Skip to main content

tv   Key Capitol Hill Hearings  CSPAN  April 4, 2014 9:00pm-11:01pm EDT

9:00 pm
enhancing global coverage, improving our ability to operate in n.i. access, aerial denial or a2ad environments. sustaining counterproliferation capabilities. continuing to develop our cyber operations capabilities and strengthening our counterintelligence capabilities and reforming our security clearance all four of us are committed to working with congress to continuing to deliver the intelligence advantage to our war fighters. i give for the subcommittee to you for the chance to address the subcommittee. thorne, and members of the subcommittee, on behalf of the men and women of the defense intelligence agency, i
9:01 pm
want to say thank you. i support the priorities in the remarks. as you have heard, from the admirals and generals, the need for more timely and accurate intelligence continues to grow. crises in the middle east and recent developments in crimea, central africa, and asia underscore the drumbeat for officers with special insight and understanding. we have a responsibility to the men and women to make smart decisions in these austere times to take risks. -- maintainand those investments that will ensure our security. changes to manage risk. to make the choices we need to
9:02 pm
-- i will highlight for critical 40's in our request. , collection processes and career broadening experiences. how we have received much of our business practices. intelligence collection operations, ensuring the defense cleansing services is a priority for the defense department and intelligence community as a whole. your oversight has helped us mature. measurable progress in support of defense equities. in all measures, tradecraft, professionalization, and the quality and quantity of recruitments, have experienced a marked increase in performance. in terms of counterintelligence, this is another critical investment for dia. events remind us that accepting too much rescue -- risk can come
9:03 pm
at an unacceptable cost. our budget request focuses our investments on the holistic strategy that addresses can judicial -- traditional counterintelligence. a security conscious colter within our workforce. analysis issource one of the largest portions or budget. we are implementing solutions to mitigate global coverage risks, particularly by forging closer relationships with the five intelligence integration centers. we use this to maximize enterprise support. while only in their first year of operation, are combined performance in response to the crisis in ukraine, less point in the south china sea, and
9:04 pm
stability in sub-saharan africa, and the civil war in syria highlight the usefulness of into ration and collaboration. we have increased our workforces in our professional development programs as well as career broadening experiences. in terms of professional 27elopment, we consolidated offices into one academy, realizing a cost savings of $3 million. through our office of defense intelligence, we have enhanced training. of career broadening experiences, this past year, we -- 225 to 25 personnel personnel overseas and plan on using 320 more. anprepare the workforce for
9:05 pm
uncertain future, we have consolidated three of our military reserve offices and 1200 reserve the let under one component. this has seen an improvement in analytic production, a decrease in contract instructors, and an increase in the number of mandates we get. toare taking steps significantly improve our contracting business processes with a start small scale fast fail cheap strategy. this reduces risks, shortens delivery time, and mitigates the trap we typically get ourselves into. we are particularly proud of our work with small businesses, which are generating the original ideas we need for the future. the federal government average of contracting is less than 25%. but i dia, we have doubled our investments in small businesses, reaching a high of 31%.
9:06 pm
and now nearly one in every three dollars we invest is vested in small businesses. we have maybe hard choices. the right investments to make sure our defense intelligence team of skilled professionals is trainingwith the right and technology strengthened by partnerships across the government and around the world. we will continue to provide all source defense intelligence whenever and wherever required. i thank you for your continued support. >> good morning, chairman. ranking member. and distinguished members of the subcommittee. thank you for the opportunity to discuss the program. and the budget request. in my more than 30 years of
9:07 pm
working in defense intelligence, the collaboration between our agencies has never been stronger. geospatial intelligence is the analysis of intelligence from a number of sources. that described, assess, and depict physical features and geographically referenced activities. we have always been integral to military operations around the world. it is one of the drivers for intelligence integration. everything in the world is someplace at some time. as the lead federal agency, in g-8 provides critical information to the defense decision-makers, troops deployed in harm's way, and first responders. the content analysis and services enable mission operations,mbat
9:08 pm
strategic warnings, precision targeting, counterterrorism operations, counter gps navigation, and humanitarian assistance and disaster response. sustains global aeronautical and safety of neck vacation -- navigation information. updatingrt includes electronic records on more than 45,000 airfields. charting 16,000 square miles of ocean. maintaining information on topographic features. the bottom line is, without this information, our ships would stay in port. fly.ilots would not our ground forces would not leave garrison. the second example of our contribution is the view of the battlefield that nga provides read by identifying threat for
9:09 pm
relationships, and infrastructure, it helps commanders hold adversaries at risk. to support these types of missions, personnel deployed all over the world, embedded alongside our military and intelligence personnel. missionticipate in planning and follow-up. the intelligence that nga provides is critical to intelligence agencies and military units fighting to protect all americans. terms, thedest vision that drives nga's workforce is putting the vest need a in the hands of our soldiers, sailors, marines, and coast guard. we seek to provide new value for war fighters, whether through a map, or specialized interactive
9:10 pm
product. the budget request includes funding for expanding our analytical capabilities and is next to generation collection strategies to anticipate evolving national security threats. shaping and retaining a skilled in the divorce -- and a diverse workforce. in keeping our people safe. these investments are aligned with a number of long-term strategic initiatives. to improve our contributions to the war fighter. better intelligence integration. providing better access to our data, especially for the war fighter. enhancing analytic trade craft discover key unknowns hidden in the masses of data. in addition to these initiatives which focus on the long-term success of the agency, we have kept a close eye on the more immediate risk from russia and
9:11 pm
the ukraine to iran, north korea, and china, syria, afghanistan, and counterterrorism. nga's progresson towards financial audibility. we are undergoing the first our 2014 financial statements. the results from this audit will help us to defy areas requiring additional remediation as we move towards our goal of achieving an unqualified opinion. on behalf of the women and men of nga, thank you for your support. >> chairman, ranking member, distinguished members, thank you for the opportunity to address you. and the outstanding men and women of the national security agency, thank you for the support. that you give to nsa/css.
9:12 pm
your support makes it possible for us to provide actionable intelligence. especially the combat and combat are said -- combatant commanders . with your continuing support, we will continue to do all we can to protect the nation and its allies. our 2015 budget reflects hard ensure critical national security issues are addressed. the security landscape will newme more complex and face challenges. cyber attacks will allow adversaries to overcome conventional military power. the nation will cut -- depend on nsa's analysis to understand communications. we must support our work for others -- were fires -- support
9:13 pm
our war fighters. our fiscal year 2015 budget, while excepting risks, keeps us on the path from accomplish these goals. we have recruited and trained a talented workforce. the 2015 budget allows us to preserve this. we are leveraging human capital with providing sophisticated and innovative capabilities. investments will expand to meet the speed of action required. nsa executes three distinct funding streams. the logical program. -- crypto logical program. and the military program. let me briefly describe our areas in each of these. allows the global
9:14 pm
capability of the crypto logical system to bear. the global intelligence capabilities and trade, havetional infrastructure, resulted in the delivery of mission requirements. i look forward to providing some specific and recent examples great in the classified session that will follow. plan provides security solutions that keep pace with a fast-moving technology sector and adversaries. the cyberspace environment and its risks am a profession -- risks, protecting information. we are continuously refining our
9:15 pm
strategies to provide know-how and technology to suppliers and clients and measurably improving the security of critical operations.uring -- focuses on providing responsive and reliable signals ourlligence to make sure deployed forces can succeed and are prepared to respond to future threats and technologies. miff continues previous investments. providing support for our deployed services. operability, your commonality, and monetization. css will continue to support an --ective doing technical
9:16 pm
joint tactical system. strengthen the departmental's ability to address challenges. the investment will focus on a strong cyber workforce and intelligence gathering in cyberspace. these initiatives will provide cyber command, personnel training, and threat support. we will continue investing in the research and development of solutions that provide actionable signals intelligence. we will provide support to the development of operations plans and theater campaign lands as chairman of the joint chiefs. i will conclude by concluding that the budget request request betweenthe balance today's fiscal realities and our support for the joint war fighter.
