Skip to main content

tv   Key Capitol Hill Hearings  CSPAN  August 27, 2015 11:00am-1:01pm EDT

11:00 am
challenges. so thank you not only for the logistics but also for the leadership in this space. i am honored to be here today. and my plan is to start by describing some of the top challenges facing the department today and of course given the scope of responsibilities, the responsibilities, i'm going to limit myself to just a few and provide a high level of area but i don't mean by doing that to suggest there aren't a lot of other important things in the senior leadership that they think about and focus on. and then after highlighting some of these challenges i'm going to put on my general counsel's hat and tie jakarta but the trends and themes. i notice on the program but this is not a cle eligible program. i'm not going to say anything
11:01 am
insightful with respect to the wall and if we have time at the end i will be happy to take some questions. let me start with kind of what we've been spending our time on at the department the. this is the operational policy challenges of the department so the first challenge i want to discuss its counterterrorism and as joe and others now counterterrorism was the founding mission of the department and it continues to be the cornerstone of what we do compared to 2003 when the department was established the terrorism threat today is more challenging and more decentralized and diffuse and arguably more complex. we are more concerned about the foreign fighters who leave this
11:02 am
country and others have traveled to another and take up to the fight and link up with a terrorist organization. they are concerned about the terrorist organizations adapted and skilled use of the internet to publicly recruit and inspire individuals. to prevent the travel of the foreign terrorist fighters the secretary represented the united states in an unprecedented interior ministry session at the united nations security council to discuss the problem of the fighters and to encourage the implementation of un security council resolution 2178 including through the enhanced information cooperative
11:03 am
expertise and other bilateral security programs. and we are also making security enhancements to the visa waiver program which currently allow travelers from 38 countries to travel to the united states without a visa. last year we added additional elements to the electronic system for travel authorization. application will also maintain the substantial economic benefits. on the domestic front we are working closely in a collaborative way with state and local law enforcement and coordination with the fbi to quickly and efficiently chair. cochair intelligence with joint terrorism task forces. we've stepped up to counter
11:04 am
violent extremism through greater community outreach in the face of the very slick internet appeal of other terrorist groups it's imperative that we strengthen the communities that have the ability to reach out to individuals who may be particularly vulnerable in the recruitment and might be prone to turn to violence. in 2014 the held over 70 meetings, roundtables and other events in 14 cities across the country and the secretary personally participated in a number of meetings meetings in a variety of locations. >> cybersecurity is the second area i want to emphasize that has emerged in recent years. it's become one of the departments and frankly the entire administration's top priorities. one internal reflection of that is that the secretary has
11:05 am
expanded our regular intelligence briefings that we have for senior leadership to include greater threat. this ensures the senior leadership across the department has a deeper awareness of the current security concerns in the cyber realm. at the recent data breach in the office of personnel management highlights the fact that the federal cybersecurity isn't where it needs to be. at the same can be said for many networks in the private sector including systems that operate parts of the critical infrastructure. we've been working with a renewed sense of urgency across the inner agency to encourage full implementation of the system which is a basic layer of cyber protection that we make available to all federal civilian agencies and departments. we are also expanding the
11:06 am
national cybersecurity communications integration center. that is the government's 24/7 of how the. what we say more about that. there are the departments and agencies and the private sector entities that have regular dedicated liaisons and well over 100 private sector to collaborate and share information on a routine basis. the shares cyber threat assistance to victims of cyber attack and in this fiscal year alone they've shared over 6,000 bulletins, alerts and warnings and responded on-site to the 32 incidents that over double the number of on-site responses for the prior year. it's also the place we manage the einstein system. let me say that our ability to
11:07 am
improve cybersecurity is to limit the statutory authorities. we try to get the legislation to address that and specifically agree congress should expressly authorized program and eliminate any remaining legal obstacles to its deployment across the entire government. we must share cyber ferret indicators - cyber threat indicators in a manner that provides principles and criminal liabilities and the chair of these indicators and also protects privacy. and third we need a national data breach reporting system. what we now turn to aviation security. much of our homeland security
11:08 am
counterterrorism efforts continue to center around aviation security. we are constantly making adjustments to respond to new threats and to try to stay ahead of our adversaries. for some of the changes in the threat environment we started requiring enhanced screening of select overseas airports with direct flights to the united states. we've also prioritized the expansion of pre- clearance operations at foreign airports. but declared that allows customers of border protection officials overseas to screen passengers bound for the united states at the front end thereby protecting the plane as passengers and ultimately the country. we now have 15 preclearance sites overseas in six different countries operated by more than 600 law enforcement officers and active cultural specialists. the most recent was set up last year and since that time alone
11:09 am
we've already screened more than 500,000 passengers and crew bound for the united states and a bride-to-be who denied individuals that were found to be on the terrorist screening database and the database. we are now entering into negotiations to extend the preclearance observations and intend to foreign airports. before the area that i want to highlight his immigration, which of course is a huge and multifaceted area and one that they say we've been spending a lot of time on recently. i'm going to talk a bit about border security. with respect to border security we have continued the trend
11:10 am
increased to the border today the border patrol had the largest deployment of people, vehicles and aircraft, boats and equipment along the southwest border in its 90 year history the nation's long-term investment border security produced significant positive results over the years - >> may i have your attention please. this next panel is to be on privacy and national security we decided to create a name in the program so if you look at this hell do we secure our borders and at the same time sure that information about you is not shared in a way that is inappropriate to that function. and it's a real balancing act and the person who is going to
11:11 am
negotiate that act today is a good friend and colleague who is going to be moderating the panel a congressman from texas, senior partner at the law firm here in washington, d.c. who has the legislative public policy group, the congressman served four terms in the u.s. house. he's a former captain of the u.s. army and a ranking member of the house committee on homeland security committee. during his term in congress, the congressman worked with folks from 9/11 from both sides of the aisle which is hard to do these days as you might imagine on capitol hill. he is a graduate of the university of texas school of law. it's a great pleasure and honor.
11:12 am
>> thank you for all the hard work that you do in organizing this event every year. but for 9/11 of us would be here who wouldn't be having the conferences, we wouldn't be having jobs and responsibilities that literally change the economy of the country in many ways. this morning i wanted to open up the subject matter with a brief video clip from the last republican presidential debate. >> - you have said senator paul opposition to the nsa collection of phone records made the united states beat her and more vulnerable. and so far as to say he should be called before congress to answer for it if we should be
11:13 am
hit with another terrorist attack. do you believe that you can assign blame for opposing the collection of phone records in the terrorist attack x. >> yes i do because i'm the only person on the stage that is but is actually filed applications under the patriot act was gone before the federal foreign intelligence service court who's prosecuted an investigation terrorist in this country after september 11 i was appointed by president bush september 10 of 2001 and the world changed enormously and happened in my state. i went to funerals, we lost friends. when you ask to be responsible for doing this you can do it and we did for seven years in my office. and i will make no apologies
11:14 am
ever for protecting the lives and safety of the american people. we have to give more tools to our folks to be able to do that and then trust those people and oversee them to do the right thing as president and president and that is exactly what i will do. >> [inaudible] [applause] i want to collect more records from terrorists and less records from innocent americans. it's what he thought the revolution over. john adams said was a spark that led, and i'm proud of standing for the bill of rights and i will continue to stand - i want to collect more and less
11:15 am
[inaudible] >> governor make your point. >> when you are in the subcommittee blowing hot air about this you can say things like that when you are responsible for protecting the lives of the american people than what you need to do is make sure the - >> you fundamentally misunderstand the bill of rights. every time you did a case you've get a case you've got a warrant from a judge. i'm talking about searches without warrants indiscriminately of all americans records and that's what i want to end. i don't trust president obama. i know you give him a big hug and if you want to do that again go right ahead. [applause] >> the hugs i remember those that i gave to the family that lost their family on september 11, and that had nothing to do with politics.
