[House Hearing, 114 Congress] [From the U.S. Government Publishing Office] COUNTERING VIOLENT ISLAMIST EXTREMISM: THE URGENT THREAT OF FOREIGN FIGHTERS AND HOME-GROWN TERROR ======================================================================= HEARING before the COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED FOURTEENTH CONGRESS FIRST SESSION __________ FEBRUARY 11, 2015 __________ Serial No. 114-2 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Available via the World Wide Web: http://www.gpo.gov/fdsys/ ______ U.S. GOVERNMENT PUBLISHING OFFICE 94-106 PDF WASHINGTON : 2015 ----------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 __________ COMMITTEE ON HOMELAND SECURITY Michael T. McCaul, Texas, Chairman Lamar Smith, Texas Bennie G. Thompson, Mississippi Peter T. King, New York Loretta Sanchez, California Mike Rogers, Alabama Sheila Jackson Lee, Texas Candice S. Miller, Michigan, Vice James R. Langevin, Rhode Island Chair Brian Higgins, New York Jeff Duncan, South Carolina Cedric L. Richmond, Louisiana Tom Marino, Pennsylvania William R. Keating, Massachusetts Steven M. Palazzo, Mississippi Donald M. Payne, Jr., New Jersey Lou Barletta, Pennsylvania Filemon Vela, Texas Scott Perry, Pennsylvania Bonnie Watson Coleman, New Jersey Curt Clawson, Florida Kathleen M. Rice, New York John Katko, New York Norma J. Torres, California Will Hurd, Texas Earl L. ``Buddy'' Carter, Georgia Mark Walker, North Carolina Barry Loudermilk, Georgia Martha McSally, Arizona John Ratcliffe, Texas Brendan P. Shields, Staff Director Joan V. O'Hara, General Counsel Michael S. Twinchek, Chief Clerk I. Lanier Avant, Minority Staff Director C O N T E N T S ---------- Page Statements The Honorable Michael T. McCaul, a Representative in Congress From the State of Texas, and Chairman, Committee on Homeland Security: Oral Statement................................................. 1 Prepared Statement............................................. 3 The Honorable Bennie G. Thompson, a Representative in Congress From the State of Mississippi, and Ranking Member, Committee on Homeland Security: Oral Statement................................................. 5 Prepared Statement............................................. 6 The Honorable Sheila Jackson Lee, a Representative in Congress From the State of Texas: Prepared Statement............................................. 7 Witnesses Mr. Francis X. Taylor, Under Secretary, Intelligence and Analysis, U.S. Department of Homeland Security: Oral Statement................................................. 9 Prepared Statement............................................. 11 Mr. Nicholas J. Rasmussen, Director, National Counterterrorism Center, Office of the Director of National Intelligence: Oral Statement................................................. 15 Prepared Statement............................................. 18 Mr. Michael B. Steinbach, Assistant Director, Counterterrorism Division, Federal Bureau of Investigations, U.S. Department of Justice: Oral Statement................................................. 21 Prepared Statement............................................. 24 COUNTERING VIOLENT ISLAMIST EXTREMISM: THE URGENT THREAT OF FOREIGN FIGHTERS AND HOME-GROWN TERROR ---------- Wednesday, February 11, 2015 U.S. House of Representatives, Committee on Homeland Security, Washington, DC. The committee met, pursuant to call, at 10:15 a.m., in Room 311, Cannon House Office Building, Hon. Michael T. McCaul [Chairman of the committee] presiding. Present: Representatives McCaul, Smith, Rogers, Duncan, Perry, Clawson, Katko, Hurd, Carter, Walker, Loudermilk, McSally, Ratcliffe, Thompson, Jackson Lee, Langevin, Higgins, Richmond, Keating, Payne, Vela, Watson Coleman, Rice, and Torres. Chairman McCaul. The Committee on Homeland Security will come to order. The committee is meeting today to hear testimony on violent Islamist extremism and the threat of foreign fighters and home-grown terror. I now recognize myself for an opening statement. Today, at the first hearing of the House Committee on Homeland Security in the 114th Congress, I would like to take a moment of silence to remember all those who lost their lives at the hands of ISIS, especially Americans James Foley, Steven Sotloff, and most recently, Kayla Mueller. These victims are the reason why we are here today. We must keep these barbaric terrorists out of the homeland to protect the American people. This hearing will also assess the urgent and growing threat of terrorist recruiting and inspiring Americans. We need to accurately define the threat, and that is violent Islamist extremism, and recognize that it is spreading like wildfire around the globe. These fanatics want nothing less than destruction of our way of life, and now their ability to match words with deeds is growing at an astonishing rate. In recent years, their safe havens have proliferated and their ranks have swelled. In many ways, we are no longer talking about terrorist groups. We are talking about terrorist armies. ISIS now controls a territory the size of Belgium, governs millions of people, draws on billions of dollars in revenue and commands tens of thousands of foot soldiers. They are brutal. Their latest act of barbarism was on full display with a horrific murder of a Jordanian pilot. This evolving Islamic terrorist landscape has given rise to the dual threats of foreign fighters returning to the United States and home-grown terrorism. The recent terror attack in Paris and other attacks and plots in Belgium, Germany, the United Kingdom, Australia, Canada, and here in the United States are proof that the threat has surged and that the enemy is dead-set on attacking the West. This map behind me shows a wide-spread surge in ISIS-linked terrorist plots over the last year alone. As Mr. Rasmussen notes in his testimony, more than 20,000 fighters from over 90 countries have made their way to the battlefield to join al- Qaeda, ISIS, and other extremist groups, making this the largest convergence of Islamist terrorists in world history. That number continues to grow despite months of air strikes. Up to 5,000 of these fighters are Westerners, many of whom are able to travel into the United States without obtaining a visa. And more than 150 American citizens have attempted to or succeeded in getting to the battlefield, and we know that some of them have already returned to our shores. You can see this flow depicted in the graphic behind me. But extremists do not need to travel overseas in order to become a threat to our homeland. Through Hollywood-like propaganda videos and social media and through that means, Islamist terror groups are inciting their followers and potential recruits to wage war at home. Both ISIS, and Yemen-based al-Qaeda in the Arabian Peninsula have called for Westerners, including Americans, to wage individual jihad in their home countries, and it is working. ISIS social media also gives step-by-step instructions on how to get to the fight and how to return. Following the attacks in Paris last month, our European partners have been busy uncovering new terrorist cells and disrupting imminent plots. Also, just recently here at home, the FBI arrested an Ohio-based ISIS sympathizer who was intending to attack the United States Capitol with pipe bombs. I am worried about our ability to combat this threat abroad, but also here at home. I wrote to the President recently and raised concerns that we still have no lead agency in charge of countering domestic radicalization and no line item for it in the budgets of key departments and agencies. I am also concerned that the few programs we do have in place are far too small to confront a threat that has grown so quickly. Today, I hope to hear how the administration assesses the danger posed by foreign fighters, particularly Westerners, and the threat of home-grown terrorism here in the United States. More importantly, I hope we will hear about how the administration is responding and how it plans to ramp up its response to those challenges. This morning, I would like to welcome all of our witnesses, but especially Mr. Rasmussen with the National Counterterrorism Center, in his first appearance before Congress after being confirmed as director, and we look forward to his testimony. As part of our committee's focus on this critical National security issue, the Ranking Member and myself are establishing a task force on combating terrorist and foreign fighter travel. The 6-month task force will review U.S. Government efforts, focusing on DHS, to disrupt terrorist travel into our country and to combat the foreign fighter threat. It will ultimately provide recommendations to the committee on how we can improve U.S. security against these dangers. I must say I am very disappointed that the State Department chose not to send a witness here today. The threats we are discussing are serious, and the State Department plays a key role in combating them. I recently sent a letter to the White House expressing my concerns over the Department's desire to resettle tens of thousands of Syrian refugees here in the United States. I am worried that ISIS could exploit this effort in order to deploy operatives to America via a Federally-funded jihadi pipeline. Before closing, I would like to again reiterate what I said at our organizational meeting last month. Mr. Thompson, we look forward to working with you to accomplish our shared goal of protecting the homeland. [The statement of Chairman McCaul follows:] Statement of Chairman Michael T. McCaul February 11, 2015 Today, at the first hearing of the House Committee on Homeland Security in the 114th Congress, I'd like to take a moment of silence to remember all those who lost their lives at the hands of ISIS, especially Americans James Foley, Steven Sotloff and, most recently, Kayla Mueller. The victims are the reason why we are here today. We must keep those barbaric terrorists out of the homeland to protect the American people. This hearing will also assess the urgent and growing threat of terrorists recruiting and inspiring Americans. We need to accurately define the threat--violent Islamist extremism--and recognize it is spreading like wildfire around the globe. These fanatics want nothing less than destruction of our way of life, and now their ability to match words with deeds is growing at an astonishing rate. In recent years, their safe havens have proliferated and their ranks have swelled. In many ways, we are no longer talking about terrorist groups. We are talking about terrorist armies. ISIS now controls a territory the size of Belgium, governs millions of people, draws on billions of dollars in revenue, and commands tens of thousands of foot soldiers. And they are brutal--their latest act of barbarism was on full display with the horrific murder of the Jordanian pilot. This evolving Islamist terror landscape has given rise to the ``dual threats'' of foreign fighter returnees and home-grown terrorism. The recent terror attack in Paris, and other attacks and plots in Belgium, Germany, the United Kingdom, Australia, Canada, and here in the United States are proof that the threat has surged and that the enemy is dead-set on attacking the West. As Mr. Rasmussen notes in his testimony, more than 20,000 fighters from over 90 countries have made their way to the battlefield to join al-Qaeda, ISIS, and other extremist groups--making this the largest convergence of Islamist terrorists in world history. That number continues to grow despite months of air strikes. Up to 5,000 of these fighters are Westerners, many of whom are able to travel into the United States without obtaining a visa. More than 150 American citizens have attempted to or succeeded in getting to the battlefield--and we know some have already returned to our shores. But extremists do not need to travel overseas in order to become a threat to our homeland. Through Hollywood-like propaganda videos and social media, Islamist terror groups are inciting their followers and potential recruits to wage war at home. Both ISIS and Yemen-based al- Qaeda in the Arabian Peninsula have called for Westerners--including Americans--to ``wage individual jihad'' in their home countries--and it's working. ISIS social media also gives step-by-step instructions on how to get to the fight and how to return. Following the attacks in Paris last month, our European partners have been busy uncovering new terrorist cells and disrupting imminent plots. Also, just recently here at home, the FBI arrested an Ohio-based ISIS sympathizer who was intending to attack the U.S. Capitol with pipe bombs. I am worried about our ability to combat this threat abroad, but also here at home. I wrote to the President recently and raised concerns that we still have no lead agency in charge of countering domestic radicalization and no line item for it in the budgets of key departments and agencies. I am also concerned that the few programs we do have in place are far too small to confront a threat that has grown so quickly. Today, I hope to hear how the administration assesses the danger posed by foreign fighters, particularly Westerners, and the threat of home-grown terrorism here in the United States. More importantly, I hope we will hear about how the administration is responding--and plans to ramp up its response--to these challenges. This morning I would like to welcome all of our witnesses but especially Mr. Rasmussen. It is his first appearance before Congress after being confirmed as the Director of the NCTC, and we look forward to his testimony. As part of our committee's focus on this critical National security issue, the Ranking Member and myself are establishing a Task Force on Combatting Terrorist and Foreign Fighter Travel. The 6-month task force will review U.S. Government efforts--focusing on DHS--to disrupt terrorist travel into our country and to combat the foreign fighter threat. It will ultimately provide recommendations to the committee on how we can improve U.S. security against these dangers. I am very disappointed that the State Department chose not to send a witness here today. The threats we are discussing are serious, and the State Department plays a key role in combating them. I recently sent a letter to the White House expressing my concerns over the Department's desire to resettle tens of thousands of Syrian refugees in the United States. I am worried ISIS could exploit this effort in order to deploy operatives to America via a Federally-funded jihadi pipeline. [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Chairman McCaul. With that, the Chairman now recognizes the Ranking Member. Mr. Thompson. Thank you, Mr. Chairman, for your comments, as well as for holding today's hearing. I would like to also welcome Director Rasmussen for his first appearance before this committee as the director of the National Counterterrorism Center. As well, I would also thank the rest of the panel for testifying about the Federal Government's effort to identify and deter foreign fighters and the Government's efforts to counter violent extremism. I would like to express my condolences at the beginning to the family of the 26-year-old Kayla Mueller, an American aid worker who was taken hostage by the Islamic State of Iraq. U.S. officials have confirmed she was killed by the terrorist group. Mr. Chairman, Ms. Mueller's death and other recent terrorist attacks across the world over the past few months have magnified the nature of the evolving threat from the terrorist groups and state actors. The heinous actions by ISIL, including the beheading of a Japanese journalist and the terrorist group's burning of a Jordanian pilot further illustrates the abhorrent nature of this terrorist group. Last month, the Chairman of the Joint Chiefs of Staff indicated that the radical ideology of ISIL is causing other terrorist groups to rebrand themselves and emulate ISIL. Top U.S. officials have made public statements that foreign fighters linked to ISIL may pose a direct threat to this country. Moreover, those inspired by the ideology of ISIL, al- Qaeda, and other groups are of concern. As we look to these threats, we cannot take a myopic view. Each attack from terrorist groups have reemphasized the global reach of terrorist activity. For instance, there was a crippling cyber attack in November on Sony Pictures Entertainment Network. In December, in Sydney, Australia, we witnessed a terrorist attack on a cafe, where at the end of a 16-hour stand-off, two innocent people lay dead. Then in January in Paris, there was a series of execution- style murders of 12 members Charlie Hebdo's creative team. Al- Qaeda in the Arabian Peninsula has taken credit for this attack. This serves as a reminder that the terrorist threats we face are evolving quickly. This committee's responsibility is to hold hearings and receive Classified information that lets us know the nature of the threats and how the Federal Government is dealing with the threat. In spite of this, Mr. Chairman, the Republican majority continues to play political games with funding the Department of Homeland Security. Mr. Chairman, I, too, feel that it is meaningless to have a strategy if the ends are not paired with the means to achieve them. It is my hope that you will make the point to your colleagues and leadership who are holding the funding for a key agency and the Federal Government that Americans look to to detect, deter, and respond to a terrorist hostage situation. Unfortunately, the Department of Homeland Security is operating under the threat of a shutdown, and it is only funded by a continuing resolution for the next 17 days. It is important that my Republican colleagues act responsibly, stop playing politics, and pass a clean DHS funding bill. Without a fully-funded Department of Homeland Security, some of our key methods of identifying terrorists and preventing terrorist travel will be at risk. Are we really ready to stand before the American people, those who trust and value that we recognize their needs, and declare for the sake of partisanship we are going to make our Nation more vulnerable by not funding DHS? Mr. Chairman, I hope not. We have significant challenges before us. You have outlined in your testimony those challenges, but if we don't have a fully-funded Department, one that can't operate on continuing resolution, we put this country, its people, at risk. So whatever it takes for us to deal with this threat, first of all, we have a Department that has the resources to address the threat. So I look forward to the testimony of our witnesses. But I also look forward to an effort where we can get the Department of Homeland Security treated like every other department of Government, having a budget that carries us until the end of the fiscal year. With that, I yield back. [The statement of Ranking Member Thompson follows:] Statement of Ranking Member Bennie G. Thompson February 11, 2015 I would like to welcome Director Rasmussen to his first appearance before this committee as the director of the National Counterterrorism Center. I also thank the rest of the panel for testifying about the Federal Government's efforts to identify and deter foreign fighters and the Government's efforts to counter violent extremism. I would like to express my condolences to the family of 26-year-old Kayla Mueller, an American aid worker who was taken hostage by the Islamic State of Iraq and the Levant. U.S. officials have confirmed she was killed by the terrorist group. Kayla Mueller's death and other recent terrorist attacks across the world over the past few months have magnified the nature of the evolving threat from terrorist groups and state actors. The heinous actions by the Islamic State in Iraq and the Levant (ISIL), including the beheading of a Japanese journalist and the terrorist group's burning of a Jordanian pilot, further illustrate the abhorrent nature of this terrorist group. Last month, the Chairman of the Joint Chiefs of Staff indicated that the radical ideology of ISIL is causing other terrorist groups to rebrand themselves and emulate ISIL. Top U.S. officials have made public statements that foreign fighters linked to ISIL may pose a direct threat to this country. Moreover, those inspired by the ideology of ISIL, al-Qaeda, and other groups are of concern. As we look at these threats, we cannot take a myopic view. Each attack from terrorist groups have reemphasized the global reach of terrorist activity. For instance, there was the crippling cyber attack in November on Sony Pictures Entertainment's network. In December, in Sydney, Australia, we witnessed a terrorist attack on a cafe where, at the end of a 16-hour stand-off, two innocent people laid dead. Then, in January, in Paris, there was a series of execution-style murders of 12 members of Charlie Hebdo's creative team. Al-Qaeda in the Arabian Peninsula has taken credit for this attack. This serves as a reminder that the terrorist threats we face are evolving quickly. This committee's responsibility is to hold hearings and receive Classified information that lets us know the nature of the threat and how the Federal Government is dealing with the threat. In spite of this, the Republican Majority continues to play political games with funding the Department of Homeland Security. Mr. Chairman, I, too, feel that it is meaningless to have a strategy if the ends are not paired with the means to achieve them. It is my hope that you will make that point to your colleagues and leadership who are holding the funding for the key agency of the Federal Government that Americans look to detect, deter, and respond to terrorism hostage. Unfortunately, the Department of Homeland Security is operating under the threat of a shut-down and is only funded by a continuing resolution for the next 17 days. It is important that my Republican colleagues act responsibly, stop playing politics, and pass a clean DHS funding bill. Without a fully- funded Department of Homeland Security, some of our key methods of identifying terrorists and preventing terrorist travel will be at risk. Are we really ready to stand before the American people--those who trust and value that we recognize their needs--and declare for the sake of partisanship, we are going to make our Nation more vulnerable by not funding DHS? Chairman McCaul. I thank the Ranking Member. Other Members are reminded that statements may be submitted for the record. [The statement of Hon. Jackson Lee follows:] Statement of Honorable Sheila Jackson Lee February 11, 2015 Chairman McCaul and Ranking Member Thompson thank you for holding this morning's hearing on ``Countering Violent Islamist Extremism: The Urgent Threat of Foreign Fighters and Home-Grown Terror.'' I offer the family and friends of Kayla Mueller my condolences and thoughts and prayers during this difficult time. She is the latest United States citizen to have been killed while being held against their will by ISIS/ISIL. I welcome and thank today's witnesses, the Honorable Francis X. Taylor, under secretary for intelligence and analysis U.S. Department of Homeland Secretary; the Honorable Nicholas J. Rasmussen, director, National Counterterrorism Center, Office of the Director of National Intelligence; and Mr. Michael B. Steinbach, assistant director, Counterterrorism Division with the Federal Bureau of Investigation. The work of the Department of Homeland Security, the Office of the Director of National Intelligence, and the Federal Bureau of Investigation to protect our Nation and its people from radical terrorists and terrorism is critical to homeland security. The topic of today's hearing is relevant to the reality of a new global terrorism threats posed by the Islamic State of Iraq and the Levant (ISIL)/the Islamic State (IS)/the Islamic State of Iraq and Syria (ISIS). On February 14, 2014, the testimony of James Clapper, the director of intelligence, before the Senate Armed Services Committee estimated that ``somewhere between 75,000 to possibly 115,00 insurgents were organized into 1,500 groups comprised numbers of persons associated with the ISIS/ISIL terrorism network.'' In 2014, the Bipartisan Policy Center reported that more than 10,000 foreign fighters have gone to Syria where they have access to training, weapons, and hardened terrorist fighters. The threat is no longer isolated to the region that borders Syria, Iraq, and Turkey, but can be found in nations far from the area of conflict. In January Belgium police conducted pre-emptive raids against terrorist suspects who were said to have recently returned from fighting with terrorists in the war in Syria. Belgium police reported that the suspects opened fire on police using military-style weapons. The attraction by some in the United States to joining the ISIS/ ISIL is evident by the FBI arrest of U.S. citizens and residents on charges of providing material support to terrorist groups and using certain weapons in connection with the conflict in Syria. In 2014, a 20-year-old U.S. citizen and resident of California allegedly traveled to the Canadian border intending to travel to Syria to join ISIL. In March this young man was charged with attempting to provide material support to a foreign terrorist group after he agreed to ``connect'' an undercover FBI agent to ISIL. Many of the Members of the Homeland Security Committee are concerned about terrorist travel especially those holding United States or European passports because they can gain ease of access to our shores. I know that the Department of Homeland Security's job is to identify foreign fighters who may seek to enter the United States and prevent them from traveling to this country or ensuring another appropriate Government response. I have introduced H.R. 48, the ``No Fly for Foreign Fighters Act,'' which requires the director of the Terrorist Screening Center to review the Terrorist Screening Database and the terrorist watch list to determine if an individual boarding a U.S.