9:17 pm
thank you for your support helping us containing -- maintaining world-class capabilities to read -- capabilities. >> we will immediately reconvene next door. the opening hearing stands adjourned. -- imagine how much money we could save if you stopped collecting information. we will lock you up for disturbing a public building. >> we are asking questions. >> i was just asking a question -- >> we have been fighting for the people. >> we are fighting for our constitutional rights.
9:18 pm
apparently, they are not doing a very good job. the nsa is not doing a very good job here equipped they are fighting -- [indiscernible] largest --ave the presentn is pleased to our winning interests -- entries. studentcam is c-span's annual competition that encourages middle- and high-school students to think critically about issues. students were asked to create their documentary based on the question, what's the most important issue the u.s. congress should consider in 2014? ben wolman is one of our second prize winners. he attends palisades charter high in pacific palisades, california. he based his video documentary on the issue most important to him, nasa funding. >> ♪ i was strolling on the moon one day ♪ >> ♪ in the merry, merry month of ♪ >> ♪ december >> may. >> ♪ may
9:19 pm
when then much to my surprise ♪ >> nasa's proposed budget for fiscal year 2014 is the lowest it's been since 2007, with a mere .44% of the annual federal budget. nasa is a huge asset to the united states, bringing not only spectacular photos and information about our universe, but also spurring technological innovation and development here on earth. the organization's impact on both our country and our planet is unjustly downplayed due to its comparably meager funding. >> i think the investment we make at nasa also benefits us over and over again, not just on what nasa does, but the byproducts of that investment, whether it's in the medical area, which we've seen where hospitals are using some of the technologies that came about from the nasa programs, or new enterprises, new businesses in
9:20 pm
this country spun off because of the breakthroughs and the research that's done with nasa itself. >> i go to schools and i describe to students my connection, personal connection to nasa technology, and i describe the car accident that i had, where that airbag that saved my life was nasa technology. >> nasa is encountering some new competition, raising the question of whether private space agencies will enhance our exploration of space or detract from the current predominance of governmental space organizations. space x plays a leading role in the new establishment of private space businesses. >> if you look at the private companies, they're doing a great job supplementing nasa now, from lower earth orbit, but there are things that are done with nasa's pioneering work, in other words, a lot of scientists, a lot of know-how came from nasa, and the funding is still ultimately coming from government.
9:21 pm
most of it's governmental. >> private space industries do seem to be worthwhile developments then, especially with nasa having a central role in many of the companies' operations. but there is one major flaw if private space agencies are to ever overpower and replace governmental organizations -- money. >> the other thing is that some of the things will just never be profitable, and private companies are doing things that are profitable. and they do these things more efficiently than any government organization ever could. but there are a lot of things such as basic science that will just never pay off in terms of making money. >> you won't make a profit by sending two rovers to look for a formerly habitable environment on mars. and you won't make a profit on a multi-billion-dollar mission to the moon. >> there may not be profit to private shareholders, but studies actually show for every $1 given to the organization, the american people receive as
9:22 pm
much as $7 to $14 back from spinoff technologies and increased employment. in my city of los angeles, california, almost 10,000 aerospace engineers are employed through companies that work in tandem with nasa on various projects. >> increasing funding for nasa and for space exploration could have an enormous benefit for southern california as a whole, los angeles county generally, and the city of los angeles particularly. >> i am standing in front of teledyne reynolds, a business only 20 minutes away from my house that has supplied nasa with interconnect systems for projects such as the hubble telescope. boeing, another company close to my house, has long worked with nasa and is the prime contractor for the international space station. as you can see from the stuff in my room, the organization has also had a much more personal impact on people. nasa has always inspired me in particular, and i credit it with giving me a sense of fascination and interest in science. i remember playing nasa games on their website and watching the shuttle launches from home. i also had the privilege of
9:23 pm
watching nasa's nearby jpl for its annual open house, which was cut last year due to sequestration. with the current state of funding, kids are being deprived of experiences that could hugely impact their lives and future careers. >> not only did the united states win the race to put people on the moon, but the cold war is over, the soviet union has collapsed, the competitive argument, whatever virtue it may once have had -- sputnik and yuri gagarin certainly scared the united states -- whatever merit it may once have had is now gone. and we have to ask, what exactly is the function of human space flight? >> we just have it in our dna to explore. it's our destiny. it's our mission. but too often that gets lost in d.c. >> enhancing man's knowledge -- i should say person's knowledge
9:24 pm
-- about outer space is extraordinarily important as to what it does for the state of knowledge, the enticement of young people into knowledge, the pursuit of new frontiers. >> and i think we need to increase the nasa budget for exploration, for example, robotic exploration of mars and orbiters around saturn. i'd have a robot around every planet, because i think what we learn out there ultimately about tells us about our planet and what we need to survive on earth. >> if you cut your research budget, you literally cut your future. those are the future industries, the future technologies. and if you do not maintain that, whether it be space people or not, then you do so at your own peril down the line. >> if you're not a scientist or technologist, you will value that activity. >> we'd be investing in our future. >> yes, and that in the 21st century are the foundations of tomorrow's economies, and without it, you might as well just slide back to the cave,
9:25 pm
because that's where we're headed right now -- broke. >> nasa's reach extends beyond geographical boundaries, partisanship, and nationalism. nasa has long inspired not only americans, but people around the globe. each scientific achievement is not simply the accomplishment of one country, but of the entire human race. other countries are steadily ramping up their space programs, and congress must realize that giving nasa proper funding is a responsibility to both the u.s. and the world. in this new year, america, the world's richest country, should lead the way, take off, and explore the unknown. ♪ >> to watch all of the winning videos and to learn more about our competition, go to c-span.org and click on studentcam. and tell us what you think about the issue this student wants congress to consider. post your comment on studentcam's facebook page, or tweet us using the hash tag #studentcam. hearing --ousehold
9:26 pm
house hearing on passport fraud. after that, the march jobs numbers. >> on the next washington journal, wall street journal reporter will discuss the unemployment and job numbers. offervin mccormick will advice for those preparing their federal taxes. as always, we will take your call and you can join the conversation. 7:00ngton journal, live at a.m. eastern. security homeland secretary says an alarming countries provide
9:27 pm
little or no information to a lost and stolen passports database. he testified before the committee on border and maritime security. congressperson plans to introduce... station. -- plans to introduce legislation. it is a problem that has gained attention in recent weeks after it was revealed that two iranians or did malaysian airlines flight 370 with stolen passports. hour and additional minutes.