11:16 am
unlike what you're doing by cutting speeches on the floor of the senate putting them on the internet and a half within a half an hour to raise money for your campaign. and while still putting the country at risk. >> i think that you get the gist of the discussion. and although those points of view are represented on the panel today. i want to introduce briefly the panelists come up with the, but introduce them and they will do it briefly. first we have laura donohue at the professor of law at the georgetown law school and the director of the george thompson, national security and the law. she's the director of the center on privacy technology and she writes extensively in the
11:17 am
subject area and we are always delighted to hear from laura. we have jennifer, the assistant assistant professor of law professor of law at the american university washington college of law. prior to that was a senior counterterrorism counsel at human rights watch. bob has been serving as the general counsel of the office of the director of national intelligence for the past six years. previously he was a partner at the firm firm behind the panels are prior to that served as the deputy assistant attorney general in the criminal division of the department of justice as well as the principal associate deputy attorney general. we have ron lead the former general counsel of the national security agency at the nsa. he is currently a partner
11:18 am
specializing in cyber cybersecurity and practicing issues and government contracts. we also have dan sutherland the associate sharon council national protection and program director at the u.s. department of homeland security. the senior national intelligence service at the national counterterrorism center prior to that he was first office of the civil rights and civil liberties division of the department of homeland security. so we have a very distinguished panel and i'm going to ask each of them to briefly in two or three minutes describe what they view as the current and emerging issue in the debate with privacy versus national security. and then we are going to open it
11:19 am
up and have as lively a debate as you saw in the republican national convention. >> hopefully a little bit more civilized. i would like to do is highlight three areas that i feel in emerging technologies are bringing us constitutional questions in the united states. first is the impact of the digitization and the scope of the digital storage networks worldwide and third is the shift is to is the shift to the big data analytics. let's start with the digitization. the third party doctrine is out of date and it no longer reflects how the world works. we know this stems from maryland has a case in the 1970s. and in this particular case, there was a woman that was robbed, her purse was taken. the police went into his home
11:20 am
based on the registered trade order the court found they have no interest in the particular calling records and it's on this basis that face all the data program continued in the united states. the fact is as many of the judges suggested that the zero plus zero still equals zero. but we have cell phones that follow us around and that information requires a lot more information about us if we have no privacy interests and the numbers dialed and received then we don't have any privacy interests just because we have more records available. and i'd like to suggest this is wrong. it's not zero plus zero people's fear of debate coach - zero. the amount of information you now have based on people not just on their cell phone but all of the data that we generate on
11:21 am
a dalia basis is a significantly different than the type of information in 1976 or 1978 when the case was decided. the second plaintiff of point is on the global communications and digital storage. we rely on the processes of the high standards have accompanied the collection of information on the citizens and on the domestic soil in the foreign intelligence act. the problem is the communications no longer stay with the domestic balance so it didn't make sense anymore if you had a bad guy in london traditionally you don't need to go to the courts to get a warrant now it happens to go to the united states the government would have to go to the courts to actually intercept the communications. a very strong argument for the 2008.
11:22 am
the problem is that works two ways. if i'm sitting in this room and it happens to go internationally now it can be collected. so the data isn't territorial and found my bound by countries borders in the way that traditionally we thought about privacy protections and recommended the countries borders. if i make a document by my students it might be in the finland server. finally that is international. so the understanding of the boundaries of the is the way to protect privacy is no longer adequate living forward. the third and final point that i want to make the frequently have seen in this era the number of surveillance programs that have come to life not just just for terrorism surveillance program that was talked about after 9/11 but that section 215 metadata and exit of order 12003. we've seen the collection of the e-mail metadata and the undermining of all of these
11:23 am
arguments is the principle that is necessary to collect all of the information and then to analyze it. there are programs underway involving large amounts of information. why is this problematic? particularly at the point in which there is a convergence between the national security and criminal law so this isn't a new question in many ways in the country toward cook discussed this in details in his institute when he was worried about the crown of the 17th century collecting a lot of information looking for potential evidence of criminal activity and been using it as a way to go after potential enemies. later hawkins wrote about this and then james famous rail against the concept that government should be allowed to collect all of this information
11:24 am
to look at the evidence of criminal activity. the fourth one was introduced at what you're seeing with this kind of rationale underlying the collection of the foreign intelligence collections at the plaintiff converges with criminal law you you're seeing the reappearance of the general which raises the foundational constitutional questions about the amendment. >> thanks for putting together this content. i want to focus my remarks on two areas, one that incidental collection of more of us talking about the communications and global data and second under the radar problem associated with law enforcement actions that involved the cross-border access of data in the raise they think often overlooked security and privacy concerns. first the problem in the collection as i think everyone here knows both the fourth
11:25 am
amendment and current statutory scheme governing the foreign intelligence information has protections based on one's identity in one location so it protects persons in the united states as well as citizens and other persons connections but it doesn't provide protection to the non- citizens located outside of the united states if they lack sufficient united states and the the scams tracked the basic framework. when fisa was first passed, the warrants were required for all covered collections at the time and in 2008 with the changes it's now the case of the government needs a probable cause to collect the communications of the u.s. person to find the citizens and legal permanent residents wherever they are located but it
11:26 am
doesn't mean a warrant because the individual targeting decision doesn't need court refused to collect the data of the citizens located outside of the united states and the result is a huge quantity of what is known as incidental collection by which the government is either targeting the noncitizens are effectively targeting nobody because it is engaged in what is known as both collection that sweet sandbox of personal information and a lot of people get information about u.s. citizens and also legal permanent residents. there is a number of ways in which this happened. i won't get into that right now. i'm happy to talk about it later. but i had to arguments about this. first the acquisition itself triggers the fourth amendment regardless of how to set up the views with regards to the minimization restrictions put into place.
11:27 am
but this is something that has been an oddity in matters of congressional concern. if you look at the amendment act as while the congress spent a lot of time regulating and this does a bare minimum of the minimization of the subsequent use restrictions not on the retention and who has access to the data. that's a mistake. congress should do more. but congress also clearly recognizes the point of collection matters and that's why they spend so much time regulating on that area. and there are many reasons why this matters and i will name a few which is the possible chilling effect on speech, association, that results from acquisition the way that acquisition kind of shift the balance of power between the governed, the citizenry and the government and the risk of error were abused by matter how well-intentioned our officials
11:28 am
are, no matter how trained they are. there's always a possibility of the actors and less well-intentioned government decision-makers in the future. so this brings me to the second point that the rules on acquisition are failing to adequately protect the u.s. person in the fourth amendment and the statutory scheme in governing that they are meant to protect and that we need to rethink the way we think about acquisition and that we need to think about having the rules across the board that no longer depend on the identity of the person being collected upon the identity of the target because those rules fail to serve the interests that we are the most concerned about. i want to say that this is not the same thing. it's required every single time the government engages in any sort of collection. i'm comfortable with the idea
11:29 am
that there is an exception to some type of a foreign intelligence information. more ordinarily defined in a currently is, so the proposal wasn't necessarily write protected or restricted. we have to think about what the rules are but the basic premise is that we need to start rethinking beast distinctions governing foreign intelligence. and the second i just want to raise very quickly if we can talk about this more of the problem of law enforcement to access the data across border. we see this in the case of the second circuit with the government served for the e-mails and it turns out that they were located in a server located in ireland and microsoft said they are not turning over the data. they do not have the territorial reach and and now it's pending before the second circuit. the case is about of privacy and security implications. the united states is not the only government that is asserting the power to compel
11:30 am
the production of the data that is located extra territory late. the uk passed legislation and any company that is doing business within its territory to turn over the data, other companies and other countries are looking at similar legislation as well and i think that this case with the court ends up doing and what the congress does in response matters in terms of our own ability to protect our own data as well even within our own borders. so i just want to flag that as an initiative that we should be discussing. thanks. >> ..
