TFO did not present a complete or 
accurate picture of Hasan. Indeed, their contents were misleading. WFO-
TFO--and, in turn, the FBI--did not have access to the disturbing 
contents of Hasan's personal files at Walter Reed Army Medical Center 
and the Uniformed Services University of Health Sciences.
    Despite the Army's interest in Hasan's research, his communications 
with an inspirational and potentially operational radicalizer under FBI 
investigation deserved scrutiny beyond a simple records check. 
Regardless of the contents of his Electronic Personnel File, the lead 
warranted a closer look at Hasan.
            B. The Decision Not to Interview Hasan
    The decision not to interview Hasan was flawed. WFO-TFO and WFO-SSA 
believed that an interview could jeopardize the al-Awlaki investigation 
by revealing the FBI's access to Hasan's messages. This explanation is 
not persuasive. FBI Agents talk to subjects and assess threat levels 
every day without explaining the source of their knowledge.
    WFO-TFO and WFO-SSA also concluded, from the records check, that 
Hasan was not ``involved in terrorist activities.'' As a result, they 
believed that an interview and contact with Hasan's chain of command 
might jeopardize his military career, contrary to the FBI's ``least 
intrusive means'' requirement. Under that requirement, an investigative 
technique (for example, a records check or interview) may be used if it 
is the least intrusive feasible means of securing the desired 
information in a manner that provides confidence in the information's 
accuracy.
    The fact that messages to a radical imam appear to be benign 
academic inquiries does not answer the question of whether Hasan was a 
threat. The ``least intrusive means'' requirement did not prohibit 
further inquiry into that question, but would require a careful 
balancing of the competing interests of assessing a potential threat 
and minimizing potential harm to the subject of the assessment.
    Moreover, when San Diego expressed doubts about WFO's assessment, 
the calculus of the least intrusive means requirement should have 
changed. The next-least intrusive means (for example, an interview) 
could have been used to resolve any doubts about the messages and 
provide more confidence in the accuracy of the information supporting 
WFO's conclusion.
            C. The Failure to Search for Additional Messages
    WFO-TFO did not even know that DWS-EDMS, the database in which the 
Hasan-al-Awlaki communications were stored, existed until after the 
Fort Hood shootings. As a result, WFO-TFO searched only databases known 
to him and did not find any of the later messages. After receiving 
WFO's assessment, which stated incorrectly that WFO had searched all 
FBI databases, San Diego did not search DWS-EDMS for additional 
messages acquired during the intervening 5 months.
    The failure to search for additional messages appears to have had 
significant ramifications. That search, if performed on May 27, 2009, 
the date of WFO's assessment, would have returned 12 additional 
communications from Hasan and al-Awlaki's two emails to Hasan. Although 
none of the messages contained a suggestion of imminent violence or an 
overt threat, the additional messages could have undermined the 
assumption that Hasan had contacted al-Awlaki simply to research Islam.
    The failure to search for additional messages resulted primarily 
from the FBI's failure to provide TFOs with training on DWS-EDMS and 
other FBI databases, the search and information management limitations 
of DWS-EDMS, the lack of ownership of the Hasan lead, the lack (at that 
time) of a baseline collection plan, and the absence of the type of 
initiative that Agents, Analysis, and TFOs should be encouraged to 
take, particularly when confronted with dissonant information or an 
interoffice dispute.
            D. Workload and the Lack of Formal Policies
    The nearly 50-day delay in the assignment of the lead and the 90-
day delay in taking action on the lead suggest that WFO-SSA and WFO-TFO 
were overburdened. That underscores the importance of formal policy 
direction that allows personnel to understand, prioritize, and manage 
their workloads.
    The absence of formal policy guidance setting deadlines for 
assignment and resolution of Routine counterterrorism leads and 
establishing a baseline for information to be collected in 
counterterrorism assessments caused or contributed to an assessment of 
Hasan that was belated, incomplete, and rushed.
IV. Information Technology and Review
    A crucial lesson of Fort Hood is that the information age presents 
new and complex counterterrorism challenges for the FBI. Diverse and 
ever-growing waves of electronic information confront its law 
enforcement and intelligence-gathering activities. Emerging 
technologies demand changes in the ways that the FBI acquires, stores, 
reviews, organizes, manages, disseminates, and acts on intelligence.
    The actions of the Agents, Analysts, and Task Force Officers who 
handled the Hasan information cannot be judged fairly or accurately 
without an understanding of their working environment--and, in 
particular, their technological environment. Our investigation revealed 
that the FBI's information technology and review protocols were, then 
and now, less than adequate for fulfilling the FBI's role as the 
premier U.S. intelligence and law enforcement agency combating domestic 
terror.
            A. Information Technology Limitations
    DWS-EDMS, the primary database under review, is a capable tool that 
lacks the modern hardware infrastructure needed to fulfill and preserve 
its crucial functionality. The relatively aged server configuration for 
DWS-EDMS and its ever-increasing data storage demands, coupled with 
ever-increasing use, create issues that we witnessed in our hands-on 
use of the system. DWS-EDMS also lacks a ``live'' or ``failover'' 
disaster recovery backup.
            B. Information Review Workflow
    In examining San Diego's review of the information acquired in the 
al-Awlaki investigation, we identified serious concerns about the 
available technology and two interrelated concerns about human actions: 
Questionable decisions in reviewing certain communications and the 
failure to relate subsequent messages to the lead.
    The DWS-EDMS collection presented, in SD-Analyst's words, a 
``crushing volume'' of information. We were unable to assess the 
reasonableness of San Diego's review decisions and tracking of messages 
outside the context of the nearly 20,000 other al-Awlaki-related 
electronic documents that SD-Agent and SD-Analyst reviewed prior to 
Hasan's final message on June 16, 2009.
    We found, however, that the FBI's information technology and 
document review workflow did not assure that all information would be 
identified and managed correctly and effectively in DWS-EDMS because of 
a confluence of factors: (1) The humanity of the reviewers; (2) the 
nature of language; (3) the ``crushing volume'' of the al-Awlaki 
information; (4) the workload; (5) limited training on the databases 
and search and management tools; (6) antiquated and slow computer 
technology and infrastructure; (7) inadequate data management tools; 
(8) the inability to relate DWS-EDMS data easily, if at all, to data in 
other FBI stores; and (9) the absence of a managed quality control 
regime for review of strategic collections.
    The Final Report discusses each of these factors in detail (see 
Chapters 4-6 and 11). The confluence of these diverse human and 
technological factors forced SD-Agent and SD-Analyst to review, using a 
linear, forward-looking workflow, each of the Hasan-al-Awlaki 
communications in isolation as 18 of the nearly 8,000 electronic 
documents that they reviewed between December 18, 2008, and June 16, 
2009, the dates of Hasan's first and last messages to al-Awlaki. That 
workflow encouraged anticipatory review, analysis, and identification 
of products, but discouraged reflection, connectivity, and 
retrospective review and analysis. The operational and technological 
context in which SD-Agent and SD-Analyst worked, not their actions as 
reviewers, was unreasonable.
            C. Data Aggregation
    FBI Agents, Analysts, and Task Force Officers regularly consult 
many databases in the performance of their duties. In 2009, with few 
exceptions, users accessed each database using a discrete interface, 
password, and search engine. Our investigation found that planning for 
enterprise data aggregation, and consolidating and conforming the 
contents of these diverse databases, are vital to the FBI's ability to 
respond to the threat of terrorism.
                   assessment of fbi remedial actions
    At Director Mueller's request, Part Three of the Final Report 
assessed the changes to FBI policies, operations, and technology that 
resulted from its own internal review and subsequent events. We applaud 
these steps, which are outlined in Exhibit B.
              analysis of the fbi's governing authorities
A. Existing Authorities
    After an extensive review of the FBI's governing authorities (see 
Chapter 3), we asked representatives of Congressional oversight staff 
(the Majority and Minority staffs of the Senate and House Judiciary and 
Intelligence Committees) and public interest groups (the American Civil 
Liberties Union and the American Enterprise Institute) to identify 
their concerns abut the impact of the governing authorities on privacy 
rights and civil liberties.
    Part Four of the Final Report assesses those concerns. We concluded 
that existing authorities balance the FBI's responsibility to detect 
and deter terrorism with protection of individual privacy rights and 
civil liberties. We believe, however, that the FBI should monitor and 
report on its use of investigative techniques that raise concern 
through the Office of Inspection and Compliance, Inspection Division, 
and National Security Division. The FBI should modify or abandon 
policies and protocols that prove unacceptably harmful to privacy 
rights or civil liberties.
B. Additional Authorities
    We interviewed a broad range of FBI personnel involved in 
counterterrorism work; former FBI and other U.S. intelligence community 
personnel; and members of the Majority and Minority staff of the 
Congressional Judiciary and Intelligence Committees. Although we 
received a number of recommendations, we identified, but took no 
position on, two legislative actions that the FBI could propose to 
improve its ability to deter and detect terrorist threats.
    The Communications Assistance for Law Enforcement Act.--The FBI 
believes that amending the Communications Assistance for Law 
Enforcement Act (CALEA) (1994), 47 U.S.C.  1001 et seq., is an 
immediate priority. Congress enacted CALEA to assure that law 
enforcement obtains prompt and effective access to communications 
services when conducting a lawful electronic surveillance. The statute 
recognizes that surveillance may be difficult, if not impossible, 
absent an existing level of capability and capacity on the part of 
communications service providers. The threat to our National security--
increasingly explicit in FBI investigations--is that service providers 
using new technologies often lack that capability and capacity.
    Administrative Subpoena Authority.--The FBI's counterterrorism 
authorities are not as robust, definitive, and consistent as its law 
enforcement authorities. The FBI has the authority to issue 
administrative subpoenas in narcotics, child-abuse, and child-
exploitation investigations, but not in counterterrorism 
investigations. This inconsistency is noteworthy, although we recognize 
that counterterrorism investigations may implicate potential risks to 
civil liberties and privacy interests in ways that traditional law 
enforcement investigations do not.
                            recommendations
    We made 18 formal recommendations for corrective and enhancing 
measures on matters ranging from FBI policies and operations to 
information systems infrastructure, review protocols, and training. 
Exhibit A summarizes those recommendations. We also assessed whether 
any administrative action should be taken against any employee involved 
in this matter, and we concluded that administrative action was not 
appropriate.
    We recognize that the FBI has continued to evolve as an 
intelligence and law enforcement agency in the aftermath of Fort Hood 
and in furtherance of internal and external recommendations that 
followed, including the Special Report of the Senate Committee on 
Homeland Security and Governmental Affairs (February 3, 2011). To the 
extent our Recommendations may parallel or implicate actions and 
initiatives proposed internally or by others, they should not be read 
to suggest that the FBI has not been diligent in pursuing those actions 
and initiatives, but to underscore their importance.
                               conclusion
    In the words of our Final Report: ``We conclude that, working in 
the context of the FBI's governing authorities and policies, 
operational capabilities, and the technological environment of the 
time, FBI and Joint Terrorism Task Force personnel who handled relevant 
counterterrorism intelligence information made mistakes. We do not 
find, and do not suggest, that these mistakes resulted from intentional 
misconduct or the disregard of duties. Indeed, we find that each 
Special Agent, Intelligence Analyst, and Task Force Officer who handled 
the [intelligence] information acted with good intent. We do not find, 
and do not believe, that anyone is solely responsible for mistakes in 
handling the information. We do not believe it would be fair to hold 
these dedicated personnel, who work in a context of constant threats 
and limited resources, responsible for the tragedy at Fort Hood.'' We 
concluded instead that ``these individuals need better policy guidance 
to know what is expected of them in performing their duties, and better 
technology, review protocols, and training to navigate the ever-
expanding flow of intelligence information.'' We also concluded that 
the FBI should continue to focus on compliance monitoring and the 
oversight of authorized investigative techniques that may affect 
privacy rights and civil liberties.