-bound or domestic flight poses a terrorist threat or is suspected of being a member of a foreign terrorist organization. It is my believe that the Department of Homeland Security must be able to do its job and that Congress not providing full funding for the agency for fiscal year 2015 is a hindrance to the agency's mission and our obligations to do all that we can be protect the American public. Protection of Federal buildings, as well as the workforce and citizens who access them, are also hampered by a failure to provide full-year funding to DHS. In the wake of high-profile attacks in Paris, Secretary Johnson directed the Federal Protective Services to step up security operations. Without full year funding, those efforts could be hampered. Because of budget uncertainty the Department of Homeland Security cannot complete a much-needed $90 million investment in new and upgraded remote and mobile video surveillance systems in the Rio Grande Valley. These systems are necessary to provide the Border Patrol with increased situational awareness, early detection of border incursions, enhanced identification and classification of threats, and the tracking of suspect materials. Additionally, the Border Patrol needs Mobile Video Surveillance Systems for day and night surveillance. Moreover, the Department cannot carry out the additional 16,526 flight hours along the Southwest Border to detect illegal border crossings. For this reason, I ask my colleagues on the committee to join me in asking the leadership of the House to pass a budget to fully fund the Department of Homeland Security for fiscal year 2015--not doing so may make the Nation more vulnerable at a time we should be at our highest level of preparedness. I thank today's witnesses and look forward to their testimony. Thank you. Chairman McCaul. I am pleased to have three distinguished witnesses before us today to discuss this important topic. First, the honorable Francis Taylor became the under secretary for intelligence and analysis at the U.S. Department of Homeland Security in April 2014. He has held a variety of senior-level positions over his 35-year career in Government service. Most recently, Under Secretary Taylor served as the assistant secretary of state for diplomatic security and director of foreign missions. Thank you, sir, for being here today. Next we have the honorable Nicholas Rasmussen, sworn in as director of the National Counterterrorism Center in December 2014. He previously served as NCTC's deputy director since June 2012. Prior to returning to NCTC, he served with the National Security Council staff as special assistant to the President and senior director for counterterrorism. Thank you, sir. Last but not least, Michael Steinbach, appointed as the assistant director of the FBI's Counterterrorism Division by Director Comey in July 2014. He joined the FBI in 1995, held a variety of positions at FBI headquarters in the field and overseas during his 10-year career with the bureau, most recently served as deputy assistant director of the Counterterrorism Division. The witnesses' full statements will appear in the record. The Chairman now recognizes Under Secretary Taylor for his opening statement. STATEMENT OF FRANCIS X. TAYLOR, UNDER SECRETARY, INTELLIGENCE AND ANALYSIS, U.S. DEPARTMENT OF HOMELAND SECURITY Mr. Taylor. Chairman McCaul, Ranking Member Thompson, and distinguished Members of the committee, I am pleased to be here today with my colleagues from the FBI and NCTC to discuss the foreign fighter threat and our current efforts to disrupt terrorist travel. I would be remiss if I did not highlight one of the biggest threats to the security of our homeland, the lack of funding for the Department of Homeland Security. Given the myriad of threats facing the homeland, it is imperative that Congress pass a full-year DHS appropriations bill for 2015. As long as the Department operates under a CR, there are a whole series of activities vital to homeland security and public safety that the Department just cannot do. The men and women of DHS need a partner in Congress to fund their efforts. Time is running out, and I urge Congress to pass a full-year appropriations bill for this Department as soon as possible. The foreign fighter threat continues to be a security threat to the United States and our allies. Events in Australia, Canada, and most recently in France and Belgium underscore that the foreign fighter threat is no longer a problem restricted to foreign conflict zones, such as northern Syria and western Iraq. At present, we are unaware of any specific, credible, or imminent threat to the homeland. However, recent events have demonstrated the need for increased vigilance, both at home and abroad. That said, the foreign fighter threat is constantly evolving as well as developing new tactics in recruitment that we have not previously seen before. The Islamic State of Iraq and Levant, commonly referred to as ISIL, exhibits a very sophisticated propaganda capability. ISIL's use of multi-media content has enhanced the appeal of its terrorist organization. This propaganda encourages supporters to carry out attacks, and such attacks could be conducted without specific direction from ISIL with little or no warning. To address this very threat, counter violence extremism in the homeland, and to guard against the domestic lone offender, Secretary Johnson has directed the DHS to build on our partnerships with our State, local, and local law enforcement partners in ways that enhance its community relationships and builds resilience to violent extremism. The Secretary recently appointed a CVE coordinator to oversee the various CVE programs and efforts across our Department. Additionally, since September 2014, Secretary Johnson has personally participated in direct engagement efforts with critical stakeholders in Chicago, Columbus, Ohio, Minneapolis, Los Angeles, and Boston to discuss how DHS can best support local efforts to counter violent extremism and address the foreign terrorist fighters. DHS CVE efforts are designed to share information with communities and local officials, to raise vigilance on behavioral indicators that may link to radicalization to violence. The DHS program also focuses on empowering communities and local law enforcement to develop intervention and prevention efforts at the local level. The White House plans to host a CVE summit on February 18, 2015. It will focus on both domestic and international CVE efforts. Prior to the summit, DHS will host an event for domestic stakeholders on February 17 at the White House, while a second affiliated event, specifically for international partners, will be hosted by the Department of State on February 19. Let me now turn to the specific efforts DHS is undertaking to identify, address, and minimize the foreign fighter threat to the United States and to our allies. Beginning in July 2014, DHS required enhanced screening at selected overseas airports with direct flights to the United States. Weeks later, DHS added additional airports to this list with the United Kingdom and other countries following similar enhancements to their required aviation security operations. TSA, as directed by Secretary Johnson is also conducting an immediate short-term review to determine if additional security screening measures are necessary at both domestic, and overseas, last-point-of-departure airports. DHS is also exploring the possibility of expanding PRE--pre-clearance operation at foreign airports with flights to the United States. Currently, CBP has pre-clearance operations at 15 airports in six countries, and, where appropriate, CBP intends to enter into negotiations to expand air pre-clearance operations at new locations. The Department continues to work closely with our European partners through the U.S.-E.U. Passenger Name Records Agreement to transfer passenger name records information to DHS by airlines that are subject to the E.U. data protection laws. In addition, DHS uses close partnerships with countries in the Visa Waiver program and the five-country ministerial to improve respective abilities to identify illicit travel. Just this past November, the Secretary increased the data fields that are collected from Visa Waiver countries where visas are not required for entry into the United States, and to provide additional passport data, contact information, and other potential names or aliases in the travel application submitted under the electronic system for travel authorization before they can travel to the United States. DHS is increasing efforts to track those who enter and leave Syria and may later seek to travel to the United States without a State Department-issued visa. The terrorist threat is dynamic, and those who operate individually as a part of terrorist organizations will continue to challenge our security measures and our safety. Mr. Chairman, I would like to end my statement there, and I look forward to the questions from the committee. [The prepared statement of Mr. Taylor follows:] Prepared Statement of Francis X. Taylor February 11, 2015 Chairman McCaul, Ranking Member Thompson, and distinguished Members of the committee, thank you for the opportunity to appear before you today--along with my colleagues from the Federal Bureau of Investigation (FBI), the National Counterterrorism Center (NCTC), and the Department of State (DOS)--to discuss the foreign fighter threat and current efforts to disrupt terrorist travel. For some time, the U.S. Government, including the Department of Homeland Security (DHS), has been concerned that terrorist groups operating in permissive environments present a significant security threat to the United States and to our allies. Events in Australia, Canada, and, most recently, in France and Belgium underscore that the foreign fighter threat is no longer a problem restricted to foreign conflict zones such as those in northern Syria or western Iraq. The Islamic State of Iraq and the Levant (ISIL) and other like-minded terrorist organizations have been effective in recruiting fighters from Western countries, as well as recruiting individuals for violent action at home for those who cannot travel to conflict zones. The threat is real, it continues to evolve, and it is a present danger to everyone across the globe. It includes people radicalized to violence overseas, or potentially here in the United States. At present, we are unaware of any specific, credible, imminent threat to the homeland; however, recent events have demonstrated the need for increased vigilance both at home and abroad. We recognize that the threat environment is ever-evolving and becoming increasingly complex and decentralized. For that reason, DHS is continuing to encourage an informed and aware public, as promoted by the ``See something, say something'' campaign, as well as our more specific bulletins. We must recognize protecting the homeland is a shared responsibility. In my testimony today, I will discuss the foreign fighter threat and highlight specific efforts DHS is undertaking to identify, address, and minimize the foreign fighter threat to the United States and to our allies. foreign fighter threat While much of today's hearing will focus on terrorist threats from Syria and Iraq, it is important to emphasize that the terrorist threat is fluid and not constrained to one group, race, ethnicity, national origin, religion, or geographic location. Many terrorist groups continue to pose a risk to our security and safety. Core al-Qaeda (AQ), al-Qaeda in the Arabian Peninsula (AQAP), and AQ's affiliates and adherents remain a major concern for DHS. Despite the deaths of many of AQ's senior leaders, the group maintains the intent, and in some cases, the capability to facilitate and conduct attacks against U.S. citizens and facilities. The group has also demonstrated that it is capable of adjusting its tactics, techniques, and procedures for targeting the West. Events in recent weeks have also made it clear why DHS and others in the counterterrorism and law enforcement communities are concerned about the threats posed by terrorists operating out of Syria and Iraq. In addition to hard-core al-Qaeda loyalists, a number of those involved in terrorist operations within Syria and Iraq are affiliated with ISIL. ISIL operates as if it were a military organization and aspires to overthrow governments in the region and eventually beyond. Their experience and successes on the battlefields in Syria and Iraq have armed this group with advanced capabilities that most terrorist groups do not have. ISIL has also publicly threatened ``direct confrontation'' with the United States, which is consistent with the group's media releases during the past several years that have alluded to attacking the United States. Through their sophisticated messaging capability, which includes the dissemination of high-quality media content on multiple on-line platforms, ISIL has been able to quickly reach a global audience and encourage acts of violence, as well as inspire U.S. citizens to travel to Syria to join in the conflict. The on-going conflict in Syria has emerged as a draw for more than 19,000 foreign fighters. We are aware of a number of U.S. Persons who have traveled or attempted to travel to Syria. More than 150 U.S. Persons and at least 3,400 Westerners have traveled or attempted to travel to Syria to participate in the conflict. We have also noted that veteran al-Qaeda fighters have travelled from Pakistan to Syria to take advantage of the permissive operating environment and easy access to foreign fighters. We remain concerned about the threat of foreign fighters from the United States or elsewhere who may go to Syria and Iraq, become more radicalized to violence, and return to the United States or their home country and conduct attacks on their own or in concert with others. Furthermore, we also are concerned that U.S. Persons who join violent extremist groups in Syria could gain combat skills, violent extremist connections, and possibly become persuaded to conduct organized or ``lone-wolf'' style attacks that target U.S. and Western interests. We also have become increasingly aware of the possibility that Syria could emerge as a base of operations for al- Qaeda's international agenda, which could include attacks against the homeland. dhs response to the foreign fighter threat Aviation Security Terrorist organizations like AQAP continue to pose a serious threat to international civil aviation. As we have seen in AQAP's three attempted aviation attacks against the homeland--the airliner plot of December 2009, an attempted attack against U.S.-bound cargo planes in October 2010, and an airliner plot in May 2012--terrorist groups have shown a significant and growing sophistication in terms of bomb design and construction, operational skill, and innovation. In the past 3 years terrorists have become increasingly interested in circumventing airport security screening through the use of improvised explosive devices (IEDs) concealed in cargo, commercial electronics, physical areas of one's body, in shoes or clothing, and in cosmetics and liquids. To address the terrorist threat to aviation, DHS continues to evaluate, modify, and enhance aviation security measures. For example, beginning in July 2014, DHS required enhanced screening at select overseas airports with direct flights to the United States. Weeks later, DHS added additional airports to the list, with the United Kingdom and other countries following with similar enhancements to their required aviation security operations. Following recent world events, in January 2015, the Transportation Security Administration (TSA) took steps to enhance the number of random searches of passengers and carry-on luggage boarding aircraft at U.S. airports. TSA, as directed by Secretary Johnson, is also conducting an immediate, short- term review to determine if additional security measures are necessary at both domestic and overseas last-point-of-departure airports. DHS will continue to evaluate the implementation of aviation security measures with air carriers and foreign airports to determine if more is necessary, and will make the appropriate aviation security adjustments without unduly burdening the traveling public. In the long term, DHS is exploring the possibility of expanding pre-clearance operations at foreign airports with flights to the United States. This initiative provides for customs, immigration, and agriculture inspections of international air passengers and their goods by U.S. Customs and Border Protection (CBP) officials before the individual boards the plane for travel to the United States. Currently, CBP has pre-clearance operations at 15 airports and in 6 countries and, if appropriate, intends to enter into negotiations in order to expand air pre-clearance operations to new locations. Information Sharing Information sharing with our domestic and foreign partners is vital in identifying developing threats both here and abroad. DHS is committed to continuing our efforts, along with our colleagues in the intelligence community, to partner with European governments and other key counterterrorism allies to share information about terrorist threats. Since its inception, DHS has sought to broaden and deepen international liaison efforts to improve its ability to share information with key foreign allies. DHS has worked closely with the European Union through the U.S.-E.U. Passenger Name Records Agreement to facilitate the transfer of Passenger Name Records information to DHS by airlines that are subject to E.U. data protection laws. This agreement provides the highest standard of security and privacy protection. In addition, DHS has used its close partnerships with the countries in the Visa Waiver program and the Five Country Conference to improve our respective abilities to identify illicit travel. The Preventing and Combating Serious Crime Agreement that DHS and 40 foreign partners have signed provides each signatory with reciprocal access to fingerprint repositories for the purposes of combating crime and terrorism. With the Five Country Conference, which includes Australia, Canada, New Zealand, and the United Kingdom, we have also concluded immigration information-sharing agreements that reduce the likelihood that a person applying for asylum or a visa in any of the five countries who has an illicit past could hide that history. DHS also engages with foreign partners to share analytic and targeting methodology, chiefly by conducting analytic exchanges, to enhance the ability of DHS and foreign allies to identify individuals and travel routes, and prevent travel to foreign conflict zones. DHS is working with our interagency partners to inform our State, local, Tribal, and territorial (SLTT) partners of recent events and threats. Following the Paris attacks, the Office of Intelligence and Analysis (I&A) prepared two Intelligence Notes and worked with the FBI to prepare and issue Joint Information Bulletins (JIBs); DHS shared both items Nationally with fusion centers. I&A continues to provide our State and local law enforcement partners with information about observable behavioral indicators of U.S. Persons planning or attempting travel to Syria. I&A has produced tailored assessments on the motivations of U.S. travelers, their travel patterns, the role social media is playing in radicalization to violence, and the ways in which U.S. Persons are providing material support to Syria-based violent extremist groups. Additionally, I&A has partnered with the FBI to produce JIBs and other products for State and local law enforcement on the trends and observable behaviors in individuals seeking to travel to Syria. Tracking Foreign Fighters DHS is increasing efforts to track those who enter and leave Syria and may later seek to travel to the United States without a State Department-issued visa under the Visa Waiver program (VWP). Working with the intelligence community, DHS is aware that a number of foreign fighters in Syria have come from various VWP countries. In response, this fall, DHS strengthened the security of the VWP through enhancements to the Electronic System for Travel Authorization (ESTA). Those changes went into effect on November 3, 2014. ESTA adds a significant layer of security to the VWP by enabling CBP to conduct security vetting of prospective VWP travelers to determine if they pose a law enforcement or security risk before they board aircraft destined for the United States. DHS determined that additional data will improve the Department's ability to screen prospective VWP travelers and more accurately and effectively identify those who pose a security risk to the United States. These improvements provide an additional layer of enduring security for the VWP and facilitate visa-free travel to the United States. Because we view advance passenger screening as a critical element to an effective National counterterrorism capability, we have explained to many partner nations how they can compare airline manifests and reservation data against terrorist watch lists and other intelligence about terrorist travel. This is an area where the United States has developed a capability significantly more advanced than most other nations, both in identifying illicit travel and in protecting the privacy and civil liberties of all travelers, and we have worked to share this know-how in order to prevent terrorists from traveling the globe in anonymity. Developing this capability is also consistent with the new obligations introduced through U.N. Security Council Resolution 2178, introduced last year by President Obama. DHS is also working with partner nations in Europe, the Middle East, and North Africa to increase our information sharing to track Syrian foreign fighters. These efforts allow the United States greater visibility on potential threats to the homeland, while similarly enhancing our partners' ability to track and prevent terrorist travel. The importance of this issue was highlighted by the United Nations Security Council's adoption of Resolution 2178 in September 2014, which provided new momentum for European and other governments to use air passenger screening technology and enhance information sharing through multi-lateral and bi-lateral channels. Countering Violent Extremism Home-grown violent extremists (HVEs) represent a persistent and often unpredictable threat based on their close familiarity with the United States and their ability to act with little or no warning as lone offenders or in small decentralized cells. Over the past few years we have seen self-mobilizing, independently operating HVEs plot to