9:28 pm
[inaudible conversations] >> the committee on homeland security, subcommittee on border and maritime security will come to order. the subcommittee is meeting today to examine the issue of passport security. we're certainly pleased to be joined by mr. alan bersin who has been with this committee in the past and resort appreciate his attendance her here today. his thesis is negative or international affairs at the department of homeland security. mr. john wagner, excuse me, it's also been before the subcommittee for. we pressure his attendance today. is the deputy assistant director
9:29 pm
of the u.s. customs and border protection and brenda sprague to as the deputy assistant secretary for passport services at the department of state, and mr. shawn bray was the director of interpol washington. united states national central bureau. i will more formally introduce them in just a moment. but let me recognize myself for an opening statement here this morning. and first of all of course let me start by saying all of us must and prayers are with the families of those killed and wounded at fort hood, a terrible, terrible incident that them in in my ranking member's state of texas. and certainly as we begin the very to school -- difficult task of what went wrong with be mindful to support the men and women who wear the uniform not only been overseas but certainly when they get, when they return home as well. this morning we're going to be talking about travel document security which is the cornerstone of the united
9:30 pm
states' effort to secure our homeland, it's integral to pushing our borders out, the building of terrorists and others who seek to do is harm hinges in large part on the building into trouble. if you make are for terrorists to cross our borders without being detected, future acts of terrorism hopefully can be prevented. and i want to begin a committing the department of homeland security of the department of state for the great progress made as we have strengthened the so-called out a ring of border security. today we conduct more vigorous vetting, early in the process. we stationed dhs personnel and high-risk countries to prevent persons of concern from boarding a plane are getting a visa and where using biometrics to detect visa fraud. and in the past three years is subcommittee has actually held six areas hearings on visa and document security because we sorely understand the importance of the 9/11 commission's recommendations, and one of the conclusions actually as they said that for terrorists, travel
9:31 pm
documents are as important as weapons. vulnerabilities in our documents security can be exploited by those who would do us harm so we must have robust measures in place to deter and to ultimately detect those traveling on false documents. to that end we would certainly dismayed to from press reports that two of the passengers on the malaysian flight 370 bordered the aircraft using stolen passports, and while of course as been reported we don't have any reason to believe that these individuals were involved in an act of terrorism, it sort highlights the vulnerability in the aviation systems abroad. our thoughts and prayers go out to the families who are still waiting to learn what has happened to their loved ones and which would hope and pray that that plane will soon be found. in the united states for the work of the department of homeland security, we've made the necessary changes to keep the flying public secure, and the building of passengers to board a flight bound for the
9:32 pm
united states with known, lost or stolen passport is very, very low. in the years after 2001 the international committee through interpol created a lost and stolen travel document database that is -- send information to a central repository and check against that database to make sure no one could enter a country or board a plane with a known, lost or stolen passport. unfortunately, only three countries in the world routinely check flight manifest against that database. the united states of course, the united kingdom and the united arab emirates. so there is no question that more countries should follow our lead, otherwise international travelers, including americans who travel internationally, are at risk. according to interpol, in 2013 travelers bordered international flights more than a billion times without having to passport numbers checked against the database. tools are in place to determine
9:33 pm
if the passport has been reported missing, and we should use every avenue at our disposal to encourage countries to do the right thing, including offering technical assistance where appropriate. in addition to not consistently checking the lost or stolen passport database most countries are not consistently sharing lost and stolen passport information with the interpol database. the overwhelming majority of the 40 million records in the lost and stolen database comes from visa waiver program countries. in large part because it is condition for visa free travel to the united states. however those countries do not routinely check their flight manifest against the database. and as a result i will be exploring and introducing legislation and legislative solutions to encourage countries within the visa waiver program to do so. because without time reporting of lost or stolen travel documents become straight difficult for cbp through the advanced targeting system to determine if someone is lying on
9:34 pm
a false document before they present themselves to a customs officer at an airport. if a terrorist is intent to hijack an airplane, it might be duly. and even though the united states has a robust screening in vetting process for travelers, it doesn't mean our work in this area is done. i understand cbp just recently began to check passengers on outbound flights against the lost and stolen database. we certainly are interested in hanging from our witnesses today why that wasn't done before. finally, i want to get an update on the work that the department of homeland security and cbp and the state department, and interpol, done since 9/11 to prevent those with lost, stolen and fraudulent passports from getting on a plane bound for the united states. while americans should be confident that teach-ins is doing good work vetting all of the appropriate databases, we can and should work with our international partners to strengthen aviation security for americans who travel abroad. this subcommittee stands ready
9:35 pm
to assist in any way that we can. and the chair would not recognize my ranking member, on the subcommittee, a gently from texas, ms. jackson lee for her opening statement. >> thank you very much, madam chair. good morning to the witnesses. thank you so very much for your presence here today, and thank you again, madam chair, for reminding us as i intended to do of the tragedy that occurred in my home state, my neighbors at fort hood, texas, and to again offer to those men and women who have been brave enough to put on the nation's uniform to fight in faraway places, our deepest concern and sympathy, certainty for the families have lost their loved ones who, as i indicated, are willing to serve in the united states military, and certainly those who were injured. this is the second time that this tragedy occurred at fort hood, and second time that we've had to embrace those who, as i
9:36 pm
said, are our neighbors. i mourned with them in 2009 and will continue to do so now. i hope this committee will have an opportunity to address the question of protecting even as this is a military issue, protecting our men and women while they're on domestic soil, and view it as a cause for zero tolerance for these kinds of incidents on the nation's domestic military bases. again, my sympathy do not only the men and women at fort hood and the leadership, but also to the people of the state of texas. this is another tragedy that we are facing, trying to find solutions, and i would make mention that even as this has gone into many, many days, that we still express our concern for the families of the passengers of malaysia airlines flight 370. i hope that it will not be their final and as there's been no
9:37 pm
determination as to what occurred to that particular flight. but today i am appreciative that we are holding this hearing as i spoke to the chairwoman in the immediacy of the hours of determining that there were passengers on that flight that have fraudulent passports. survey there have been continuing investigations and whether not we have concluded that there was no connection, we do know that passengers traveled with fraudulent passport. and as well but american citizens were on that flight. while many questions remain unanswered regarding the tragic disappearance of flight 370, we do not know as i indicated what connection those two passengers may have had. to its demise, if any. to iranian nationals were allowed to come using italian and an australian passport -- posturing passports had been injured in interpol stoler a lost passport database. reports suggest that these individuals were not criminals
9:38 pm
or terrorists but rather a asylum-seekers hoping to reach your. nevertheless, the fact that at least in certain countries travelers can readily board aircraft using passports that do not belong to them is a cause for concern. if a couple of asylum-seekers can do it, so can terrorists or criminals. and after 9/11 and even in other countries before that, we know that we live in a different territory with different actors and different reasons for their actions. in fact, they are known examples of terrorist comment on fraudulent documents. according to interpol, master money the 1993 world trade center bombing in new york committed his crimes after traveling internationally on a stolen passport. also the so-called white widow of a london july 2005 suicide bomber is wanted in kenya and currently at large with aliases linked to a fraudulent passport
9:39 pm
and a passport reported stolen. evidence that this is a problem. it is my understanding that the u.s. is ahead of most of the rest of the when it comes to preventing individual talent a loss, stone or fraudulent doctors. department of homeland security systematically checks all travelers documents against appropriate lost and stolen database. these checks yield results. for example, in fiscal year 2013 u. fiscal year 2013 u.s. customs and border protection, cbp, reviewed 17,710 possible hits against lost and stolen databases resulted in 496 individuals being denied from boarding planes to the u.s. already in fiscal year 2014, cbp has reviewed 10,806 possible hits resulting in 159 individuals in denied boarding but i also want to thank homeland security and the various agencies relevant to the issue of our border security for
9:40 pm
the extended perimeters and improved security that we've had post-9/11. we are clearly, as i've often said, in a better place than we were. thank them again for the service at what we've been able to benefit from. since flight 370 incident, not just arriving passengers but also those departing this country. while overdue, this step should post our remaining -- should close the remaining loophole applied to or from this country. hope to hear from our dhs witnesses debate about why the party passengers had not really been included in their checks and whether any analysis have been done such going to determine whether passengers have been departing the u.s. on documents that do not belong to them. i also hope that we will be able to embrace and declared the airline industry as we move forward on a number of ways to ensure the safety and security of the traveling public. hope to here from all over what
9:41 pm
this is about how we can encourage our international partners to follow the lead of you as an handful of other countries that regularly check travel documents against intervals database. it is my understanding that traveling on loss, still are otherwise fraudulent travel documents has already come place in certain parts of the world. doing so is made possible because fewer than 20 of interpol's 190 countries systematically check passports against s. ltd. although the flight 37 incident has focused attention on the vulnerability was already known to interpol. in fact, speak at the seventh annual world summit in february just before flight 370 incident, interpol secretary-general noble lamented that only a handful of countries are systematically using sltd to screen travelers. when that technology and device is available, leaving our global security apparatus vulnerable, exploitation by criminals and
9:42 pm
terrorists. the world is getting smaller. traveled from all over the world to all over the world, this is simply unacceptable. helped her from her witnesses debate about how we can encourage other countries, particularly those would work closely with on aviation security matters to begin regular screening passengers or doctors against interpol's the database. it is in that then i will be looking to draft legislation dealing with the enforcement aspect of this particular aspect of aviation travel. the security of the traveling public including u.s. citizens traveling between foreign countries can well be at stake as well as those traveling from foreign countries to the united states as well as americans leaving our soil and traveling elsewhere around the world. again i think chairwoman miller for holding today's hearing, and the witnesses for joining us. at this time i ask unanimous consent to allow mr. swallow, a
9:43 pm
member of the full committee, to sit and question the witnesses at today's hearing. >> without objection. >> i yield back. >> i thank the gentleman. other members of the committee are reminded that helping statement might be submitted for the record. we are pleased today to have as an agent for very distinguished witnesses joining us today spent allow me to indicate that i am called to be part of a quorum in a market and i'll be away for just a moment. i think the chairwoman for her courtesy. >> certainly. a busy morning here on the hill and we will be having votes a little after 10 so we will move a long. mr. alan bersin is the assistant secretary for national affairs and chief diplomatic officer for the department of homeland security. previously mr. bersin service commission for u.s. customs and border protection. mr. john wagner is acting deputy assistant commissioner for the office of field operations in u.s. border protection. mr. wagner from serve as
9:44 pm
executive director and passenger programs was responsible for all travelers admissibility related policies and programs. ms. brenda sprague served as deputy assistant secretary of state for passport services in the bureau of consular affairs, a position she held since july of 2008. and in this capacity this break oversees a network of 28 agencies and centers that are responsible for the exception -- adjudication and issuance of u.s. task force. mr. chabot is the director of interpol washington, the nsa's national central bureau, a position he has held since 2012. as director the xml for the attorney general as the official u.s. represents to interpol. mr. bray has been focused on improving partnerships between the other 189 interpol member countries and the u.s. a federal, state and local tribal law enforcement counterparts. careful statements about what is will appear in the record and the turn of recognizes mr. bersin for his statement.