11:31 am
-her to believe that the courts will apply the third party doctrine in its full force to private documents you store on the cloud. i just don't think the courts will go there and i frankly find it difficult to believe the department of justice would argue that. i do think we have to make adjustments, but i also think it has to be a two-way street. fundamentally the fourth abandonment is about prohibition of illegal searches and i think it will require a fairly careful analysis to determine what is
11:32 am
reasonable in light of the current environment and that should take into account among other things what kind of restrictions are on the use of data. how comfortable are we with that? how can we be sure that data being collected is not being misused and what are the technological challenges inherent in collecting data in the current environment? data that is out there and being collected by our enemy and is so i think it is a far more public into problems than simply saying that we have the threat the existing rules because they are not sufficiently protecting privacy theory having said that, i went to respond to a couple of points. on the issue of the third-party doctrine i think it is worth noting smith against maryland did not create a third-party doctrine. it was a case a couple years earlier in the supreme court that it involved bank records held by a bank in the court held that because you gave those records to the bank you have no
11:33 am
interest of privacy in them to prevent them from being obtained by the bank, so i think we need to accept this is a fairly well rooted doctrine and i think it needs to be re-examined, but i think it needs to be re-examined on a case-by-case basis looking at the type of data you are talking about and uses made of it. in that regard, boris said something about a principal that you can collect everything and then look into it for evidence of a crime. that i actually think is not true of any activity that we undertake. first of all, a program she mentioned the only one that actually involved a fun collection was the 215 telephone mandate program and that did not involve looking for evidence of a crime. it involved strictly looking for potential bar-- foreign intelligence information under cyclic controlled situations. in fact, that is true of nsa. nsa does not authority to search
11:34 am
data collection for evidence of a crime. what they can do is if in searching for ballot foreign intelligence they come across evidence of a crime they can provide that to the fbi for further investigation, which is a very different thing and one i think frankly has evolved over a long history of circumstances of insufficient coordination between intelligence and law enforcement. finally, on the issue of a global communication, it is absolutely not true that we can collect an e-mail between war and jen just because outside of the united states. as agenda mentioned if we want to collected communications of an american where that person is located we need a warrant based on probable cause. so, there are already substantial protections and i think the collection point that generates is sick-- a significant. it is not new to the law in this area. if you-- if your barber happens
11:35 am
to be the target of a wiretap and you call your barber to make an appointment you will be infinitely collected regardless of the fact that there is absolutely no probable cause as to you. you might say there is a probable cause as to the barber, but that is not necessary. if your barber is an informant and talks to you and he is wearing a wire, then that can be collected. if your barber throws his computer outs without wiping it and abandons it in the government collects it in your communications can be incidentally collected. the general rule is that if there is a legal basis to collect one end of communication, it can be collected and then we do have immunization rules to ensure that the communications are not improperly used in a frankly, i'm not sure how you can connect foreign intelligence collection on any basis other than that because you don't have the ability at the front and to weed out all communications of americans nor would you want to
11:36 am
if you could because some of those communications are going to be of a significant for an intelligent value, so i see no way to solve this problem other than saying have appropriate limited authority to collect foreign intelligent targeting foreigners and then protect the american citizens at the back and that's what we do. can i make one point? i completely agree with jen, that this is an area where congress should be legislating rules and if for example after the case i mentioned about the bank records and passed the right to financial privacy act, which limited government access to records, i think it is far more suited for legislative action and i'm not holding my breath. [laughter] >> indeed, after united states versus's congress went out and pass title iii, so there is a long tradition-- tradition of the three branches getting involved and i think our opening
11:37 am
remarks, i will mix international football metaphors, so our opening remarks are like the free kicks we get in then i think what jim once is a free for all from the kind you saw on the video. when he said he was going to show is a video i thought the one he was going to show us was john stuart a few nights ago and you probably saw that, taking a chair into the wrestling ring and going at it and i think that is the kind of lively debate he wants to see from the panel. so, i don't know if my issues are really the ones that you will see in the headlines in the next your or not. i hope they are. they are based on kind of my observing these issues both while in the government and the private sector and some writing i'd done on this, so think of them as issues lurking to deep the service and if i can do nothing else this morning then kind of brought in the scope of it so it is not just about the
11:38 am
latest twists and turns of the usa freedom act or what that crazy malicious dni is up to with the council or anything like that. i want to broaden the scope of that. there is a huge amount of homeland asked-- activity is the last panel showed that has not-- it has less to do with the intelligence community. one thing i learned when i was with the justice is there is a huge amount of activity prevention, interdiction, interception, a force that, all of that that is carried on at all levels of government, soak city, state him a you know all of that and a lot of that involves gathering information. sometimes it's called intelligence and sometimes it's called good police work or whatever, so there is that. there is public safety, which also involves a huge amount of gathering of information and then there is economic or regulatory information as some
11:39 am
of you know who recently filled out a tax return or an application to do business or anything like that. when i would like this group to do, maybe not today, but over time is to start thinking about the privacy versus security trade-off in light of all the different types of information and intelligence that are being collected or could be collected to work or is being collected of perceived operational or economic or privacy or constitutional issues and think about those trade-offs as well and in thinking about that to make this even more complicated, i went to mention the panelists have already referred to some of these, kind of the wild cars. meaning there is never a static balance and when his course is technology. the second is budget pressures, which you have already heard about this morning from the last panel, but that affects that as well and then the third, of course, is all of the type of interconnectedness boat that
11:40 am
janice and laura have referred to, so that is the first issue. it is-- i think some attention to it as well as following all of the twists and turns of the latest patriot act issues would probably be beneficial. the second issue is, perhaps even more amorphous. it is this snowden links of course, was one model for how some discussions, some lively public discussion about intelligence collection and privacy versus security trade-off happens. sometimes maybe at the cocktail hour you can ask bob what he thinks about the integrity of that model of public discussion. but, i think we all need to think about other models, maybe even some lawful models. there is one model, which i am sure you have seen in the usa freedom act which allows for an intelligence surveillance to appoint amici, friends of the
11:41 am
court either lawyers to argue legal issues or also interestingly an organization to help the court understand technological development or something like that, so that is one possible example to try to in a bit of a way get the public or surrogates for the public a bit more involved in something, which is inevitably secret. we need to think more broadly and imagine about other mechanisms for doing that. traditionally, the sticking point has been well, it is all secret stuff, so anyone that gets involved in that has to be cleared and all that stuff. we have things like the president's foreign intelligence advisory board, but i'm thinking beyond that and by necessity we have to go beyond that and i think even the folks in the government on left and right might concede that if the government does not come up with a lawful mechanism there will-- and maybe continue anyhow to be lots of other evil taking
11:42 am
measures in their own hands, so i will just threat wacky ideas and obviously this is stuff i thought up and i am not speaking for anyone. bringing ordinary citizens for a day into three letter agencies and actually talking to them about what is happening and with all due respect i don't necessarily mean ordinary people like jen and laura and bob once he goes into private service. although, there is a role for that and it would simply be like a jury. i know a jury has a constitutional dimension, but the question is like the overuse cliché of a focus group. another possibility, which i know sounds ridiculous, but we all have been conditioned to watch these reality tv shows where people saying and get instant feedback, instant poll votes by text messaging for
11:43 am
various have a better go intelligence programs lots of ways-- and none of this would bind the government or the aclu or the freedom of the heritage foundation or anyone else. it would be a way to sort of get some input from folks and frankly and maybe bob could address this later, inform people about either what is being done whether it's being considered done or to input into some ways that could be. i think that would involve-- it would've avoided a lot of heart ache on all with the revelations of both vehicle action ended in my third plan, which may be the most amorphous of all, probably so i am sure all of you are familiar with the concept of privacy by design. canada came out with which now everyone embraces the ftc is all over it and everyone is talking privacy by design and once the concept is-- instead of coming out with a cool technology or service or product and doing
11:44 am
whatever you do with personal information and then later on trying to build in safeguards and guardrails and fences once there is some public issue about what you are doing with people's data, the ideas kind of two planets ahead of time and design the product with privacy considerations in mind and figure out with the safeguards are in advance and maybe even design those into the product in how it works and how you collect data. that has been, i think, a large focus of a number of responsible companies in their new products and services lately. the question i have is to what degree is that entering into the way the government thinks about things. we have the fourth amendment and the statutory things and i'm thinking of something different. something really beyond the legal compliance points to figuring out how will we actually operate this program or even how will we design its or
11:45 am
what will we asked to go back to the last panel, what authority will we ask our overseers or in the congress and part of that, bob and dan will probably kill for me-- kill me for this, but having a rudimentary privacy by design presentation about how we will build it in from the beginning and obviously part of that should be security by design also, which is any information collected needs to be clearly linked to the security objective. so, those are my three free kicks. they won't be in the headlines tomorrow, but i hope they will be in the next year or five years. >> i'm actually going to give a specific case study. without these discussions about privacy and security and the debates and the balance for years. the first days, joe, you will remember the department for standing up and secretary told us, i don't believe in a trade
11:46 am
off for a balance between liberty and security. i did believe we need to-- and can a commerce both goals at once and i think sometimes people laugh that off a bit, but i will give you a case study and see if we can't think that work of it and actually build on your comments or thoughts about privacy by design. this is a specific case i want to mention that is in the news now. you probably know there are a number of legislative proposals currently under act for consideration on the issue of information sharing in a cyber security. it was mentioned in the panel before and basically the question is, how can we stimulate or catalyze or incentivize companies in the private sector to share information about malicious cyber activities or potential cyber code in activities with the federal government so that government agencies can be informed and to do their work
11:47 am
whether their work is to begin investigating a crime or their work is to try to help remediate , whatever has happened with the network or whether their work is to try to spread out that information about that particular malicious activity to others so that others can defend themselves. really we are trying to create a robust real information exchange , a series of exchanges, but information exchange or information comes in, everyone learns and it pushes back out and everyone can defend themselves. the president actually announced legislate a proposal in january in the house is passed to build on this and the senate has a bill that you heard the previous panel their employees to consider. there's a lot of activity in this area. now, to make information sharing in cyber security really work we need a new generation and a new revolution. we need to have machine to machine sharing. right now what we have is really
11:48 am
great and everyone has worked hard to get to this place and we have a lot of humans involved. we like humans. we are humans and we enjoy having them, but it will not work for us in this environment's. you can't have humans taking telephone calls, analyzing code and three days later saying there's something here, and everyone else and telling them what is going on and i used our defend yourself. that is what we have now and it's good, it's excellent, but we have to take it in the next level. to problems with machine to machine sharing and one is a technical problem. have you make that work? that actually isn't a bigger problem. we had a lot of progress on that and we can talk at that with some length, but the second problem is this panel, how do you deal with privacy issues in information sharing, so here is the specific or i'm trying to make it specific for you. when information is submitted to us, it could include personal information.