bomb high-profile targets, such as the Federal Reserve Bank in New York, the U.S. Capitol, and commercial establishments in downtown Chicago, Tampa, and Oakland. All these plots were disrupted. To address the need to counter violent extremism (CVE) in the homeland and to guard against the domestic ``lone wolf''--someone who did not train at a terrorist camp or join the ranks of a terrorist organization overseas, but is inspired here at home by a group's social media, literature, or violent extremist ideology--Secretary Johnson has directed DHS to build on our partnerships with State and local law enforcement in a way that enhances community relationships and builds resilience to violent extremist recruitment. DHS now has a senior executive whose sole responsibility is coordinating and improving the Department's CVE efforts. DHS's approach emphasizes the strength of local communities and the premise that well-informed and well-equipped families, communities, and front-line personnel represent the best defense against violent extremism. Over the past 8 months, DHS has participated in a National Security Council (NSC)-coordinated interagency effort to work with Boston, Los Angeles, and Minneapolis/St. Paul to facilitate and support the development of locally-based, and -driven, violent extremism prevention and intervention pilot frameworks. Additionally, since September 2014, Secretary Johnson has personally participated in direct engagement efforts with critical stakeholders in Chicago, Columbus, Minneapolis, Los Angeles, and most recently, Boston, to hear how DHS can best support local efforts to counter violent extremism and address foreign terrorist fighters. DHS CVE efforts, in partnership with NCTC, also include the development of the Community Awareness Briefing (CAB), which is designed to share Unclassified information with stakeholders regarding the threat of violent extremism, as well as help communities and law enforcement develop the necessary understanding of al-Qaeda, al- Shabaab, ISIL, and related affiliates' recruitment tactics as well as explore ways to address these threats at the local level. The CAB draws a parallel between the similar recruitment targets of all types of violent extremism. For example, the CAB uses the case study on the attack at a Sikh temple in Oak Creek, WI to illustrate potential for violence from all types of violent extremists, including but not limited to violent white supremacists, violent eco-terrorists, violent Neo-Nazis, criminal gangs (such as MS-13), and international terrorist groups. Due to the increased number of Western-based fighters traveling to foreign war conflicts, such as Syria and Somalia, the CAB now includes information relating to the foreign terrorist fighter recruitment narrative by al-Shabaab and ISIL. Beyond our borders, DHS collaborates with partner countries (such as the United Kingdom, Belgium, the Netherlands, Germany, Canada, Spain, and France) to develop best practices in community engagement endeavors that effectively counter violent extremism. Following the Paris attacks, DHS worked with some of these countries and the Department of State to link members of civil society and community stakeholders in respective countries so that they could coordinate and build grass-roots responses to the attacks in Paris. DHS is also working closely with the NSC staff, the Department of State, the Department of Justice including the FBI, and NCTC to plan the February 18-19, 2015, CVE Summit which will bring together key stakeholders from National and local governments around the world as well as the private sector, civil society, and community leaders to develop an action agenda address violent extremism in all its forms. Furthermore, DHS is working with the Department of State on the Global Counterterrorism Forum Workshop, which will be held on February 23 and 24 in Washington, DC and will build on the CVE Summit. This workshop will focus on ways in which communities and governments can develop specific programs and efforts to address the issue of foreign terrorist fighters. France, Canada, Australia, and others will address the recent attacks they have faced and solutions they are developing to deal with this threat. conclusion The terrorist threat is dynamic, as those who operate individually or as part of a terrorist organization will continue to challenge our security measures and our safety. DHS will continue to work with our international counterparts and our colleagues within the FBI, NCTC, Department of State, and the intelligence community, to identify potential threats to our security, both at home and abroad. Chairman McCaul, Ranking Member Thompson, and distinguished Members of the committee, thank you for the opportunity to appear before you today. I look forward to answering your questions. Chairman McCaul. I thank the Secretary. Excuse me. The Chairman now recognizes Director Rasmussen for his opening statement. STATEMENT OF NICHOLAS J. RASMUSSEN, DIRECTOR, NATIONAL COUNTERTERRORISM CENTER, OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE Mr. Rasmussen. Thank you, Chairman McCaul, Ranking Member Thompson and Members of the committee. I really do appreciate the opportunity to be here today to discuss the threat posed by foreign fighters and home-grown terror and our efforts as a Government to counter it. As Frank Taylor said, I am also pleased to join my colleagues and close partners from Homeland Security and the Federal Bureau of Investigation. We work closely and cooperatively every day as a part of a true community of counterterrorism professionals, and I am really grateful for that partnership that we share. This morning, I will briefly describe the threat we face from foreign fighters, highlight the role that extremist use of social media has played in that process, and conclude with efforts NCTC and our partners across the Federal Government are taking to counter that threat. I will begin with the foreign fighter picture. As you know, one of the most pressing concerns for the intelligence community is the on-going flow of foreign fighters to Syria, and importantly, the threat they could pose upon return to their home country of home origin. The battlefields in Iraq and Syria clearly provide foreign fighters with combat experience, with training in weapons and explosives, and with access to terror networks that may be ultimately planning targets--attacks which target the West. The rate of foreign fighter travel that we have seen in recent years is unprecedented. It exceeds the rate of travel and travelers who went to Afghanistan, Pakistan, Iraq, Yemen, or Somalia, other prominent conflict zones, but it exceeds the rate of travel to those conflict zones that we have seen at any point in the last 20 years. The United States and our allies are increasingly concerned with the more than 20,000 foreign fighters we assess have traveled to Syria from over 90 different countries of origin. We assess that at least 3,400 of these fighters are from Western countries, and that number includes also over 150 U.S. persons who have either traveled to the conflict zone, or attempted to do so. That is something we can speak about in more detail later in the session. I want to be cautious here about that because it is very difficult to be precise with these numbers, because they come from a wide variety of sources that vary in quality. I would rather focus on the trend lines, which are clear, and which are concerning. In addition to the foreign fighters who have already traveled, it is clear that the number of those seeking to go to Iraq and Syria is going up. Furthermore, the majority of those who are getting there, getting to the conflict zone right now, are fighting, or looking to fight for ISIL on the battlefield in Syria and Iraq. It is also a complicating factor that the individuals drawn to fight in foreign conflict zones do not fit any one stereotype or profile. They come from various backgrounds, which highlights the need for comprehensive messaging strategies and early engagement with a variety of communities in order to dissuade vulnerable individuals from trying to travel to conflict zones. The volume and diversity of recruits flowing to and from the conflict makes disruption particularly challenging. There is no single pipeline for foreign fighter travel into and out of Syria. Violent extremists take different routes, including land, air, and sea. Most routes do involve transit through Turkey because of its geographic proximity to the Syrian border areas where most of these groups operate. Now this sense of shared threat has prompted even closer cooperation across U.S. Federal agencies, and importantly, with our international partners, particularly in Europe. This is resulting in the development of stricter counterterrorism laws overseas, increased efforts at border security among our European partners, and importantly, more willingness to share threat information among partner nations. While these good efforts are under way and are making progress, significant work remains, particularly in ensuring that our foreign partners are able and willing to identify and stop foreign fighters when they transit their borders, both to prevent those fighters from entering, and then to stop fighters from leaving their home countries to travel abroad. Now, I will turn quickly to the use of social media by extremists, and especially by ISIL, and the way in which this group uses social media to attract a diverse set of aspiring foreign fighters. Now, the Chairman and the Ranking Member both mentioned in their opening remarks the brutal behavior that we have seen of ISIL in recent weeks. The world witnessed the brutal burning of a Jordanian pilot held hostage by the group, and we have seen the cruel beheadings of U.S. and Japanese hostages. ISIL's media capabilities are robust and effective. Moreover, their ability to generate timely propaganda continues to grow. I would argue that ISIL has proven far more adept than core al-Qaeda ever was, or more adept than any of--core--of al- Qaeda's affiliate groups, more adept at using these new social media tools to reach a broader audience. Just since January 1 of this year, more than 250 official ISIL products have been published on-line, and the group has shown the capacity to use these products to speak to a full spectrum of potential audiences. Local Sunni Arab populations inside Iraq and Syria, who they are trying to co-opt and exercise dominion over, individuals in coalition countries, and even populations around the world, including English-speaking audiences here and across the globe. As you would expect, ISIL uses the most popular of social media platforms to disseminate this messaging. YouTube, Facebook, Twitter. They know how to ensure that once their media releases are posted, that they reach far and wide almost instantaneously with reposting, and regeneration of follow-on links and translations into an ever-growing number of additional languages. Now, in terms of content, we have all seen that it includes these horrible, horrific images in which hostages have been murdered or ISIL's adversaries on the battlefield have been executed in summary fashion. But we have also seen social media images of a bucolic family-friendly welcoming light under ISIL's rule in their self-declared caliphate as ISIL tries to paint a picture to entice disenfranchised individuals seeking ideological, religious, or personal fulfillment, and not just a battlefield or a martyrdom experience. ISIL also generates releases that cater to a younger population very familiar with popular culture. These releases often reference Western branding, including popular video games, in an attempt to appeal to thrill seekers and youth looking for fulfillment. Now, the threat we face is not just from foreign fighters or terrorist groups including ISIL and al-Qaeda. Individuals inspired by these and other groups, or simply by violent, extremist propaganda can be motivated to action, and, as Frank said, that can come with little or no warning. Many of these so-called home-grown violent extremists are lone actors who can potentially operate undetected and who can plan and execute a simple attack without providing us warning. As a community, we closely monitor violent extremist activity, including when that activity appears and occurs in the United States, and we are looking for signs that last year's attacks in Canada and elsewhere may embolden other HBEs to conduct additional attacks. We believe ISIL's rhetoric may have played a role in these attacks, particularly in target selection in terms of targeting Government officials or military personnel. We are working with our partners across multiple disciplines in the community to increase our knowledge of foreign fighters and to counter extremism. NCTC has taken a broad center-wide effort to track foreign fighters traveling to Syria. We work in the first instance to resolve the specific identities of these potential fighters to uncover any potential derogatory information that we have in intelligence community holdings. We are also working closely with foreign partners to combat threats emanating from Syria. We are looking hard to develop investigative leads for our partner agencies to pursue, including identifying foreign fighters entering Syria, who may have potential access or connections to individuals in the homeland so that they can be watch-listed. The growing number of individuals going abroad as foreign fighters only emphasizes the importance of prevention. Any hope of enduring security or defeating organizations like ISIL rests in our ability to diminish their appeal and to dissuade individuals from joining them in the first place. To this end, we continue to refine and expand the preventive side of terrorism and counterterrorism. We have seen a steady proliferation of more pro-active and more engaged community awareness efforts across the United States with the goal of giving communities information and tools they need to identify extremism in their midst, and to do something about it before it manifests in violence. My organization, NCTC, in direct and daily collaboration with DHS, the Justice Department, and FBI, has led the creation of CVE tools to build community resilience across the country. In working closely with these partners, we are doing this work all across the country, and I would like to point to just one quick example. You will recall the case last year in which three young teenage girls allegedly attempted to travel from Denver to Syria by way of Frankfurt, Germany, where their travel was disrupted by law enforcement. Now, in the aftermath of that incident, we, working together with DHS--DHS, FBI, and the Department of Justice--sent our officers on multiple occasions to meet and talk to the greater Denver community to raise awareness among community and law enforcement partners about the terrorist recruitment threat. We developed a briefing, working with our partners, that is now tailored to address the specific effort to identify and recruit foreign fighters for Syria and Iraq. We have received a very strong demand signal for more such outreach from communities like Denver, and we continue to try to expand our toolkit of CVE-related tools. With our DHS colleagues, we have created and we regularly deliver a community resilience exercise program, a table-top exercise that brings together law enforcement with community leaders to run through a hypothetical scenario and talk about response. We realize we can't institutionalize a prevention approach without scaling up these efforts, and that goes to something you said in your opening statement, Chairman McCaul. So we are working as a community to try to create more programs to train individuals on CVE tools to ensure that communities across the country are able to lead CVE approaches locally in their own communities. This approach syncs up nicely with the efforts of the White House, NCTC, DHS, DOJ, and FBI to facilitate the local development and implementation of intervention frameworks in cities all across the country. I will stop there, Mr. Chairman---- Chairman McCaul. Thank you. Mr. Rasmussen [continuing]. Mr. Ranking Member. Thank you. [The prepared statement of Mr. Rasmussen follows:] Prepared Statement of Nicholas J. Rasmussen February 11, 2015 Thank you Chairman McCaul, Ranking Member Thompson, and Members of the committee. I appreciate this opportunity to be here today to discuss the threat posed by foreign fighters and home-grown terror, and our efforts to counter it. I'm pleased to join my colleagues and close partners from the Department of Homeland Security and Federal Bureau of Investigation. foreign fighters One of the most pressing concerns for the intelligence community is the on-going flow of foreign fighters to Syria and the threat they could pose upon return to their home countries. The battlefields in Iraq and Syria provide foreign fighters with combat experience, weapons and explosives training, and access to terrorist networks that may be planning attacks which target the West. This shared threat has prompted even closer cooperation across U.S. Federal agencies and with our international partners, particularly in Europe. We are seeing increased international focus on this problem which is resulting in stricter counterterrorism laws overseas, increased border security efforts, and more willingness to share threat information among partner nations. The United States and our allies are increasingly concerned with the more than 20,000 foreign fighters who have traveled to Syria from over 90 different countries. We assess at least 3,400 of these fighters are from Western countries including over 150 U.S. persons who have either traveled to the conflict zone, or attempted to do so. It's very difficult to be precise with these numbers because they come from a variety of sources that vary in quality. But the trend lines are clear and concerning. The rate of foreign fighter travel to Syria is unprecedented. It exceeds the rate of travelers who went to Afghanistan and Pakistan, Iraq, Yemen, or Somalia at any point in the last 20 years. In addition to the foreign fighters who have already traveled, the number of those seeking to go to Syria and Iraq are going up. Furthermore, the majority of those getting there right now are fighting for ISIL on the battlefield in Syria and Iraq. Individuals drawn to fight in foreign conflict zones do not fit any one stereotype. Recruits come from various backgrounds, highlighting the need for comprehensive messaging and early engagement with a variety of communities to dissuade vulnerable individuals from traveling. Extremist use of social media, especially by ISIL, is attracting a diverse set of aspiring foreign fighters and serving as a platform for relaying travel advice, including facilitation information, meeting locations, and even regional hotel accommodations. isil's use of social media Last week, the world witnessed the brutal burning of Jordanian pilot Lieutenant Muath al-Kaseasbeh. As that propaganda video demonstrated, ISIL's media capabilities are robust and effective. Moreover, their ability to generate timely new propaganda continues to grow. Since January 1 of this year, more than 250 official ISIL products have been published on-line. The group has shown the capacity to use these products to speak to the full spectrum of potential audiences: Local Sunni Arab populations whom they are trying to co-opt and exercise dominion over, coalition countries, and populations around the world--including English-speaking audiences here and across the globe. As you would expect, ISIL uses the most popular social media platforms to disseminate this messaging--YouTube, Facebook, and Twitter. They know how to ensure that once their media releases are posted, that they reach wide and far almost instantaneously, with re- posting and generation of follow-on links and translations into additional languages. In terms of content, we've all seen that it includes those horrible images in which hostages have been murdered or ISIL's adversaries on the battlefield have been executed. But we've also seen the social media images of a bucolic, family- friendly, welcoming life under ISIL's rule in their self-declared caliphate, as ISIL tries to paint a picture to entice disenfranchised individuals seeking ideological, religious, and personal fulfillment, not just a battlefield or martyrdom experience. ISIL also generates releases that cater to a younger population more familiar with popular culture. These releases often reference Western brands--including popular video games--to appeal to thrill seekers and youth looking for fulfillment. They have also coined pithy ``memes'' such as, ``YODO: You Only Die Once. Why not make it martyrdom?'' ISIL supporters have also enhanced the group's presence on the internet, expressing their alliance in various languages--in countries from Belgium to the Philippines--in their ``We are ISIL'' campaign. In short, ISIL has proven far more adept than core al-Qaeda--or any of al-Qaeda's affiliates--at using new media tools to reach a broader audience. foreign fighter travel How do we disrupt travel by foreign fighters to conflict zones, Syria in particular? The volume and diversity of recruits flowing to and from the conflict areas make disruption especially challenging. There is no single pipeline for foreign fighter travel into and out of Syria. Violent extremists take different routes, including land, air, and sea. Most routes involve transit through Turkey because of its geographic proximity to the Syrian border areas where violent extremist groups operate. Turkey has signed visa-free travel agreements with more than 69 governments, which limit the requirement for traveler screening. No visas are required for most E.U. citizens, some of whom are also able to travel on identity cards. Many would-be fighters simply take direct or indirect commercial flights to Turkish airports. Some European fighters also travel overland via the Balkans. Violent extremists from the Caucasus transit Iran, Russia, or Georgia en route to Turkey. Other extremists, including those from Europe or North Africa, use maritime routes by boarding cruise ships or ferries to Turkey before crossing into Syria. Recently, Turkey has stepped up its efforts to deny entry to potential foreign fighters based on information provided by the fighters' countries of origin. The ``Turkish Banned from Entry List'' now reportedly includes 10,000 individuals. In response to the recent attacks in Paris and arrests in several European countries of violent extremists planning terrorist attacks, we see an increased political willingness among our foreign partners to review and enhance border controls and institute stronger watchlisting and information-sharing arrangements. In fact, tomorrow, the European Union is holding a summit on foreign fighter issues, and we hope to see additional border security and information-sharing initiatives as a result of this meeting. Additionally, the summit will most likely address counterterrorism legal mechanisms in the European Union and a discussion of terrorist use of the internet, all worthwhile and meaningful steps to greater cooperation in Europe. Our partners in North Africa and Asia are also passing new counterterrorism laws and identifying other means to identify, interdict, and prosecute foreign fighters and those who support them. Egypt, Jordan, Saudi Arabia, Qatar, Turkey, and the UAE have all recently enacted legislation or regulations to address the foreign fighter issue. While good efforts are underway, significant work remains, particularly in ensuring that our foreign partners are able and willing to identify and stop foreign fighters at their borders--both to prevent fighters from entering and to stop fighters from leaving their home countries to travel abroad. These efforts must include a range of measures, including screening visa applicants; using Passenger Name Records or other data to identify potential foreign fighters; applying increased screening measures at points of departure; and a willingness to share information through INTERPOL, the United Nations, and bilateral relationships. nctc efforts to address foreign fighter threat NCTC is undertaking a