9:45 pm
>> thank you, madam chair, ranking member of the, i appreciate this opportunity on this subject. the international criminal police organization or interpol is the world's largest transnational police association with 190 member countries today. each member country as a national central bureau to conduct interval activities and could make its services within its national territory. on the service is interpol provides to the law enforcement entities of every member country is access to its sltd, stolen and lost travel document database. this database contains over 49 records provided by nearly 170 of the organization's members. on march 9, interpol confirmed that two of the passports used by passengers that boarded malaysia and fought through some have been recorded and installed a lost travel documents a base.
9:46 pm
as noted by the ranking member, interpol secretary-general ronald noble noted to the surprise of many that very few countries systematically query the sltd database for the purpose of verifying whether a passport has been reported as lost and stolen. even more troubling is the miniscule rate at which countries outside of europe, canada and the united states visa waiver countries our country bidding information to the database. madam chair, as you noted since 9/11, the united states government and the american people have addressed the security vulnerabilities exposed so tragically on that day. in the 12 years since any thoroughly bipartisan fashion in which this committee has play significant role, we have together constructed a multilayer, fully automated, in agency approach to homeland security. as additional vulnerabilities have been revealed, and are
9:47 pm
revealed, we examine and respond to them properly in concert with the concert. -- congress. eveas we do so to in the contexf lost and stolen passports. when an individual seeking admission to the united states presents a foreign passport, whether he or she seeks admission by land, by commercial air or by sea, that passport to screen against the sltd database prior to admission. in fact, many cases on multiple occasions. doubt as mr. wagner will explain we screen outbound passports in a way. most countries in the interpol committee do not screen travelers against the database as thoroughly as we did in the united states. meaning not at all. the alarming number of countries that report very few and in some cases no lost or stolen passport data to the sltd database. as a condition for participation as the chair noted, these a waiver countries are required to do so.
9:48 pm
the united states, canada and europe as those of the other the deputy partners according have provided a vast majority of the 49 records in the slt database. some of the most populous countries in the world note of it including china, india and indonesia have contributed few if any records to the database. despite the remarkable department of the database, 49 records added in the past 12 years, the lack of data provided by many interpol member countries remains significant. i have had the honor of serving on the interpol executive committee, and as vice president of the americas since novembe november 2012, and i've been urging the organization to prioritize the sltd program and other border security efforts as core functions of interpol. to be sure, madam chair, congressmen, there are real and current challenges to this vision. despite the fact that dhs and
9:49 pm
the united states national central bureau have worked to incorporate recommendations for data reporting and response times into interpol's standard operating procedures, many countries have not been able to connect their agencies and interpol does not require them to do so. the task ahead is encouraging our partners to more fully utilize the sltd database and to engage in these kinds of border screening and security efforts. this can only add to this that from a standpoint of american security. i look forward to exploring with you how we may best approach this latest challenge. it will not be the last, madam chair, and congressmen, but i take from our past experience that we can forge and resolve this matter in a satisfactorily cost-effective way. thank you for this opportunity again, and i look forward to responding to your questions. >> thank you very much,
9:50 pm
mr. bersin. mr. wagner. >> chairman miller, ranking member lee and testing which members of the committee. thank you for the opportunity to appear today and to discuss our u.s. passports are good for appreciate the opportunity to join my colleague conspicuously important issue supports the core mission of cbp. today i would like to discuss the sources of information of able to see bp, how we query this information as well as operational responses in a different travelers are desperate to deliver cbp officers to access real-time and reliable information on all travis seeking admission to the estateestates is critical for antiterrorism and anti-fraud efforts. however, secure modern document may be today, cbp must ensure that a traveler isn't fraudulent presenting another individuals valid passport or other travel documents with the dog is stolen or intentionally provided to enter the united states. cbp uses interpol stolen a lost travel document database, and
9:51 pm
department of state called through lost and stolen passport and support systems in the air land and sea environments to verify the validity and status of travel documents. cbp also uses the sltd data on a citizen of a visa waiver program country applies for travel authorization through the electronic system for traveler authorization also known as esta. cbs tonight over 98,000 s. does since 2008 for lost and stolen records. and all travel environment air, land, and sea, cbp officers were troubled it was against tax which is our primary database that includes access to many enforcement systems including lost and stolen test -- and edit it in the air and see if i'm cbp as extra advantage of receiving airline travel information prior to departure from the foreign location to this enables cbp to address potential risk factors and admissible issues prior to boarding the aircraft.
9:52 pm
cbp will coordinate our national targeting center and our assets overseas in immigration advisory program or in preclearance oma cornet directly with the airline to prevent boarding in cases where the esta has been denied for the traveler does not have a replacement document to the one reported lost or stolen. cbp has recommended over 650 no board recommendations to carriers in the last 18 months. in all environments cbp chordates with interpol when matches are returned from the sltd. many of the cases are actually travelers with no malice i think it. there simply travelers headed for a lost document, but later founded and are trying out to use it for travel. in ms. casey bp will verify the person's identity and if the passport is a u.s. passport we will allow the traveler to proceed but will seize the passport and returned to the department of state. in other cases the travel will have a valid replacement document for the lost and stolen one and cbp will verify that
9:53 pm
they are the to bear and about the traveler to proceed. this often occurs in the air environment when the traveler hasn't updated their airline profile with an airline and the old passport data has been transmitted to us. if the travelers found to be present a lost or stolen passport as an impostor or is altered and tempered with a passport in any form, cbp will take appropriate law enforcement action against that traveler. in the last 18 months see pscs over 300 lost and stolen documents using attempt to enter the united states fraudulently. to enhance passport security operations, cbp has developed a carrier liaison program which provides training to airlines and security companies and identifying improperly documented passengers destined to the united states. cop keating provides airline personal hands-on instruction fraudulent document identification or passenger assessment, posture identification and traveler document verification. to date the clp has trained 33,600 airline security
9:54 pm
personnel. winters encountered a lost or stolen document, clp training instructs teachers to contact the regional carrier liaison groups that are 20 for seven operations maintained at airports in new york, miami and honolulu. the rcl just respond in real-time to carry increased concern to plenty of the total document presented. after a determinadetermina tion a loss of some travel docket has been made, they will make the recommendation to board the passenger or denied boarding. so in concert with a part of cbp strive to ensure that travelers who present a risk are abruptly interviewed or vetted before boarding a flight bound for the united states in any document his address before traveling to give. cbs place opposite the strategic airports overseas to work with carriers and host nation authorities and has built strong liaisons with airline represents improve our ability to address threats as early as possible and effectively expand our security efforts beyond the physical port
9:55 pm
abuse but these efforts seek to keep our transportation sector safe and prevent threats from ever reaching the united states. these efforts also enhanced efficiency and create savings for the us government and the private sector by preventing inadmissible travelers from traveling to the united states. and for the opportunity to testify today and i'm happy to answer your questions. >> think you very much, mr. wagner. the chair recognizes mr. sprague for her testimony. >> chairman miller, distinguish most of the committee to thank you for the opportunity to testify today about the many things the department of state does to promote the security of u.s. passport and to deter passport for appreciate your focus on this important topic. we at the department of state believe to prevent passport fraud we need to focus on five areas. a sophisticated document with technic advanced security features, a robust and vigorous education system, real-time sharing of data, a proactive anti-fraud program, and outraged
9:56 pm
u.s. citizens to educate them -- i'm sorry. to educate them about the important form of identification. because of the access of passport provides, we spend years creating products with high-tech security features in photo biometric and secure limiting micro-printed, color shifting ink enhanced electronics that render these documents virtually impossible to counterfeit. but it's the sophistication of u.s. passport increases, so did efforts of those attempting to commit passport fraud. today's passport fraud most often involves fraudulent birth certificates, fake identities and the look-alike photos. passport adjudicative spend hours annually in mandated trained to make certain that they have the skills to identify there is types of fraud. we also integrate several real-time fron front-end databae checks into our education system. but this is not enough.