11:49 am
spearfishing campaign, you will seven formation in and that has personal e-mail addresses on it. the body of the e-mail could have something about your wife, your personal life, whatever, do you want that, do you want your company sending that to the department of homeland security and spreading that around this broad network of whoever has connected to them? it could also have proprietary information. company identifiers and things about the way the company may organized their networks are other things about the company. does the company with their proprietary information sent to the department of homeland security, shared all-around? no, you want that scrubbed. you want to make sure it is anonymized and if you are convinced and confident that you can send potential malicious code to the government entity, it is anonymized and then shared and you will no problem with that. you will like that because you will benefit from not also, benefiting from other people's bad experiences and learn how to defend yourself, so we have this robust sharing information
11:50 am
because everyone is confident in my personal information is not being lifted. the problem is that law enforcement agencies once that information now. they want that information in real time. so the information comes to the department of homeland security and they want to its. they don't want some guy who looks like he's from-- you picture the geek squad and you take your computer in and there some guy standing across the aisle and when can i my computer back to you think, so you want to take out the human because the lawn for the agencies want it quickly. so, this is a real problem where privacy and security are clashing and we are trying to figure out the solution right now. as is often the case there is a way to make both interests to set by both interests. it really depends on, i think, some tried and true processes
11:51 am
that we are familiar with. it takes the interagency, that's the first thing and we are working with people all across government, dni, fbi, all across , that's homeland security and we know we are familiar with that in the homeland secure to context and the second thing is it takes a lot of work. that easy answer is this won't work and we get that a lot. it does work. through dozens of meetings, 20 plus agencies, we have poor through these issues over the past number of months. one example, we did a survey of the cyber analysts at all the operations centers in the government to do cyber analytics and we asked them, what data specifically do you need, what do you not need, what is critical in the first instance, so we have a survey of all the guys who do the data in day-to-day exec with a neat, what they feel they need. the third thing is it takes strong foundation of previous work.
11:52 am
we can build upon a great deal of technical work done for other purposes. we have a protocol for structuring how machines connected to one another and we had to leverage that in the fourth thing as it takes really strong stakeholder relationships , another thing we are comfortable with in homeland security. dhs has those with privacy and civil liberties groups. we just worked on those over a number of years devoting a number of communities and so we have been able to leverage those unlearned from people there. so, even though the legislation has not passed since the president's legislative proposal in january, we have been working in october-- the fall, but i think october we will be able to begin ingesting or receiving information. by the spring we will be able to begin sharing back and forth and by next fall about a year from now, we will have the capability to make all of that technical work that is being done
11:53 am
available even to those who don't have sophisticated cyber security operations. but i'm trenches adjust and i will close with this is, there are ways to take specific case studies to build to work through both privacy and security interests. here is one we are really rolling up our sleeves on and you heard in the panel before this is a senate is even dealing with this specific issue and trying to get their arms around it and get comfortable with it. if the carters feels countable, we will see legislation. if private sector companies feel comfortable we will see information sharing. so, these issues have a real practical meaning. really play out in a day to operational issues and orientation, so with that i will turn it back over to you. >> jim, can i make one quick point in response to iran's point about privacy by design. i'm not sure nsa was like when he was there, but we actually are very focused on privacy by design and building it at the front entered with a number of
11:54 am
mechanisms to agencies have their own privacy and civil liberty officers as well as officers of general counsel. we have the privacy and civil liberties board, which i know is represented here today, which has statutory obligation to ensure all of our policies and laws adequately take privacy into account. the president a year and a half ago specifically directed we take privacy and sybil-- civil liberty consideration into concern in developing all surveillance programs. as required legislation we had to work with congress on it, so people may disagree with the outcomes, but it is not that we aren't trying to build privacy at the front end. >> i just want to say i was not suggesting or implying there is a lack of privacy by design. at any time in the community, but maybe it's a rhetorical thing in par, which is it would help bridge the use of understanding between what the government and intelligence committee does and how people in the private sector's think about
11:55 am
privacy if they could start to talk and in some the ways that bob was just speaking. >> just in response to the last three speakers and ron, you are interesting kind of blue skies approach, but it makes me uncomfortable and rather nervous to think the majority area and tenants would decide individual rights to read the point of the bill of rights was to protect the minority against the majority, so the idea of canvassing people to see what they would be willing to trade off, at some levels is in contradiction to the whole purpose of the bill of rights is to protect minority views against the majority. along those lines, reasonableness, so in the fourth amendment it is not to go originalist, but unreasonable meant against reason or against the common law. , not the time they and general, which was the broad connection of information on citizens to use it then to find evidence of illegal activity to read that's what general warrants was, so
11:56 am
when the fourth the memo says unreasonable if you go back to these cases in the context of the time it was understood in a more moderate sense, which bob rightly says we understand and we say what is reasonable in this context and it meant what was against the common law. from this according to cook and hail and hawkins it was against magna carta to give the government the power to collect information on people broadly and then to use that information to find evidence of illegal activity. there were good reasons for third there were reasons that relate to the harms that can be perpetrated against anyone who objected to the government's policies, any social, economic or political actors they wanted to target the guitar. there were also writes that were valued in and of themselves and the import the democratic the liberation. the importance of solitude of self actualization, of intimate relationships, of being able to build a social network and have diversity in your intimate relationships and decide what
11:57 am
level of intimacy you wanted. there are values to these rights, quite apart from the security or freedom contemplation in those trade-offs and these were values recognized from time warner within the british constitution and later by the american constitution. >> i just actually wanted to respond to one thing that bothered said about collection and he made the point which i agree with which this is not a new problem. it existed before the rise of faisal, before the rise of new kinds of data and the growth of loot global internet, but it's also two things have changed. one, the scope of information that is being collected has changed and the quantity of information and so that i think requires us to reconsider some of these roles including the roles of collection and i just want to read a quote from the 1978, house report when a first
11:58 am
pass. there was a debate at the time about as i said earlier there was a decision in the 1978 legislation to require warrants for all collection that was covered at the time. there were a number of numbers of congress who objected to the idea that warrants would apply to the connection of data targeted at aliens or nonresident aliens who could also be covered in certain types of collection and at the time the house, the majority of congress rejected those objections and they said that the warrant required not primarily to protect such persons, those aliens, or rather to plett-- protect us citizens who may be involved with them and to ensure the safeguards inherent to the judicial warrants cannot be avoided by termination as it sedition ship and i think that understanding that recognition of the risks of targeting collection based on lower standards of non- citizen located abroad applies with much greater force today and
11:59 am
something that requires us to reconsider some of our thinking about incidental collection. stomach i just want to respond briefly to one of laura's examples. i was not advocating a majority should decide who advances, what gets done in the intelligence community. so, in that way my analogy to america star search may have been incorrect. i was suggesting that the public needs to get a better insight and understanding about what the choices are and then the governance and the folks that make these decisions can factor that into account. i think it's probably not responsible to suggest that people in the government who have to follow the constitution and the laws were to simply do the majority area people say. i have one other point about
12:00 pm
majoritarianism. the statutes under which the intelligence community and the whole government operates are actually passed by the majority rule. even the judges, the federal judges who adjudicate these things are nominated by president who was elected by a majority, by the electoral college and that's another story and confirmed by the senate, which i am told can be a part of some-- a person process. [laughter] >> just in response to john's point about the example of collection, i don't think there needs to be rules to protect the information of us persons incidentally collected. i just don't see a way to do that other than some variant of a back and minimization procedures, which is what commerce adopted in title i and covers applied in title iii when it authorized electronic surveillance to begin with.