broad Center-wide effort to track foreign fighters traveling to Syria, working closely with our intelligence community partners. We work to resolve the identities of potential fighters to uncover possible derogatory information in NCTC holdings. Additionally, the U.S. Government continues to work closely with foreign partners to combat threats emanating from Syria. As part of this effort, NCTC aggregates information on known or suspected terrorists traveling to Syria in the Terrorist Identities Datamart Environment (TIDE). TIDE is the U.S. Government's central repository for terrorist identity intelligence. It is also an analytic tool, and this effort has created a valuable forum for identifying, tracking, and sharing information with law enforcement, counterterrorism, screening, and watchlisting communities on known or suspected terrorists. Our metrics-based tracking and assessment of these terrorist identities has directly helped resolve inconclusive identities, enhance TIDE records, and upgrade watch list statuses on several hundred known or suspected terrorists. NCTC's Pursuit Group--which develops investigative leads for our partner agencies to pursue--is working to identify foreign fighters entering Syria who have potential access or connections to the homeland, so they can be watchlisted. This analysis leverages NCTC's unique accesses: A wider range of IC and law enforcement information than any other agency through our own counterterrorism data holdings as well as natively through embedded officers from ten other agencies. home-grown violent extremism The threat we face is not just from foreign fighters or terrorist groups including ISIL and al-Qaeda. Individuals inspired by those and other groups, or simply by violent extremist propaganda, can be motivated to action, with little to no warning. Many of these so-called home-grown violent extremists (HVEs) are lone actors, who can potentially operate undetected and plan and execute a simple attack. We closely monitor violent extremist activity, including when such activity occurs in the United States, for signs that last year's attacks in Canada and New York may embolden other HVEs to conduct additional attacks. ISIL's rhetoric may have played a role in those attacks, particularly in target selection. More broadly, we believe the HVE threat will remain at its current level resulting in fewer than 10 uncoordinated and unsophisticated plots annually from a pool of up to a few hundred individuals, most of whom are known to the IC and law enforcement. countering violent extremism (cve) The growing number of individuals going abroad as foreign fighters to Syria only emphasizes the importance of prevention. Any hope of enduring security against terrorism or defeating organizations like ISIL rests in our ability to diminish the appeal of terrorism and dissuade individuals from joining them in the first place. To this end, we continue to refine and expand the preventive side of counterterrorism. We have seen a steady proliferation of more proactive and engaged community awareness efforts across the United States, with the goal of giving communities the information and the tools they need to identify extremism in their midst and do something about it before it manifests itself in violence. NCTC, in direct collaboration with DHS, DOJ, and FBI, has led the creation of CVE tools to build community resilience across the country. Working closely with these partners, NCTC is engaged in this work all across the country, and I will point to just one example. You will recall the case last year in which three young teenage girls allegedly attempted to travel from Denver to Syria by way of Frankfurt, Germany, where their travel was disrupted. In the aftermath of that incident, we, in concert with DOJ, DHS, and FBI, sent our officers on multiple occasions to meet with the greater Denver community and to raise awareness among community and law enforcement audiences about the terrorist recruitment threat. The briefing, developed with our partners, is now tailored to address the specific issue of foreign fighter recruitment in Syria and Iraq. We and our partner agencies have received a strong demand signal for more such outreach. This isn't a law enforcement-oriented effort that might be perceived as intimidating. Rather, it's an effort to share information about how members of our communities are being targeted and recruited to join terrorists overseas. Seen in that light, we've had a remarkably positive reaction from the communities with whom we have engaged. We continue to expand our CVE tools. With our DHS colleagues, we have created and regularly deliver the Community Resilience Exercise program, a table-top exercise that brings together local law enforcement with community leadership in a city to run through a hypothetical scenario featuring a possible violent extremist or foreign fighter. We were pleased that House Homeland staff was able to attend a recent exercise in Minneapolis. We realize we cannot institutionalize a prevention approach without scaling up these efforts. Our agency is creating programs to train individuals on CVE tools to ensure that communities across the country are able to lead on CVE approaches locally. This approach syncs with the efforts of the White House, NCTC, DHS, DOJ, and FBI to facilitate the local development and implementation of prevention and intervention frameworks in cities across the country. conclusion Confronting the threat of foreign fighters and working with resolve to prevent another terrorist attack remains the counterterrorism community's overriding mission. NCTC recently celebrated its 10th year in service to the Nation, and we remain focused on continuing to enhance our ability to counter the terrorist threat in the years ahead. Chairman McCaul, Ranking Member Thompson, and Members of the committee, thank you for the opportunity to testify before you this morning. I look forward to answering your questions. Chairman McCaul. We just have many Members here to ask questions, and there will be plenty of time to talk about that, but we appreciate you being here today. Thank you, Director. Chairman now recognizes Assistant Director Steinbach for his opening statement. STATEMENT OF MICHAEL B. STEINBACH, ASSISTANT DIRECTOR, COUNTERTERRORISM DIVISION, FEDERAL BUREAU OF INVESTIGATIONS, U.S. DEPARTMENT OF JUSTICE Mr. Steinbach. Good morning, Chairman McCaul, Ranking Member Thompson, Members of the committee. Thank you for the opportunity to appear before you today to discuss the dynamic threat of foreign fighters traveling in support of the Islamic State of Iraq and the Levant, commonly known as ISIL, and the continued threat to the United States posed by home-grown violent extremists. These threats remain among the highest priorities for the FBI and the intelligence community as a whole. However, it is a blending of the home-grown violent extremism with foreign fighter ideology which is today's latest adaptation of the threat. Conflicts in Syria and Iraq are currently the most attractive overseas theaters for Western-based extremists who want to engage in violence. We estimate upwards of 150 Americans have traveled or attempted to travel to Syria to join extremist groups. While this number is small in comparison to the number of European travelers, we must also consider the influence groups like ISIL have on individuals located in the United States who are inspired to commit acts of violence. It is this influence which I refer to as the blended threat. ISIL has proven ruthless in its campaign, in its violent campaign to rule, and has become yet the latest terror group attracting like-minded Western extremists. Yet from a homeland perspective, it is ISIL's wide-spread reach through the internet and social media which is the most concerning, as ISIL has proven dangerously competent like no other group before it at employing such tools in furtherance of its nefarious strategy. ISIL uses high-quality traditional media platforms, as well as a multitude of social media campaigns to propagate its extremist ideas. Like al-Qaeda and other foreign terrorist organizations, ISIL has effectively used the internet to communicate, to both radicalize and recruit. Unlike other groups, ISIL has gone one step further and demonstrates an effectiveness to spot and assess potential recruits. Social media in particular has provided ISIL with the technical platform for wide-spread recruitment, operational direction, and consequently has helped bridge the gap between foreign fighters and home-grown extremists. As a communication tool the internet remains a critical mode for terror groups to exploit. One recent example just occurred this past week. A group of five individuals was arrested for knowingly and willingly conspiring and attempting to provide material support and resources to a designated foreign terrorist organizations active in Syria and Iraq. Much of their conspiracy occurred via the internet. Following on other groups' doctrines, ISIL, too, has advocated for lone-wolf attacks. Last month, ISIL released a video via social media reiterating the group's encouragement of lone-wolf offender attacks in Western countries, specifically advocating for attacks against soldiers, law enforcement, and intelligence members. Several incidents have occurred in the United States and Europe over the past few months which indicate this call to arms has resonated amongst ISIL, supporters and sympathizers. In one case, an Ohio-based man was arrested in January after he obtained a weapon and stated his intent to conduct an attack on the U.S. Capitol in Washington, DC, as was mentioned here earlier. Using a Twitter account, the individual posted statements, video, and other content indicating his support for ISIL, and he planned his attack based on his voiced support. Likewise, recent events in Australia, Canada, France, and the United Kingdom reflect the power of this radicalized message and reemphasize our need to remain vigilant in the homeland, since these small-scale attacks are just as feasible within the United States. We should also understand community and world events, as viewed through the eyes of the committed individual, may trigger action. As we have seen with highly-publicized events such as the attack on military personnel at the Tomb of the Unknown Soldier in Canada and the hostage situation at the cafe in Australia, these acts of terror will attract media attention--international media attention and may inspire copy- cat attacks. ISIL, however, is not the only high-profile terrorist organization of concern. Al-Qaeda in the Arabian Peninsula, AQAP, poses an on-going threat to the homeland and U.S. interests abroad. AQAP's on-line magazine, Inspire, advocates for lone wolves to conduct attacks against the homeland and Western targets by utilizing simple and inexpensive tactics and methods. On December 24, 2014, AQAP released the 13th edition of the magazine, which provides instructions for building and deploying an IED. Lastly, social media has allowed groups such as ISIL to use the internet even more effectively at spotting and assessing potential recruits. With the wide-spread horizontal distribution of social media, terrorists can identify sympathetic individuals of all ages in the United States, spot, assess, recruit, and radicalize either to travel or conduct a homeland attack. The foreign terrorist now has direct access into the United States like never before. As a result, it is imperative that the FBI and all law enforcement organizations understand the latest communication tools and are equipped to identify and prevent terror attacks in the homeland. We live in a technologically-driven society, and just as private industry has adapted to modern forms of communication, so have the terrorists. Unfortunately, changing forms of communication on the internet and through social media are quickly outpacing laws and technology designed to allow for the lawful intercept of communication content. This real and growing gap the FBI refers to as ``going dark'' must be urgently addressed as the risks associated with going dark are grave both in traditional criminal matters, as well as National security matters. We must continue to build partnerships and work with internet providers and social media companies to ensure appropriate, lawful collection is possible. Most companies are not required by statute to development lawful intercept capabilities for law enforcement. As a result, services are developed and deployed without any ability for law enforcement to collect. The FBI, in partnership with the Department of Homeland Security, is utilizing all investigative techniques and methods to combat the threat these individuals pose to the United States. In conjunction with our domestic and foreign partners, we rigorously collect and analyze intelligence as it pertains to on-going threats posed by ISIL, AQAP, and other foreign terrorist organizations. In partnership with our many Federal, State, and local agencies assigned to the Joint Terrorism Task Forces around the country, we remain vigilant to ensure the safety of the American public. Be assured the FBI continues to pursue increased efficiencies and information-sharing processes to stay ahead of the threat to the homeland. Chairman McCaul, Ranking Member Thompson, and committee Members, I thank you for this opportunity to testify concerning the foreign fighter threat and home-grown violent extremist threat posed to the homeland. I am happy to answer any questions at this time. [The prepared statement of Mr. Steinbach follows:] Prepared Statement of Michael B. Steinbach February 11, 2015 Good morning Chairman McCaul, Ranking Member Thompson, and Members of the committee. Thank you for the opportunity to appear before you today to discuss the dynamic threat of foreign fighters traveling in support of the Islamic State of Iraq and the Levant (ISIL) and the rising threat to the United States from home-grown violent extremism. This threat remains one of the biggest priorities not only for the FBI but for the intelligence community (IC) as a whole and our foreign partners. Conflicts in Syria and Iraq are currently the most attractive overseas theater for Western-based extremists who want to engage in violence. We estimate upwards of 150 Americans have traveled or attempted to travel to Syria to join extremist groups. However, once in Syria, it is very difficult to discern what happens there. This lack of clarity remains troubling to the IC. ISIL has proven to be relentless and continues to terrorize individuals in Syria and Iraq, including Westerners. We are concerned about the possibility of home-grown extremists becoming radicalized by information available on the internet. ISIL utilizes high-quality, traditional media platforms, as well as wide-spread social media campaigns, to propagate its extremist ideas. The group's ability to produce visually appealing messaging coupled with the rampant use of social media by ISIL supporters exhibits the diverse propaganda capabilities. Combined, these tactics result in sophisticated propaganda which may continue to inspire individuals in the homeland to travel to fight overseas. Recent propaganda releases include multiple issues of English language publications, including a complete English magazine. Several videos of ISIL-held hostages and videos sensationalizing ISIL members have also been released. The threat to American interests overseas is most acute in Iraq, but extends throughout the Middle East region and to the West. There is little doubt that ISIL views the United States and the West as a strategic enemy. A year ago, the leader of ISIL warned the United States will soon be in direct conflict with the group. In January 2015, ISIL released a video via social media networking sites reiterating the group's encouragement of lone-offender attacks in Western countries; specifically advocating for attacks against soldiers, patrons, law enforcement, and intelligence members. Several incidents have occurred in the United States and Europe over the last few months that indicate this ``call to arms'' has resonated among ISIL supporters and sympathizers. Our Western partners in Australia, Canada, France, and the United Kingdom (UK) have recently disrupted plotting and, unfortunately, had security officers attacked by individuals linked to ISIL or other forms of violent extremism. A French national who took hostages in Paris and shot and killed a policewoman in early January, claimed he was an ISIL supporter. In December 2014, another French national entered a police station in France and began stabbing police officers before being killed by police in a violent extremism attack. Two separate attacks in Canada in October 2014 targeted Canadian soldiers. Additionally, in September and October, the U.K. and Australian authorities separately thwarted attacks targeting local law enforcement. In each scenario, the apprehended individuals had suspected ties to ISIL. The FBI remains concerned the recent calls by ISIL and its supporters on violent extremist web forums, and the recent events in Europe could continue to motivate home-grown extremists to conduct attacks in the homeland. On-line supporters of ISIL have used various social media platforms to call for retaliation against the United States in the homeland. In one case, an Ohio-based man was arrested in January after he obtained a weapon and stated his intent to conduct an attack on the U.S. Capitol in Washington, DC. Using a Twitter account, the individual posted statements, videos, and other content indicating support for ISIL, and he planned his attack based on this voiced support. Al-Qaeda in the Arabian Peninsula (AQAP) continues to pose one of the greatest threats to the United States. AQAP's on-line English magazine Inspire advocates for lone wolves to conduct attacks against the homeland and Western targets by utilizing simple and inexpensive tactics and methods. The most recent edition of Inspire was released via social media sites in December 2014. As with the previous editions, the magazine promotes the need for lone wolves to carry out small arms attacks and provides specific, detailed ``how-to'' instructions for constructing a successful bomb. Historically, AQAP has been focused on large-scale transportation and aviation plotting. However, last month's shooting at a satirical magazine's office in Paris demonstrates the sophisticated ability of individuals inspired or directed by AQAP to conduct coordinated attacks by combining small arms and explosive devices. The attackers demonstrated extensive preparation and maintained a level of discipline throughout the attack. This assault shows a new wave of extremism; a blending of home-grown violent extremism and an association with a foreign terrorist organization. Soon after the attacks in Paris, authorities in Belgium conducted a raid against several individuals who were allegedly planning an attack against police personnel. These individuals purportedly had ties to ISIL and allegedly had some connections to the Paris attackers. Our European partners remain on heightened alert and continue to take the steps necessary to mitigate imminent threats. The recent events in Europe re-emphasize our need to remain vigilant in the homeland as these small-scale attacks are feasible within the United States. Individuals inspired by foreign terrorist groups could be covertly arming themselves with expertise and tools to carry out an attack in the homeland. Community and world events may trigger one of these individuals to act. We remain concerned these types of events, which were widely broadcasted in the media, could inspire ``copy-cat'' attacks. Additionally, as we saw after ISIL posted videos depicting beheadings of hostages, we continue to see intelligence advocating plots which include public or videotaped beheadings. The FBI, in partnership with the Department of Homeland Security, is utilizing all investigative techniques and methods to combat the threat these individuals may pose to the United States. In conjunction with our domestic and foreign partners, we are rigorously collecting and analyzing intelligence information as it pertains to the on-going threat posed by ISIL, AQAP, and other foreign terrorist organizations. In each of the FBI's 56 Field Offices, the Joint Terrorism Task Forces remain vigilant to ensure the safety of the American public. Given the global impact of the Syria and Iraq conflicts, regular engagement with our domestic and foreign partners concerning foreign fighters is critical. The FBI continues to pursue increased information sharing, efforts to combat radicalization, and exchanges regarding community outreach programs and policing strategies. Chairman McCaul, Ranking Member Thompson, and committee Members, I thank you for this opportunity to testify concerning the threat foreign fighters and home-grown extremists pose to the homeland. I am happy to answer any questions you might have. Chairman McCaul. Thank you, Director. Chairman now recognizes himself for 5 minutes. You know, the American people have seen Americans, the American journalists, beheaded by the executioner, ISIS executioner. It was a wake-up call for the United States, Kayla Mueller, who was just recently executed, and the Jordanian pilot, in one of the most horrific videos I have ever seen, and a very sophisticated Hollywood movie production style, lit on flames. They are barbarians, and I think the barbarians are at the gate. We want to keep them outside the gate of the United States. I am concerned that some have already returned. So my first question is--we know there are 50,000 ISIS strong. We know that foreign fighters have gone from 15,000 to 20,000. We know that 5,000 of these foreign fighters have Western passports that could get them entrance into the United States. As Director Rasmussen mentioned, there are hundreds of Americans who have traveled to the region to fight with ISIS. We know that some of them have returned, and that is a Classified number. But my first question is, for those who have returned to the United States, what assurance can you give the American people--what confidence do we have, first that we know all the people who have joined the fight and returned? What are we doing about it to ensure that they do not attack here in the United States? Director Rasmussen. Mr. Rasmussen. I will start, but I will ask Mike Steinbach to pitch in on the bureau's efforts here. In talking about the numbers, Mr. Chairman, you are right to raise questions about our overall level of confidence in numbers. As I tried to say in my remarks, we know what we know, but that comes from a wide variety of sources, and we have always assessed that there is likely more information out there that we have not yet been able to collect either from our foreign partners or from other intelligence means, and that it is possible that there are greater numbers of foreign fighters, and potentially even greater numbers of individuals from Western countries and the United States who have traveled to the conflict zones. I will let Mike speak to the question of what we can say about individuals who have traveled to the conflict zone and come back, but it is obviously the highest-possible priority for the intelligence community to track their movements. Chairman McCaul. Mr. Steinbach. Mr. Steinbach. So certainly, I would not be truthful if I told you that we knew about all the returnees. We--like Nick said, we know what we know. There is a number that we don't know about. The ones we know about, the numbers of foreign fighters that have returned from Syria, from the conflict zone, every single one of those is a predicated FBI investigation run on the Joint Terrorism Task Force. Regardless of the intelligence or the information that we started with, we go to build the case to disrupt, whether that disruption is in the form of deportation or whether that disruption is in the form of prosecution. Every single one of those known foreign fighters is an FBI investigation, and we seek to determine the root cause of their travel, what they did in Syria, and then ultimately, if it was in support of a foreign terrorist organization such as ISIL, we look for prosecution or some other disruption. Chairman