9:57 pm
as recent events have shown, even a well-designed, well educated passport still if on ability in the wrong hands. domestically we counter this by reporting lost, stolen and revoked passports detected, the system and custom border protection used to screen arriving passengers at u.s. ports of entry. in turn cbp transcends us u.s. passport its season at u.s. borders so that we can identify patterns and determine whether the better submits a fraudulent passport application internationally we lead the way in reporting lost, stolen and revoked passport data to the interpol lost and stolen travel document. we provide interpol with real-time data including the passport number and date of issue so it is accessible to member law enforcement authorities worldwide. we also require all countries in our visa waiver program to report lost and stolen data to interpol if they wish to maintain vwp status. the departments of state and
9:58 pm
homeland security use the sltd to that visa applicants inbound flights and doesn't manifest and people crossing mentors at all u.s. ports of entry. if you this is about international law and border enforcement agencies, the sltd effectively prevents impostors and is lost or stolen passports they bought or obtained fraudulently for travel. though i would our documents and systems are strong, there is never time to rest on our laurels. the u.s. passport is one of those sought after documents in the world. not only is it an international can't document it is also a legal form of identification and might be used to determine eligibility or endowment benefits, to apply for driver's license, to confirm employment eligibility, to qualify for a mortgage or to open a bank account. this means we must continually assess the passport security features and design for potential vulnerabilities and incorporate new measures as
9:59 pm
technology advances. through our website, travel top state.gov after committee outreach by our 29 passport agencies, we remind you citizens of the importance of safeguarding their passport and provide guidance for reporting to us if the documentation is lost or stolen. we continually review our methods to improve our passport issuance system and fraud detection capabilities. and look for new ways to partner with other agencies to educate the public and strengthen existing procedures. we welcome opportunities to expand the efforts with federal, state, local and international agencies to protect our citizens and promote safe, secure and legal travel throughout the world. thank you again for the opportunity to appear before you today. i'm happy to answer any questions you may have. >> thank you very much, mr. sprague. mr. sprague. thatcher never get jesus mr. bray for his testimony. >> thank you, chairman miller, ranking member jackson lee and
10:00 pm
distinguished members of the subcommittee. it is an honor to be today to provide you with an overview of interpol stole the lost travel document database or sltd. dashing stl p. before this i'd like to echo the previous statement of the pen regarding the tragedies there's a malaysia airlines flight 370. our thoughts and prayers remain with the families and loved ones of the flight passenger and crew. this incident servicers to underscore the need for coordination and collaboration across international borders great a safer, more secure world for us all. as you're aware the international criminal police organization commonly known as interpol is the largest police organization in the world. membership is comprised of the national police the first from 190 member companies. all of which participate in the organization on a voluntary basis to interpol exist to ensure and promote the widest possible you to assistance between these police authorities. in order to achieve this high level of cooperation each interpol never should country is required to establish and
10:01 pm
maintain a national central bureau. interval washington is that national central bureau for the united states. a component of the department of justice were unique in that we are also omitted by the department of homeland security. enough for six year of operation interpol washington is or but a multisector workforce consisting of a full-time staff from the department of justice and an additional senior personnel represent more than 30 years law enforcement agencies. simply stated our mission is to visit the international police cooperation, communication and investigations through interpol on behalf of the united states. we support and heavily utilize interpol's database and resources, it's global, secure global complete situation in the i-20 47 and what to publish this nation. it is the it would force him that connects the uc berkeley with interpol which with resources but also correctly with our 189 other member country partners. the use of its databases are governed by interpol tools in the processing of data. it is these rules allow interpol
10:02 pm
washington to extend the service and data including sltd to u.s. law enforcement. in accordance with our internal information sharing session interpol washington is next and the ability to query sltd to all authorities to existing u.s. law enforcement data systems. the sltd itself is essentially a search of a positive stolen and lost passport, visa and attended document information designed to prevent illicit international travel and false impersonation by criminals and terrorists. a query against the database to which there' there is a naturalt in the return of only information about the suspect document itself but will not include personally identifiable information about the document holder. although stronger encouraged by interpol, participation in sltd is voluntary and does very country by country the u.s. has embraced as a pd in its efforts as the critical point of its persecuting and transportation strategy.
10:03 pm
in the united states the bureau of consular affairs at the department of state as a designated target and source for the stove and lost passport data that is popular into the stove and last travel database. the u.s. making over 39th of the more than 49 records contained in the sltd. u.s. participation in sltd is managed at interpol washington by our operations and command center. working on a 24 by seven basis recorded the entry of that data into the u.s. passport data into the sltd, and also verify and result in matches against the database by either for or domestic authorities. in 2013, u.s. law enforcement border security and council authorities already sop in more than 238 million times. accounted for proximate 30% of all query activity worldwide. these queries result in more than 25,000 matches against the database, the of 100 of which were resolved administratively. small number of these hits, however, represent a series
10:04 pm
potential concern and were referred to appropriate law enforcement authorities for further investigation. as you can see, interpol washington is aggressively pursued the use of sltd to enhance and support on national security investigation. we will also continue to explore additional applications for sobt to further assist our law enforcement can be to ensure the safety of the american people. chairman miller, ranking member jackson lee, and distinguished of the subcommittee i appreciate the opportunity to testify about our role and support program and i've be pleased at any questions you have at this time. >> thank you very much, nestled appreciate all of the witnesses your it's been very, very informative. i think they're interesting issue and something that i think the united states congress needs to be looking at a bit more. because really the purpose of this hearing, first of all, we have a great story to tell, as has been mentioned here this money. the united states has a great story to tell about how significantly we have ratcheted
10:05 pm
up our security, our document security, et cetera, for our american citizens, particularly flying domestically here since 9/11. it really is a remarkable achievement by our nation i think. and so i think, i want to make sure that our united states systems do recognize and take a high degree can't have high degree of confidence and comfort level in the fact of what is happening with our various government agencies when our citizens are traveling domestically here. but as we are very aware now, and i think the american citizens are much more aware, because of the tragic of the malaysian flight 370, that if you are an american citizen and you are traveling internationally, particularly from one international country to another, they don't have the same type of security with their data documentation that we do. and suppose we know that, but
10:06 pm
yet we need to look at what types of things we could do perhaps to incentivize others to improve a bit, particularly when they see in the malaysian flight 370 there were american citizens traveling on that aircraft. and so since that has happened, the world continues to search for that flight, we decided to have this hearing this morning really to look into this issue a bit and explore what kinds of options we might have. and certainly one that comes to mind immediately and has been mentioned here of course extensively, and there's a testament today in our opening comments, both myself and the ranking member, i mean, we have 38 countries, a list of 38 countries that do, these are our friends. these are our allies, these nations that are under the visa free travel, the vwp program.