12:01 pm
i think the privacy and civil liberties oversight board reports on section 702 or some other document that we have released has indicated under section 702 collection, which targets noncitizens outside the united states, we are currently targeting tens of thousands of selectors. because this covers a broad scope of foreign intelligence collection. we are never going to require warrants to collect on vladimir putin's cell phone or to try to collect on what al qaeda terrorists are doing. it would bring foreign intelligence collection to a halt and so what we need to do and this go back to the first point i made is we need to find ways, number one to explain what we do, which we have been doing for the last couple of years and number two, to try to put
12:02 pm
technological, legal and oversight restrictions in place to satisfy people that information about americans or information frankly about any persons that's being collected is subject to a puppet productions and privacy and not be misused. in fact, in the last 20 years of all the information that has come out there has not been any indication that people have been persecuted for their political beliefs or misinformation has been used. in fact, the system we have in place is working reasonably well to provide privacy protections for information that we do collect. >> so, on the 702-point, i think it's really important to look at the controls put in place because 702 data right now courted to the privacy and civil liberties oversight board the fbi routinely uses the database for criminal purposes unrelated to the foreign intelligence purpose for which the information was collected and i understand that some people might have the view that one set of information is legally collected you don't need a warrant to go back and clear
12:03 pm
that data. i would suggest there is a use restriction in the fourth amendment and if you collect that information for foreign intelligence purposes to use it to then check out bank robbers in california, for purposes unrelated to some foreign intelligence purposes or which it was collected then you should be required to go back to the court get a warrant for a database of the source, so i think the 702 database actually brings up the tickler concerns about confirmation is being used, whether you that information can be used or if there is judicial restrictions on that or not and how that plays out terms of the warrant requirement of the fourth amendment when applied to criminal context. >> well, as you can see we have some degree of disagreement and it's fascinating. i don't know, we may have time for a couple of questions that there is anyone that has a burning desire to query this talented panel we would be happy to allow you to do so.
12:04 pm
yes, right back here. >> hello. my name is david hudson and i recently remember hearing the director of the fbi testifying on strong encryption. and how many of the leaves the fbi are going dark because the strong encryption and asking basically for industry or perhaps congress to force industry for keys to the castle so they could get in on one side or the other with strong encryption and it strikes me that might work in america. are not sure in a globalized world we are talking about privacy by design, but if that technology is getting to the point where we can't see what's going on in any way shape or form and i would imagine there is a way that will anonymize the traffic itself is a goes to one server and that's it. we don't know what happens with -- without some sort of encryption.
12:05 pm
is that something that needs to be looked at and wait in some manner, not just nationally, but internationally amongst our foreign partners because a lot of their territory can host these sort of services and, of course, there are those who may not want to help us thinking of certain asian powers, so if there is anyone who care to respond on that good question. bob. >> i think the administration position on this is reasonably clear. strong encryption is a good thing. it is a way to protect people's privacy. but, it's also a bad thing to the extent it makes communications invisible to us and there is no question that did this is a problem for law enforcement. not only in terms of foreign terrorists, but domestically as well and what we need to do is
12:06 pm
get private industry to come to the table and a flying the kind of creativity and technological insight that they have used to develop remarkable tools we have today to try to find a solution that protects people's privacy while at the same time allows law enforcement to get information it needs when it has appropriate authority. i don't think the problem is insoluble. i think sure, it is true-- it's sort of a truism that if there is opportunity for law enforcement to get access you have to some extent we can encryption. the question is how much of you weakened it, how much risk are you willing to take for the great social benefit. after all there is currently a statue called leah which requires telephone company's to configure their services in a manner to permit interception of communications. that is a little less secure
12:07 pm
than would we be if we didn't have this. it creates vulnerabilities, but we as a society have determined that that is a risk we are willing to take because the overall social benefits is a significant. the question is, can we find that kind of solution in the inscription space where we say we have a manageable risk you're in the overall social benefits are sufficiently great and that will require efficient with the companies and their willingness to engage with government to work on these solutions. >> so, i would just add to bob's remarks economic security and this is often missing from the national security equation, but we have taken a huge bath since september 2013 or 2012, i guess really-- well, guess twice 13 on our cloud computing. by some estimates a hundred billet-- hundred 50 billion lost in which the way the usgovernment interaction with us companies has undermine competitiveness abroad. a certain amount of opportunity is going on. to the extent we drive this as a law enforcement or national security issue domestically
12:08 pm
there is also an economic price to this end that needs to be part of the discussion and part of the equation. it's not just at an ms sea level in terms of discussion, but also to make sure us economic interests are protected long-term and interest of us national security. >> i think that is correct and i would only add that i would think at the end of the day there is a reasonable possibility that if american companies have a transparent environment where it is clear to the world what we can do and your average person's face with a choice of m i'd estimate that a google or microsoft or apple were i know what they are doing or will i use some romanian communication system where i have no idea what they are doing then we may still retain a competitive advantage even under those circumstances. >> i want to thank the panel and hope you give them a good round of applause. [applause]. [applause].
12:09 pm
[inaudible conversations] [inaudible conversations] >> a lunch break now in this american bar association homeland secure to conference and they are excited to take about eight half hour break and when they return, panel discussion on immigration and later on a look at the role of lawyers in emergency preparedness response. while we wait for this event to resume and our live coverage to continue an earlier panel on regulations and legislation with
12:10 pm
lawyers from the house and senate, homeland security committee's. >> good morning, everyone. and thank you for joining us and thanks for the kind introduction is more that i try to stay gainfully employed, so that's probably better off not. very excited to have our panel this morning joining us and to give you an overview of the departments latest legislative and regulatory updates. in particular, as i introduce our panel of like to know that we also try to keep things fresh and current, which means that and i will introduce in the order our panelists are represented from the department is tia johnson who yesterday was the senior advisor to the director of ice and the last night was named as the new assistant secretary for legislative affairs for the department. [applause].