                               EXHIBIT A
             summary of webster commission recommendations
Policies
A.1: A Formal Policy on Counterterrorism Command-and-Control Hierarchy
A.2: A Formal Policy on the Ownership of Counterterrorism Leads
A.3: A Formal Policy on Elevated Review of Interoffice Disagreements in 
Counterterrorism Contexts
A.4: A Formal Policy on the Assignment and Completion of Routine 
Counterterrorism Leads
A.5: A Formal Policy on Counterterrorism Leads Assigned to JTTF Task 
Force Officers
A.6: A Formal Policy on the FBI Clearinghouse Process for 
Counterterrorism Assessments and Investigation of Law Enforcement 
Personnel
A.7: A Formal Policy on the FBI Clearinghouse Process for 
Counterterrorism Assessment and Investigation of Other Government 
Personnel
Operations
B.1: Continued Integration of Intelligence Analysts into Operations
Information Technology and Review
C.1: Expedite Enterprise Data Management Projects
C.2: Expand and Enhance the Data Integration and Visualization System
C.3: Acquire Modern and Expanded Hardware for DWS-EDMS
C.4: Acquire Advanced Information Search, Filtering, Retrieval, and 
Management Technologies
C.5: Adopt Managed Information Review Protocols for Strategic 
Collections and OtherLarge-Scale Data Collections
Governing Authorities
D.1: Increase Office of Integrity and Compliance (OIC) and Inspection 
Division Compliance Reviews and Audits
D.2: Assure Strict Adherence to Policies That Ensure Security for 
Information That Lacks Current Investigative Value
D.3: The FBI's National Security letter, Section 215 Business Record, 
Roving Wiretap, and ``Lone Wolf'' Authorities Should Remain in Effect
D.4: Update Attorney General Guidelines Affecting Extra-Territorial 
Operations
Training
E.1: Train Task Force Officers on FBI Databases Before They Join Joint 
Terrorism Task Forces
                               EXHIBIT B
                    summary of fbi remedial actions
Information Sharing
(1) FBI-DoD Clearinghouse Process for Counterterrorism Assessments and 
Investigations of Military Personnel
(2) Consolidation of FBI-DoD Memoranda of Understanding on Information 
Sharing, Operational Coordination, and Investigative Responsibilities
Operations
(1) Discontinuance of ``Discretionary Action Leads''
(2) Counterterrorism Baseline Collection Plan
(3) Triggers for Assessments/Investigations
(4) Decisions to Close Certain Investigations of DoD Personnel
(5) Identification and Designation of Strategic Collections
Technology
(1) Automatic Linking of Email Data
(2) Automatic Flagging of Certain Email Data
(3) Flagging DWS-EDMS Activity Across Cases
(4) Workload Reduction Tools
(5) DWS-EDMS September 2011 Release
Training
(1) Virtual Academy
(2) Classroom Training
(3) Database Training
      THE WILLIAM H. WEBSTER COMMISSION ON THE FEDERAL BUREAU OF 
 INVESTIGATION, COUNTERTERRORISM INTELLIGENCE, AND THE EVENTS AT FORT 
                    HOOD, TEXAS, ON NOVEMBER 5, 2009
The Honorable William H. Webster, Chair
                             commissioners
Douglas E. Winter, (BRYAN CAVE LLP), Deputy Chair and Editor-in-Chief
Adrian L. Steel, Jr., (MAYER BROWN LLP), Governing Authorities Liaison
William M. Baker, (former FBI Assistant Director, CRIMINAL 
INVESTIGATIVE DIVISION)
Russell J. Bruemmer, (WILMER HALE)
Kenneth L. Wainstein, (CADWALADER, WICKERSHAM & TAFT LLP)
                                adjutant
Stephen J. Cox, (APACHE CORPORATION)
                               associates
George F. Murphy, (BRYAN CAVE LLP)
Margaret-Rose Sales, (MAYER BROWN LLP)

    Mr. McCaul. Thank you, Mr. Winter.
    The Chairman now recognizes Professor Manji for her 
testimony.

STATEMENT OF ISHRAD MANJI, DIRECTOR, MORAL COURAGE PROJECT, NEW 
                        YORK UNIVERSITY

    Ms. Manji. Thank you.
    Good morning. My name is Irshad Manji, and I am here in my 
capacity as founder and director of the Moral Courage Project.
    Before I formally begin, allow me also to express my 
sympathy to those, both American and not, who have been 
victimized by this week's violence in Libya, Egypt, and now 
Yemen.
    Housed in the Wagner School of Public Service, the Moral 
Courage Project teaches people worldwide to speak up when 
others, frankly, want to shut them up. We are motivated not 
just to break silences but also to combat the abuse of power, 
in other words the corruption, that comes from the fear of 
speaking out. This means understanding why silences develop in 
the first place, which brings me to the question that concerns 
our hearing.
    Let me be clear: I do not know if one or more FBI officers 
intentionally withheld information about Major Nidal Malik 
Hasan. But personal experiences leave me skeptical about 
whether the standard bearers of National security are willing 
to share vital information, whether with the public or with 
each other.
    I will give you a couple of examples in a moment. First, 
let me address why I would have personal experiences on this 
front. The reason is I am a devoted Muslim who loves God; and, 
because I love God, I speak up whenever anybody uses Islam to 
violate all of our God-given liberties and human rights.
    As refugees from East Africa, my family and I settled on 
the West Coast of Canada; and there I grew up attending two 
types of schools, the multi-racial, multi-faith public school, 
and then every Saturday, for several hours at a stretch, the 
Islamic religious school, the madrassa.
    At madrassa, I asked candid questions. For instance, why 
can't Muslims take Jews and Christians as friends? At the age 
of 14, having asked one too many of these questions, I got 
booted out of the madrassa. But as I have had to assure my 
mortified mother more than once, leaving madrassa does not mean 
leaving Allah.
    I decided to study Islam on my own and discovered that 
there is an Islamic tradition of questioning, of 
reinterpreting, and even of dissenting with the clerics. It is 
this tradition that empowers me to reconcile my faith with 
freedom. All of which puts me and my team on the receiving end 
of death threats and actual violence not just in Muslim-
majority countries but also in this part of the world. That is 
why I have first-hand experience with some of the inner 
workings of National security. That is how I have come to 
observe the censorship that plagues many good people, people to 
whom we do owe gratitude and whose mission is to protect the 
public.
    In my remaining time, I would like to share two stories. 
Although the first takes place in Canada, of which I remain a 
citizen, it foreshadows the second story, which takes place in 
the United States, where I now live and work.
    In June, 2006, Canadian police arrested young Muslims for 
plotting to blow up Parliament and behead the Prime Minister. 
The Toronto 17, as they came to be known, called their campaign 
Operation Badr, B-a-d-r, Badr. Operation Badr is a tribute to 
the battle of Badr, the first decisive military victory by 
Prophet Mohammed.
    Now, police knew that religious symbolism helped inspire 
the Toronto 17. Still, at the press briefing to announce those 
arrests, police did not mention the words Muslim or Islam.
    At their second meeting with the press, police boasted, 
bragged about avoiding the words Muslim and Islam, again 
despite knowing that Operation Badr had been organized in the 
name of Islam.
    Three months later, at a police conference, I raised my 
concern about the silence. After my plea for honesty, several 
law enforcement insiders, independent of each other, confided 
to me that the lawyers prevented these authorities from 
publicly uttering the words Muslim and Islam.
    As for my experiences in the United States, here is a 
concrete one. In 2009, I received media calls about David 
Headley, a U.S. citizen who helped plan the terrorist attacks 
on Bombay in 2008, in other words, the year before. Apparently, 
Mr. Headley had named me among his targets, too. Journalists 
wanted to know how that made me feel. You can guess my 
response.
    What made me feel worse, though, was that these media calls 
came in a full day before any National security officials got 
in touch. Somehow, somewhere their chain of communication had 
broken down.
    The research on institutional silos and silence suggests 
multiple forces at play. But the antidote to all of these 
forces is moral courage, the willingness to speak up when 
others want to shut you down.
    I thank you for this invitation and, unlike my madrassa 
teacher, I welcome your questions.
    [The prepared statement of Ms. Manji follows:]
                   Prepared Statement of Irshad Manji
                           September 14, 2012
    My name is Irshad Manji. I am here in my capacity as founder and 
director of the Moral Courage Project at New York University.
    Housed in the Wagner School of Public Service, the Moral Courage 
Project teaches people worldwide to speak up when others want to shut 
them up. We are motivated not just to break silences, but also to 
combat the abuse of power--the corruption--that comes from the fear of 
speaking out.
    This means understanding why silences develop in the first place, 
which brings me to the question that concerns our hearing.
    Let me be clear: I do not know if one or more FBI officers 
intentionally withheld information about Major Nidal Malik Hasan. But 
personal experiences leave me skeptical about whether the standard-
bearers of National security are willing to share vital information, 
whether with the public or with each other.
    I will give you a couple of examples in a moment. First, allow me 
to address why I would have personal experiences on this front. The 
reason is: I am a devoted Muslim who loves God, and because I love God, 
I speak up whenever Muslims use Islam to violate our God-given liberty 
and human rights.
    As refugees from East Africa, my family and I settled on the West 
Coast of Canada. There, I grew up attending two types of schools--the 
multi-racial, multi-faith public school and then, every Saturday, for 
several hours at a stretch, the Islamic religious school (madressa). At 
madressa, I asked candid questions. For instance, why can't Muslims 
take Jews and Christians as friends?
    At the age of 14, having asked one too many of these questions, I 
got booted out of madressa. But as I had to assure my mortified 
mother--more than once--leaving madressa does not mean leaving Allah.
    I decided to study Islam on my own, and discovered that there is an 
Islamic tradition of questioning, re-interpreting, and even dissenting 
with the clerics. It is this tradition that empowers me to reconcile my 
faith with freedom.
    All of which puts me and my team on the receiving end of death 
threats--and actual violence--not just in Muslim-majority countries, 
but also in this part of the world. That is why I have first-hand 
experience with some of the inner workings of National security.
    And that is how I have come to observe the censorship that plagues 
many good people whose mission is to protect the public.
    In my remaining time, I would like to share two stories. Although 
the first takes place in Canada, of which I remain a citizen, it 
foreshadows the second story, which takes place in the United States, 
where I now work and live.
    In June 2006, Canadian police arrested young Muslims for plotting 
to blow up Parliament and behead the Prime Minister. The ``Toronto 
17,'' as they came to be known, called their campaign, Operation Badr. 
This title is a tribute to the Battle of Badr, the first decisive 
military victory by Prophet Muhammad.
    Police knew that religious symbolism helped inspire the Toronto 17. 
Still, at the press briefing to announce those arrests, police did not 
mention the words ``Muslim'' or ``Islam.''
    At their second meeting with the press, police boasted about 
avoiding the words ``Muslim'' and ``Islam''--again, despite knowing 
that Operation Badr had been organized in the name of Islam.
    Three months later, at a police conference, I raised my concern 
about this silence. After my plea for honesty, several law enforcement 
insiders, independent of each other, confided to me that lawyers 
prevented authorities from publicly uttering the words ``Muslim'' and 
``Islam.''
    As for my experiences in the United States, here is a concrete one: 
In 2009, I received media calls about David Headley, a U.S. citizen who 
helped plan the terrorist attacks on Bombay the year before. 
Apparently, Mr. Headley had named me among his targets. Journalists 
wanted to know how that made me feel. You can guess my response.
    What made me feel worse was that these media calls came in a full 
day before any National security officials got in touch. Somehow, 
somewhere, their chain of communication had broken down.
    The research on institutional silos--and silence--suggests multiple 
forces at play. But the antidote to all of these forces is moral 
courage: The willingness to speak up when others want to shut you up.
    I thank you for this invitation and, unlike my madressa teacher, I 
welcome your questions.

    Mr. McCaul. Thank you, Professor, and we appreciate your 
courage. Thank you for being here.
    The Chairman now recognizes Mr. Leiter.

STATEMENT OF MICHAEL E. LEITER, FORMER DIRECTOR OF THE NATIONAL 
                    COUNTERTERRORISM CENTER

    Mr. Leiter. Mr. Chairman, Mr. Ranking Member, it is a 
pleasure to be back. This is my first appearance before the 
Congress outside of the Executive branch, and I have to say the 
freedom is rather invigorating.
    Today, I am actually appearing as a member of the Homeland 
Security Project at the Bipartisan Policy Center. That is the 
follow-on organization to the 9/11 Commission, led which the 
very distinguished and talented Governor Tom Kean and 
Congressman Lee Hamilton. Although, of course, also my comments 
are really based on my time, over 4 years, as the head of the 
National Counterterrorism Center, as well as serving in the 
Navy and the Department of Justice.
    Now, rather than spending my 5 minutes now going over 
extensively where I think improvements have been made, I would 
like to focus most of my comments on where I think there are 
still challenges that the Congress and the Executive branch 
faces over the next several years. But I do want to highlight, 
because you are focused on a failure--Congressman McCaul, you 
obviously noted the successes, and there really have been many, 
and many of these successes we simply take for granted today: 
The fact that we have a single, consolidated watch list at the 
National Counterterrorism Center; the fact that we have 
analysts and information systems from a variety of 
organizations all in one place; the fact that we have 104 Joint 
Terrorism Task Forces and fusion centers.
    These are all--none of this is to say that the problems are 
solved, but this is to say that the improvements are quite 
tremendous. The tragedy of the 13 brave Americans who were lost 
at Fort Hood can never be eliminated.
    All that being said, that we have avoided large-scale 
terrorist attacks in the United States and a total of 14 
individuals have been killed in the United States in the past 
11 years is, in my view, nothing short of remarkable. Tragic 
that every one of those lives was lost but a record which I do 
think that the Congress and the U.S. Government and our allies 
can in fact be proud of.
    Now, having accepted that not everything is right, I would 
offer two caveats before I go into the areas where I think they 
can be improved.
    First, I think the Congress and the Executive branch must 
be very careful not to conflate all information-sharing 
problems as being the same. There is real sophistication in 
this. What happened on Christmas day, an intelligence failure, 
was one type of information challenge; and it is a very 
different challenge from what happened at Fort Hood. I say that 
because I think it is important to, as I say, get under the 
hood, examine these with some specificity.
    Second, I think this committee knows this well, but we have 
to continue to remember that information sharing is not always 
unmitigated good. We need look no father than WikiLeaks to 
remember that, as we share information, we must also do it in a 
way that not only protects privacy and civil liberties but 
protects the security of that information.
    I believe these two things can be reconciled, but we cannot 
forget that there are dangers as well.
    Very quickly, where do I see some opportunities and need 
for improvement? I will divide it into five basic areas: Legal, 
policy, budgetary, personnel, and technology.
    First, on the legal front, I am a recovered lawyer, but I 
will say there is probably no area in which I work in National 
security where the legal landscape is a myriad of complicated, 
conflicting statutes, and it is extremely difficult to ever 
know how information can or cannot be shared. The burden that 
that puts on operators and analysts, not to mention lawyers, is 
tremendous.