10:07 pm
and this is a program that the united states started back in the '80s really as a way to expedite travel from our allied countries into the united states and for tourism, for commerce, et cetera. and since 9/11 we have had great success with them. certainly checking, or giving us information, if there is a lost or stolen passport. so that is all good. however, it is interesting and it really comes like i think because of the malaysian flight that these same countries are not really checking as they could for the potential stolen or lost passport under database when people are getting on their flights. and so again these are other nations, and i think the united
10:08 pm
states obviously they are our friends, allies consider but we do this particular program with them, and i'm just wondering, i mentioned in my opening statement, it's my intention we are looking at introducing legislation that would require them as a participant in this program to really not only just regulate submit information on lost and stolen passports, but really for these countries also to routinely check the database for passengers who are boarding these flights. and i mean, you look at the list of the countries here. as i say, these are our friends and allies, closest allies in the world. look at france and germany and greece, ireland, italy, et cetera. this information is available, and in some ways it would seem to me that many of these countries don't need to incentivize by the united states. perhaps they will start doing it on their own at what has come to light with malaysia's flight. i guess i would throw the
10:09 pm
question out, maybe start with mr. bersin. what is your thought about actually legislation about something like that and what you think would be the reaction of our allied countries for something like that? would they consider it an intrusion? what would you you about the on something like that? >> madam chair, so of course you recognize that pending the submission of legislation this is, which the department would have a formal review process, this is in good faith response to your -- >> at i appreciate that. there has not been legislation introduced by as i said it is my intent to do so. >> is looking at. >> is looking at the what and which visa waiver countries operate now, we do require them to pipe of the database so that every time someone comes -- populate -- on the way to the united states we have been queried the database, maintained by interpol operate as
10:10 pm
ms. sprague indicated and find lost and stolen documents, and the number is great because of the requirement. also when you get on a foreign airline and they come, someone is coming on a foreign airline from those countries, we get the same benefit because the advanced passenger information requirement of games to any flight from any country, whether visa waiver or else coming to the united states. the question you raised which is whether as a condition of protecting into visa waiver program they ought to be compelled to scream against the database with regard to all flights, regardless of whether the coming towards us are going elsewhere, poses an interesting policy question. it does address the issue that we see highlighted by malaysian airline or flight 370 and the two iranians using the lost or stolen passport issued in italy
10:11 pm
and austria. is a legitimate issue. i believe though that we are going to have to assess whether of all the things that we would require that do not have a direct impact on us, whether that would be one of them, i think it's an open question. ..
10:12 pm
ct do that. some of them do it in a varying degrees and then the ability to run that data against the different databases that are there for that government to access becomes a technology and resource issue for a lot of the governments to do. in the cases where we've had our closest partners develop these types of systems we've also brokered some arrangements to help them targeted information and help them review it and exchange information and located personnel on the ground to work with their authorities to help them adjudicate a lot of the manifests. we have officers in camelot and mexico. it's an extension of the advisory program. but we can work with travelers moving towards the government to identify travelers in the countries to help them identify that. we've had some success with
10:13 pm
stolen documents entering pamelor in mexico to do that so people continue to push certain countries to expand on those really on those capabilities. >> following up with mr. wagner because it was in your testimony or one of you that testified at the cbp was going to be just starting a screening for lost in the store when passports and i know you've been doing that on the in-bomb flights. can you tell us what we are doing and why we are doing that and how it advantages us from the security risk standpoint? >> we get 100% of the passengers departing the united states manifests. historically we have screened them for some of our top threats that we face the terrorist screening, no-fly hit with some of the targeting and analysis. we've recently added to the lost
10:14 pm
and stolen database to the manifests and screaming. we are looking now i want to see 60 to 80 hits a day total. we are looking to program the systems to be able to see if we can administratively reconcile so we are not chasing down administrative actions. the old database person is interred. as we've seen on the inbound the majority are reconciled in the administrative manner cause they have a replacement document and they lost and found the document so we see ways we can help them pinpoint the ones that are with qualified intent and depart the u.s. on the stove and document.
10:15 pm
and we are working to see if they can build and prohibiting printing the boarding pass when they get the hits to reconcile the information and respond. it is properly credentialed the person leverages a lot of that as well. even though we are talking about peace and passports activity i think interpol is an interesting organization and you mentioned all of the members countries. for instance if you had germany got on an aircraft flying into the united states would they be
10:16 pm
sharing that information with us? not just other threats. so i understand how the information sharing works in the organization. >> it can be received from germany and other countries. we routinely receive information regarding traveling sex offenders from a generally registered offenders in many countries that have a registry for that but for the countries that may be notifying us. we communicate that information immediately to the determination can bthatdetermination can be me disability in the united states but that's one story. there is information regarding criminals, terrorists that are chain-smoking on a daily basis.
10:17 pm
at the command center is 24 by seven, 365 s 365 so they procesd over 30,000 messages to and from the law enforcement community. this is the work we do every day into vs ltd has been a component of the work we do to enhance u.s. security. as we spoke about it is a department of justice concern. there are no officers there. it is law enforcement and tools to help us overcome linguistic and sometimes cheap traffic barriers with other foreign countries. as you said it's been a success story we will be able to build upon in the future.
10:18 pm
>> as indicated that we can receive information on the criminal records and in fact it is the vehicle that they can communicate and there are sex offender registered but that information was not come unless there is a specific case or law enforcement inquiry. unless that sex offender or murderer unless that record is in the fbi database we had no routine insight into what is in the data records of other countries. that's the issue. if there is a specific case or inquiry they would receive that information but the point is it's not a routine data exchange
10:19 pm
because we don't have routine access to german criminal records anymor any more than the routine access unless there is a case towards the criminal records. >> of the subcommittee and the full committee is interested in pursuing legislation in regards to biometrics etc. and that is the only sure fire wa surefire f verifying somebody's identity in this case we are only talking about foreign travelers into the united states. they are an important tool for something like that perhaps from the department. do we have a comment on that? >> i would never pretend to be an expert but as you know they provide ten fingerprints and of course those can be verified at
10:20 pm
the entry so the most reliable biometric accepted his fingerprints and they are already collected. >> one of the requirement requit congress imposed is that we enter into something called the preventing and combating serious crime agreements. there's also a national security agreement that's required that would facilitate the exchange of information and we do have with the 38 countries in agreement and in fact with some countries that are not members we have those agreements. but we are at the very dawn of creating the exchange and one of them is biometric we can inquiry each other's fingerprint
10:21 pm
databases and if ther there's ad light alert to call the police authority to say what is that about. >> certainly the information is power. such a critical component of the security that we appreciate that and the chair recognizes the ranking member. >> let me thank the chairwoman and the witnesses again. in my opening statement i mentioned it to individuals and i'm going to mention them again because in the present circumstances of the malaysian flight 370, the investigation
10:22 pm
initially has not pointed to the individuals having criminal intent to bring the plane down. what is attributed to these individuals in false passports is a benign but important issue of a desperation added that the bike drop and 50 and sympathy. i don't want that determination to cloud how serious this hearing is and how crucial that we have a construct that will let the world know this is a very serious issue and the witnesses already know that in actuality he was convicted of masterminding not just a traveling soldier standing by the wayside about masterminding the world trade center bombing
10:23 pm
and many have made note of the fact that it's something that didn't wake america up. it was so unusual we didn't attribute it to the beginning change in the psyche of those that want to do america harm but he was traveling internationally on a stolen passport and of the widothewidow that is now wantedn kenya is linked to fraudulent passport. we must leave here with the idea that solutions are possible and i would like to put on the record that interpol has taken note travelers have boarded flights more than 1 billion times without having their passports checked against the
10:24 pm
lost travel documents. that is very much a wake-up call so i would ask you what impediments with respect to technology privacy concerns that are blocking or keeping countries and what is your view of how the u.s. might be able to be hopeful to these countries? you are correct with the observation on the 1 billion -- >> that is a large number. >> very large. you indicate some of the difficulties the countries have. these include not only resource free strains in terms of lacking the money and priority of a budget decision. it also involves the lack of technological know-how to set up the kind of sophisticated information technology systems
10:25 pm
that are required to create this kind of automated checking. it also involves as you indicated the invisible requirements or constraints of privacy and the lack of coordination between immigration authorities and police authorities of the provincial levels in foreign countries. all of those together within institutional, create an institutional capacity to operate the kind of automated vending systems that we have. having said that, we have to have a strategy with regard to those countries that are critical to our security to ensure at the very least they populate the stolen and lost travel document database. the important requirement for us in the near term is that we have the data to be able to see who may be traveling to the united
10:26 pm
states. the second requirement is to figure out again based on flow of passengers what strategic capacity building efforts we ought to engage in to help countries build up the kind of technological and capital requirements to build up the systems and while we do that, to some extent we don't, for example, at the department of homeland security have capacity buildinbuilding fund and fundine sector funding in which to do that. so when we go out to do that they grant from the state department or the defense department we have to do that so-called aldehyde which we regularly do. >> that you have no budget line items that would allow you to dip into the funds and be engaged in that kind of capacity building? >> that's correct.