12:11 pm
>> so we have been keeping our fingers crossed that the timing would align on the appointment so she could join us on the panel this morning. i will give you a bit of background and introduce the remainder of our panelists, which we have a great and distinguished lineup. tia actually as i mentioned has been the advisor to the director of ice and is also a recently retired us army judge advocate and specialized in international and national security laws and participated in many aba panels and on committees, so you may know her from those interactions as well. she had served as a legal advisor within the department of defense and us, korea, italy and bosnia and also teaching department at the jag school, just became the first african-american fema to be selected to the rank of colonel in the jag core in 2002 and is a graduate of temple university, jag school from uva school of law. next on our dhs panel is another
12:12 pm
long-term veteran of the department, christina mcdonald and she serves as their assistant associate general counsel for regulatory affairs and at dhf served with joe and i and others, previously served as the deputy and attorney advisor in the right interrogatory affairs division prior to that was a trial attorney at the federal administration and is a graduate of franklin marshall and the university of maryland school of law. represented from the senate and the house side for our general counsel for homeland security committee of homeland security, supporting chairman mccall. she has been the council since 2011 and has been interacted on a lot of topics including privacy, civil liberties and other constitutional questions and is now the general counsel help with to develop legislative agenda. jd from new york law school and also had several distinguished
12:13 pm
clerkships and also an aba and last but not least the chief counsel for homeland security on the senate committee for homeland security and government affairs and has been with senator carper in that role for several years and since 2011 and prior to that also if you google stephen you'll find some of his articles when he was a congressional research service as well. so, with that great panel and what we wanted to do is just note that as we are looking at the legislative and regulatory agenda for the department, we are almost 15 years in. in the operations and in policy of the department, founded in 2003. the homeland security act, when it was passed evidence of bipartisanship and signed into law november 2002, set off an amazing reorganization of the
12:14 pm
department with a 22 agencies to read your another story, came together, multiple new directorates and it do fresh ideas about government should look like from an up the structure side and also from a policy side and how to respond to the needs of 911, post 911 world, but that was 13 years ago almost. so, our operations inside the department have continued to evolve to the present needs be it on immigration front, if the structure of the cyber front that inpex are legislative priorities, our ledges-- rogatory priorities and what we want to lay out for you today is a presentation that looks at how internal dhs is responded to the homeland security needs through its regulatory agenda and i have asked tia to just put her on the spot early in the morning to give a couple minutes of thoughts on the legislative agenda with the knowledge that she is to have powers in.
12:15 pm
we are looking at this from the perspective of we are constantly responding to operational policy needs both internal needs and those of public and most certainly about partners on capitol hill, so how are regulatory legislative agenda reflects that. also, then looking at from two points for the hill. first how economists legislatively responding to the needs of the department and homeland security and the actions of their undertaking nominations and other steps that are the day to day needed to sustain our operations and ensure that we have what we need. while in engaging in robust debate about the latest policy issues, immigration, cyber and others. and concurrent with that i see you have hope-- you have seen in the data you have available to you as congress as a creator of the department of homeland security through the homeland
12:16 pm
security act is not only acting in support of the mission, but also now evaluating potential changes to the homeland security act 12 years in under the reauthorization front and that is something that john in particular will focus on. with that i wanted to take a couple of minutes and turn to tia. of pressure at all. but, knowing your experience in the department with ice, but also prior to that, tia has an extensive background and she and i chatted in the homeland security realm dating back to not only the founding of the department, but actually prior to that with some of the homeland issues. she and i share a conversation about just thoughts about how that might impact that agenda, so i promise it will only be a minute or two. >> good morning. thank you. james said my announcement came up last night's while i was sitting over at this table i got
12:17 pm
e-mail that the president signed my appointment, so i am the assistant secretary to read i haven't taken of yet, so i'm brand-new. yes, james and i were talking. i could not appear until i was official and so in the course of trying to prepare james and i were talking about what would be the legislative outlook and i had mentioned the fact that i followed the development of the department because i was teaching at the jag school at the time and in the wake of the september 11, attacks from the military perspective the issue became, what actions the military was taking and were those under the umbrella of homeland defense, which we called it or some people were saying the statutory prohibition
12:18 pm
against the military provided some type of support. law-enforcement have action and so intellectually then i had to start grappling with that to answer that question and we came square within the fact that yes, it was well within the constitutional mission of the long forces because we were defending homeland. we had been attacked and that's what caused me to start following what was happening on the civilian side with the development of homeland security. so, yes, i'm with others who think mr. whitley who develop the discipline to read with regards to the department, yes, we are and i am looking for steve. steve did a great job because it was so unknown as to whether i would show up today and he did a great job of laying out what our legislative priorities are. one of which is the unity effort, the recognition that the department was quickly put together in the wake of the
12:19 pm
september 11, attacks, taking the recommendations from the 911 commission and we pulled together 22 desperate agencies. so, we have gone through a process and the secretary is trying to advance that process and under what he calls his unity of efforts he issued a memorandum last april to kind of lay that out. but, in preparing for this i found an article that talked about dlg and the act and which went-- many of you are familiar with dod was created under this security act of 1947, we ask a got her name, the department of defense in another act in 1949. that was the last time there was major legislation dealing with the organization of the department of defense until 1986, when we had the goldwater
12:20 pm
nichols act and one of the things i will read this quote quickly, but one of the things that dan gerstein said in an article back in january and described this and the need to have something similar to that poor dhs and what he said was, the legislation helped clarify roles and responsibilities, elevated the imports of strategy formulation, provided more efficient use of resources, improved the administration, staff management and effective operations and perhaps most importantly build a unified culture within our diverse departments. so, i would commit that those same parameters apply today. that is what the secretary tried to achieve with the unity of effort as noted that the whole idea was that we had 22 components, different traditions , different cultures,
12:21 pm
but that overarching systems and processes could be put in place to create a more effective and efficient department of homeland security. so, that is one of the secretary's main priorities and driving through this whole unity of efforts. you will hear in some the legislation we are looking to have some of that enacted in the legislation to help with our organization and structure. i think that is it. that answers your question. >> i think it does. short and sweet and thanks for the referencing as well. i think it has a good framework, also. as mentioned, while we watch the legislation, the day-to-day operations of the agency have to continue and part of that obviously is getting feet or movements to legislative mandates and a two-day
12:22 pm
requirements for agencies as well as the department as a whole and to that end i will turn to christina to give us an overview on where things lie in the rulemaking migratory front most recently. >> thank you, james. i am the person on the panel that will talk about regulation at dhs. there are actually three areas i will cover. and will start and talk about the overall level of dhs rigatoni program. i will give you statistics on activity within dhs across our components and over the past decade. i will also then i went to disco several notable lug-- regulations from last year and what is coming up in this coming year and a third, when to share with you some of the things we have heard in the regulatory world from the other two branches of government because we have heard some things this year. that is what i will cover.
12:23 pm
first, went to start with like the overview of the dhs regulatory program. the dhs regulatory responsibility is brought into verse that aligns with our mission, which is brought-- broad and diverse. there are several components in dhs that issue regulations critical to the homeland security mission, but the majority of our relations, from the seven regulatory compliance operational response ability, basically the one that highlighted in this chart. those are cbp, ice, cas, coast guard to read ocg manages the regular tour program for dhs, but these components are implementing and enforcing them. so, in our unified agenda from fall of 2014, we had 141 regulatory actions and that are things that are either in
12:24 pm
progress or projected for the next six months, so in progress might be a proposed rule that has not been finalized. of the 141, what is interesting to see is that the largest number of red or coast guard and have the largest regulatory in that department carried if you had coast guard nci s you're basically at 60% of regulation. as far as our number regulations , i had this table that shows our significant regulatory actions over the past decade. in the war than a decade, 11 years. i have only discussed significant regulations and significant is a term of art. it refers to regulation that omb reviews. generally that means relation that are high cost, impacts other agencies or policy issues. in these numbers you see i think what one would expect in the early years in 2004, we had a huge uptick and at the end of administration there tends to be more reds and that's what you see in 2008.