    Although I think the Foreign Intelligence Surveillance Act, 
FISA, serves some very valuable purposes both for collection 
and for protection of civil liberties, anything that Congress 
can do to simplify that law, especially in an era of rapidly-
changing technology, would be critically important.
    Second, on the policy front, I think it is important that 
the Congress and the Executive branch work together to move 
legal policies--pardon me, move information-sharing policies in 
a far more rapid way than they move today. I think as a general 
matter--and I say this having served in a Republican and 
Democratic administration. I think as a general matter 
administrations have gotten these policies right about how 
information should be shared, but the pace at which these 
discussions occur borders on the Biblical. In an era of 
rapidly-evolving terrorist threats we cannot allow these 
discussions to go on endlessly. The Congress must demand that 
the Executive branch rapidly adopt policies, like the Attorney 
General guidelines, to ensure there is effective information 
sharing once laws are passed.
    On the budgetary front, this committee knows quite well the 
pressures that all of National security and State and local 
governments will face in the coming years. We have spent an 
enormous amount of money building Joint Terrorism Task Forces 
and State and local fusion centers. In my view, although these 
have done quite well, as we enter a more austere budgetary 
period the Congress will have to look quite closely at how we 
can rationalize and truly create a National system and not 
simply a patchwork of entities.
    Very quickly on the last two points, personnel and 
technology, I think part of the failure at Fort Hood was 
undoubtedly a thorough understanding among some well-
intentioned agents and officers about what were signs and 
symptoms of radicalization in the population. This sort of 
training must be continued; and, of course, training on the 
tools that people already have must be increased.
    Last, but not least, technology can help us here. We all 
know that technology is not a panacea. But basic technological 
tools which flag information for people allow uncorrelated 
information to be shown to a variety of individuals, 
information to be shared across security regimes amongst the 
FBI, National Counterterrorism, Department of Defense, and the 
like are absolutely critical. So it is not simply two agents 
looking at an email trying to decide whether or not an 
individual is radicalized, but we are actually taking full 
advantage of the larger National security community. Technology 
exists to do that today.
    With that, Mr. Chairman, I welcome your questions. It is 
very good to be back. I want to simply close on joining you on 
your notes of condolences for the loss that we saw in Libya, 
the losses that we see every day in Afghanistan, and the losses 
that we suffered in Fort Hood.
    [The prepared statement of Mr. Leiter follows:]
                Prepared Statement of Michael E. Leiter
                           September 14, 2012
                              introduction
    Mr. Chairman, Mr. Ranking Member, Members of the subcommittee: I am 
pleased to have the opportunity to appear before you today. This 
subcommittee has been at the center of ensuring that needed reform is 
taking place in our Government. I am deeply grateful to you for your 
sustained leadership in that effort. The subject of today's hearing, 
``Lessons from Fort Hood: Why Can't We Connect the Dots to Protect the 
Homeland?'' is of critical importance to National security.
    Today, I appear in my capacity as a Task Force Member of the 
Bipartisan Policy Center's Homeland Security Project, a successor to 
the 9/11 Commission. Drawing on a strong roster of National security 
professionals, the HSP works as an independent, bipartisan group to 
monitor the implementation of the 9/11 Commission's recommendations and 
address other emerging National security issues.
    HSP includes the following membership:
   Governor Thomas H. Kean, Former Governor of New Jersey; 
        Chairman of the 9/11 Commission; and Co-Chair of the Homeland 
        Security Project;
   The Honorable Lee H. Hamilton, Former Congressman from 
        Indiana; Vice-Chair of the 9/11 Commission; and Co-Chair of the 
        Homeland Security Project;
   Peter Bergen, Director, National Security Studies Program at 
        the New America Foundation;
   Christopher Carney, Former Congressman from Pennsylvania and 
        Chair of the U.S. House Homeland Security Oversight Committee;
   Stephen E. Flynn, Ph.D., Founding Co-Director of the George 
        J. Kostas Research Institute for Homeland Security and 
        Professor of Political Science at Northeastern University;
   Dr. John Gannon, Former Deputy Director of the CIA for 
        Intelligence;
   Dan Glickman, Senior Fellow, Former Secretary of 
        Agriculture; Former Chairman of the U.S. House Intelligence 
        Committee;
   Dr. Bruce Hoffman, Director, Center for Peace and Security 
        Studies, Georgetown University;
   Michael P. Jackson, Chairman and CEO, VidSys, Inc. and 
        Former Deputy Secretary of the U.S. Department of Homeland 
        Security;
   Ellen Laipson, President and CEO of the Stimson Center and 
        member of the President's Intelligence Advisory Board;
   Michael E. Leiter, Senior Counselor to the Chief Executive 
        Officer, Palantir Technologies and Former Director of the 
        National Counterterrorism Center;
   Edwin Meese III, Former U.S. Attorney General, Ronald Reagan 
        Distinguished Fellow in Public Policy and Chairman of the 
        Center for Legal and Judicial Studies at The Heritage 
        Foundation;
   Erroll G. Southers, Former Chief of Homeland Security and 
        Intelligence for the Los Angeles Airports Police Department; 
        and Associate Director of the National Center for Risk and 
        Economic Analysis of Terrorism Events at the University of 
        Southern California;
   Richard L. Thornburgh, Former U.S. Attorney General and 
        Governor of Pennsylvania;
   Frances Townsend, Former Homeland Security Advisor and 
        Deputy National Security Advisor for Combating Terrorism;
   Jim Turner, Former Congressman from Texas and Ranking Member 
        of the U.S. House Homeland Security Committee.
    My HSP colleagues and I believe the depth of this group's 
experience on National security issues can be of assistance to you and 
the Executive branch and we look forward to continuing to work with 
you.
    I will also draw on my experience as former Director of the 
National Counterterrorist Center (NCTC), a post I stepped down from 1 
year ago. While I will address certain aspects of deficiencies in 
information sharing surrounding the Fort Hood shootings, I believe I 
can best help the subcommittee by sharing my views about how well the 
Government is sharing information generally. While my testimony is in 
part based on my work with the HSP, it does not necessarily reflect the 
views of my HSP Board Member colleagues.
    Now, exactly 11 years after the tragic 9/11 attacks, and 8 years 
since The 9/11 Commission Report, is an appropriate time to take stock 
of how well our Government is sharing information.
                                overview
    The 9/11 Commission documented major failures of National security-
related agencies to share vital terrorist-related information in the 
months and years before the 9/11 attacks. In the pre-9/11 period, 
legal, policy, and cultural barriers among agencies created serious 
impediments to information sharing. The Commission made a number of 
specific recommendations to improve information sharing across our 
Government and regarded it imperative that all levels of Government 
make improvements.
    Information sharing within the Federal Government, and among 
Federal, State, local, and Tribal authorities, and with allies, while 
not perfect, has been considerably improved since 9/11. The level of 
cooperation among all levels of government is higher than ever. State 
and local officials have a far greater understanding not only of the 
threat and how to respond to it but also of their communities and those 
who may be at risk of radicalization. The formation of the National 
Counterterrorism Center (NCTC) was a major step toward improved 
information sharing. When the follow-on organization to the Commission 
issued grades and reviews in late 2005 and subsequently, it cited the 
creation of NCTC and its performance as a success in National security 
reform. Although I am admittedly biased on this point, I certainly 
agree that NCTC has played and continues to play a critical 
information-sharing role.
    NCTC's information-sharing responsibilities are extremely broad and 
encompass items that many now take as a given--even though 10 years ago 
they were nonexistent. For example, NCTC's maintenance of a 
consolidated watch list that is available to local police during a car 
stop, foreign service officers checking a visa application, and 
homeland security professionals at a border, ensure that a critical 
information-sharing gap from 9/11 is filled. Similarly, NCTC's three-
times daily video conferences ensure that every element of the U.S. 
Government knows what threats are on the radar. In addition the 
presence of analysts from more than 20 organizations at NCTC, sitting 
side-by-side, and sharing information countless times a day is a 
radical (and positive) shift from 2001. Finally, the Interagency Threat 
Assessment and Coordination Group (ITACG) provides greater information 
sharing between State and local officials and the whole of the U.S. 
Counterterrorism Community. In short, when it comes to information 
sharing the U.S. Government has moved forward in leaps and bounds.
    This improvement is, of course, not just because of NCTC but 
because of an equally concerted effort by the FBI, DHS, and others. 
Most notably there are now 104 Joint Terrorism Task Forces throughout 
the Nation, and 72 Fusion Centers in which Federal, State, local, and 
Tribal authorities investigate terrorism leads and share information. 
Since 2004, DHS has provided more than $340 million in funding to the 
Fusion Centers. Information sharing with the private sector has also 
become routine and is an important part of our defenses.
    Despite these improvements, there is no doubt that weaknesses 
exist--although I frankly believe we must be careful not to equate more 
recent information-sharing failures with those of the past. Information 
sharing is no more monolithic than any other complex issue or business 
process. Although information sharing is a good headline, when 
considering information sharing successes and failures we have to 
``look under the hood'' to see what is really going on, lest we fix 
things that weren't the problem in the first place.
    While the mechanisms are in place for better information sharing, 
the fact is that we missed opportunities to stop the Christmas day 
bomber from boarding Northwest Flight 253, as well as opportunities to 
intervene before the Fort Hood shootings. In my view each of these 
represents a different challenge.
    With respect to the first, information regarding the bomber was 
shared and shared widely. In the simplest of terms, the issue was not 
that people didn't have the data, but instead that they had too much 
data--and policy issues existed about what steps should be taken based 
on that data. With respect to the second, relevant information was not 
sufficiently recognized as such and passed to other operators, and FBI 
information technology hampered the connection of key data.
    An enormous amount of intelligence information constantly pours 
into our National security system. Sifting through it, synthesizing it, 
making sense of it, and making sure it receives the necessary attention 
is a backbreaking challenge, one that requires attentive management and 
testing to determine where the flaws are and how to fix them. It also 
requires the latest software and technology to ensure that searches 
dive into all databases so that no pertinent information on an inquiry 
fails to be captured. That technology exists and is available today it 
simply needs to be widely deployed.
    Of course, we should not view information sharing as an unmitigated 
good--or at least not as a good that does not require attendant 
modifications to other aspects of intelligence and homeland security as 
it advances. There is no greater illustration of this than the tragedy 
of WikiLeaks, which has disclosed to the world--both our adversaries 
and friends--sensitive information about our intelligence and policies. 
This publication of sensitive Government documents has harmed our 
Government's ability to conduct its affairs and has had serious 
consequences for our National security.
    In my view WikiLeaks demonstrates why as we share information we 
must also increase our ability to control the information that is 
shared and take special care to control the wholesale movement of 
sensitive information off of protected networks. It is not new that 
those who wish to harm the Nation will attempt to steal our secrets; it 
is new that with the spread of electronic information they can steal 
petabytes rather than mere pages of documents.
                      still a need for improvement
    Where, then, can improvements still be made? We offer some 
suggestions along the traditional lines of correction: Legal, policy, 
budgetary, personnel, and technology.
    With respect to the first, legal, we must recognize that the 
Constitution and countless statutes govern the mosaic that is 
information sharing. In my experiences at NCTC, statutes ranging from 
the Foreign Intelligence Surveillance Act (FISA) to the Violence 
Against Women's Act drove what could and could not be shared. If there 
was one statute that was most at issue, however, it was FISA. In my 
view although FISA obviously provides critical protection of U.S. 
persons' privacy, it also makes for an exceedingly complex decision-
making process within the intelligence community. Any way in which we 
can simplify this statute while maintaining protections would be 
invaluable for both collectors and analysts.
    On the policy front, I believe it is important that we accelerate 
the review and adoption of Executive branch implementation guidelines 
for any information sharing-related policies. In my view the Executive 
branch has done an admirable job getting to the right polices in cases 
like the Attorney General Guidelines for various elements like NCTC, 
but the time required to adopt such policies borders on the Biblical. 
Yes there are difficult issues that must be addressed, but these issues 
are too important to allow the process to drag on as it most usually 
does.
    Also on the policy front--but directly related to the budgetary--we 
remain concerned that FBI and DHS information-sharing efforts with 
State and local governments lack full cohesion. With declining 
budgetary resources, it strikes us as important to determine the best 
way to spend the marginal on DHS-sponsored fusion centers--where today 
the FBI has more people in place than does DHS. The U.S. Government 
must, 11 years after 9/11, ensure that respective Departmental foci are 
consistent with the reality of long-standing intergovernmental 
relationships and on-the-ground presence. I believe that the FBI's new 
responsibility as domestic DNI representatives is a very positive step 
in that direction.
    Nowhere will budget play a bigger role in information sharing than 
State and local fusion centers, which are facing wide and deep 
budgetary challenges. In addition, budgetary issues will be faced in 
the context of protecting information from leaks (which is required to 
enable information sharing), training for personnel on advanced 
analytic tools that enable information sharing, and having sufficient 
personnel to collect and exploit information so it can be shared 
effectively.
    On the personnel front, many agencies must continue to train 
personnel to ensure that they know what information is relevant and 
hence what must be shared. In particular, the FBI needs to--as it 
generally has in the past--prioritize enhancing the status of its 
analysts and ensuring that analysis drives operations. Similarly, DHS 
must continue to improve its analytic cadre and move away from contract 
personnel. All analysts and operators must continue to receive high-
quality training on issues like radicalization, to recognize signs of 
danger.