10:27 pm
>> when the secretary went to visit with countries dealing with tsa responsibilities in foreign countries, what outreach was that? >> with regard to tsa because of the responsibilities for the screening and airport security has a limited separate line budget with regards to providing technical assistance on airport security no other component to my knowledge has a separate line item that would permit the kind of capacity building. >> let me quickly pursue this very briefly. you said that despite the fact they work to incorporate recommendations on response times and the standard operating procedure they do not require member countries to implement
10:28 pm
them. do you have recommendations on this? >> as i said in response to the chairs question requiring other countries to screen the database is an issue we need to debate but populating it has a direct and immediate impact on our security so if we go down that route and mandates or capacity building efforts i would focus on getting data into the database that we could screen. whether we could cooperate with interpol and other organizations such as the civil aviation organization is one we also need to explore as we move forward.
10:29 pm
>> but there is a question with mr. wagner. cbp has screamed arriving passengers. you haven't screamed departing pax to the passengers i think you started after malaysia 370. mr. bersin said he doesn't believe any other agency have capacity building. i need a yes or no on that and then whether this indicates our ability in the human trafficking issue because i would imagine that that is also a possibility for individuals being smuggled todathey may be on a fraudulent passport as well but the question is you just started
10:30 pm
giving the exiting passengers. why haven't you done it and then what about the impact getting our hands around the passports on human smuggling? >> we've recently added to the lost and stolen documents to the outbound manifest screening that we do. we will focus primarily on the terrorist screening database is and other types of national security. but we will call out some of the administrative heads. >> we will be working to come up with a better -- >> do you believe in issues dealing with human smuggling and trafficking? >> and assuring people that are properly credentialed. as far as the capacity building i don't think we have a line item for it but we do put a lot of resources into doing that and
10:31 pm
work with the department of state to fund those activities and like i mentioned before helping the governments build these advanced passenger information systems to get the manifests, to do the targeting and analysis and helping ex- change that information is critical to a lot of our priorities. i have questions i will put in the record and ask for a response from the committee and i will ask about how you discern the possible hits but do you do if a possible hit is discerned. now the chair recognizes the gentleman from mississippi. >> in an effort to share information to the passports as a criteria in the visa waiver
10:32 pm
program countries must sign agreements with united states regarding the sharing of lost and stolen passports. through participation in the program that nations have agreed to share the lost and stolen passport information. doctor bersin, do the countries routinely share information on lost and stolen passports in interpol backs >> yesterday due into there was regular checking that we do to see that that requirement is met that would be a preview of how many entries have been made by the countries and if th that problem arises we will remedy that. >> are there any countries that are noncompliant? >> at this time no and asked several of us noteasseveral of e testimony of the 40 million records 96% of them come from
10:33 pm
the visa waiver countries or aspiring in which the requirement to populate the database is set. >> if the country becomes noncompliant what actions would you take? >> first would be the communication between the program office working with the components on hsi to point out the deficit and overtime we haven't met the situation yet but there would be the authority of the secretary's office with secretary johnson to take steps to see that that effort was enforced in the law. >> we haven't had this instance happened yet. what would be a realistic amount
10:34 pm
of time, three months or six months quick >> because of the importance to the security vetting we wouldn't want that to be an extended period of time. i know everybody seems to be in compliance right now but is there a hurdle to providing the information you hear from the partner nations? >> with regards to the visa as the chair pointed out at the outset of these are the closest allies in the country with whom we share the most experienced that have developed sophisticated information systems operating through, so with regard to the countries we have the infrastructure in place. >> as a result of the requirement to you think the
10:35 pm
sharing has been increased into the program has been successful? >> i appreciate you can be named this hearing and exploring the legislative options so soon after the vulnerabilities have been exposed and appreciate the testimony that we've heard from the experts today and want to thank mr. wagner and mr. bersin for the response and the outbound passengers from the u.s. in light of the flight 370 tragedy and everything else that you described but to build upon something the ranking member has asked about the capacity building with other countries around the world you responded that there is not a line item
10:36 pm
currently but can you talk a little bit more starting with mr. bersin and continue with mr. wagner about funding the capacity and efforts into the second question you may also want to address in the same way that we are exploring the legislative options in the fixes you've already put in place maybe talk about what other countries have done over the last three weeks so if you would start. >> starting with the second question in the aftermath of the interpol statements come of secretary general ronald noble
10:37 pm
has been publicizing the issue and countries around have taken note of the problem and while it's too soon to say that it's resulted in changes it has created an awareness that didn't exist before and i think we will be seeing different countries within the constraints of the systems and cultures into the wall taking action and we should continue to encourage the populating database and also the screening. with regards to capacity building there are instances in which they have received state department grants through programs to help countries build the capacity. my point is it's always on a grand basis and there is no long-term capacity building line item to say we are going to do this and encourage all of the countries in north america from colombia or pinnacle to build a
10:38 pm
system so that any time someone comes into the north american aerospace or port we would have insight who is on those planes. to do that would take a large budget. mr. wagner is in a better position to give the experience and can allow anin panama all ad others but the larger vision is that over the next ten years while we cannot build the measures we built here we can put a minimally required satisfactory system in place from ten of all to the arctic but that would take it budget appropriation and i was us. >> i would think every country and every person in the world that gets on an airplane has a
10:39 pm
shared interest so we have the allies we've already described. the uk is already pursuing this but we also have countries like iran who have safety concerns. is there any way we can provide resources or encourage others especially wealthy countries to share the burden to make sure everyone is participating? i would love to find from you or mr. wagner what the cost is so we know what we are talking about. do you have a thought on this? >> we did work with mexico and panama on and the caribbean to help these countries with their authorities into the internal laws and regulations to complex of the manifest information to help fund them in the systems to actually go through and screamed
10:40 pm
that information and we have our personnel with this to share what we can so there's work to do with other developing develog countries and then there's also the developed world getting our allies to take like approaches to how we do this and you will find very degrees of capacities and authorities and privacy issues that it's a consistent message that all of our allies should be doing it in a similar fashion. >> as a follow-up to today's hearing what you be able to come up with a ballpark figure and share that with the committee so we understand and maybe on the past experiences with other countries what it would take to fund the necessary capacity
10:41 pm
locally, not that the united states needs to bear that burden on its own, but just so we know what that number is it so that is the basis for engaging other countries that might give to fund that's because it's in everyone's interest. >> she described this in finer detail. there is an infrastructure background. there is one single that connects the 190 countries have interpol and it's the beginning of the kind of system that you're talking about but perhaps he can explain what the system is and why it is a potential link in the area that you're exploring. >> we have notes in about five minutes. >> it is the backbone that connects the countries to not only interpol and resource databases to each other and the
10:42 pm
ability otothe ability of the co utilize this is centered upon its bureaus of the national central bureau becomes the cornerstone for making sure that the utilities tools are available. >> with that said the u.s. has been supportive of the interpol membership in the community specifically in central america. we helped install sites at specialized police units but also border control points as well. we are continue to work prior to the airline disaster we've been working with counterparts in mexico and other countries in the caribbean as well to determine how we can better and most effectively assist them in fully realizing how the utilities and tools may be better serviced in their countries. and we will obviously work with interpol to determine how we can best come up with a global strategy for engaging countries
10:43 pm
sharing best practices and lessons learned from this process. it's been a process for the united states, one that's taken time to develop and we need other countries to ramp up as quickly as possible. >> recognize the gentleman from california. first the ranking member has a comment. >> i want to put on the record thank you for your leadership on this issue and a lighter that you joined on into this isn't taking your time but i hope you will submit -- i would like to submit the letter for the record. again thank you for your leadership. >> thinthank you madam chair for allowing me to participate and the ranking member for supporting that request. and as others have stated, my prayers and wishes go out to the families of malaysia flight 370.