12:25 pm
2014, might look high, but not really. there were several temporary notices and i will review those to read we had eight with 2014 making it look higher than it is carried the only thing i want to add as these regulations are significant, the term of art, dhs issues several more regulations, tons more. not significant ones, just ones lb does not review, regulations, routine a frequent regular, so when i talk about here these are a fraction, our high cause more controversial more novice relations. that is the overview i wanted to give in our regular tour program. next, i want to move to notable regulation that we have seen last year and we will see visscher. of course, immigration has a huge-- i think as everyone knows in november of 2014, the president and secretary announced a series of executive actions related to immigration. so, there are several
12:26 pm
regulations that come out of executive action. so, a few have been published and we have two and went to mention, both are cas. one is that h for final rule is not published in february of 2015. and extended eligibility for work authorization to the spouses of high skilled workers. that regulation is not effective and there's obviously more technical, but i'm giving the high-level. there is also a 601 proposed rule that cif published and that is only a proposal and it proposed to expand provisional waiver process that dhs initially put in place in 2013. that will not be extending the process to all statutory eligible people. so, those are two we have published. we have several more in the works. one of them is an ice regulation, optional practical
12:27 pm
training or zero pt. it is a program where foreign students can study after study in the us they can request additional months like an additional 12 months and then they can stand their student visa status here as it zero pt. in 2008 there was an extension of this for student science technology, engineering and math students to stay an additional 17. there is now another rule in the works in this realm and that is being developed by ice. in addition, cas is working on a rule that would identify conditions under which touts it onto the numerous can be in the us on the idea that they are able to provide significant public benefit. that is if you've the many things happening with immigration. there is a lot of immigration regulation right now. that is something you should expect to see in the coming year. just also wanted to mention temporary protected status because we have had several
12:28 pm
notices extending protective statuses. tps is a temporary benefit that allow certain eligible and nationals of certain countries to come and stay and work in the us. doesn't lead to any kind of permanent ltr or permit immigration status is also not a regular but under the government executive order we can use these, so that is why we are involved in them, but in 2014 and 2015 dhs either designated or redesignated or extended tps for 12 different countries. the secretary can designate tps because-- 3 grams, ongoing conflict and we saw that with the civil war in syria. for an environmental disaster and we saw that ongoing with earthquakes in haiti, nepal, el salvador, hurricanes in nicaragua and honduras and thirdly, the secretary can doesn't tps for other
12:29 pm
extraordinary to break conditions. so, without a lot of tps activity in the past year. second category i want to discuss is security regular shift. on the tsa front, tsa has done several relation the past year on passenger security, so with that tsa can collect fees to provide security services. tsa original implement of the in 2001, but there has been several pieces of legislation that has changed that. tsa has issued several rules, but their most recent rule was in june of 2014. basically the amount of the fee has been adjusted and so as i said there have been multiple rows with a lot of legislation, but they now have their rule in place. another security rule we saw, so with this is-- actually, take a
12:30 pm
step back, the visa waiver program that allows eligible citizens of certain designated countries to travel to the us without a visa. is an online system people use to travel under the program. cbp had developed a program a couple years ago that they had set a fee for the program, but now they have finally closed at that rule making an issue the final rule in june. the last security right i want to highlight is the npp dc, a guided document that came out and 2040 legislation:
12:31 pm
the only proposal at this stage the coast guard also issued a final rule on on the automatic identification system they are transponders and the vessels and they hope the ships and vessels avoid collision and avoid the baroness and that regulation is finalized. they do traditions on the proposed rule to large offshore
12:32 pm
vessels. they should have a final rule on the towing vessels that are the vessels that have taught about. there should also be a greater regulation. the card readers for the transportation identification credentials. we have heard us this year in the regulatory front. they impact the regulatory process and bills like the act have passed the past two times previously before that. it would require congress to approve major rules before they take effect. it would require the joint resolution of approval for the
12:33 pm
major rule before it went into effect. and then a major rule is tracked from the congressional so it means the high-cost rural that is going to have major increase in costs or that would have a significant adverse impact. so it's only reported in the committee but that would establish a retrospective review commission for a look at the agencies that need to eliminate and then before they can issue, they would have to eliminate one by the commission it's like a cut and go procedure. we've also seen the overt act which would require you to have the administrator report in the planned year.
12:34 pm
the department of labor regulation changes their mind in the long-standing interpretation , the circuit originally said if you change her mind you have to go through the common rule making and the supreme court came around and said no. it's called the veteran doctrine and its contrary. you can't change your mind. you don't have to go through it if you do that you are putting the putting their retirement and if that isn't in the administrative procedure act so you don't have to go through the rulemaking if you do the long-standing interpretation. and they only other one i want to mention his michigan versus epa which is a recent case that was in the news because it was decided in june of this year in the regulation saying that you have to consider cost in deciding whether to regulate. so, there's been a lot of talk about the cases and there will be more on how it will impact the regulatory world. so i want to close and have the diverse regulatory agenda and
12:35 pm
expect to see regulations in a variety of areas and there will be several high-priority regulations and finding the monitor to judicial legislative. >> thank you. >> the summary says the more things change the more they stay the same. i also note straight activity and all of the above. that does remind me if we start at the department in the counsel's office i think one of the very first calls that i received was from the federal registered unified agenda folks in the end of march, 2003 saying the unified agenda is overdue. what do you mean, so it's been a great revolution to see how the process happened over the years in the year of leadership. so moving from where we are internally and in forecasting out turnover to talk about how
12:36 pm
they are taking note of those needs and operating in the existing framework of the homeland security act. thank you for inviting me back here. it is a privilege and honor to be here talking with everyone about what we are doing here in congress. i'm going to break up my comments and talk about congress supports the hsa and conducts oversight. the oversight, but a station and last but certainly not least the budget. the senate has already given advice and consent role and this is an area that i know my boss has taken very seriously. you'll hear them often set in the nomination hearings that are organization, the size and scope
12:37 pm
of the most important thing for the organization and that's how they work incredibly hard in the presidential nomination to do our due diligence. this moved the two nominees for the tsa. there was over a dozen vacancies at the dhs from the secretary on down and so we worked really hard to move the nominees through the committee to fill those vacancies but by and large we worked incredibly hard to fill these vacancies. that's on the leadership and again this is something that's incredibly important to not only engage with every other agency off there. on the oversight front, you know, at the end of the day the
12:38 pm
oversight agencies are carried out in a way that is consistent. so the congress. spin it any time on the website c-span.org we take you back now to capitol hill. it's holding a homeland security conference this afternoon coming up at panel discussion on immigration live coverage. as we move towards this next spot to be on the agenda this we year it always will be. now we process those people as they want to come to the country
12:39 pm
how the complex issue and how easily demagogues. we have picked a panel that will address this in a considerable fashion and we need to lay out some of the challenges that we have in the u.s. immigration law and policy. i've lived in immigration all of my career and prosecuted as an illegal alien transporting case as a tremendous education i learned a lot more in i thought that i knew of the general counsel in the department of homeland security in this area so when i was there i needed to have somebody working with and for me that was knowledgeable, and fortunately was part of the team early on as an attorney and he was a partner.
12:40 pm
it's the chief counsel for the u.s. citizenship and immigration services and also served in texas and we are really delighted to have lyndon moderate the next panel. we all recognize joe and polly. if you came here expecting the lunchtime food fight over the birthright citizenship i think he will be a little disappointed today we will have the leading experts on the immigration law that represent the government could come from the hill and advocacy organizations.
12:41 pm
we will hear about the issues that are really going to be going on here in the last year and a half in the administration she currently serves as the deputy assistant secretary for immigration policy at the department of homeland security. but prior to that position she was the director of the immigration policy center. for a number of years she served as a senior loyal at ins and the department of homeland security specializing in the refugee and asylum law, and she also did it for bush bush if you up to the late senator kennedy's office during the robust 2007 immigration debate. to her right is the professor's international expert on immigration law and focuses on procedures used to adjudicate immigration cases still in
12:42 pm
opaque topic to be. but she directs the law in the government program and i do recommend for any attorney that is going to tackle the immigration law that you would read her article called administrative law through the lens of the immigration law. to the right is granted the director of advocacy for the lawyers association. we will get their. it's refugee service and u.s. committee for refugees. he's one of the most respected voices on very controversial issue that has testified before the house and the senate. finally but not least is very person who recently assumed the position of the democratic chief counsel for the subcommittee on immigration and border security in the house of representatives.
12:43 pm
his undermining full-time position is the chief of staff for the ombudsman to u.s. citizenship and immigration services. the topics we are but a cover is the most likely likely to drive duration policy in the final year and a half. so we are going to cover the president's signature action on daca in the favorite is announced in the last six months into the challenges to the deputy administration facing on the southern border with unaccompanied minors, and finally the recent presidential announcement regarding the proposals to modernize the visa immigration system. with that i'm going to sit down and talk and jill is going to take the substance and then i will come in with some questions.