    Finally, on the technology front, we continue to face a relative 
maze of Government information systems of significantly varying 
capability. We cannot be so naive to say that one big database of 
information can be created: This is neither technically feasible nor 
wise as it relates to protection of information and privacy. That being 
said, we must ensure that operators and analysts have advanced 
technology that allow them to make connections in disparate data sets, 
share their knowledge across organizations, and keep information 
secure. And perhaps most importantly, the Congress must continue to 
closely monitor Government information technology reforms as the 
bipartisan Executive branch record on this front is less than 
inspiring.
                               conclusion
    In sum, up until now the Government's counterterrorism capability 
has grown with much energy and devotion, but it has done so while flush 
with resources. The Nation's current fiscal situation means we have to 
be smarter in how we use our resources so that we get the maximum bang 
for our counterterrorism buck and can stay one step ahead of the ever-
changing terrorist threat.
    Our terrorist adversaries and the tactics and techniques they 
employ are evolving rapidly. We will see new attempts, and likely 
successful attacks. One of our major deficiencies before the 9/11 
attacks was that our National security agencies were not changing at 
the accelerated rate required by a new and different kind of enemy. We 
must not make that mistake again. Sharing information rapidly is a 
major comparative advantage we have over terrorists. We must regularly 
review how we are doing and move quickly to address any problems, fill 
any gaps that arise.
    Thank you for inviting me to testify, and for this subcommittee's 
leadership on these critical issues.

    Mr. McCaul. I appreciate those comments, Mr. Leiter. Thank 
you for being here again; and I look forward to hearing the 
answers to my questions in a more open format, without the 
constraints of the Federal Government on top of you.
    So with that, I would like to enter into the record a 
statement from the Honorable William Webster, the chair of the 
Webster Commission.
    Hearing no objection, so ordered.
    [The statement of Mr. Webster follows:]
    Statement of William H. Webster, Chair, The William H. Webster 
                               Commission
                           September 14, 2012
    On December 17, 2009, Federal Bureau of Investigation Director 
Robert S. Mueller III asked me to conduct an independent investigation 
of the Federal Bureau of Investigation's handling of counterterrorism 
intelligence before and after the tragic shootings at Fort Hood, Texas, 
on November 5, 2009. The FBI had conducted an internal investigation in 
the immediate aftermath of the shootings and had implemented 
procedural, operational, and technological improvements. Director 
Mueller believed, however, that an objective, independent review was 
critical to understanding the FBI's actions and assessing the potential 
for further improvements.
    I agreed to what proved to be a complex and lengthy assignment. The 
Terms of Reference were extraordinary in scope. Director Mueller 
requested not only a full investigation of the manner in which the FBI 
and its Joint Terrorism Task Forces handled and acted on 
counterterrorism intelligence before and after the shootings, but also 
a review and assessment of the FBI's governing authorities and the 
FBI's remedial measures in the aftermath of Fort Hood--with a 
particular focus on whether existing laws and policies strike an 
appropriate balance between protecting individual privacy rights and 
civil liberties and detecting and deterring threats. That broad mandate 
was complicated, and its importance underscored, by subsequent terror-
related events. The investigation did not probe the shootings, which 
are the subject of a U.S. Army-led inquiry and military criminal 
proceeding against Major Nidal Hasan.
    In discharging my duties, I asked five distinguished citizens--
seasoned investigators and legal specialists--to volunteer their time 
to serve as Commissioners: William M. Baker, Russell J. Bruemmer, 
Adrian L Steel, Jr., Kenneth L. Wainstein, and Douglas E. Winter. They 
were assisted by Stephen J. Cox, George Murphy, and Margaret-Rose 
Sales. Their contributions of time and energy were substantial, adding 
to the already significant demands of their work in the private sector. 
Their commitment to this investigation and the resulting report was an 
act of selfless patriotism.
    The Commission took its responsibilities seriously. My colleagues 
and I pursued the sensitive, complex matters under review with 
diligence and care. The investigation was meticulous. Our discussions 
were vigorous. The Commissioners asked questions and expressed their 
perspectives, concerns, and opinions with candor. Although we disagreed 
from time to time during the course of our investigation, we were 
unanimous in our factual findings, our analysis of the FBI's actions, 
our recommendations, and every other aspect of the Final Report.
    When I agreed to undertake this project, Director Mueller promised 
the FBI's full cooperation and support. That promise was fulfilled. The 
FBI and Department of Justice provided the Commission with more than 
100 formal and informal interviews, meetings, and briefings; more than 
10,000 pages of documents; and direct access to FBI computer systems. 
To obtain a broad range of perspectives, the Commission also consulted 
with outside experts on counterterrorism and intelligence operations, 
information technology, and Islamic radicalism; public interest groups 
that promote civil liberties and privacy interests; and staff from 
Congressional committees with FBI oversight responsibilities. The input 
of more than 300 persons and hundreds of documents informs the Final 
Report.
    On July 12, 2012, after a completing the 2\1/2\-year investigation, 
we delivered the Final Report of the William H. Webster Commission on 
the Federal Bureau of Investigation, Counterterrorism Intelligence, and 
the Events at Fort Hood, Texas on November 5, 2009, to Director 
Mueller. As you have seen, the Final Report exceeds 150 single-spaced 
pages in length and includes 18 formal recommendations for corrective 
and enhancing measures.
    Director Mueller asked me to examine, among other things, ``whether 
the actions taken by the FBI were reasonable under the circumstances 
known at the time.'' Our analysis of those actions could not proceed 
from what we later learned about Nidal Malik Hasan or Anwar Nasser al-
Awlaki. Hindsight has uses, but it is not an appropriate tool for 
assessing the reasonableness and adequacy of actions taken without its 
benefit. Our review was based on information known or available to the 
FBI at the time the actions were taken.
    We also recognized that reasonableness must be measured in the 
context of the FBI's governing authorities and policies, operational 
capabilities, and the technological environment of the time. For 
example, as discussed in the Final Report, the FBI's governing 
authorities limit its ability to disseminate information acquired using 
the Foreign Intelligence Surveillance Act of 1978, 50 U.S.C. 1801 et 
seq., and require Agents and Task Force Officers to use the ``least 
intrusive means'' in conducting assessments and investigations. As a 
further example, the FBI's then-existing information technology and 
document review workflow did not assure that potentially relevant 
intelligence would be identified, correlated, and assessed in a 
strategic context.
    Finally, we recognized our limited ability to predict what might 
have happened if different policies or procedures were in effect or 
personnel had made different decisions or taken different actions. We 
chose not to speculate. We examined instead the reasonableness of what 
did happen, in order to identify and recommend, when appropriate, 
better and corrective policies and practices for the future.
    The Final Report did not hesitate to identify shortcomings when we 
found them. In its words: ``We conclude that, working in the context of 
the FBI's governing authorities and policies, operational capabilities, 
and the technological environment of the time, FBI and Joint Terrorism 
Task Force personnel who handled relevant counterterrorism intelligence 
information made mistakes. We do not find, and do not suggest, that 
these mistakes resulted from intentional misconduct or the disregard of 
duties. Indeed, we find that each Special Agent, Intelligence Analyst, 
and Task Force Officer who handled the [intelligence] information acted 
with good intent. We do not find, and do not believe, that anyone is 
solely responsible for mistakes in handling the information. We do not 
believe it would be fair to hold these dedicated personnel, who work in 
a context of constant threats and limited resources, responsible for 
the tragedy at Fort Hood.''
    We concluded instead that ``these individuals need better policy 
guidance to know what is expected of them in performing their duties, 
and better technology, review protocols, and training to navigate the 
ever-expanding flow of intelligence information.'' We also concluded 
that the FBI should continue to focus on compliance monitoring and the 
oversight of authorized investigative techniques that may affect 
privacy rights and civil liberties.
    The Commission found shortcomings in FBI policy guidance, 
technology, information review protocols, and training. We made 18 
important recommendations for corrective and enhancing measures in 
those areas and about the FBI's governing authorities. We also 
identified, but took no position on, two legislative actions that the 
FBI could propose to improve its ability to deter and detect terrorist 
threats. Finally, we assessed whether administrative action should be 
taken against any employee involved in this matter, and we concluded 
that administrative action was not appropriate.
    The FBI has agreed with the principles underlying all 18 of our 
recommendations. In most cases, the FBI has taken action to implement 
the recommendations based a combination of the Commission's work, its 
own internal review of the Fort Hood shootings, and the report of the 
U.S. Senate Committee on Homeland Security and Governmental Affairs.
    I appreciate the subcommittee's interest in the lessons of Fort 
Hood. Those lessons are not specific to the Federal Bureau of 
Investigation, but resonate throughout the law enforcement and 
intelligence communities. The Final Report provides insights into the 
arduous mission of the FBI and other agencies in combating the threat 
of terrorism, whether domestic or international.
    Throughout our investigation, we witnessed the ever-increasing 
challenge that electronic communications pose to the FBI's efforts to 
identify and avert potentially destructive activity. Although our 
Report reviews the specifics of one tragic event, it also speaks to 
transcendent issues that are crucial to our ability to combat terrorism 
in the electronic age.
    We did recommend corrective and enhancing measures, but nothing 
said in the Final Report is intended to cast doubt on the dedication 
and professionalism of the men and women who serve our Nation in 
combating terror and crime.
    Thank you.

    Mr. McCaul. I want to just show, not for any reason other 
than--this was taken the day of the memorial service at Fort 
Hood, and you can see--I was standing here--you can see the 
boots, the rifles, the helmets. It really gives you a graphic 
picture of what really happened that day.
    [The information follows:]

    [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
    
    Mr. McCaul. You can see one of these soldiers on crutches. 
I asked him, ``What did he say when he shot you?'' 
``Congressman, he said `Allahu Akbar,' '' God is great, the 
classic jihadist terminology.
    At that moment, I realized that this was not a workplace 
violence incident, that this was something more, that this was 
in fact an act of terrorism. I was criticized at the time for 
saying that. I think history will judge that as a correct 
assessment of what happened on that fateful day.
    Mr. Leiter, I want to start with you, because you headed 
the NCTC. You are really the expert at connecting the dots, and 
you did perform a masterful job while you were there.
    You and I worked with Joint Terrorism Task Forces. They 
have an enormous challenge, an enormous amount of data that 
comes through, and many of which, if you miss one thread of 
evidence, you can be held accountable by Members of Congress 
like myself at a later hearing.
    But these emails, the 18 emails that took place, when we 
were briefed by senior intelligence officials--and they 
wouldn't give us the content, they would just simply say--the 
only word I can use is downplay the significance of these 
emails. Finally, when the good work of the Webster report 
revealed these emails publicly, we all had a chance to actually 
read the content.
    The one that I described in my opening statement on May 31, 
2009, Major Hasan, he almost seems to be telegraphing exactly 
what he is getting ready to do, almost asking for permission 
from al-Awlaki in Yemen, is it okay for a suicide bomber to 
kill soldiers and innocent civilians in the cause to protect 
our fellow brothers?
    You know, you and I have worked in law enforcement. This is 
one of 18. The other one, ``keep me on your Rolodex,'' you 
know, to me, this is a huge flag.
    It was a big deal in San Diego. The San Diego Joint 
Terrorism Task Force thought, wow, there is something wrong 
going on here. We need to start--let's send a lead to WFO. 
Let's have them investigate.
    The response from WFO is astounding, that, well, we don't 
really see a terrorist threat here; and they basically shut 
down this investigation until 5 months later when Major Hasan 
kills 13 people, 12 soldiers.
    There is a Department of Defense official on the Joint 
Terrorism Task Force, and yet that official didn't contact Fort 
Hood. Maybe it is the legal restrictions that you are talking 
about. If so, we need to change that.
    There were so many flags not only between the FBI two 
offices--and I really commend the San Diego office for their 
courage and bravery of trying to get to the bottom of this. I 
fault the WFO office for not following up on this. In the 
military, the way they passed this guy along, knowing he is 
proselytizing radical Islam with a business card: Soldier of 
Allah. He is enraging his colleagues. What do they do? They 
don't want to deal with the problem. They want to pass him 
along, promote him, send him down to Fort Hood.
    So many flags in this case. The dots were identified, but 
they weren't shared. How did this happen?
    Mr. Leiter. Congressman, I will say that I agree with you 
that it did not take long, from my perspective, to know that 
this was an act of terrorism. In fact, the National 
Counterterrorism Center within a week of the event entered this 
into its world-wide database of terrorist events based on 
preliminary reports. That was not a conclusive legal judgment 
but certainly all the indications were that this was terrorism.
    I think in terms of the information that was not shared, 
you had a breakdown along so many different angles. The San 
Diego team I think did do a very good job; and I would defer to 
Mr. Winter, of course, who knows these details better than I, 
but they were not even aware of all of the emails. They were 
not aware of the Department of Defense information. WFO was not 
aware of much of that. It was handed to an officer who, 
frankly, from an outsider's perspective, I think didn't have a 
really strong understanding of the signs of radicalization.
    Now, the two points I would make quickly in defense of how 
this evolved is: No. 1, we do have to put ourselves back in 
2009 to recall who Anwar al-Awlaki was then versus who he is 
perceived to be today. In 2011, 2012, we understood him to be 
an operational leader in a way that in 2009 we did not. That is 
not an excuse, but it is some color.
    The second piece is, from my perspective, Congressman, the 
idea that people would not go talk to him I do not understand. 
I do believe that if that information were shared with a 
broader group who understood radicalization there would have 
been increased pressure from headquarters to make that happen; 
and that would have led to, I believe, a better outcome.
    Mr. McCaul. I couldn't agree with you more.