McCaul. Well, in my briefings in having served as a Federal prosecutor, as well, I certainly understand that. I want to commend the FBI for its efforts in this very difficult task to monitor. You are right, you don't know what you don't know. I don't think our human intelligence on the ground in Syria is sufficient to properly identify these individuals, and hopefully, the administration will move forward to do that. General Taylor, in regards to travel. At Homeland Security, there is a lot of it is about travel, keeping people off airplanes, whether it be al-Nusra, Khorasan Group, AQAP with bombs or these foreign fighters in Syria with ISIS off airplanes. There has been some concern that our European partners have not been fully cooperative. A good example is the brothers in the Paris attacks, went to Yemen, were on a No-Fly list. We share that information with them. I don't know what they are doing with that. I am concerned about Turkey in terms of their cooperation because, let's face it, these foreign fighters are like a highway going through in and out of Turkey, as demonstrated by the female terrorist in the grocery store who left Paris, went to Istanbul and into Turkey. What are we doing to ramp up these efforts with our European partners and with Turkey? Mr. Taylor. Thank you, Mr. Chairman. Certainly, as you indicate, one of our major on-going concerns is a foreign terrorist fighter on an airline coming to the United States from a last-point-of-departure airport. As I indicated in my remarks, we have taken action since July to ramp up security of our aircraft at those locations around Europe and in the Middle East and elsewhere, where we assess there is a potential for those individuals to try to exploit airplane travel to get to the United States. In addition, the Secretary has directed additional requirements under the ESTA, the Visa Waiver program, to strengthen the amount of data that we have to assess against our community records within both DHS and within the intelligence community, so we can spot and assess--spot individuals who may be involved in nefarious activity. I would say that we are all concerned that we only know what we know. Ramping up our work with our European partners and other partners around the world has certainly increased since the attacks in Paris. I was just in London last week with the Five Country Ministerial. There is a clear understanding that sharing of information on these individuals across all of our five country partners is critical to the ability to detect. We now have, and I would ask Nick to speak a little bit to it, within NCTC the capacity to begin to track these individuals that we are getting data on from across the world. That gives us a better confidence that if someone were to try to circumvent our security systems, we would at least be able to know who they were and what they were trying to accomplish. That is not a perfect system yet, we continue to add to it today. I just saw a report this morning, so it continues to grow, but the cooperation with our European partners has been significantly enhanced in the course of the last 6 months. Chairman McCaul. Well, I think since Paris it has been enhanced. I know it is--if State Department was here they could answer the coordination and cooperation with these databases. No-fly list, terrorist watch list, we have had a difficult time having them recognize that in Europe, Canada with some privacy concerns as well, and I hope that we can work that out so that we have a free exchange of intelligence and information to keep these terrorists off airplanes, stop the travel, and stop them from coming into the United States. My time is just about expired, but one last question. The state is not here to answer this, but I am very concerned and I sent a letter to Susan Rice about these refugees, both in Syria and Turkey. I have been over there and I have seen them. Yes, most of them are women and children, but there are male actors that concern me. I think this would be a huge mistake if we bring in these refugess into the United States that could potentially be radicalized. Then we got a--we are not only trying to keep these guys, the foreign fighters, out, but under this would be a Federally-sanctioned welcome party, if you will, to potential terrorists in the United States. Can the three of you, and I know this is a very maybe awkward question to ask you, but all three of you, do you agree with that policy that we should bring in these Syrian refugees into the United States? Mr. Taylor. Sir, I am not in a position to agree with the policy, that is really under the offices of the Secretary of State and his response---- Chairman McCaul. But do you think that would pose a threat or danger to Americans? Mr. Taylor. We are concerned about any group of people coming to the United States who may be coming to the United States for nefarious purposes. Therefore, under our CIS responsibilities, want to make sure that if we are asked to vet individuals from any part of the world to come to the United States, that we have applied the most rigorous screening that is available within the U.S. Government. I think we have learned that lesson in the past, and so any tasking we are given from a Departmental point of view with our intelligence community partners will be as thorough as we can make it to make sure---- Chairman McCaul. My time is--I mean, very succinctly, Director Rasmussen, Mr. Steinbach, would that bring in Syrian refugees pose a greater risk to Americans? Mr. Rasmussen. I mean, it is clearly a population of concern and, as Under Secretary Taylor said, what we want to be able to do is apply the full weight of U.S. intelligence community holdings to the vetting and screening process so that we can unearth any information that we may have in our holdings that gives us concern about particular individuals. Thank you. The Chairman recognizes the Ranking Member. Chairman McCaul. Well, you said we don't know what we don't know. Mr. Steinbach. Mr. Steinbach. Yes, I am concerned. We will have to take a look at those lists and go through all of the intelligence holdings and be very careful to try and identify connections to foreign terrorist groups. Chairman McCaul. Thank you. Chairman recognizes the Ranking Member. Mr. Thompson. Thank you, Mr. Chairman. Following on the Chairman's questioning, is it our procedure for anyone coming to this country that we provide a thorough vetting of that individual, or those individuals, before they are allowed to come? Mr. Taylor. Yes, sir, it is. Mr. Thompson. Is that your understanding, Mr. Rasmussen? Mr. Rasmussen. Yes--National Counterterrorism Center as a information center provides the information that allows the screening agencies to decide--make the decisions on entry or exit. Mr. Thompson. Mr. Steinbach. Mr. Steinbach. You have to have information to vet, so the concern in Syria is that we don't have systems in places on the ground to collect the information to vet. That would be the concern is we would be vetting--databases don't hold the information on those individuals, and that is the concern. Mr. Thompson. Thank you. This is to General Taylor and to you, Director Steinbach. The Business Executives for National Security recently released a report finding that U.S. law enforcement and intelligence agencies are currently operating without an enterprise-wide concept at the Federal level. This inhibits the Federal Government's ability to conduct domestic intelligence activities in support of counterterrorism. This is a concern given the fact that there could be potential home-grown violent extremists here in the United States. Do you agree with that assumption? Mr. Taylor. Sir, I have had a conversation with the BENS leadership. We don't agree with that assumption. We believe the enterprise partnership that we have with the FBI is as strong and as effective as it can be today, especially adding the information that is available through the NCTC. So, no, we do not agree. Things can be better. We work at making it better every day, but the lack of an enterprise approach I don't think is a fair assessment of where we are today. Mr. Thompson. Director Steinbach. That BENS strategy piece is outdated. It was a good attempt, but they looked at information that was 4 or 5 years old, so no, I don't agree. Updated information, had they looked at what is going on now, they would have likely come to a different conclusion. Mr. Thompson. Have you shared that with the business executives? Mr. Steinbach. Yes, we have. Mr. Thompson. Thank you. General Taylor, you have outlined in quite detail what the impact of not being funded after February 27 would be. We are talking about the threat to foreign fighters and home-grown terror. Can you, in short order, indicate to this committee what kinds of impact without money the Department would be faced? Mr. Taylor. Certainly, sir. Certainly, sir, and not a total list, but for example, nearly $2.6 billion in funding for new grants, including $103 billion in homeland security grants and $680 million in foreign fighters assistance grants cannot be approved--disseminated under the current continuing resolution. One hundred ninety million dollars in new upgrades for remote and mobile--video surveillance along the Rio Grande Valley to enhance our detection capability there. One hundred forty-two million dollars in Secret Service protective activities as we are get into the election cycle. So, there is a long list of things that we are precluded from doing and investing in without a full funding bill from the Congress. Mr. Thompson. One of the things that a lot of us are confronted with as well as our constituents, is we all have Federal buildings in our communities. After the situation in Paris, the Secretary ordered an enhanced effort at those Federally-protected facilities. Would the lack of money for the Department create a security risk at some of those buildings? Mr. Taylor. Sir, I can't speak spec--we are continuing to enhance our security efforts at facilities across the country, Federal facilities that we are charged with protecting. Specifics on whether or not FPS would be able to continue that, I would have to take that as a question and get back to you. Mr. Thompson. Please, I think we need to hear since we have quite a few of those facilities. Mr. Taylor. Yes, sir. Mr. Thompson. I yield back. Chairman McCaul. The Chairman recognizes the gentleman from Texas, Mr. Smith. Mr. Smith. Thank you, Mr. Chairman. I will yield my time to my colleague from Texas, Mr. Hurd. Mr. Hurd. I would like to thank the gentleman from Texas and you here today. I appreciate you all coming here. I know the difficulty of the task that you all are charged with having spent 9 years as an undercover officer in the CIA, chasing al-Qaeda and the Taliban and places like that-- organizations like that. I know the difficulty and--I know that the people in your--the men and women in your organizations are operating as if it is September 12, 2001. Please, when you go back to your organizations, thank them for all of their hard work on behalf of us. When I was in Pakistan, Afghanistan, you know, the bad guys would push their message through night letters. At night, they would drop letters on people's doorsteps. Now, they have social media, and all three of you will have highlighted that in your testimony and in the documents that you submitted. My question is--is what efforts--who is coordinating the effort to counter that ideology on social media and these other elements? You know, 20 percent of any counter-insurgency is cutting off the head of the snake, 80 percent is addressing the underlying concerns. Who is leading that? What are you guys doing in each one of your agencies to counter that? Mr. Rasmussen. I will start, and certainly welcome help from my partners up here. In terms of the counter-ISIL strategy that the President has laid out for our effort to degrade and ultimately defeat ISIL, State Department has the lead for working with our international partners and the overseas environment to counter violent extremism, and to create a counter-narrative and a counter-messaging effort. I would certainly defer to them to kind-of describe the whole range of activities which have included a number of overseas summit meetings and other gatherings designed to coordinate, particularly inside the region, inside the Middle East to make sure that our partners in the coalition are doing their part to counter the narrative. Here at home, we have, as I described in my testimony, I think a very effective partnership among the four agencies and departments with responsibility for countering violent extremism. DHS, the FBI, the Department of Justice, and NCTC. As I said, we work together almost seamlessly on a range of difference CVE initiatives, leveraging the capabilities that each of our departments have. I say that because it is the law enforcement community that has the reach into local law enforcement. So FBI has that advantage. Homeland Security has the reach into a network of community organizations and other Homeland Security-oriented populations in our major metropolitan areas that gives them reach into. NCTC tries to provide analytic support and, you know, content generation to help us with this effort at outreach in the domestic environment. So, it really is--I rarely would say this--we are seamless as we could, I think, almost possibly be in terms of our work together. The question is, as I mentioned to the Chairman earlier, is scale. Are we doing enough of it? Do we have enough reach into all of the parts of the country where this is a potential problem? I would not argue to you that we are there yet on that score. Mr. Hurd. Thank you. Mr. Rasmussen. The President's CVE summit will give us a chance to kind-of give that an important boost. Mr. Steinbach. Yes, just one note on context. So, you know, part of is--a part of this message has to be pushed down at the local level, just like parents have to watch their children on the internet and on social media for pedophiles and financial criminals. We have to have that same message. You have to have interaction. If you look at the case in Denver that was highlighted, you look at other cases, we see a lack of understanding by parents and guardians to what is going on, and that tool needs to be monitored. It is a powerful tool and it provides quite a bit of reach. So, that is a part of it at the local level. Mr. Hurd. Thank you. Next question is two parts. Again, when I was, you know, in the intelligence community and operating an alias, I would frequently travel to a lot of countries, and I never ended up going to that end destination. I would go somewhere else driving because it was a lot easier. So, you know, the concept of broken travel. What are you all doing in order to monitor the broken travel of folks that may end up going to Syria, but don't go directly there, drive in? The other issue is, what new intelligence capabilities do we need in Syria in order for you all better do your job back here? Mr. Taylor. Let me speak first, sir, to the nature of how we monitor broken travel. It is a concern. People can book a flight to an end-destination, and stop at an end-point and go other places. We understand that phenomenon. We are able to use our travel data to better spot those instances when they occur. As I mentioned earlier, taking that information and bouncing it against the other holdings within the community to better understand the phenomenon. It is not perfect yet. It continues to refine, but it is an issue that we now understand how that works and use our travel security tools to monitor it most effectively. Mr. Rasmussen. Sir, you raise a very good point about the challenge of collecting intelligence in Syria right now. Without going into too much detail in an open session, it is a tremendously challenging collection environment for all of our intelligence agencies because we are not present on the ground there in a traditional way. We don't have the footprint on the ground that we would have in many places around the world with a diplomatic, military, and intelligence presence. So, we are forced to be more creative, more innovative, more entrepreneurial in trying to close that gap. We can talk about that more in closed session, but it--all of the intelligence agencies have prioritized this at the absolute top of our priority list in terms of devoting resources, energy, and effort to do so. I would not argue, though, that we have closed the gap on where we need to be in terms of our understanding with granularity what is going on on the ground in Syria. In many cases, the information we have about foreign fighters traveling into the conflict zone stops when they get there, and we don't have as much insight, or nearly enough insight, into what actually happens when they are on the ground in Syria. That is a gap we are trying to close. Mr. Hurd. I think they covered it sufficiently. I yield back. Chairman McCaul. Gentleman's time has expired. The gentleman from Rhode Island, Mr. Langevin, is recognized. Mr. Langevin. Thank you, Mr. Chairman, and I want to thank our witnesses for your testimony today. I would like to turn to the discussion that we have been involved with this morning about tracking those individuals who have been in the conflict zone in Iraq or Syria fighting with ISIS who have U.S. or Western passports. It is my understanding that we have, you know, somewhat our arms around being able to track those with U.S. passports, but as we have alluded to this morning, we are talking about maybe on the hundreds, or a hundred or so persons with U.S. passports. But it could be in the thousands for people with Western passports that are fighting in Syria, many of whom with ISIS, and yet those individuals that could travel potentially then back to European countries and could come to the United States, particularly those from Visa Waiver countries--and what I am hearing, what I have heard in past testimony--that it is very difficult perhaps to track those individuals particularly because there are certain governments particularly in the European Union that are reluctant to share threat information on their citizens due to privacy concerns. I was just in Munich this past weekend at the Munich Security Conference, met with Britain's--their Secretary of Defense, and he confirmed that that is a concern not so much for the United Kingdom because their privacy laws are different, and so that kind of information sharing is not-- restricted from Great Britain, but more an issue with continental European countries. So has this been the experience of NCTC? What are we doing to close that gap? Because that is a significant blind spot for us. Mr. Rasmussen. In talking about sharing of information, particularly from our European partners, I think it is maybe useful to think of it happening in two different ways. One is kind-of structured, routinized sharing of travel information of the sort that Under Secretary Taylor mentioned before. We certainly want that kind of sharing from our European partners because it would help us with the screening that we are talking about. But the other kind of sharing that I think is worth mentioning, and where we have seen, I would say, a fairly dramatic improvement with our European partners over the last couple of years, is intelligence service to intelligence service sharing on individuals of specific terrorism concern. We have been on a bit of an evangelical effort over the past few years to try to engage our European partners on this, and I would argue that a couple of years ago, we were in the position of explaining, Gee, this is a terrible threat, we need to work together on it. We are well past that now. Any European capital you go to or any European partner you engage with jumps into that conversation right away and is quite open in sharing what they know, including often about their own citizens. What that allows us to do is potentially populate our TIDE, our Terrorist Identities Datamart Environment, with information about specific individuals that can aid our screening process. So I don't want to paint an entirely dire picture of our European partners' work in this area because I would argue that in intelligence channels, it has been almost unprecedentedly a good news story. Much room for improvement, and Europe is not a monolith, and so certainly, across the continent, there are areas where we could get better, more cooperative sharing arrangements. But I did want to distinguish between the two types of sharing because there is a kind of bulk data-sharing discussion that is sometimes more difficult for our European partners. Then there is more granular, specific sharing about known individuals on whom we have intelligence reporting where I think they are often quite responsive. Mr. Langevin. But what I want to get to is the question, should we be insisting or trying to work with NATO partners, our European partners, to change their privacy laws, or can Congress play a role in helping to ease these privacy concerns? For example, do you believe that the judicial redress announced last week as part of the PPD-28 review would help alleviate these challenges? Mr. Taylor. Sir, I would say that the privacy concerns in Europe are significant, and not just in this area of sharing terrorism information, but in all aspects of how private information is shared for business, for Government and elsewhere. The Chairman referred to it earlier. There are now new laws in several countries, particularly in the five I's about enhancing that sharing. There is a discussion at the European Union this week about EUPNR, which we are encouraged by and hope that the European parliament will move forward to pass a European-wide PNR requirement that allows for that data to be collected across Europe and shared across the European Union. We think that will be a big step, but we also think if that doesn't work, then we can work bilaterally with individual countries to share data. The important thing for us is using every tool in our toolkit to get the information shared between us and our partners, and back and forth. There is not one set of processes that are going to do that, but we are going to use every tool in the toolkit to make sure those relationships work and work effectively. Mr. Rasmussen. I would just add one thing, though, to your point, Mr. Langevin, on engaging European legislatures or parliaments. I mean, I think anything we can collectively do to send the message that if information is shared with us, we use it for the purposes that we have asked for it, and we handle it responsibly and in accordance with the terms on which it was given to us. If that can provide reassurance to European partners and increase the flow of information, then all to the good. Mr. Langevin. Okay. I appreciate your answer. I just would say I still think this is--until we get this seamless, and we are getting all the information that we need, it is a blind spot. I think it is a problem and I think we need to work on this. Thank you, Mr. Chairman. I yield back. Chairman McCaul. The gentleman from South Carolina, Mr. Duncan, is recognized. Mr. Duncan. Thank you, Mr. Chairman, for a very timely hearing. I would ask that we schedule a Classified hearing, briefing with some of these intelligence community to get a little different intake--input. Chairman McCaul. That is a good idea. Mr. Duncan. Yes. Thank you. So Director Rasmussen, al- Qaeda--they are still alive and well, right? They are still a threat to freedom, global freedom? Mr. Rasmussen. Yes, sir. They certainly pose a significant terrorist threat. Mr. Duncan. In fact, I would say that al-Qaeda, ISIS, al- Qaeda in all of its elements, AQAP, AQ MINA, Boko Haram, al- Shabaab, Abu Sayyaf--all these terrorist groups are still active, right? Mr. Rasmussen. Yes, sir. Mr. Duncan. So we shouldn't take our eye off the ball with just focusing on ISIS and think of this globally and not get hung up on the 50 shades of terrorism, talk about terrorism about terrorism, that these groups are a threat all over the globe. So let me lay out a scenario that actually happened. I led a CODEL back in late May to Europe. Right before we arrived in Brussels, a foreign fighter had traveled to Syria about a year, I