12:44 pm
>> thank you as well to the administrative section for hosting this institute. i am always happy whenever i can do anything with the administrative section. it is a wonderful group and it's great to be here. so, my task is to fill you in very quickly on one of the most controversial immigration aspects in the last year or so and that is the president starting of the two things called daca and dapa. and i also have to stop and think and if you don't think about immigration time all the while that sounds funny, daca and dapa so what is that. so it titled arrival and the third action for parents of
12:45 pm
american and lawful presidents. since both of those terms have the word deferred action, i'm going to explain to you quickly what the third action is in immigration law and then we will move into how this has all ended up in the headline. so, deferred action is a temporary reprieve from removal. it's an exercise across the discussion in immigration law and it's a signal that an individual is a low priority for the removal. it's important to know that it is revocable and it doesn't provide a lawful immigration status. it just is a revocable statement from the government to a particular foreign national that they are not high priority for removal for a certain period of time. deferred action has been around in immigration law for a long time. it's not new. it's not something that president obama came up with himself. in fact, john lennon received
12:46 pm
the deferred action in the 1970s. so, that's our go, cool, hip connection. mary is singing over here. what is new is the obama administration is using deferred action in a slightly innovative way through daca and dapa and it's trying to harness the equitable relief available. before daca and dapa even back i remember when i was practically immigration law but a fraction sort of a mystery wasn't aware to the private immigration attorneys. who you asked for deferred action it's like you knew it existed, but how exactly you got it and how the government decided who was eligible with a mystery. so it's a little bit less of a mystery through daca and dapa
12:47 pm
because what the obama administration davis released a policy memo that said here is the criteria that our agency at adjudicator's should consider when deciding whether or not to grant the deferred action within daca and dapa. and so, this method allowed for the individuals to have a better sense of where to apply and what the government will think about when deciding whether or not to grant daca or dapa. and so they've been in place since 2012 and that is aimed at individuals who arrive. the children have lawful status and that they and that they give then again is not a lawful immigration status but it's a signal they are not a high priority for the removal and it also makes it eligible for them to apply for the employment eligible documentation. >> so, daca is 3-years-old and
12:48 pm
some data tells us that approximately half of those that are eligible have applied into the number of falluja 750,000. and 83% of those that have been granted originally is good for two years and had applied for renewal. now, dapa is a proposed initiative similar not the statement that would apply for parents of u.s. citizen children or children who have had lawful permanent residence in the deferred action to those parents. dapa is estimated at 3.6 million individuals who would be eligible for dapa. but we don't know yet how many might apply because dapa hasn't been implemented because the u.s. district court judge in texas preliminarily enjoyed dapa
12:49 pm
and also some proposed changes. and the judge concluded that dapa violated the administrative procedure lacked because the obama administration erroneously invoked to invoke the policy memorandum exception to the rulemaking requirements. so, for those of you i'm sure in this crowd his crowd are familiar, but if you are going to a font to want to use the notice and comment rulemaking. but you have to use it correctly. it's in immigration law that i spend a great deal of my time thinking about so on the one hand i was excited. on the other hand, i was disappointed because i disagreed with a lot of the district court judge's conclusions both on the
12:50 pm
administrative law and the immigration law aspect. one thing i disagree with is the judge concluded that there was judicial review under the conclusion in the prosecutorial discretion and i disagree with that conclusion. also, the district court judge concluded that the obama administration used a policy document and i disagree with his reasoning there as well. just something to think about going forward and i'm happy to take any questions if you want to know more about why i disagree with the conclusions, one more general point i want to make in terms of thinking about the future of immigration law is that me via litigation sort of solidifies in my mind that immigration lawyers and administrative lawyers can no
12:51 pm
longer operate as the two separate islands. the district court judge's opinions reflect the misunderstandings both in the administrative law and immigration law. and it's up to the immigration lawyers to be fluent in the administrative principal so that we can help bridge this gap to bring them back to the mainstream of the administrative law. thank you. >> people do a few questions up here and then time permitting at the end we've opened up for the floor. the first question coming and this is for you, jill, and other speakers. tell us about the timing. right now there are decisions happening in the fifth circuit. where'd you see it going to the supreme court after this? >> the fifth circuit refused to grant the stay in the district court preliminary injunction and so now the appeal of the
12:52 pm
parliamentary injunction is before the fifth circuit that it's before the exact same panel the two that ruled. so. it's the same result in the fifth circuit so it will end up before the supreme court. >> a major part of the litigation and the lawsuit as you mentioned was brought by texas and a coalition of the states that are opposed to the policy. and the district court found that they have a standing. and the basis for the the courts to find court to find the standing was that the grand of the deferred action and that bond status resulted in the individual's ability to apply for the texas driver's licenses and each time that you apply for the texas driver's license, there is a small cost to the
12:53 pm
state. so the narrative they brought the litigation is through the grant of the deferred action, texas is incurring the costs when the issue drivers licenses. we have seen how the government and interested parties have sought to broaden the economic discussion to say there might be cause for a drivers license. but there's also other economic benefits of being able to work, the more in taxes and benefits in other ways. where do you see the sexual discussion going as it moves through the courts and the policy realm about the narrow and broad view of economic? >> i'm not an expert at standing. but i can tell you. i would still tell you something about it. >> i can tell you what the fifth
12:54 pm
circuit says in the preliminary injunction they said that being pressured to change the state law is an addressable injury. they said the implementation would have a direct and applicable effect on the state drivers license regime. it's not speculative because the beneficiaries will almost definitely apply for the licenses and they didn't seem very impressed by the offsetting benefits argument. they did consider that an essay for the pulmonary injunction. so, you know, we will see what the fifth circuit says next and i would imagine the standing argument is going to be huge because this has repercussions way beyond immigration law. >> and if i may, just one other point to add real quick that is described in terms of the timeframe here if that case is going to be brought up in the
12:55 pm
second court and see certain that the supreme court term will start filling quite quickly as we all know it only handles about 70 cases may be cases in a given term that will have to be made fairly soon so there is a window of opportunity where the fifth circuit has to come down and the supreme court makes a decision whether it is going to grant the circuit and it may not do that. and if they missed the window for the term, the loan will be denied and they wouldn't be hurt until the next term coming around starting in the fall of next year so that is the thing to think about for the timing of this. and to get here later on in the term it will become not until the summer time but if it goes up to the supreme court something not until earlier more
12:56 pm
likely midway in the supreme court. >> with the additional time it's been on hold the government has been working out scenarios that implement the program. all of you have experienced either within the government were working on the education side if the government does get a green light whether it is this fall or next year after the supreme court case, will they be better positioned today to be able to implement quickly. >> everybody's looking at me and then of course the attorneys are looking at the. i think that probably is a better answer for you all to speculate on the readiness and such because we really have taken backwards order extremely seriously in terms of not really
12:57 pm
freezing everything in its tracks with respect to the dapa implementation. so i think that is a good thinking that is going on in the conversation that goes on needs to be one that is in the public realm. >> i think it certainly helps it has opened up in 2012 they did launch the program in the applications. they worked up some of the kinks unlike the prior debates in 2005 this isn't an unknown administrative challenge anymore. why don't we stick with you while you are in the hot seat. the president and the secretary announced major changes to the enforcement priority system, and those have been ongoing for a number of months. then we had this issue of the sanctuary cities that explode into the scene with a high-profile filling out in california.
12:58 pm
aside from the emotional part of the murder that occurred in california, the enforcement policy changes i don't think i've gotten enough mainstream attention. if you could walk through what the changes are and how you see them impacting the policy changes down the road. >> the important place to begin is for any number of years and certainly in the last five years the guidelines to help to shape the nature of the enforcement actions that we undertake and many of the things the secretary did in november of 2014 word i think respond and identify those places in which the guidelines could not only be improved but could sharpen some of the broader policy points that really the administration wanted
12:59 pm
to emphasize. and so, you know, we have always made those that threaten the national security and public safety were our chief among the three or 80. and none of that really has changed. but i think that what you saw in november of 2014 was an attempt to go in with greater precision in a tighter gauge to say here's how this plays itself out in the context of the day-to-day decision-making. i can't emphasize enough that when i look at all of the november 2014 announcements and memos from the secretary that the notion of the decision-making is decision to be co- debate co- critical to what the dhs is about. the idea of discretion and enforcement priorities and the idea of the programs that are joined and other programs that were attempting to do and in
1:00 pm
innovation and modernization. it's often turned on the best decision-making and judgment possible. i often like to see say that the goal of the enforcement priority is exactly that. how do we enshrine the best standards of making good judgments about individual cases in the context of the massive undertaking. >> this is important in the context, so that is enough opining. >> some of the basics are actually available in the outline to the critical thing to sort of know and understand arafat removed from a broad set of categories to the slightly more targeted one in which greater emphasis has been placed on the criminals and less

84 Views

info Stream Only

Uploaded by TV Archive on