    I talked to the commanding officer at Fort Hood. Wouldn't 
you have liked to have known this? I understand FISA 
complications. I understand you want to shake down somebody. 
They could have at least watched him, put him under some sort 
of surveillance. Just maybe that would have stopped what 
happened.
    My time is limited. I do want to go to Mr. Winter.
    Eighteen emails, WFO only has two emails. Some technology 
breakdown occurs where they are not even aware--they can't even 
access, they didn't even know how to access to get these 
remaining emails. I have to say, Mr. Leiter, I mean, you as a 
former Justice Department official like myself, this May 31 
email, if you read this, would that concern you?
    Mr. Leiter. Congressman, I look at one email and I look at 
the body of the emails and to me they are clear indicators of 
an individual who has been radicalized. Whether or not he has 
been mobilized to take action, that is a hard call----
    Mr. McCaul. But when he is asking permission to perform a 
suicide bombing mission against soldiers and civilians at a 
dinner to protect his fellow----
    Mr. Leiter. That is why I said, Congressman, I would want 
somebody to go out and interview this guy, who has clearly been 
radicalized.
    Mr. McCaul. I think that is what should have happened in 
this case.
    Mr. Winter, what happened here?
    Mr. Winter. The decisions made in WFO were based on a 
cascading set of circumstances.
    Mr. McCaul. Your microphone?
    Mr. Winter. I am sorry. Is that better?
    Mr. McCaul. Yes.
    Mr. Winter. The decisions made at WFO were the result of 
truly a cascading set of circumstances. San Diego sent this 
lead based on the first two emails that were acquired from 
Hasan to al-Awlaki. There was no FBI policy on the assignment 
of these types of leads or on taking action on these types of 
leads.
    The supervisor of WFO waited 50 days after the arrival of 
the lead to read it and to assign it. He assigned it to a DCIS 
agent who was a task force officer.
    That agent waited 90 days from then to read it and to act 
on it. Under informal FBI practice, agents had 90 days to work 
on leads, either to elevate them into an investigation or to 
close them down. So this agent read that lead and acted on it 
on the last day under that FBI practice and, indeed, conducted 
this assessment in 4 hours on that day.
    So it was rushed. There was that pressure that was created 
by their workload and these late assignments.
    He consulted U.S. Army electronic personnel files on Major 
Hasan. That was the entirety of what he as a DCIS agent could 
have access to from the JTTF. That meant he received a brief 
and highly misleading set of personnel records that indicated 
that Major Hasan had a security clearance, he had been promoted 
to major only 10 days earlier, and his supervisors praised him 
thoroughly. The only negative in those 80-some pages, I 
believe, was that he had failed his PT test.
    Mr. McCaul. They praised him.
    Mr. Winter. They praised his research on Islam in the 
military.
    Now, Hasan had used his real name in communicating with al-
Awlaki, so had not tried to render himself anonymous. The DCIS 
agent concluded, based on that, that this was part of Hasan's 
research on Islam in the military and that the Army approved of 
it.
    At the same time, there was no FBI policy on what is called 
a baseline collection plan. That policy was instituted in 
September, 2009, after this investigation but before the Fort 
Hood shootings. That created a minimum of what agents are meant 
to collect when conducting an assessment. If that plan had been 
in effect then, this agent would have been required to consult 
the DWS-EDMS system, which is a computer database on which all 
of the messages from Hasan to al-Awlaki and vice versa were 
stored. Thus, he would have known of that, and he would have 
been required to search it.
    But he had not been trained on that database. He didn't 
even know it existed. So, what he believed, after searching FBI 
databases, was that there were only two emails, that they were 
sent in December, 2008 and January, 2009, which was 5 months 
prior, and that al-Awlaki had not responded. Based on that, he 
concluded and his supervisor concluded that Hasan was not 
involved in, ``terrorist activities.''
    Now, did that resolve the question of whether or not Hasan 
was a threat? We didn't believe so. We felt that this decision-
making process was flawed and that they should have considered 
and conducted an interview of Hasan based solely on the 
information they had at that time.
    But I am not defending the decision; I am explaining it. 
You can understand how reasonably these men could have been led 
down this path by the combination of all these circumstances, 
some of which were self-imposed, others of which were the 
result of the lack of policy, others that were the result of an 
inability to gain access to those records that Walter Reed, for 
example, had.
    Mr. McCaul. I think those problems need to be fixed. But I 
will ask you this question. I believe that gross errors were 
made in this matter that resulted in 13 people being killed, 12 
soldiers. Should anybody be held accountable within the Federal 
Government?
    Mr. Winter. On our review--we were specifically asked by 
Director Mueller to assess whether any disciplinary action 
should be taken against any of the personnel involved. Although 
we found that mistakes were made, we found that these 
individuals acted with good intent, they acted mostly 
reasonably under the circumstances, and that they were not 
individually responsible for some of the decisions that 
occurred because of the lack of policy direction, for example.
    One of the reasons we advocated the seven policies that we 
recommended was that if those policies had been in place, and 
similar procedures, then actions like this would violate them 
and individuals would be directly responsible and subject to 
discipline.
    Mr. McCaul. Is it your understanding these policies are in 
place now?
    Mr. Winter. Almost all of the policies are in place. They 
are not--some of them are being coordinated into a single 
policy, the command-and-control hierarchy, for example.
    Mr. McCaul. My time is kind of running short.
    On the Center report, they indicated the San Diego office 
calls WFO; and the response back is: Look, we don't want to 
damage his stellar career, and something to the effect of this 
is a politically sensitive matter.
    That was not corroborated by the WFO office. Is that 
correct?
    Mr. Winter. That is correct.
    Mr. McCaul. But, according to San Diego, that conversation 
took place.
    Mr. Winter. Well, the first part that you discussed is 
corroborated, that WFO advised San Diego twice that they did 
not believe an interview of Hasan was appropriate because it 
would damage him in terms of his position in the military. The 
chain of command would not take it lightly.
    Mr. McCaul. I do think that the American people and the 
families and the victims deserve that somebody in this 
Government be held accountable for what happened.
    Professor, I want to ask you real briefly, with my limited 
time left, you spoke very eloquently of your experience of the 
fear of speaking out. Within the Department of Defense, you 
know, we have this individual that various of his colleagues 
are seeing these warning signs popping up. They call him a 
ticking time bomb. He is proselytizing radical Islam, talking 
about Osama bin Laden, having business cards that say Soldier 
of Allah. I mean, so many indicators are there, and then no one 
wants to speak out. There is a fear of retribution within the 
Army, and he is just sort of passed along. Is this a case where 
political correctness was more important or overshadowed 
National security?
    Ms. Manji. It sure sounds like that--if you can hear me, it 
sure sounds like that.
    Thank you.
    It sure sounds like that, Congressman. Frankly, I think it 
would be fairer to ask if political correctness also crept into 
the FBI.
    For example, we have spent the last several minutes talking 
about how somebody at the San Diego office of the FBI had a 
troubling lead, passed it on to the Washington field office, 
after which it went nowhere. One of the questions I have, as I 
am listening to these other testimonies, is why did the San 
Diego officer not stand up when it became clear to him or her 
that an obviously unsettling lead was not going to be acted 
upon?
    Now, one can argue that, well, it is obvious why people 
don't stand up in general, because doing so invites 
complication in your life. Life is complicated enough, thank 
you very much.
    But this is where I believe we can actually learn something 
about a mechanism that the Department of State has put into 
place, and that is a mechanism called the dissent channel. It 
was actually introduced just after the Vietnam war, whereby 
foreign policy officers, when they see that the chain of 
command is going to be resisting their dissent with groupthink, 
with the settled consensus that has been accepted for too long 
within the cozy confines of that department, they can actually 
use this dissent channel to explain why somebody higher up 
needs to hear a counter argument. They do not have to get 
permission from their higher-ups in order to be heard through 
this channel.
    I don't think that that exists either at the Department of 
Defense or at the FBI, but it is something well worth 
investigating whether it works, as it did, by the way, in the 
lead-up to the Yugoslav--to the Balkan genocide. It was, one 
could argue that that was the reason, because at the time 
Secretary of State Eagleburger heard a dissenting voice through 
that channel and realized that the United States must 
intervene.
    It was through that that I think we can learn a little bit 
more about how dissent can be institutionalized so that it is 
constructive rather than chaotic.
    Mr. McCaul. Thank you. Excellent point.
    The Chairman now recognizes the Ranking Member.
    Mr. Keating. Thank you, Mr. Chairman, and I think you have 
done a good job of looking historically at this.
    I want to come at this at a different angle, maybe ask Mr. 
Leiter first. I have heard about the policies. I have heard 
about some of the changes. Could this, under the same set of 
circumstances, happen today?
    Mr. Leiter. Congressman, you would end up with a slightly 
different set of facts. It wouldn't quite fit the policies that 
you put in place, but I think that there remain holes.
    Mr. Keating. Forget the policy, just the circumstances.
    Mr. Leiter. I think it is less--the more it looks like this 
circumstance, the less likely it is going to occur. But could 
something like this fall through the cracks? Absolutely.
    I still believe that there is information that is not being 
shared effectively and, quite often, that information is about 
U.S. persons, which is appropriately the most protected set of 
information; and the Congress and the Executive branch must 
ensure that that information is effectively shared. So, as the 
professor very ably said, you can get second and third opinions 
and you aren't simply forced to take the views of one operator 
or one analyst about whether or not someone is a threat.
    Mr. Keating. Mr. Winter, could this still happen today?
    Mr. Winter. Absolutely. I agree with Mr. Leiter, the closer 
the circumstances to those of the Hasan matter the less likely 
it is to happen because of the policy changes, because of the 
higher sensitivity to these types of issues.
    For example, however, two of our recommendations concern 
the FBI putting into place a clearinghouse process by which--
which it currently has with DOD--by which it advises DOD 
through headquarters and through the National Joint Terrorism 
Task Force about investigations of DOD personnel in the 
military. We recommended that similar clearinghouse procedures 
be adopted for law enforcement agencies, whose Members may have 
equal if not greater access to weapons and intelligence than 
military members and also as to other departments of the 
Federal Government.
    So that if someone at the State Department is under 
investigation there is a mechanism in place for the 
investigating officers to move that not only up the FBI chain 
of command but also move it to the State Department chain of 
command and their investigators so that all the individuals can 
work together to detect and deter the potential for terrorism.
    However, obviously, outside of Government hierarchies, the 
possibilities for individuals like Major Hasan to take these 
kinds of actions exist; and it is difficult for the FBI to have 
constant knowledge of the whereabouts and intent of those types 
of individuals.
    Mr. Keating. One thing that--I wasn't going to ask this, 
but you sparked this interest. I have asked it of General Barry 
McCaffrey before. That initial information, getting to whether 
it is local or State officials usually, how is that inhibited 
by not having a comprehensive immigration policy in the State? 
If people see things, if people want to come forward, how are 
they going to come forward if they are going to effectively 
make themselves criminals? How weak is that in the initial 
information?
    Mr. Winter. That is something that is slightly beyond my 
pay grade, sir. I would try to answer in this fashion, however.
    The FBI has in place what is known as an eGuardian system, 
which is an electronic version of its Guardian system, by which 
individuals who bring information to local law enforcement 
agencies, let's say, even anonymously, tips and the like, can 
be forwarded on immediately and promptly by electronic means 
and acted on by FBI agent reviewers and analysts, I should say, 
within a very short period of time.
    Mr. Leiter. Congressman?
    Mr. Keating. Assuming they did that.
    Yes, Mr. Leiter.
    Mr. Leiter. I think interaction with immigrant communities 
is critical. In the counterterrorism context, obviously what we 
are most focused on is American Muslim communities, which may 
or may not be immigrant communities. But engagement by the FBI, 
the Department of Homeland Security, Immigration, a wide range 
of agencies and State and local officials with American Muslim 
communities is absolutely critical to occur not just for law 
enforcement intelligence but for good Government and 
engagement.
    I will say that Congress has an important role in that 
regard, that when the FBI does engage these Muslim communities 
that they are not immediately second-guessed about which 
Muslims they talk to. It is very important for them to have 
wide engagement to understand these communities and potentially 
identify individuals who have been radicalized. In my view, the 
Congress has to give the Executive branch reasonable room to 
maneuver to do that engagement to find problem areas.
    Ms. Manji. May I add something of my own in this regard?
    Mr. Keating. Just briefly, yes.
    Ms. Manji. Sure.
    Of course, engagement with communities of all kinds is 
necessary for good governance. The problem is that, too often, 
especially in this country, we stumble over ourselves to try to 
identify who are the moderates and who are the extremists. I 
would argue to you gentlemen that this is the wrong 
distinction.
    The better distinction to make, if you want to really get 
at the heart of the matter, is who are the moderates and who 
are the reformists. Moderates, for example, don't much differ 
from extremists in that moderates are so consumed with what 
they perceive to be Western imperialism, Israel, America, so 
forth, that they have distracted themselves from dealing with 
the imperialism within their communities, those clerics, those 
imams, and even those supposedly secular civil leaders who 
insist that good Muslims remain silent when crimes such as 
honor killings happen within their communities.
    So we need to ensure that we get the framing here right if 
you are actually going to hear people who are willing to step 
forward. But they are not going to be willing to step forward, 
Congressman, unless they know that you have got their back. 
Because they know what backlash is coming their way by virtue 
of having opened their mouths.
    Mr. Keating. Thank you. Thank you.
    I just want to get back to the process itself, too.