believe, maybe 18 months, radicalized, came back through Turkey, through Germany into Brussels, shot up a Jewish museum, killed three people. A fourth one was wounded. I don't know if that person died or not or remember that. That was right before we arrived. It was very--it was very real to the Belgians. It was very real to the French because this foreign fighter fled out of Belgium through France and was captured in Marseilles, trying to catch a boat or a plane to North Africa. Had he gotten out of Europe into North Africa, he would have disappeared. This was a foreign fighter that took advantage of the Schengen region, the open borders in Europe. From what I remember from talking with the folks in Europe at that time is that Germany had information about this individual who had traveled through Germany but failed to share in a timely manner with either the Belgium or the French authorities. So I am concerned--(A), Mr. Chairman, you brought up the point of Visa Waiver. I am concerned with the whole Schengen open travel, open border region and visa waiver and the ability of foreign fighters to flow to this country. I am also concerned about the open borders and the ability to of foreign fighters to get back to Europe, travel to Marseilles or to the south of France, and hop over from Portugal or Spain into North Africa and disappear, or maybe rejoin the fight with Boko Haram or al-Shabaab, or travel back to the Middle East and continue these evil acts. So in a post-Snowden environment, where I believe the reason Germany was slow to inform the French or the Belgians was because of intelligence sharing and what was being revealed at the time about the United States spying on Chancellor Merkel. So in the post-Snowden environment, let me ask you, are we communicating with our allies in the region, our global allies in this war on terror? How do you see that communication being hampered in the post-Snowden era? Either one. I would rather-- let's talk to Mr. Taylor first. Mr. Taylor. Sir, I think our communication is robust with our allies across the world on this particular issue. It is not perfect. Certainly, the challenges within the Schengen zone in terms of free travel once an individual gets into Schengen and is able to move is understood by the European Union. Hence the discussions about PNR and other sorts of data exchanged between the Schengen zone countries to better remedy that particular circumstance that you describe. It is not perfect yet, but I think they recognize the security deficit that is created--cross-border movement that is allowed within the Schengen zone at this point in time and are looking at ways in which they can remedy that. But I would tell you that the bilateral and multilateral engagement on this issue of foreign fighters and sharing of data is daily and consistent and robust. Mr. Duncan. Mr. Rasmussen, in 41 seconds. Mr. Rasmussen. You are right to point to an overlay or an overhang from the period of disclosures that included the Snowden disclosures. But I would argue that since that period, we have seen an increased sense of shared threat among our European partners precisely because of the attacks like the Brussels attack and certainly what we saw in Paris and in Belgium again recently. So that, I would argue, there is a bit of a pendulum swing to this process that is for the moment trending in a direction of more sharing and willingness to share information. But again, I would argue with intelligence channels, that is not an immediate thing that just happened in the last 2 weeks since Paris. I think we have--that has been a pretty consistent refrain over the past couple of years. The politics of this issue are very difficult for some of our European partners, but as professional intelligence organizations working with each other, I would argue a lot goes on that we can be comfortable is useful to us. Mr. Duncan. Yes. I thank the gentleman. My time is expired. But communication is key in this realm, and I think you have acknowledged that. Mr. Chairman, I appreciate the lenience, and I yield back. Chairman McCaul. Thank the gentleman for his insight, as always. Gentleman from New York, Mr. Higgins. Mr. Higgins. Thank you, Mr. Chairman. Just on two aspects of this. One is the nature of terrorist attacks has changed profoundly. Al-Qaeda and al-Qaeda in the Arabian Peninsula has relied traditionally on complex plots involving explosions in airliners. Now, in September 2014, an ISIS leader told would-be recruits not to bother coming to Iraq or Syria but to launch attacks in their home countries. ISIS has called for attacks on soft targets in the West by any means available, including using a car to drive at pedestrians. The other issue is technology. As Mr. Steinbach had said, technology moves faster than legislation, a lot faster. You characterize the FBI as labeling this, you know, ``going dark.'' It is increasingly difficult to monitor the communications within terrorist networks. The proliferation of often encrypted, covert, coded information to prevent unauthorized use, from Skype to gaming forums to other new technology, has made surveillance tremendously technologically demanding, and in some cases, virtually impossible. Moreover, Apple's latest mobile operating system came with a default encryption, and Google's Android is soon to follow. In these systems, companies do not have access to their customers' passwords, and thus can't capture their messages. Now from a customer standpoint, from a consumer standpoint, you know, that is a very good thing. But those who are malicious--those--the malignancy of terror--it takes away a major tool that law enforcement uses to thwart terrorist activity in its planning stages. So, could you comment on that and what it is, if anything, we can be doing? You know, there was a time where publicly- owned telephone companies were all too willing to cooperate with law enforcement agencies for wiretaps and those kinds of things. That is no longer the case, and this poses a major, major challenge to Western law enforcement officials. Mr. Steinbach. Sir, I agree with you, the threat--first of all, is diffused, it is evolving, and so I think sometimes we focus too much on the other end versus the threat. Whether it is a complex attack, a coordinated attack such as Paris, or a more simple use of a vehicle as we saw in Jerusalem. We need to focus on the threat and the commonality in many of these threat streams is the internet, is social media. I think it needs to start with an education. I think there is probably a little bit of a backlash from Snowden, but there is also the TV version of it, what they think is doable and how simple it is. In the reality of lawful intercept, there is a very structured process in place that is reviewed by judicial, either on the criminal side or in FISAC--in the court. So, I think there needs to be an education piece that we are not looking to snoop where we shouldn't be allowed to snoop, but we have to have the lawful ability to intercept. Whether you are talking about a on-going criminal matter, a dangerous criminal matter, or you are talking about a terrorist communicating over the--either overseas or within the United States. So, I think it needs to start with a public message for all of us to explain exactly what it is. Then we need to go back and provide legislative tools, much like there were with Kahlea, that apply to not just a small number of telecommunication providers, but apply to the majority of those providers who serve as communication platforms. I think that is an issue that needs to be resolved and head-on immediately. I know from the FBI's perspective, we are engaging with the International Association of Chiefs of Police, the major city sheriffs and the chiefs, the USIC and others to explain our position and to show them very much that we are not crying wolf. This is a problem and in a closed session we can show you the numbers of how we are going dark. But it is a grave concern, and your point is right on. Without that lawful tool, we risk an attack. Chairman McCaul. Thank you, and thank you for raising that important issue. I think it is going to provide a mode of communication for not only criminals, but potential terrorists to communicate without any ability of us to intercept that. So, with that the Chairman now recognizes the gentleman from Pennsylvania, Mr. Perry. Mr. Perry. Thank you, Mr. Chairman. Mr. Taylor, a man named, a jihadist as I would characterize him, named Abdul Sabah from Florida was allowed back into the country and wandered around here for about 6 months in between visits to Syria. Now, he eventually met his demise on his own hand as a suicide bomber in Syria, but as far as I know, we didn't even know. The United States didn't even know that he made two previous trips. So, this individual is obviously somebody that we would be interested in and poses a threat to our security. How did we--how did your agency--what did we miss? How did we miss it? Mr. Taylor. Sorry, you are correct that this individual who later committed a suicide attack in Syria did return to the United States from Syria without our knowledge, and I think without--was not under an FBI investigation. It was only after his suicide attack that we learned of his activity. I think that incident really reinforced our understanding of the need to have better intelligence on what was going on in Syria. Mr. Perry. I agree with you, I am just--how did we miss him? What has changed, what have you done in your agency to make sure that that doesn't happen again? How did we miss him? What has changed? Mr. Taylor. What has changed is our better understanding of how these people move, where they move, working with our foreign partners in terms of sharing intelligence, understanding the intelligence that is coming out and the communications patterns that are going on that perhaps weren't as robust. Mr. Perry. Are there any concrete steps that you can describe right now that you have changed based on missing him and to make sure it doesn't happen again? Mr. Taylor. I think I would share that with the FBI in terms of what the FBI has done in addition to what DHS has done. In terms of---- Mr. Perry. What have you done? Mr. Taylor. Sir, we have extensively changed our methodology for tracking travel across the world, to the United States and out of the United States to these sorts of locations. In working with our intelligence partners across the world to better identify the linkages between potential Americans and others---- Mr. Perry. With all due respect, in the interest of time, is that information Classified? Mr. Taylor. Yes, sir. Mr. Perry. Okay. Can we set up an off-site that I can get that information from you? I appreciate it. Thank you. Moving on, I am just curious to get an understanding of how you characterize this threat. By what name does your agencies refer to what I describe as a global jihadi movement? That is what I described it as. What--you are talking about foreign fighters, but the larger picture, I am just trying to get a mind's eye into your view of it from an agency perspective. How do you describe this threat? Mr. Taylor. We describe it as radical extremism. Mr. Perry. Okay. Mr. Rasmussen. Mr. Rasmussen. Global extremists. Mr. Perry. Okay. Mr. Steinbach. Mr. Steinbach. Sir, I don't care what you call it. It is a threat to U.S. citizens here and abroad, so it is people trying to conduct violent attacks, whether you call it global extremism, al-Qaeda, AQAP, it is a threat. I am not going to--I don't care about labeling. I worry about their intent. Mr. Perry. Well, I appreciate that, sir, and I agree with you, but you can't fix a problem if you refuse, or unwilling, or unable to label it, and I think it is more than just global extremism. There is a particular global extremism, and that is why I characterize it as jihadi. The fact that none of you want to say--you know, characterize it that concerns me because that is not identifying the problem. But, moving on, yet again in the interest of time. The UAE, Saudi Arabia and Egypt considered the Muslim Brotherhood as a terrorist organization. I am wondering, in the interest of pursuing foreign fighters, if--that comes into your consideration, radicalization and how it is perpetrated in this country. Do you look at those organizations, or that particular organization, or another one for that matter--CAIR, those folks wander around this country with impunity and--may or may not be involved in radicalization based on the fact that some nations have considered them a terrorist organization. Does that work into your calculation into determining radicalization? Do you have any knowledge of radicalization or participation by any of the--either of those two organizations? Mr. Steinbach. Sir---- Mr. Perry. And Muslim Brotherhood. Mr. Steinbach. If you are asking me if I consider the Muslim Brotherhood a concern, I do. Mr. Perry. Okay. Mr. Steinbach. If you look at the founding of the Muslim Brotherhood, what it stood for, where it began, absolutely. There is, at the core, there are concerns about their ideology and their radicalization. Mr. Perry. All right, and so do you do investigations? Have any investigations led you to those organizations at all, regarding radicalization of America? Mr. Steinbach. Absolutely, There are historical investigations that at the root, the individual was radicalized by Muslim Brotherhood entities. We don't focus on the group. The individual has to have an intent, and that is where we focus the effort. Where is the radicalization come from is important for us, but it is not where I can hang my hat, and it is certainly not what I can build a case on. Mr. Perry. Appreciate it. Mr. Chairman, I yield. Chairman McCaul. Just to the gentleman's point, I--in deference to these individuals, in their reports they refer to it as Sunni extremism. I believe it is radical Islamist extremism that is the enemy. It is important to define that, it defies me why the administration won't call it that, but I will support these three witnesses, who, in their reporting, call--I think called threat what it is. Chairman now recognizes the gentleman from Massachusetts, Mr. Keating. Mr. Keating. Thank you, Mr. Chairman. General Taylor, thank you for your service. I want to go back to your very first remarks that you began this hearing with. You were talking about your concerns with the budget in homeland security. You know, there is a dangerous game of chicken that is going on right now, where in reaction to the President's immigration efforts, the reaction has been to threaten withholding of the very funding that protects our homeland security. Now, I don't think in the minds of the public they think there will be an absolute cutting of--out those funds, because that would be so radical a reaction. I don't think they think that is feasible. However, my point is, the reaction of going from these stop-gap budgets, continuing resolutions from month to month, backwards and forwards, that presents real limits on what you can do itself. So, I want you to focus on the fact that, forget about for a second the threat of just the cutting off of those funds. Right now the way you are functioning is a threat to your ability to deal with our security. Could you talk to that important point, I believe? Mr. Taylor. Certainly, sir. Secretary Johnson has spoken to that point, and as we have spoken during our testimony today that the threat that we face is evolving and changing. He needs the flexibility to adjust tactics and techniques as this threat evolves under the current issues. With the continuing resolution he does not have that flexibility. I would add one other thing. Before this committee, and before the authorizing committees, or the intelligence committees, as I came on board, one of the major issues discussed was the issue of morale. We have 220,000 employees in our Department who every day come to work to try to secure this country. It sends a terrible signal, in my view, to them and their responsibility when the Congress has not fully funded the effort that they are charged with accomplishing. So, not only from an ability to react to the changing nature of the threat, we have a challenge in our Department in ensuring our people understand that we support them and that they are going to get---- Mr. Keating. I thank you for that. I just don't want it lost as we are talking about all these things today that we should be doing, that you are limited right now and able--you are limited in being able to address those things because of this stop-gap or continuing resolution approach that just keeps going on. Along those lines, one of the programs that I am interested in, particularly that Director Rasmussen talked about in general, was a program with Los Angeles, Minneapolis, and Boston. Some of the UASI money is going to fund that, and it is joint with homeland and with the Justice Department in general. It is the effort dealing with the National strategy on empowering local partners to prevent violent extremism. To me, that is a critical point going forward, too. I see it right in my own home State in Boston, in our ability to deal with that. Director, could you comment on that, and any other witnesses? Mr. Rasmussen. Sure, and the three cities that you mentioned, sir, are pilot cities in an effort to try to test and--and see if we can--what we are doing in an effort to counter violent extremism in our--in our communities here in the United States is, in fact, a workable solution, working with State and local partners, and is therefore something scalable and we can use it across a larger number of cities. The three pilot cities are going to be featured at the upcoming CVE summit that the White House is convening in just a couple weeks. There will be an obvious opportunity there to show other communities the benefits of participating in an effort to pull all of the different tools of a community together, not just the Federal tools as Director Steinbach said. This largely has to be a locally-led initiative, but enabled and with content help generated by the Government. Mr. Keating. Yes, this committee has done much work, particularly in light of the Boston Marathon bombing, in showing the multiplier effect of dealing with our local, and State, and county resources and assets in there. So, that is why it is important. Very quickly, one other point with the Passenger Name Record information. I mean, it spent 2013 in the European parliament that that has languished. It is great to hear a corporation with the United States and our allies is going great, but they are not talking to each other. Without that, we have a problem. Can you see any changes, or recommend any changes, should this stalemate continue with the Visa Waiver program? Mr. Taylor. Sir, you mean the stalemate within the---- Mr. Keating. Within the European Union and parliament in dealing with this. Mr. Taylor. Of course our Visa Waiver program agreements are with individual countries. Mr. Keating. Right. Mr. Taylor. We are looking to strengthen within that bilateral relationship the exchange of information under the Visa Waiver program. So, we would love to see the European parliament come through and decide to do this across Europe, but that will not dissuade us from engaging bilaterally on the information exchanges that we think we need to---- Mr. Keating. I agree with you, but I wanted to hear your comments in that regard, because there has been some discussion on changing that. But I think really we compromise our security in doing that. I yield back, Mr. Chairman. Chairman McCaul. Let me just add, the gentleman mentioned Boston. We have the Watertown police, as you know, in town to receive the Presidential Medal of Valor for Public Safety. I can't think of a organization more deserving than the Watertown police and the heroic efforts on that fateful day. With that, the Chairman now recognizes the gentleman from Florida, Mr. Clawson. Mr. Clawson. Thank you for coming, you all, today. I also pass along my best to the folks that work with y'all. They got a real tough job. Democracy is messy on Capitol Hill, and so the circumstances are difficult. So my full respect and appreciation for what y'all do. When I think about terrorists coming out of a dangerous part of the world like this and what is going on over there, I always think to Turkey. Honorable Mr. Rasmussen, you mentioned it, I think, earlier in your comments. On the one hand, Turkey has a proud history, a secular history. They got how many thousands of terrorists go to the Aegean Sea every year, manufacturing product going out of Ismir back to Europe, and a member of NATO. So you would think, on the one hand, these folks ought to be motivated to get things under control here with respect to the highway of tourists. On the other hand, I read about hostage exchanges with ISIL. There has been a long history, as you know, of problems with the Kurds. Also, it almost feels like there is ambivalence with respect to the violence on the border--I mean, on the border, with a war going on. It doesn't feel to me like we can solve this problem over there, and therefore, over here without pinning down where Turkey really is. I don't know where they are. If we can't get an ally who is a member of NATO to help us in the region, I am not sure what we could expect from anybody else. So I--you know, I am befuddled on where this is going and how we could ever have success without Turkey, and I am really interested in what you have to say about that. Mr. Rasmussen. Well, I think you are absolutely right, sir, that success in the counter-ISIL campaign or any effort we are engaged in to try to stem the flow of foreign fighters into and out of the conflict zone requires a functioning, effective partnership with the Turks across the whole range of issues-- intelligence, law enforcement, diplomacy, all of that. It is also true, though, that Turkey will always look at its interests through the prism of their own sense of self- interest, and how they prioritize particular requests that we make for cooperation doesn't always align with our prioritization. That is just a simple fact. We have a complicated on-going discussion with the Turks, all of the Turkish government elements, about the specific ways in which Turkey can contribute to the coalition. I wish my State Department partners were here today to kind-of talk you through all of the different ways in which they are doing that, but it is a--truly a mixed story. There are areas where we receive profoundly effective cooperation from our Turkish partners and it is tremendously useful, and yet from our perspective, we think there is more to the relationship that we could get more that we need from the relationship to effectively address our concerns. Mr. Clawson. How do we take the next step, or is that purely a State Department issue at this point? Mr. Taylor. Sir, certainly, State Department has the lead, but our Department has been engaged with the Turks on very specific border security and other discussions to try to push forward more cooperation in that regard, and that is continuing. The Turks will be here for the CVE summit. Those engagements will continue. But as Director Rasmussen mentioned, it is a challenge at this point. But we see lights of cooperation beginning to flow in ways that we, I think, will want to explore going forward with them. Mr. Clawson. Well, we will push this in Foreign Affairs Committee, as well, because it seems that if we speak about a broad coalition to take on global terrorism and we don't have a fully committed Turkey on one bookend, and the other bookend is Syria, for God's sakes, you know, what are we really doing here? So I appreciate y'all's comments, and I think until you get full cooperation from the Turks, this is going to be a real uphill battle, in my view. I yield back. Chairman McCaul. I thank the gentleman on this important point. Our NATO ally Turkey could be a real help with the situation. I think we need to put pressure towards that end. Gentlelady from New York, Miss Rice, is recognized. Miss Rice. Thank you, Mr. Chairman. So I am not sure who can answer this, or all of you or one of you. Can you expand on the enhancements that are--have been made or are planning--or are going to be made on