    One of the things that you said, Mr. Leiter, that concerned 
me, is--because we hear it all the time in this committee in 
particular in different shapes and forms--but you used the word 
the necessity of having a National system versus a patchwork 
system. To me, we could have the greatest information in the 
world coming forth. If we don't have a way to process that on a 
National basis--can you really talk more specifically about 
what you meant when you said that? I mean, how far along----
    You know, all of DHS is patchwork, as far as I am 
concerned. It is amazing that we haven't gone past 
jurisdictional issues and done some of these things yet. But, 
to me, that has to get fixed first.
    Now, I know we have budgetary issues in front of us. But if 
that is not fixed and that is not a priority, what good does 
all this gathering of information, what good is it?
    So when you said that, you know, I think that is a priority 
that we have to have. What budgetary issues are confronting 
that and what actual technology issues or interaction issues 
with different levels of intelligence? Expound on that.
    Mr. Leiter. Congressman, absolutely. We obviously, as both 
you and the Chairman know well as attorneys, we live in a very 
Federated system. As we built up these State and local fusion 
centers with hundreds of millions of dollars, that information 
is being collected at the local level and, to some extent, 
shared with Department of Homeland Security and the FBI through 
the JTTFs. But what we have not done is created a system where 
you can actually effectively compare that information across 
State and local fusion centers, across JTTFs.
    Now, I think the FBI took a very, very valuable step in the 
past year, which is to move toward a regionalized structure. 
Because I don't believe that you can have any system with 104 
JTTFs and 50-plus fusion centers and actually see correlations 
quite effectively. So a regionalized intelligence structure, 
where you have I believe it is six or eight regions that are 
looking at the various State and local fusion centers and JTTFs 
and seeing where there is suspicious activity or where there is 
a FISA intercept of import. Then having those cases managed by 
the FBI headquarters, in coordination with DHS, that starts to 
look like a system.
    As you see that and as that information is shared within 
the Federal family, with the National Counterterrorism Center, 
with Homeland Security, who is specializing on borders, using 
their collection resources, and ICE and Customs and Border 
Protection, you start to understand how you can close these 
gaps and, as you so eloquently stated at the beginning of your 
questions, try to avoid this from happening in the future.
    As budgets go down, weaving this together will be more 
difficult. But absolutely the technology exists today to make 
sure that some of those less understandable correlations are 
seen both at the State level, at the local level, and 
ultimately at the Federal level for some of these cases.
    Mr. Keating. Just a last quick question of yourself and Mr. 
Winter. Would you say that is among the top priorities right 
there in having that occur?
    Mr. Leiter. Yes.
    Mr. Winter. I absolutely agree. That was the first of our 
information technology recommendations to the FBI, enterprise 
data management.
    Mr. Keating. Thank you very much. I yield back.
    Mr. McCaul. Thank the Ranking Member.
    The gentleman from South Carolina, Mr. Duncan, is 
recognized.
    Mr. Duncan. Thank you, Mr. Chairman. Thanks for this very 
timely hearing.
    You know, the State Department had warnings at least 48 
hours in advance of the 9/11 attacks that happened this week, 
yet they did not go in lockdown in certain embassies where the 
threats were. The reason I say that is a lot of times we are 
given very, very clear signals, staring us in the face, and we 
fail to act on those.
    Or many times we lean back on political correctness. As 
Professor Manji pointed out, the religious symbolism, the 
Operation Badr, they didn't even want to discuss the real 
ideology behind a certain terrorist attack, the fact that we 
have here in America taken to calling the Fort Hood a case of 
workplace violence, yet we will call what happens in Wisconsin 
an act of domestic terrorism.
    I am alarmed and really want to raise awareness here in 
this committee of some of the things that I hear going on 
within our Pentagon and within the military, where servicemen 
and women are discouraged from pointing out things that they 
see such as what happened at Fort Hood with SOA on the card, 
and just signals that are very clear for people that are going 
through their daily routine that should raise a red flag for 
us. But yet they are scared they are going to be labeled as an 
Islamophobe.
    I think when we have hearings within this committee 
addressing Fort Hood or addressing the radicalization of Muslim 
youth, it is not an address of Islam, it is more of an address 
of an ideology that is really encouraging folks that practice 
Islam as a religion to embrace a certain set of ideals and 
ideological values that lean more toward the attacks that we 
see. I think that is what happened. Major Hasan was caught up 
in that.
    But, as Americans, we can't be afraid to speak out. I want 
to thank the professor for having the courage, the moral 
courage to speak about those differences--that is what I heard 
today--about the difference between Islam and your practice of 
the Islamic religion, but also the fact that, you know, there 
are some folks that do practice that religion who have gone in 
another direction in another part of their life in their 
political ideology and what their world vision is.
    So one thing I want to ask all of you is, following the 
findings and recommendations of the Webster report on the Fort 
Hood attacks, how would you categorize the attack that occurred 
at Fort Hood? Mr. Winter.
    Mr. Winter. We discussed this question at length. I speak 
for the Commission and our unanimous view. Our view was that we 
saw evidence but we did not have the opportunity to investigate 
on a criminal basis, as the U.S. military is doing, and so we 
don't know----
    Mr. Duncan. Let me ask this question a different way. 
Workplace violence or domestic terrorism?
    Mr. Winter. I have heard that, both of those 
characterizations. We refused to reach a finding on that. I 
have to say the reason is that we don't have the evidence 
sufficient to know. We don't know what kind of standard 
Department of Defense is applying.
    Certainly our investigation was not into Department of 
Defense activities; and it was not into the criminal 
investigation itself, which was to a great degree hands-off to 
us because the military is pursuing that criminal case against 
Major Hasan. So we were unable to reach a decision on those 
issues. We do believe and really would like to see justice done 
for the victims, their families.
    Mr. Duncan. I am going to end this dance.
    Professor Manji.
    Ms. Manji. Domestic terrorism, home-grown.
    Mr. Duncan. Thank you.
    Mr. Leiter.
    Mr. Leiter. Congressman, the analysts at NCTC within a 
week, as I said, deemed it to qualify as an act of 
international terrorism under our statute that we use. It was a 
subgovernmental group, political violence. We called it 
terrorism then; I call it terrorism today.
    Mr. Duncan. Okay. I want to refer back to the Chairman's 
opening statement. The men and women that stood at Fort Hood at 
that ceremony, ones that were wounded in that attack, the 
families of the victims of that attack will tell you to this 
day this was an act of domestic terrorism in the war against 
terrorism. I think we as America need to set aside political 
correctness and really be able to discuss the real threats, 
existential threats to our way of life.
    With that, Mr. Chairman, I yield back.
    Mr. McCaul. Thank the gentleman.
    The gentleman from Illinois, Mr. Davis, is recognized.
    Mr. Davis. Thank you very much, Mr. Chairman; and I 
certainly want to thank the witnesses for their participation 
and especially for their insights and their answers.
    I was thinking that, you know, we can always know what 
happened because we have the information. It is obviously far 
more difficult to determine why it happened or the causes that 
may have generated or caused it to take place.
    Mr. Winter, let me ask you, if I could, you indicated that 
policies are that investigators and agents have 90 days to work 
on leads and that sometimes individuals have more call for 
activity than time or there is not enough personnel, there are 
so many leads and trying to follow up on all of them. Are there 
thresholds that will jump out at you? I mean, if you are 
reviewing tips and information and allegations, that a person 
can just kind of see that this appears to be over the line and 
we need to try and check it out as quickly as we can?
    Mr. Winter. Yes, there is a significant amount of training 
on many different levels on how to deal with tips, information, 
intelligence of different kinds. Here the San Diego agents 
recognized that the messages deserved some form of action. 
Under FBI policies that then existed, they could set what was 
called a routine discretionary action lead because it was not--
there was no indication of anything imminent, something that 
required a 24-hour or 48-hour response. That meant it was a 
routine lead, which would be resolved in the ordinary course of 
business. It also meant that the WFO would exercise its 
discretion on how to handle the lead.
    The 90-day period that was in existence was an informal FBI 
practice at that time. We have, of course, recommended that the 
FBI establish periods within which leads must be acted upon. 
The FBI in turn has also eliminated these discretionary action 
leads and has required action on all leads that are sent out 
from other offices.
    Mr. Davis. Let me ask each one of you if you think that we 
do as well as we possibly could in making assessments of 
individuals when they are going to be placed in certain kinds 
of positions relative to evaluation as people seek employment, 
as people take assignments and have access to certain kinds of 
opportunities. Do we assess their personalities or do we glean 
enough information where it gives a comfort level in terms of 
where they are and what they might be doing?
    Mr. Leiter. Congressman, I will answer on two pieces.
    First, I think we probably all as bosses have interviewed 
someone, given them a job. They had glowing recommendations, 
and then they come and work for you and the performance ain't 
so glowing. So this is a pretty broad problem. Obviously, the 
manifestation in this situation is absolutely tragic.
    The second piece, though, more specific to terrorism, is 
the FBI does have an incredibly difficult job of distinguishing 
those people who were radicalized and have radicalized views 
and those who become mobilized and actually take a terrorist 
action. Again, that is why you want people to go out and 
interview them and try to make that determination.
    But, frankly, the FBI, with all its resources, if you used 
everyone in the Federal Government, they couldn't watch 
everyone who was just, ``radicalized.'' They have got to 
prioritize. Making that determination is very hard before the 
fact and looks very, very easy after the tragedy.
    Mr. Davis. Or even people who might seek to become members 
of the FBI to be in a position to carry out their ultimate aim.
    So all I am really seeking is opinion. I know that it is 
tough trying to deal with motivation all of the time. I mean, 
if we could answer that, we would be in very good shape.
    Ms. Manji. Congressman, if you will allow me one quick 
intervention, I have written exactly about this question of 
what to ask in order to conclude within the Muslim communities 
of this country where people stand on the continuum of reform, 
moderation, extremism; and I would be very pleased to submit to 
the committee the specific questions that I recommend be asked.
    Mr. Davis. Thank you very much.
    Thank you, Mr. Chairman.
    Mr. McCaul. I thank the gentleman.
    Just let me close by--first, let me thank you for this 
excellent testimony. I agree with you, Mr. Leiter, that the 
FBI, JTTFs have an enormous challenge. So much information is 
coming through, and you miss one thread and then you are held 
accountable.
    I think this case, though, I would make the argument is a 
little different. You have got a major on a base, Fort Hood, 
who is talking to a cleric, who there was some evidence may 
even have had ties to the 9/11 hijackers, for God's sake, and 
he is really rising in stature to becoming the No. 2 in the 
world, next to bin Laden.
    I think, unfortunately, WFO only gets two emails. They 
don't get the May 31 email that clearly outlines what his 
intentions are and what he is planning to do.
    You are right, Professor, San Diego has it, though; and 
they have DOD employees on these task forces. You know, why 
didn't one of those at least contact Fort Hood? Why didn't 
anybody contact Fort Hood and say, you know what, there is an 
issue here? You got a problem. You got a guy that could 
actually kill somebody, you know.
    I don't think any of you really have the answer to that. I 
don't have the answer to that. It is just unfortunate that it 
didn't happen in this case.
    So with that, again, we thank you for your brilliant 
insight and your excellent testimony; and I will dismiss this 
panel, move onto Panel No. 2. Thank you.
    [Off the record for a few minutes.]
    Mr. McCaul. Our Government witness requested to be on a 
separate panel all by himself.
    Let me introduce Mr. Kshemendra Paul, who is the program 
manager for the Information Sharing Environment at the Office 
of the Director of National Intelligence. As program manager, 
Mr. Paul has Government-wide authority to plan, oversee the 
buildout, and manage use of Information Sharing Environment. He 
also co-chairs the White House's Information Sharing and Access 
Interagency Policy Committee.
    The Chairman now recognizes Mr. Paul for his testimony.

  STATEMENT OF KSHEMENDRA PAUL, PROGRAM MANAGER, INFORMATION 
    SHARING ENVIRONMENT, OFFICE OF THE DIRECTOR OF NATIONAL 
                          INTELLIGENCE

    Mr. Paul. Chairman McCaul, Ranking Member Keating, 
distinguished Members of the committee, thank you for inviting 
me to testify today.
    My is Kshemendra Paul. I am the program manager for the 
Information Sharing Environment. By training and profession, I 
am an information technologist. Formerly, I was the chief 
architect of the Federal Government.
    My office works with mission partners--Federal, State, 
local, Tribal, private sector, and internationally. Together, 
our focus is on the improvement of the management, discovery, 
fusing, sharing, delivery of, and collaboration around 
terrorism-related information.
    The role of my office is planning, oversight, and 
management. We span a variety of communities--law enforcement, 
homeland security, defense, foreign affairs, and intelligence.
    As my office and our partners continue to implement 
responsible information-sharing practices, we reflect on the 
progress we have made across the Nation, as well as recognizing 
that work remains.
    In January, Director Clapper spoke of a National 
responsibility to share information. He encapsulated our 
vision. He said, and I quote, ``The right data, anytime, 
anyplace, usable by any authorized recipient, preventable only 
by law and policy and not technology and protected by a 
comprehensive regime of accountability.''
    This week, we marked the 11th anniversary of the 9/11 
terrorist attacks. The National security community has achieved 
numerous successes. As they pertain to my office, these include 
improving interoperability of our sensitive but unclassified 
networks, enhancing the capabilities of the fusion centers, 
State and local fusion centers, expanding the mission 
application and the impact of the Nation-wide Suspicious 
Activity Reporting Initiative, strengthening industry and 
Government adoption of our interoperability and standards 
framework, including the National information exchange model, 
and, finally, integrating our non-Federal stakeholders, in 
particular State and local law enforcement, into the National 
policy conversation through the interagency policy committee 
you mentioned.