the ESTA system for the Visa Waiver countries to better secure, obviously, our Nation's homeland? To what extent--or where do you get the funding to ensure that whatever enhancements need to be made can be paid for? Mr. Taylor. Yes, ma'am. In October, we added six additional data elements that were required for all--and I don't have the specific ones, I can get them to you--that would broaden the data elements that have to been filled in in an ESTA application that comes to us before the travel is accomplished. That has allowed us to do more thorough screenings against our databases of those people who would come in from Visa Waiver countries. We are considering additional adjustments both bilaterally and across our entire program that are now being discussed in our Department to continue to strengthen the security of the Visa Waiver program and not to give us better confidence, more confidence here on the Hill and elsewhere that the security of that program is as effective as it can be. Miss Rice. In terms of oversight, how is that we ensure that every country that is part of the Visa Waiver program is actually keeping up with the standards that we need in order for us to get the information that we need? Mr. Taylor. Well, we do biannual reviews on the ground in those countries, of every Visa Waiver country. One of the things we are discussing is whether we should do that annually, as opposed to biannually. There are other things that we are discussing to strengthen our confidence that what we believe is happening in those countries is indeed happening. There will be more to come on that in the future as those deliberations continue. Miss Rice. Okay. Thank you. I yield back, Mr. Speaker. Thank you. Chairman McCaul. Thank you. Gentlemen, from Georgia, Mr. Loudermilk, is recognized. Mr. Loudermilk. Thank you, Mr. Chairman. To the witnesses here today, I appreciate you being here. I don't know that when in my lifetime, I have been more concerned about the internal security of America, not just from our safety and security, but our economic security and on several fronts for different reasons. One of the things that I know that has been spoken about here and at other times is the threat of ISIS as not only being what I understand the most well-funded, the best organized terrorist organization possibly in the history, but also their ability to effectively use the internet and social media. There is one thing to use social media, but those of us engaged in politics, we spend a lot of time studying the effective use of social media. How do you come up and stand out amongst billions of users across the world? It appears that ISIS is doing a very good job. They are effectively marketing to our youth, which is specially concerning to me, especially those that are vulnerable, those are--feel disenfranchised and even using video games, as you have mentioned. So what are we doing--are we working with internet providers, social media providers to help combat the use of the internet and social media to spread their radical Islamic idealism that I think is a threat to the future? Are we working with those companies, and are they participating? Mr. Rasmussen. I will start, but I will certainly ask Mike to take this on, too, because the bureau is having quite a bit of direct engagement with these providers. Partnership with these technology companies on whose platforms this propaganda is riding is a central part of any strategy to counter what is going on. The President's CVE summit will have a private-sector component to it for precisely that reason, to make these companies partners with us. This partnership has a number of elements. It is in part exposing them to the information about what is happening on platforms that they control so they understand it. If they can understand when terms of service violations are taking place that they should intervene and take steps to block certain content. But it is also to--again, to deepen a partnership and make sure that they understand that we need to be partners with them in going at this more systemically, not simply in response to a single video or a single YouTube posting or something, but actually to think about what kind of relationship between the Federal Government, law enforcement, and these companies makes sense if we are going to tackle this phenomenon that is creating a serious homeland security vulnerability. Mr. Steinbach. So I will just add, sir, that, you know, social media, when you look at the volume and numbers of companies, it is hundreds of companies. So we do have direct engagement with those companies that are U.S.-based, but when you look at the totality of what the terrorist groups are using, many of these are small social media companies that reside offshore, who flaunt their lack of cooperation with law enforcement. So that is the problem. There is a--you can go to Twitter or many other companies, but there is just a large number out there that, unfortunately, it is difficult to get our arms around. So there needs to be thought towards, how do we affect the totality of the social media platforms that are out there? Mr. Loudermilk. Well, obviously, the dominant players in social media are American companies. Have they been receptive to work with you? Have you found them to be cooperative? Mr. Steinbach. So we have had on-going continual dialogue. I think we have a team there now on the West Coast talking to the companies. I would say they understand our viewpoint. I don't think those companies and the individuals who work in those companies want to see bad things happen. They balance the right to privacy versus their diligence and the requirement to keep people safe. But it is a volume thing. So it is not--they try to follow the terms of agreement, and certainly, if they see individuals violating those terms, those service agreement contracts, they shut them down. But when you are talking with that volume, it is a challenge for them. So I would say they understand our problem. We continue to work with them to get them to develop process technology to help us out. But that is just one part of it. Mr. Loudermilk. Okay. Thank you. I only have a few seconds left, but just wanted to say that when I was in the military, one of the things that we got to was the basic ideology behind an enemy. That is how you formed a strategy for a long-term defeat. My concern is that we are not properly identifying this as radical Islamic extremists to have a long-term fight, a strategy against the ideology. Typically, on the battlefield, most soldiers have a survival instinct that we know that when it comes down to it, they do want to live. In this case, this ideology is that death is a reward. So I would just emphasize the importance, as Ronald Reagan understood, understanding the ideology of extremism. If we are going to--if we don't, we will find ourselves responding instead of having a long-term strategy. With that, Mr. Chairman, I yield back. Mr. Steinbach. Really quickly, sir? Can I make a comment to that really quickly? Chairman McCaul. Please. Mr. Steinbach. So I think it is important to note that the subject-matter experts, whether you are talking about organized crime or terrorism, they are subject-matter experts. They--we spend a lot of time training towards, we hire towards subject- matter experts to understand. You have to be a subject-matter expert to engage in this fight. We have robust training programs that talk about the ideology, that talk about the background and the culture, the history of the radicalization and history of terrorism. So those programs, those training programs are in place, and they are very important for my folks, and I am sure the other agencies, to work the threat. Chairman McCaul. I thank the gentleman. The Chairman now recognizes the gentlemen from New Jersey, Mr. Payne. Mr. Payne. Thank you, Mr. Chairman, and to the Ranking Member. You know, a lot of this discussion today and over the past month or so has been very interesting to me. Here we are, a committee with the responsibility of making sure that the homeland remains safe. But yet and still--everyone talks about making sure that that happens, but there are a group in the Congress that are willing to play politics with this country's security. You know, politics is part of what we do, but to pick Homeland Security in order to make your point is dangerous. I travel from my district in New Jersey, the 10th Congressional district, which takes in Newark, New Jersey, a tier-one target. Prudential Insurance Company was targeted several years ago, about a decade ago, for an attack. If you go to Jersey City in my district, where I went on September 12 and saw the smoldering building from across the river--we cannot play games with the funding for this Department because of a policy that you don't agree with in the Executive branch. It makes no sense. With that--oh, and let me just say, Mr. Chairman, I had come down from my district on the train Monday night, and in the train station there were DHS police officers, and I went over and spoke to them and thanked them for their service and the things they are doing for this country. They asked me to send a message back to Congress, and it was please give us the resources and the funding we need to do this job. Do not cut our legs from under us. So, we can't continue saying we appreciate their service and work, but yet we will not give them the resources that they need to do the job. So, Under Secretary Taylor, you mentioned that not fully funding the Department of Homeland Security would have a crippling effect on domestic security. Could you please explain how if the Department of Homeland Security is not provided with the full-year funding, efforts to prevent foreign fighters and their travel would be affected, since that seems to be a great concern on the other side, how not funding the Department will impact that ability? Mr. Taylor. Sir, I think the point the Secretary has made and I have tried to make here today is that working under the CR limits our flexibility in investing in the threats as they evolve over time, and our grant funding, and our ability to respond--to add money to the Secret Service for additional protection, and those sorts of issues. So, I can't speak specifically to a specific foreign fighter aspect, but in the day and age that we work and live from a security perspective, the Secretary believes very strongly that in order to protect the homeland, we need the flexibility to invest in the new threats as they are evolving. Under the current system, he doesn't have that flexibility to direct his forces to execute in that manner. Mr. Payne. New funding for new programs? Mr. Taylor. New funding for programs, funding for continuing grants, funding---- Mr. Payne. Two-point-six--two-point-six billion dollars in grant funding from what I am reading here. Mr. Taylor. Yes, sir. Mr. Payne. You know, it just baffles me how we can almost, like, talk out of both sides of our mouths and say that we want to make sure that the homeland is safe, but because of an issue you have with the Executive branch, we are going to play games and say, well, you know, maybe we won't fund the Department of Homeland Security. I yield back. Chairman McCaul. The gentleman from New York, Mr. Katko is recognized. Mr. Katko. Thank you, Mr. Chairman. Mr. Steinbach, earlier you testified that the FBI did not have a process in place to vet and conduct background checks for Syrian refugees. What tools or capabilities would the FBI need to be able to conduct these checks? Mr. Steinbach. Sir, I didn't say we didn't have a process in place, I said that there was a lack of databases. So, we learned our lessons with the Iraqi refugee population. We put in place a USIC-wide background and vetting process that we found to be effective. The difference is, in Iraq, we were there on the ground collecting, so we had databases to use. The concern is in Syria, the lack of our footprint on the ground in Syria, that the databases won't have the information we need. So, it is not that we have a lack of process, it is there is a lack of information. Mr. Katko. Is there ways that you could suggest we go about trying to get this information? Mr. Steinbach. I just don't think you can go and get it. You are talking about a country that is a failed state, that is--does not have any infrastructure so to speak, so you--all of the data sets, the police, the intel services that normally you would go and seek that information don't exist. Mr. Katko. That obviously raises a grave concern as to being able to do proper background checks of the individuals coming into the country. Mr. Steinbach. Yes. Mr. Katko. Okay. All right, now, Mr. Taylor, thank you for your testimony as well. As a Member of the--as the Chairman of the Subcommittee on Transportation Security I look forward to working with DHS and TSA on a regular basis moving forward to the mutual benefit of everyone. A couple quick questions from your written submission, and it just--these real points of clarification for me so I can better understand the foreign fighter issue. One of the things that you mention was that the Secretary Johnson has ordered--or is conducting an immediate short-term review to determine if additional security measures are necessary at both domestic and overseas last-point-of- departures. What is the status of that review right now and when are we going to be able to get some information out on that? Mr. Taylor. The schedule to brief the Secretary is this week by TSA. The idea behind this--the thing Secretary Johnson has charged us all with is thinking outside of the box. Mr. Katko. I like that. Mr. Taylor. We apply security directives, we see the effect of those security directives every week when we have our counterterrorism meeting. His last question is: Are we thinking out of the box, and what else could we be doing to be more effective? That is what he has charged TSA to give him some ideas back that he will decide in terms of how those things might be better implemented to--across both domestically and internationally. Mr. Katko. Okay. So, that is a short-term, and--of course you will report to us at the appropriate time any suggestions-- -- Mr. Taylor. Yes, sir. Mr. Katko [continuing]. That might be helpful. Mr. Taylor. Absolutely. Mr. Katko. We appreciate that. You also noted that in the long term, you are exploring the possibility of expanding to pre-clearance operations. Could you explain this a little bit more in detail why that would be beneficial? Mr. Taylor. Well, simply put in a football analogy, we would rather play defense on their one-yard line than on our one-yard line, and right now, without pre-clearance, the clearance happens here in the United States and not at the overseas airport. So, the extent to which we have pre-clearance agreements with governments across the country, we can put Homeland Security personnel in those airports, conduct the screening using our databases at their 1-yard line, and be more effective, we think, in preventing people from getting on airplanes, coming to our country. Rather than finding them here and having to send them back. Mr. Katko. Okay. Thank you for that. Last, with respect to tracking the foreign fighters, there was a reference in your written report to enhancing or enabling of CBP to conduct security vetting of respective VWP travelers to determine if they have low--law enforcement security risk. When you say enabling CBP, what do you mean by that? Is it something mandatory? Mr. Taylor. We are really speaking to the expanding of ESTA and our ESTA data requirements, as one of the earlier Members asked, we have expanded that by six. We are looking at whether or not we should expand it even further so that we have better data upon which to vet against our databases. Mr. Katko. All right, so when you are--the term I was kind of hung up, maybe I am being my former prosecutor a little bit too much here, enabling the CBP to conduct security vetting. I mean, I use the seed word enabling. Does that mean it is optional for them to do that, or is it---- Mr. Taylor. No, no, sir. It expands your capacity to do it with more data elements. Mr. Katko. It is part of the total mix of things they do when they screen someone? Mr. Taylor. Yes, sir. Mr. Katko. Okay. All right. Thank you. Mr. Taylor. I would add, sir, that every person that comes to the United States on an aircraft or ship is vetted against our holdings. There is no one that comes here that doesn't get that kind of screening. It is the--whether it is a visa screening or an ESTA screening, that may be a bit different in terms of whether an interview is conducted and that sort of thing, but everyone gets screened against the databases that are available to our country. Mr. Katko. Okay. Thank you very much. Chairman McCaul. Gentlelady from New Jersey, Mrs. Watson Coleman is recognized. Mrs. Watson Coleman. Thank you, Mr. Chairman and thank you Mr. Thompson. Gentlemen, I am sorry I wasn't here for the beginning of your testimony, but I spent my last night reading it, and I found it fascinating. So, I want you to know that I am very appreciative of what each of your agencies is doing and attempting to do and identifying in terms of keeping us safe here. How you have expanded your interactions, and your information sharing, and your methodologies, and your creativity with other--places, including foreign countries so that we can all be safe. That is very important to me. I am particularly struck by Homeland Security and I want to associate myself with Mr. Keating and Mr. Paine's remarks about our responsibility to ensure that as you are the protector of the homeland, that you have the resources necessary to be flexible, to be responsive, to be proactive, to do what you need to do to keep me safe without engaging in the political wranglings of whether or not we should be holding the President's foot to the fire on something that he did because Congress couldn't see fit to do. But nonetheless, my question is more narrowed, and I think it is similar to Mr. Loudermilk's questioning. I am concerned about growing our terrorists here, taking who we think are everyday young people, having them exposed to the way these radical organizations use the social media and any other recruitment resources, and how--what is it that we can do to sort of cut it off at the pass? What is it that we should be doing in terms of accessing young students, vulnerable college students? Are there resources that we should be putting in educating and counteracting some of this negative propaganda, this ideology- spewing that is taking place with--how do we help our communities and our families see signs? Are there any commonalities of the characteristics of people that we have seen that seem to be most vulnerable that are home-grown, that seem most vulnerable to this radicalization? Can you share with me where you think our greatest threat is in terms of the security? Is it on the Southern Border of the United States and Mexico? Is it some other borders that we are talking about? For someone like me, I consider myself Spongebob. I want to soak up as much information as I can get. I need to have a better understanding of those questions, and whoever is able to answer any part of it, I would be greatly appreciative. Mr. Rasmussen. I will start, but any one of us can add pieces to this, ma'am. You are absolutely right that the focus of--one of the focuses of our effort at the Federal level is to try to empower local communities to develop their own engagement or intervention strategies, because that is what it takes. There is not going to be a Federally-led intervention in a particular family, or community, or social setting that is going to be the tipper that turns someone off from radicalization. It is that local community, the families, schools, churches, mosques, they are the ones who recognize behavioral changes at a point when behavior can be still addressed and potentially not end up at the worst-case scenario of a person actually having traveled overseas. So the precisely the kind of information you are asking for is what we are trying to share in a series of community awareness briefings that give people, parents, schools, teachers the tools to say hey, this is what is happening, and now I have to do something about it. Now the ``do something about it'' part is still very much has to be a community decision or a local decision. But the other frustrating piece, and it gets to the last part of your question, is that there isn't a single place you can say, ah, we need to be worried about it here but not here. Unlike some of our other previous foreign fighter flow episodes, like during the period when a large number of Americans were going to Somalia to participate in the fighting in east Africa, there you had a relatively defined set of communities where we had great concern because of the Somali- American population and their particular vulnerability to recruitment there. Here, and I am sure Mike would echo this, we do not have a profile or a pattern that says, ah, in these communities yes, but in these communities we are okay. So what we are having to do is, we talked about it with Chairman earlier, is just scale up these efforts because the ISIL, the Iraq grounded propaganda is having a reach far beyond ethnicity. It is not Iraqi Americans or Syrian Americans, it is--it isn't--it can't be narrowed in that way, and that is a challenge and it is frustrating to us. Mr. Taylor. Ma'am, I would add, and certainly associate myself with all of the comments that Nick has been made, we believe one of the empowering organizations is our fusion centers and training of our State and local police officers who are the first responders, who are going to be the first level of defense, if you will, in spotting some of this behavior in addition to what happens within the community awareness area. So, it is a combination of empowering the community in terms of what to look for and having our police officers better understand this phenomenon and what they may see on the street on a day-to-day basis in their encounters with citizens. Community policing officers who are involved in day-to-day activities within communities across our country also need to have that kind of an understanding. I think, Assistant Director Steinbach mentioned it, it is almost like the D.A.R.E. program, where you go to get to the basics of everybody understanding what the issue is and filling the knowledge base so that people when they see it, that is where, ``See something, Say something'' can really make a difference in identifying these sorts of issues before they become bigger problems. Chairman McCaul. Thank you, gentlelady. Mrs. Watson Coleman. Thank you, Chairman. Chairman McCaul. The gentleman from Georgia, Mr. Carter is recognized. Mr. Carter. Thank you, Mr. Chairman, thank you, gentlemen for being here and thank you for what you do to protect our homeland. We appreciate it very much. Let me ask you--you know, this is the kind of report that you read through and you are concerned about everything, and not one thing more so than the other. But one of the things that struck me was about the foreign fighter travel. I just want to know what we can do to better control that. From what I understand, we are not using all of our resources. I don't know that the administration has even identified a lead agency to combat this. Is that true? Mr. Steinbach. No, I would say that is not true. So foreign fighter travel, travel to a conflict zone in support of foreign terrorist organization, is against the law. So the FBI has the lead on that. The question is: When you look at the broken travel, as Mr. Hurd brought up earlier, when you look at the ways to-- legitimate citizens traveling abroad is not something that we choose to curtail. So if you take travel to destinations like Europe, where you can then take--Schengen--down to Turkey. So it is more about identifying the multitude of ways that these individuals in the United States are committed to travel using good investigative processes. Are they going up to Canada? Are they going down to Mexico? How are they getting to--how are they using lawful process, lawful ways to get to these locations? So it is not a function of not having the tools. It is--you know, they are--they have just as much creativity as we do and they have got a lot of support. So they reach out on social media, on platforms, talk to people who have done it and made it, and then follow the travel routes. So we have got to stay on top of that and use tripwires, the intelligence community, the 17,000 State and local and travel law enforcement agencies to develop an understanding of what the landscape is. Mr. Carter. So the message I am getting from you here today is that you feel like we have got that under control, or doing the best we can? Mr. Steinbach. We don't have it under control. Absolutely, we are doing the best we can. If I were to say that we had it under control, then I would say I know of every single individual traveling. I don't. I don't know every person there and I don't know everyone coming back. So it is not even close to being under control. It continues to be a challenge. We have to creatively, as Frank said, think outside the box to figure out how to combat this. We spend a lot of time figuring this out, looking this over, trying to develop processes and databases, automated searches to work this problem. Mr. Carter. Okay. Let me switch here to a quick--and let's talk about the Visa Waiver program. As I understand it, there are certain people who are eligible for this and it is good for 90 days and it expires in 90 days? Mr. Taylor. Actually, sir, the period of the ESTA approval can be upwards of 3 years, depending on the country. So once an ESTA is submitted, then the period that that ESTA is valid can be between 1 and 3 years. Mr. Carter. But those countries that we are most concerned with, it is up to 90 days, generally? Mr. Taylor. In terms of? Mr. Carter. In terms of the waiver. Mr. Taylor. Right now, we have a Visa Waiver with 28 countries across the country--across the world. In each of those cases, we have a bilateral relationship with those countries about how we exchange data and for what purposes. More broadly, other countries have to get visas through the State Department for the purposes of traveling to---- Mr. Carter. Okay, well, let me ask you this: What happens when it expires? Do we have someone who checks up on these people to make sure that they are not still here? Mr. Taylor. Oh, absolutely. That is the job of our Immigration and Customs Enforcement. Part of being in the Visa Waiver program is the requirement that your visa overstays be somewhere in the less than 1 percent level. So we are pretty confident in the countries that we have Visa Waiver programs with that the level of this type of activity by their citizens in our country is minimal, compared to the level of activity that may be evident in other countries, where visa overstays are a bigger issue. Mr. Carter. Okay. Well, as I can imagine it, you have got a tickler file set up, and if somebody exceeds that 90 days and they haven't left---- Mr. Taylor. Absolutely. Mr. Carter [continuing]. Then you go looking for them? Mr. Taylor. We have processes to try to make sure that those people who are in this country for longer then their visa period are tracked down and escorted away. Mr. Carter. Okay. Mr. Chairman, I yield the remaining time. Chairman McCaul. I thank the gentlemen. Chairman recognizes the gentlelady from Texas, Ms. Jackson Lee. Ms. Jackson Lee. Let me thank the Chairman--let me thank the Chairman and the Ranking Member for this very important hearing. Let me state to the witnesses I was delayed because we were holding a crime subcommittee in Judiciary, of which I am the Ranking Member. This is an extremely important hearing, and it is issued in the backdrop of several worthy comments. The President has now released his AUMF, which is a singular notice to the Congress of the importance of addressing the question of ISIS and the potential of the United States engaging in some form of military action to be able to secure this Nation. I indicated in remarks earlier today on the floor that the Department of Homeland Security provides a domestic armor, a National armor of security. That is the responsibility of that. For many of us on this committee, we have had the privilege of serving since the horrendous and heinous act of 9/11. Often, I make the comment, certainly not proudly, that I was on or at Ground Zero during the moments of the extended time of looking for remains. It will always be a potent and striking moment in my life, and I take seriously the responsibilities of this committee. For that reason, I believe it is crucial that we do not hold hostage this Department. We have actually 7 days to make amends on the funding of the Department of the Homeland Security, and I remind my colleagues that the issue of unaccompanied children or the President's Executive Actions do not pose the kind of heinous threat that we are talking about today. I frankly think this is an important discussion, and many front-line DHS employees will be, in essence, hindered from their work without the full funding of this committee. I ask you Mr. Taylor, just a simple question, that in the midst of your jurisdiction and employees that you have under your jurisdiction, without funding for this Department, will some of them not be paid or some of them have to be furloughed, or some issue may come up regarding their service? Mr. Taylor. Ma'am, we are in the process of reviewing the procedures for an orderly shut-down of the Department. I can't say specifically the number of people, since I--people who work for me are primarily in the National security arena and are exempt from this. But there will be an impact in terms of people who are not directly involved in National security. Also, I would reinforce a comment I made earlier. There are going to be people who are working but not paid. Ms. Jackson Lee. That is the point that I made. You didn't hear me say that. Mr. Taylor. This is a morale challenge in a Department that is morale-challenged going forward. So---- Ms. Jackson Lee. But the main point is, is that you are in the process of having that as a responsibility, which is surveying your Department and determining what will happen without the funding. Mr. Taylor. Absolutely. Ms. Jackson Lee. That is taking your attention away from important security issues of securing the Nation, which I assume--that is a statement that I believe is accurate. Is that not accurate? Mr. Taylor. I am not personally involved, but our Departmental management folks are working---- Ms. Jackson Lee. But that is staff persons dealing with those issues---- Mr. Taylor. Absolutely. Ms. Jackson Lee [continuing]. That would not ordinarily be dealing with them at this time. Mr. Taylor. Absolutely. Ms. Jackson Lee. Let me offer and pursue my questioning to make this point. I do want to offer sympathy. We have come to our attention that three members of a Muslim family were murdered in Chapel Hill. These were students at the University of North Carolina Chapel Hill. We understand the culprit was arrested and charged with first-degree murder and had some issues dealing with religious questions. One of the individuals was, in fact, speaking against the murder of people, meaning one of the Muslim students was speaking against that. Let me go straight to the gentleman from the FBI and ask the question regarding cyber and the internet and soliciting and what counter, in terms of ideology, can be best used to fight this. We can fight with arms. We can fight with intelligence. But are there other ways of stopping or getting in the way of the solicitation of our young people? Mr. Steinbach. Absolutely, ma'am. I think there are a variety of ways, both methods we can talk about in open session, as well information we can talk about behind closed doors in a Classified setting. I think it starts to go back--we have to understand the path to radicalization and mobilization. It starts with intellectual curiosity at some point, and there are lots of community-based efforts that can be made to turn people away. Once an individual gets to the point where he or she has an intent to conduct an attack, then it turns into an enforcement or a disruption piece. All along that spectrum, all the way through disruption, there are efforts that can be made both from a counter-radicalization narrative, both from a disruptive and an intervention perspective--and it is a multi-pronged approach that involves the State Department and the counter- messaging piece. It involves a community-based counter- radicalization piece. Of course, it involves the use of tripwires and disruption to prevent acts of terrorism. So it is a wide-spread approach that we have to utilize all of those. Ms. Jackson Lee. Well let me just say that I hope that this committee, that we have overlapping jurisdiction, will ramp up the dollars that will intervene in that radical heinous ideology. I consider ISIS barbaric. Mr. Chairman and Ranking Member, I do want to offer my deepest sympathy to the family of Kayla Mueller, who was in the truest sense a great American, who wanted to do nothing more than to help people who were in need. To be targeted by the heinous violence of ISIS--this committee's hearing is important. The violence in this committee--excuse me, in this--not in this committee, in this Nation that warranted and brought about the death of three Muslim students or individuals in North Carolina--none of this should be tolerated. However we can disrupt and interrupt this, I think it requires all of our resources, working together in bipartisan, funding the DHS, to be able to make a difference. I, for one, would like to be engaged in the writing of the legislation and/or to find out more in an instructive manner, how do we stop the radicalization of our young people for something as heinous as what ISIS represents. My final word, Mr. Chairman, is to thank King Abdullah and Jordan for their committed work, along with our allies, on this effort. My sympathy to them for the losses that they have experienced throughout the Mideast and throughout Europe. With that, I yield back my time. Chairman McCaul. Gentlelady's time has experienced. The gentlelady from Arizona, Ms. McSally, is recognized. Ms. McSally. Thank you, Mr. Chairman, and thank you, gentlemen, for your testimony here and--try and look at you while I am talking here with my colleague in the way. So I appreciate your work that you have been doing. I was 26 years in the military and worked especially, Director Rasmussen, with your organization, and my last assignment at U.S. Africa Command running current operations there to include our counterterrorism operations. I am aware you all have been dealing with the foreign fighter issue long before a lot of people are now paying attention to it. But we were watching it even back then, 2007 to 2010, where we had foreign fighters flowing from many places but into areas for al-Shabaab training camps and AQAP and AQIM, North Africa, any of these ungoverned spaces, as you know. I will say as someone in the military, it caused great frustration as much as what we have been talking about today is mostly on the defense, to your terminology. But in order to address this, it needs to be a comprehensive whole-of- Government approach, for sure. But I sure would prefer to be on the offense primarily, and that includes going after these people that have, you know, decided to become enemy combatants in a generational struggle against us, as well as going after the core ideology. So at the Unclassified level--I mean, you know this. We watched thousands of foreign fighters graduate from these training camps because, quite frankly, we didn't have the political will to do anything about it on the offense at the time, not thinking it was within our interest or it wasn't a threat to our country. God knows where those thousands of jihadists who graduated from these training camps all over Africa--where they are now. I mean, who knows where they are today? But we just watched them. We let them go. We did nothing about it. Where we had tremendous opportunity to do some things, we just didn't do it. So we have been focusing on the foreign fighter problem with ISIS, but I do want you to comment on your perspective of the foreign fighter problem in other ungoverned areas that we can't forget about, to include many of them in Africa. I would just like your perspectives on what we are seeing through there. Mr. Rasmussen. Thank you. As I talked about in my testimony, the thing that is an order of magnitude different about the foreign fighter phenomenon in this current conflict is the scale. But you are absolutely right. This is not a phenomenon that was invented yesterday. Individuals interested in flowing to conflict zones to participate in conflict there is something we have been watching through a series of conflicts in the Middle East and North Africa. The kind of unifying theme in these areas is lack of governance, and so we are left, in a sense, sitting on the outside, trying to intervene using all of the tools available, but no one tool itself being adequate to the task of reaching into North Africa, whether that is a Mali or a Libya or a Somalia, and reaching in and being able to affect the dynamic that those foreign fighters are moving into, is a challenge that we do not have our arms completely around yet. We are particularly challenged in some of these areas because of an intelligence deficit, where our ability to collect intelligence that gives us a really, really good picture of who the individuals of greatest concern are. As you know, that is where we try to spend most of our effort, is trying to determine who those individuals are that actually are engaged in plotting against our interests because there is obviously a huge population of individuals who are there to participate in localized,conflict so we can't devote all of our resources to understanding that picture. I guess the last thing I would say is that particularly concerning about the ISIL phenomenon is that ISIL has now decided it needs to move beyond Syria and Iraq. So you have extremist organizations in North Africa, Algeria, in Egypt, in Libya, who now have raised the flag of ISIL and claimed affiliate status. Again, that creates a sense of momentum and competition among extremist jihadist groups that ultimately adds to our threat concerns, doesn't subtract. Even though you like to see your enemies fighting amongst each other, but actually, it is creating competition against each--amongst each other as they try to one-up each other in efforts to go after us. Ms. McSally. Great. Thank you. The next question--I have just a little bit of time here left--is--I know you talked about some community engagement, but you know, this is an Islamic extremist problem. So what in particular is the engagement with the Muslim community in America, the Muslim leaders? Where are you seeing that there are obstacles to having them admit that this is a problem of an extremist portion of their religion, and they need to get on board in order to stop it? Mr. Taylor. Ma'am, I would say that within the Muslim communities around our country, they are concerned, as are all Americans, about this kind of behavior among people within their community, and they want to address it. They want to understand it better and to have the tools to address it. I have noted--I have been out with the Secretary on a couple of these. There are concerns about discrimination on the part of those communities and how they are are treated in certain other ways, but there is no lack of commitment in those communities to get at extremism among their children, among people in those communities, because they see that as inconsistent with their responsibilities of being Americans and living the American dream in our country. So I have noted--I don't think we have noted a major lack of effort among those communities to recognize this phenomenon and how it impacts those communities and not wanting the tools to help them address them proactively. Ms. McSally. Great. Thanks. My time has expired. Thank you, Mr. Chairman. Chairman McCaul. Chairman recognizes the gentlelady from California, Mrs. Torres. Mrs. Torres. Thank you so much, Mr. Chairman. I apologize to the panel for giving you my back, but unfortunate circumstances of seating arrangements--I would like to go back to the question that was asked by Ranking Member Thompson for you, Under Secretary Taylor. Without a full year funding bill, the Department of Homeland Security cannot award, it was my understanding, $2.6 million, correct? Billion dollars. Mr. Taylor. Billion. Mrs. Torres. Billion in grant funding, much of which goes to State and local departments. Having served both at the local level as a council member/mayor, and having served as a State senator in the State of California, you know, these agencies are just beginning to recover from this great recession that we have had. They certainly do not have the funding to back-bill what we do not send to them, and they are dependent on this funding in order to help protect our communities. So what do you think is the risk assessment as it relates to these agencies not being able to pick up the phone and have someone on the other side answer to get feedback on a potential threat risk? Mr. Taylor. Ma'am, I can't speak to the specific risk. What I can speak to is the fact that grant funding and our investment in State and local community engagement efforts is a linchpin for how we have structured our country to do homeland security. We believe everyone needs to be in the game. Everyone needs to be empowered to understand what the risk is, what the tactics, techniques, and procedures are that they should be looking for and to share that information with the FBI, with the IC so that we can engage before the act happens. So the extent to which these grants make those agencies less effective in meeting that responsibility presents a risk for us. Mrs. Torres. Would you consider that a low-risk, a high- risk, in the--as it relates to not just the agencies, but--I am sorry, not just as it relates to the local agencies, but the inability of the FBI or the inability of other departments to be able to coordinate and communicate with these agencies? Mr. Taylor. As I said, ma'am, we have built our homeland security enterprise based on a State, local, Federal model, and any capability that is taken away from that in some way diminishes our capacity to address the risks that we are concerned with in our country. Mrs. Torres. Thank you. I yield my time back. Chairman McCaul. The Chairman recognizes the gentleman from Texas, Mr. Ratcliffe. Mr. Ratcliffe. Thank you, Mr. Chairman. Gentlemen, I have very much enjoyed and appreciated your testimony today. As a former terrorism prosecutor and as a former United States attorney, I have had the good fortune to work with each of your agencies before on a number of occasions, and I very much look forward to the opportunity to do so again as a Member of this committee. Mr. Steinbach, I would like to start with you. Your boss, director of the FBI Jim Comey recently expressed concern about technology companies using encryption methods on mobile devices, specifically in response to an Apple representative's statement that it would no longer be possible to unlock encrypted iPhones and iPads. Director Comey drew an analogy to child kidnappers, and he said, ``The notion that someone would market a closet that could never been opened, even if it involves a case involving a child kidnapper and a court order, to me, that does not make any sense.'' As a former terrorism prosecutor, I share Director Comey's concern and can certainly see how the inability to access encrypted devices would hamper terrorism investigations. So my question is: What is the FBI's plan to deal with this? Have you engaged the technology industry to address these concerns? Mr. Steinbach. First of all, sir, I am certainly not going to argue with Director Comey, so he is, of course, right. It is a concern. I think, quite frankly, it is irresponsible for companies to build products, have software updates that allow for no lawful capability to unlock their devices. So to make the argument that it is on the cloud and so you don't need to have access to the device itself is disingenuous because, as we know, not all of the information is on the cloud. We have to have the ability, whether we are talking about gangsters or organized crime or terrorists, with lawful abilities, court orders to look into and take content, store communications, whether it is a child pedophile, whether it is somebody involved in narcotics trade or somebody trying to conduct a terrorist act. We have to have that ability. So we have put this message out. I know that the director and his staff have gone out and relayed this message on numerous occasions. We have pushed it out. We have had interaction with the State, local, and Federal levels of law enforcement, as well as had direct contact with those companies and tried to explain to them through use of examples that this is a dangerous precedent to go down, to not have the ability at any means--whether it is an on-going kidnapping or some other event, not to have the ability to get in there and look at that content or that stored communication. Mr. Ratcliffe. Terrific. Thanks very much. I am going to throw this question out to anyone on the panel that wants to take it. There are numerous reports out there that Ask.fm is one of the common recruitment channels through which a number of American foreign fighters have formed close relations with ISIS recruiters. We talked today about the teenage girls from Denver. Since Ask.fm is operating out of Latvia, I would like to know whether there has been any interaction between the State Department and/or law enforcement with the Latvian government regarding this? Mr. Steinbach. So I can't speak to specific interaction between the State Department and the Latvian government. I will tell you that Ask.fm is but one of many social media companies that we have seen in our intelligence collection efforts USIC- wide that is being used. It is just one. There are many other platforms that reside overseas that, again, like I said earlier, have shown an unwillingness to work with either our government or the host governments. Mr. Ratcliffe. Terrific. Last question. I apologize if this has been covered earlier. I have been in and out of other hearings today. But when ISIS-specific material is posted on Facebook, Twitter, Tumblr, YouTube, what are the existing lines of communication between law enforcement and those entities to either provide notice or to facilitate the removal of that material? Mr. Steinbach. So the companies themselves have terms of service agreements that in many cases, violence, criminal acts, violate those terms of service agreements, and as I understand, they have got automated processes, once they see that, to take those down. We are not looking at it from a terms of service agreement, of course. We are looking at it from the threat. So when we identify a communication, a radicalization node or some other piece that is being used, we look to, quite frankly, exploit that node and do that through lawful means, whether it is collecting the information to see what they are communicating about or to look at on-going communications. So we have an overlapping, I guess, mission when compared to some of these companies, but at the end of the day, the result should be the same. We want to stop the communication through various social media and internet platforms. Mr. Ratcliffe. Terrific. My time is expired. Again, I appreciate all of you being here. Mr. Chairman, I yield back. Chairman McCaul. We thank the witnesses for being here today. This is a very important topic to our National security. I want to thank all three of you for your service to the American people to keep Americans safe. I want to thank also the rank and file within the Department of Homeland Security, NCTC, and the FBI for the job that they do day in and day out without much recognition. But they are truly the patriots of this country. Just on behalf of this committee, we want to say thank you. The hearing record will be open for 10 days for additional questioning. Without objection, the committee stands adjourned. [Whereupon, at 12:43 p.m., the committee was adjourned.] [all]