    But we are not without challenges. These include the 
continuously evolving threat environment, the tsunami of data 
faced by my mission partners, and the constrained fiscal 
environment.
    My office continues to convene partners and lead efforts in 
responsible information-sharing innovation. This is a journey. 
The evolution of the threats against us, the integration of our 
resources, and the efficient use of technology require constant 
vigilance and leadership. The threats to our safety do not stop 
at jurisdictional or agency boundaries. Our information 
shouldn't either.
    Three core ideas are the drivers of the mission of my 
office. We are grounded by an enduring purpose to advance 
responsible information sharing to further the counterterrorism 
and homeland security missions. We are focused on responsible 
information sharing to enable decisions to prevent harm to the 
American people. Finally, we are building capacity for 
responsible information sharing across our mission partners at 
all levels of Government.
    We are also strengthening protections for privacy, civil 
rights, and civil liberties. This work makes us stronger.
    Let me elaborate. Every fusion center in our country has a 
privacy policy as comprehensive as Presidential privacy 
guidelines. The bulk of Federal departments are in the same 
position, and we are well on the way to finishing the job here 
in Washington. This means that when citizens see something and 
say something, when police officers submit reports to fusion 
centers and Joint Terrorism Task Forces, when analysts work to 
connect the dots, the work proceeds across agencies and levels 
of government in a standardized and efficient manner that 
handles information appropriately and responsibly.
    Gaps, challenges, and opportunities for improvement exist. 
We have traction, a clear and compelling value proposition, and 
a way forward to continue to accelerate responsible information 
sharing. You have our comprehensive annual report; and, for the 
record, it is located on our website, ISE.gov.
    In summary, I believe there is no higher priority in the 
nexus between National security and public safety than 
responsible information sharing.
    On a personal note today, as we talk about the attacks at 
Fort Hood and also reflect on recent events overseas, I just 
want to say that my thoughts and prayers go out to the victims 
and their families.
    Mr. Chairman, Ranking Member, thank you for the opportunity 
to be here, and I look forward to your questions.
    [The prepared statement of Mr. Paul follows:]
                 Prepared Statement of Kshemendra Paul
                           September 14, 2012
                              introduction
    Chairman McCaul, Ranking Member Keating, and distinguished Members 
of the subcommittee, I am Kshemendra Paul, the program manager for the 
Information Sharing Environment (ISE). We are the National office for 
responsible information sharing. The ISE provides analysts, operators, 
and investigators with information needed to enhance National security. 
These analysts, operators and investigators come from a variety of 
communities--law enforcement, homeland security, intelligence, defense, 
and foreign affairs--and may work for Federal, State, local, Tribal, or 
territorial governments, or in the private sector or our international 
partners. The PM-ISE works with ISE mission partners to improve the 
management, discovery, fusing, sharing, delivery of, and collaboration 
around terrorism-related information. The primary focus is any mission 
process, anywhere in the United States, that is intended or is likely 
to have a material impact on detecting, preventing, disrupting, 
responding to, or mitigating terrorist activity. The PM-ISE facilitates 
the development of the ISE by bringing together mission partners and 
aligning business processes, standards and architecture, security and 
access controls, privacy protections, and best practices.
                               statement
    As PM-ISE and our mission partners continue to implement 
responsible information-sharing practices, we reflect on the tremendous 
progress made toward our goal, while recognizing that significant work 
still needs to be done. In January, Director of National Intelligence 
James R. Clapper spoke of the National responsibility to share 
information--``the right data, any time, any place, usable by any 
authorized recipient, preventable only by law or policy and not 
technology, and protected by a comprehensive regimen of 
accountability.''\1\ As the office responsible for organizing and 
implementing responsible information-sharing practices Nation-wide, we 
are proud of the progress we have made strengthening National security 
while also honoring and protecting privacy, civil rights, and civil 
liberties.
---------------------------------------------------------------------------
    \1\ http://csis.org/files/attachments/
120126_info_sharing_clapper_transcript.pdf.
---------------------------------------------------------------------------
    We have become much better at using our inherent strengths to make 
the American people safer. Our federated democracy means that we have 
committed law enforcement, public safety, and intelligence 
professionals working at the Federal, State, local, and Tribal levels; 
they are also working closely with partners in the private sector to 
protect our Nation's infrastructure. We have carved out a strong role 
for governance through our leadership role in the White House's 
Information Sharing and Access Interagency Policy Committee. Our robust 
and innovative private sector contributes significantly to the work of 
the ISE. And we are championing a standards-based approach to defining 
Government requirements for responsible information sharing that will 
enable greater interoperability across our Government's networks while 
offering a greater potential for cost savings.
    This week we marked the eleventh anniversary of the 9/11 terrorist 
attacks. The National security community has achieved numerous 
successes since 2001, including progress towards improving: 
Interoperability of our sensitive but unclassified computer networks, 
capabilities of our fusion centers, and mission impact of our Nation-
wide suspicious activity reporting practices. The PMISE has enhanced 
our National security by: Advancing these initiatives, brokering 
solutions between organizations with different missions, convening 
partners from inside and outside the Government, and leading 
improvements in responsible information sharing through policy, 
governance, and strategy.
    The PM-ISE is committed to continuing to convene partners and lead 
efforts in innovation. We understand that this is a continuing journey. 
The evolution of the threats against us, the integration of our 
resources, and the efficient use of technology to move our responsible 
information sharing agendas forward requires constant vigilance and 
leadership.
    Three core ideas are the drivers of PM-ISE's mission. We are:
   Grounded by an enduring purpose to advance responsible 
        information sharing to further the counterterrorism and 
        homeland security missions. We must stay focused on the fact 
        that we are sharing information in order to keep the American 
        people safe.
   Leading a transformation from information ownership to 
        information stewardship in order to improve Nation-wide 
        decision making. We must treat information held by the 
        Government as a National asset: This means it must be used, and 
        reused, to benefit the American people. Information must be 
        protected and cultivated to ensure that we get the maximum 
        value from it. At the same time, strong protections for the 
        privacy, civil rights, and civil liberties of the American 
        people must be safeguarded.
   Promoting partnerships across Federal, State, local, and 
        Tribal governments, and the private sector, as well as 
        internationally. By building organizational capacity at every 
        level, we will share information more securely and effectively. 
        The threats to our safety do not stop at jurisdictional 
        borders; our information must not either.
    We have also strengthened privacy, civil rights, and civil 
liberties protections by developing privacy guidelines, on behalf of 
the President, and supporting Federal, State, and local agencies as 
they develop privacy policies that are at least as comprehensive as the 
ISE privacy guidelines.\2\ This means that when citizens see something 
and say something, and when police officers submit reports to their 
local fusion centers, they all know that the information will be 
handled appropriately. It means that when analysts conduct their 
evaluations, they will proceed in a manner based on agreed-upon 
definitions of behaviors that are indicative of terrorist activity, and 
that their investigations will not be based on race or religion. It 
means that the American people can know that their Government is 
committed to protecting their privacy, civil rights, and civil 
liberties, as well as their security.
---------------------------------------------------------------------------
    \2\ Guidelines to Ensure that the Information Privacy and Other 
Legal Rights of Americans are Protected in the Development and Use of 
the Information Sharing Environment (``ISE Privacy Guidelines'') 
(November 2006) available at http://ise.gov/sites/default/files/
PrivacyGuidelines20061204_1.pdf.
---------------------------------------------------------------------------
    While we focus on the accomplishments and the progress to date on 
numerous fronts, we maintain a sense of urgency about tackling the work 
that remains to be done. The biggest challenges facing the ISE are the 
continuously evolving threat environment, the tsunami of new data, and 
a constrained fiscal environment. As the ISE grows and its work deepens 
and expands, we need to continue to assess and adjust for current 
realities--allowing us to be well-positioned for dealing with future 
threats and exploiting opportunities.
    These challenges and opportunities present a framework within which 
to rethink the ISE and our approach to responsible information sharing. 
We see great potential in leveraging our advances and building from the 
terrorism-related mission to more broadly support information-led 
public sector transformation. Recognition of the enduring value of the 
ISE lies in the ceaseless needs of the mission and the variety of 
continued successes that have been spawned by our work. The 2012 ISE 
Annual Report to the Congress showcases many of these accomplishments 
and lays out our way forward. While gaps, challenges, and opportunities 
for improvement are present and described, we have established 
traction, developed a clear and compelling value proposition, and 
identified a way forward.
    We are fulfilling the mission set out before us, and we are 
enhancing our National security through responsible information 
sharing. We will continue to fulfill this mission and to identify and 
meet new challenges as they arise.
    More information about the Information Sharing Environment and the 
office of the Program Manager is available at ISE.gov.
                                summary
    I believe there is no higher priority for our National security 
than the issue of information sharing. Congress has provided us the 
mandate through legislation; the President has provided us the 
leadership and further guidelines; we continue the work of transforming 
our information-sharing environment into one that works more 
effectively for all.
    Thousands of men and women work tirelessly to protect this Nation 
from terrorist threats. It is important for us to provide them and 
other decision makers with the best possible information to do their 
job to protect the people and interests of the United States against 
another terrorist attack.
    Mr. Chairman, I appreciate the opportunity to provide this 
subcommittee with information on the activities of the Program 
Manager's Office and look forward to your questions. Thank you.

    Mr. McCaul. Thank you, Mr. Paul, and thank you for 
recognizing the importance of information sharing, fusion 
centers.
    Mr. Keating, my Ranking Member, we both worked with fusion 
centers. Sometimes they are given a bit of a bad name, and I 
think that privacy protection piece is important to preserve 
the integrity of the work that they are doing and to make sure 
that privacy interests are protected.
    So, with that, I again want to focus back to what this 
hearing is all about, and that is Fort Hood.
    Now, my question may go outside of your expertise or 
ability to comment. But, again, in this case I think you had a 
huge breakdown in information sharing, not only between the FBI 
within itself but also with the Department of Defense. If you 
can speak to these issues, I would like to know how to fix 
this.
    First, you have got an agent sitting at WFO who sits on 
this matter for the maximum amount of time possible, looks at 
the lead on the very last day. I understand the FBI is swamped. 
They have a lot on their plate. But when you have a major at 
Fort Hood who is the subject matter, I think that would take a 
little higher priority. But they wait until the very last day 
and within 4 hours make an analysis based upon two of 18 emails 
because this analyst doesn't know how to access the database 
that would give him the other 16 emails, one of which, as I 
mentioned previously, telegraphs what he is getting ready to 
do. So you have got that breakdown.
    Then, you know, finally, within these task forces you 
actually have Department of Defense representatives. Why on 
either side, both from Washington or San Diego, in your 
opinion--and maybe you can't speak to this--but why didn't one 
of those DoD representatives on the JTTFs contact Fort Hood and 
say, you got a problem?
    Mr. Paul. Commenting on the specific operational aspects of 
Fort Hood are a little bit outside of my lane.
    But what I would like to come to is some of the comments 
that were discussed on the earlier panel that relate to this 
question, things like doing a better job of enterprise data 
management. That was a key recommendation coming out of the 
Webster Commission. It is a key focus of my office, all right. 
There is a recognition, this goes back to the 9/11 Commission, 
a series of seminal reports from the Markle Foundation that is 
codified in the Intelligence Reform and Terrorism Prevention 
Act. It is really the mandate for my office. It is to drive a 
better job of enterprise data management so we can knit 
together all the different aspects of National and public 
security to keep the American people safe.
    I mean, think about 800,000 police officers in this 
country. The bulk of law enforcement is State and local, 18,000 
police departments. Knitting that together into a coherent 
National architecture requires a focus on common processes, 
policies, and data standards.
    We have had success with that, actually. I mentioned in my 
opening comments about the National information exchange model. 
What is not widely understood is that originated with State and 
local law enforcement. It is actually a State and local 
innovation that we have adopted at the Federal level as the 
basis for our counterterrorism data sharing enterprise.
    So I think, you know, the focus on knitting together all 
these different components into a coherent architecture really 
is the key.
    Mr. McCaul. You know, as somebody who has worked on the 
FISA applications, I understand the restrictions when a FISA is 
out there, like in this particular case with Mr. al-Awlaki. I 
think there is so much apprehension when you get in the FISA 
world and so many restrictions, legal restrictions, that that 
may have been counterproductive and may have gotten in the way 
of these Department of Defense employees or officials sharing 
this information with Fort Hood, which is something that the 
Ranking Member and I would like to maybe look at jointly as to 
if we have to reform it or somehow just have some sort of 
reporting language that would clarify that that can be shared.
    I can't imagine why, if the Federal Government has this 
information within its hands, it can't share it with the United 
States Army, United States military, you know, on one of its 
bases. To me, that is just incomprehensible.
    So I thank you for your testimony.
    With that, I recognize the Ranking Member.
    Mr. Keating. Thank you, Mr. Chairman.
    Mr. Leiter and Mr. Winter had said that although the 
chances would have been less likely, the circumstance, this 
tragedy at Fort Hood could indeed occur again today. Could you 
reflect on your thinking whether it could occur today?
    Also, what would you give for your recommendations to try 
and not have--the greatest legacy we can give to these families 
that have lost loved ones are--I think the greatest legacy is 
that this wouldn't happen again to another American. Could you 
comment on what you think in that regard?
    Mr. Paul. It is difficult to answer a hypothetical about 
the specific events that occurred at Fort Hood. But what I will 
say, and I will highlight the Nation-wide Suspicious Activity 
Reporting Initiative, you know, one of the things that we are 
really successful on with this initiative is being able to 
bring together a lot of different voices across levels of 
government, and outside the Government, to identify a process 
for doing suspicious activity reporting that addressed privacy, 
civil liberties concerns, but also operational effectiveness. 
Through that process, we were able to identify 16 behaviors 
reasonably indicative of terrorism-related activity or pre-
operational criminal planning. So that functional standard is 
in place Nationally now.
    You know, coming back to the question about policy or 
things like that, when we started that journey a lot of folks 
were concerned that we wouldn't be able to rationalize how 
folks looked at these kinds of issues because of the levels of 
government and the privacy issues. But we were able to work 
through those successfully, all right. So I think there is a 
model there, and I go back to that as----
    To answer your question about, you know: What is the 
highest priority? From where I sit, accelerating responsible 
information-sharing practices, as championed by my office, you 
know, is a real part of the answer in terms of dealing with the 
enterprise data management issues that were highlighted, 
dealing with the jurisdictional issues, dealing with the 
cultural issues, I think just accelerating the work.
    Mr. Keating. The other thing that Mr. Leiter mentioned is, 
when we were talking about a patchwork system versus a National 
system, he referred to having six regional areas perhaps as an 
approach that would be effective. What do you think in terms of 
that?
    Because I do think the more you have it under one roof, so 
to speak, even though it might be an IT roof, the more that is 
there the better off we are. His reference to having six 
regional areas as sort of a better step than we have now in 
this patchwork quilt, do you think that would be effective as 
well? I mean, you are dealing with getting the same message, 
but the process by which it is reviewed and shared is the 
issue, too.@
    Mr. Paul. You know, the Information Sharing Environment by 
design, by statute is a distributed and decentralized 
environment that interconnects existing systems. So the focus 
we have is on interoperability but not just at the technical 
level. It is not about pipes and things like that. That is an 
important component, but it is more. It is interoperability at 
the policy level, the business process level. So we think it is 
key to keep that focus on interoperability so that you can 
seamlessly share the information.
    Now, the FBI approach on regionalization, that is a focus 
on coordinating Federal activity, which I think is a good 
thing. It is something we have heard from our State and local 
partners. It is something that we are working through the 
different governance structures.
    Mr. Keating. I will just ask you this, too. We had a 
hearing in Houston, actually, on the Port of Houston and 
security. One of the things that came out of that was the need 
for the first line, the need for local police to be there and 
to be really one of the most important flash points in terms of 
information.
    I must tell you, it is just my feeling, that of all the 
areas, we are talking about all the higher governmental areas, 
Department of Defense, FBI, I just don't see enough effort or 
enough success at that local level, the front line. Sometimes 
that information can be just the catalyst to spring the network 
of information that really will tell us something. What are 
your recommendations to really do a better job at the local 
level of having them be part of that information network?
    I know there is agencies that don't want to go down to that 
level for fear that some of that information might be breached. 
But the other side of that is, without sharing that information 
at the local level, you could really lose probably the most 
important information that you could have in front of you in 
the most time-sensitive way.
    Mr. Paul. You know, we have had some success as a 
Government with the National network of fusion centers and 
their increasing maturity. Those efforts are led by DHS with 
close involvement from FBI--integral involvement from FBI, and 
DOJ, and other Federal agencies.
    I talked about the SAR initiative before. Three hundred 
thousand police officers in this country have been trained. It 
is the first time that I know of where these police officers 
have been through the same training. It was around the 
behaviors I mentioned earlier.
    So there is some success that way. It's at risk right now 
because of the fiscal situation, right?
    This goes to--you know, to answer your question, when I 
talk to my State and local stakeholders, that comes back loud 
and clear. When you look across that landscape, 18,000 police 
departments, 90 percent of which have 50 or fewer sworn 
officers, there is a real concern about the smaller 
departments, which make up the bulk of law enforcement, how to 
integrate them in the National architecture. So a focus of our 
office and working with our stakeholders is to look at 
solutions like regionalization, you know, that is controlled by 
States, or State-wide information-sharing environments, or co-
location. All right. There is a variety of different 
approaches, and they are talked about in the annual report.
    But I think thoughtful solutions like that to help bring 
people together to have a common information infrastructure are 
a key part of dealing with this financial issue as well as 
knitting together the smaller departments into a National 
architecture.
    Mr. Keating. So, just to be clear, you are hearing from the 
local stakeholders that they are saying that if there was, for 
instance, Federal money that could go to that kind of training, 
then they would be more apt to participate and then be a part 
of this, you think, from their vantage point?
    Mr. Paul. When I talk to the State and locals and the 
Federal, there is a key focus on making sure that as we have 
these investments today, right, in the fusion centers and in 
other initiatives that we are looking at making them as 
effective as possible by expanding the usage of them with the 
smaller agencies and also looking at, over time, other priority 
crimes, other priority threats that allow then the business 
case to be made more effectively for these and to develop 
support for them.
    Mr. Keating. Okay. Thank you. I yield back.
    Mr. McCaul. The gentleman from South Carolina, Mr. Duncan.
    Mr. Duncan. Thank you, Mr. Chairman.
    Mr. Paul, thank you for your work. Your vision and your 
goal for information sharing that will help prevent future 
attacks on this country and just help law enforcement in 
general and mine are similar, are shared, really. So I thank 
you for the work.
    In subsequent hearings or past hearings, we have talked 
with all the agencies, DHS, State, about information sharing 
between those agencies. Some of the things that I have learned 
is that if someone--and I will use the case of maybe a visa 
overstay, and DHS was looking into someone who may or may not 
overstay their visa and investigate the background of that 
person. Sometimes they have to come out of one database or 
system and actually log into another and come out of that 
system and actually log into another. I even heard that an MS-
DOS-type program or database is still being used. I hadn't even 
heard the word DOS in so many years that that kind of caught me 
by surprise.
    But they are all passwords, entry level. So instead of 
having one password or one biometric system where one person 
could enter one time and get in all the databases that they 
need, they are having to remember all the different passwords. 
That gets frustrating, and they end up not doing a complete 
search because of the frustration level.
    So I just share that with you, because I think you need to 
know that. That is what I am hearing from people that currently 
work in the different levels of government.
    In your prepared statement, you talked about the 
transformation of information ownership to information 
stewardship, which I think that is a very valid point. Do you 
believe we have reached that point of information stewardship? 
In my experience, there are still holdouts today, 11 years 
after 9/11, 3 years after Fort Hood, where folks refuse to 
partner or share their information. They still consider they 
have got ownership of that, and they really don't want to share 
it for whatever reason, whether they want to hold themselves up 
to their superiors as the person in the know or the person that 
has the ability to move up in the ranks. We see that in the 
private sector as well. How do we overcome that? Are we 
overcoming that? What do you foresee in the future?
    Mr. Paul. Thank you. That is a focus of the work of my 
office, and I appreciate you mentioning the stewardship focus. 
It has taken us a long time as a Government to develop the 
siloed structures, the programmatic structures, and we have 
lots of policies around information that is based on classes of 
information and that is specific to agencies or bureaus.
    The vision that I talked about that Director Clapper talked 
about is more focused on policy around classes of decisions. 
The Markle Foundation called it an authorized use standard. It 
is a big job to look at the body of policy we have and how do 
we transition it to making decisions about information sharing, 
discoverability, and things like that based on the classes of 
decisions. It requires the technical infrastructure, right, 
with networks that are secure, where identity management works 
across these networks, across different organizations, across 
different levels of government, where we have more consistency 
in how we implement policy in the computer systems.
    This is a lot of work. It is a big journey in front of us.
    We have had some successes. You know, one that I will 
mention is related to the watch list that Mr. Leiter was 
talking about earlier is a success. When somebody gets stopped 
by State and local law enforcement and there is a hit on the 
watch list, we have a process now where that information gets 
back to the local fusion centers and the Joint Terrorism Task 
Forces in a timely manner. All right. So that is important 
again to bring in State and local law enforcement into having 
that situational awareness of what is going on in their 
communities.
    So there is more processes, more work to do, but it is a 
valid point, and it is where we are headed is the stewardship 
focuses.
    Mr. Duncan. I applaud the fusion centers. I see it as the 
first platform, as long as those platforms are integrated to 
talk to the higher platforms, so that the higher-up authorities 
have the ability to go to one platform and be able to Google, 
so to speak--to use that term not necessarily, that company--
but your name and find out everything that someone at a 
decision-making level needs to know about you. So I applaud 
your work.
    I appreciate this committee, the questions that have been 
raised here. Mr. Chairman, I really don't have anything else.
    Mr. McCaul. I thank the gentleman.
    The gentleman from Illinois, Mr. Davis, is recognized.
    Mr. Davis. Thank you very much, Mr. Chairman; and thank 
you, Mr. Paul, for your testimony.
    Government-wide there have been challenges to the 
development of unclassified and classified systems of 
information sharing. In particular, DHS has had problems in the 
past developing and deploying these information-sharing 
systems.
    Let me ask you, how will the recent round of cuts to the 
budget impact development of some of these systems? How can we 
make sure that they are developed and get to the State and 
local and Tribal governments that need them?
    Mr. Paul. It is difficult for me to comment on the cuts 
specific to DHS, but I do want to highlight that DHS, with 
their classified network, the HSDN system, has connectivity out 
to the fusion centers, and they have been making some stellar 
progress with the HSIN system, Homeland Security Information 
Network.
    We are also doing a lot of work to drive interoperability 
across DHS's HSIN system, FBI's LEO--Law Enforcement Online--
the IntelLink system out of the intelligence community, and 
also the grant-funded, State-owned Ris.Net.
    So that is a core initiative of the office, is to have 
interoperability. Our philosophy--there is no wrong door. When 
you are in a fusion center, working in a police department, 
line law enforcement, you can get into these systems and find 
the information.
    We have made progress, as I talked about in the Annual 
Report, but I don't want to overstate that. There is still a 
lot of work to do there.
    We do think that having consistent standards and 
architecture and working with industry to make sure that we are 
not building systems and then trying to interconnect them in a 
one-off manner, that kind of a jerry-rigged approach is not the 
right way. The right way is to have a consistent architecture 
that is used across these different systems and by our State 
and local partners and work with industry and standards 
organizations to make sure that, you know, identity management 
is done in a consistent, best practices way, that we are 
implementing access-based authorization and controls that 
people can discover information. I think that it is a 
challenge, there is more work to do, but we have made some 
substantial progress.
    I do want to highlight that key to making this progress is 
the fact that we have integrated our State and local 
stakeholders into our governance structures. We do that both--
in a variety of ways, but in particular we focus on working 
with professional associations. That gives us a big ability to 
help drive culture change, because it is bottoms-up, and it is 
inclusive.
    Mr. Davis. Let me ask you, it is my understanding that the 
eGuardian system set up by the FBI is a major part of the 
National Suspicious Activity Reporting, or SAR, Initiative and 
is the main way that State and local law enforcement can share 
information on suspicious activities with one another and with 
the Federal Government. How helpful has this system and has 
SARs in general been for Federal counterterrorism efforts? Can 
you give an estimate of how many State and local law 
enforcement SARs have led to Federal counterterrorism 
investigations?
    Mr. Paul. The Suspicious Activity Reporting Initiative is 
foundational to our domestic counterterrorism activities. It is 
a critical integral part. There is approximately 20--maybe a 
little bit more now--I can give you the precise numbers after 
the hearing--in the suspicious activity reports that have been 
vetted to the functional standards that my office has 
published. There is something on the order of 40,000 searches 
in what is called a Shared Space. That is the electronic pool, 
if you like, that the fusion centers and the Joint Terrorism 
Task Forces and other participants in the ISE use to share this 
information.
    Numerous cases have been opened by the FBI. I believe those 
numbers are for official use only, so I would like to respond 
for the record or in a different way for those numbers.
    You know, the eGuardian system is one of two technologies. 
The other is what is called Shared Space. They are 
interoperable. The important thing is they work within the 
functional standard, and there is a common process for how the 
information flows from the citizenry, from industry, critical 
infrastructure, key resource sectors, to local law enforcement, 
to the fusion centers, and the Joint Terrorism Task Forces, 
shared for analytic purposes.
    Mr. Davis. I would just suspect that the number--or that 
there would be some serious increase in the reporting of 
suspicious activity.
    Mr. Paul. There is a substantial number, a substantial 
number of investigations that are across this Nation related to 
suspicious activity reporting, either directly out of the SAR 
system or SAR-like activity. It is foundational.
    Mr. Davis. Thank you very much.
    I have no further questions, Mr. Chairman. I yield back.
    Mr. McCaul. I thank the gentleman.
    Mr. Paul, let me thank you for your testimony as well.
    I just want to conclude by saying that we have 
representatives of the victims and their family members here 
today at this hearing, and I think the Federal Government 
deserves--or should give an apology, a formal apology as to 
what happened, and should call this what it actually was. It 
was an act of terrorism, and I do believe that the families of 
the victims need to be compensated adequately and given our 
deepest respect. As for this Member of Congress and this 
committee, you have my assurance that we will do everything we 
can to make sure that that happens.
    So, with that, the hearing record will be open for 10 days.
    Without objection, this committee is adjourned.
    [Whereupon, at 11:01 a.m., the subcommittee was adjourned.]