10:44 pm
but as we have often learned from aviation disasters, if there is any hope that has come out of it it is that we learn a lot about our own security and how to make passenger safety much better and i also want to note int if the chair miller submitted a letter to the department of homeland security and we appreciate the response that we received. and with senator schumer to create this s. ltd database if they don't we simply won't issue than these us and i hope i can work with the chair and the ranking member on such legislation. mr. bersin from you we would've
10:45 pm
to north america's concern as well because i believe the country we should principally be tracking our ones who have airports near our borders. for example, and my colleagues district she has mexico which has a large international airport and in san diego you have to yell on a just to the south and washington state you have vancouver and of course new york montréal and toronto are not far. my question is what degree are the bordering countries to the north and south, canada and mexico and of course in the hemisphere and a law and other countries, what percentage of passengers are being screened against the database traveling in and out of those countries? >> with regards to mexico, the
10:46 pm
figure mr. wagner can confirm what the 100% in terms of people entering mexico and could cross the border and come into the united states. with regard to canada, the canadians are fully cooperative with us and they screamed. we are in discussion with them about the full screening debut for their own citizens and as a result of this incident we will see a complete screening from the neighbors to the north. >> does that mean a flight originated in venezuela and landed in mexico 100% of the passengers with a check? >> that's great with regards to the stolen and lost travel document database. >> suppose a flight originating from germany and coming to vancouver, 1100% be checked? >> with regards to against the
10:47 pm
canadian database, yes and against the s. ltd when there is a secondary inspection there would be a check and as i say we are engaged in canada is engaged in to see what it could do to complete the cycle. with regard to the point on north america the reason i focus is that it's not just the neighboring airports such as far as and el paso, san diego, but it's people coming from outside the atmosphere into central america for example and traveling overland to the border so it's important for us to actually look at this as a continental problem, not a national one and i think president obama in the own the border action plan with the prime minister and canada
10:48 pm
recognizing perimeter security as a critical issue and our colleagues and partners share this notion. >> we are beginning to learn about check it whic such as a purchase program with interpol. what is the participation of u.s. airlines and hotels and other tourism companies right now as far as checking passports against the database as a point of purchase rather than 72 hours before the flight? and i'm just talking about the united states. >> i believe that all passports are being screened not by the airlines necessarily at the
10:49 pm
plaintiff purchased but by cbp and domestic purchases is what we are referring to. >> but i check a program intended to have cooperation with the vendors, right? the airlines and hotels. >> right. the relationship, the public-private relationship exists in the u.s. for some time and has a better fact it's a model for the world. it's one that we have taken to interpol and the ie check if working group is in a developmental stage. interpol is beginning to look at how to balance requirements into the concerns of 190 companies with a public-private partnership. having said that, the models that have been rolled out have been with hotels and they have seen success. they are now looking specifically at following the malaysian airline disaster at the transportation sector.
10:50 pm
>> is every purchase in the united states to travel outside or every purchase out of the united states to travel in the united states checked against the database at the point of purchase or closer to the departure or arrival? >> this will be the final question. >> when the tickets are purchased and checked out the counter. >> 100%? >> inbound flights to the u.s. yes. >> i want to thank the witnesses for being here. i think all of us have additional questions, so i would invite you all to separate those for the witnesses and we will ask for a written response to the questions and again i appreciate you coming on short notice. we convened this hearing i had an idea and convened it pretty quickly particularly for helping us move on capitol hill.
10:51 pm
so we appreciate the witnesses coming this morning and in person went to the role that record will be open for seven days and without objection the committee stands adjourned. thanks again. >> thursday morning, secretary of state john kerry talked about the ongoing middle east peace negotiations. he called for palestinian president mahmoud abbas and israeli prime ministers benjamin
10:52 pm
netanyahu to not abandon the talks. the white house press secretary built on his remarks. here is a portion of the briefing. clear, this is the current phase of the -- is the current phase of the middle east peace process over? >> no. what i would say is we have reached a place, and secretary kerry spoke to this earlier in morocco, we have reached a place where it is time for a reality check. it is time for the israeli leaders and the leaders of the palestinian people to spend some time considering their options at this point. observes there is a limited amount of time and resources that can be dedicated by the united states of america to an effort by this. the reason there are limits, beyond the obvious limits of time and physical space, is there are a range of challenges
10:53 pm
on our plate. >> was there a single instance that pushed talks over the edge? >> i would not characterize it as a single incident. steps taken by countries on both sides of this issue have been unhelpful, have contributed to at least some degradation of the trust that has been built up through the course of these talks over the last couple months. >> is the release of jonathan pollard still on the table? >> we described earlier, the reason the release of jonathan pollard was on the table is because this is something the israeli government regularly raises with the u.s. government. it is still true the president has not made any decision about mr. pollard. he was tried and convicted of very serious crimes, and is serving a serious sentence. >> next, house majority leader eric cantor of virginia and minority whip steny hoyer of maryland.
10:54 pm
they took a look at next week's schedule for the u.s. house. this is about 20 minutes. >> what brings the gentleman from maryland to seek recognition? >> the purpose of inquiring of the majority leader the schedule for the week to come. >> without objection. >> i am now pleased to yield to mr. cantor, the majority leader. >> i thank the gentleman from maryland, the democratic whip, for yielding. on monday the house will meet at noon for morning hour and 2:00 p.m. for more -- business. votes are posed owned until 6:30 p.m. tuesday and thursday -- wednesday, the house will meet. thursday, the house will meet at 9:00 a.m. for legislative business. last votes are expected no later than 3:00 p.m. on friday no votes are expected. the house will consider a complete list that will be
10:55 pm
announced. in addition, the house will consider three bills from the budget committee. the first, hr 1871, authored by representative bob woodall, would require cbo and omb to assume the baseline does not increase or decrease for discretionary spending. this practice added $1.2 trillion to the baseline in 2013. the second bill ,hr 1872, the budget transparency act written by representative scott garrett, brings off-budget programs on budget to provide more accurate accounting of the programs. finally, the house will consider and pass the budget resolution on time for a fourth consecutive year. the republican budget under the leadership of chairman paul ryan and budget committee members will adhere to agreed upon spending limits and balance in 10 years, as we did last year,
10:56 pm
increase economic growth and job creation, create opportunity, lessen the middle class squeeze, cut wasteful government spending, and strengthen our entitlement programs. with that, i yield back. >> i thank the gentleman for that information. it is wonderful news that budget will do all those things. that the budget is coming forward. we may not be pleased with the budget, but we are pleased it is coming forward. as the gentleman knows, we have already had the budget levels for fiscal year 15. you indicate it will adhere to the ryan-murray agreement. i assume that also means it will adhere to the firewall division between defense and nondefense discretionary spending as well. is that accurate? >> for this fiscal year, he is correct. >> i thank the gentleman for that information. i tell my friend the majority leader, the "wall street journal" had an editorial.
10:57 pm
i disagreed with the first 15 paragraphs, but i did agree with the last paragraph. it said, the ryan outline does the service of showing the policy direct and in which republicans will head if they regain control of the senate next year. it goes on to say, senate democrats do not want to declare themselves, but they favor higher taxes and more spending on anything other than defense. voters will have to decide on the direction they want congress to go. mr. leader, as i said, we welcome debate on this budget. we do believe that it expresses the priorities of your party, and as you know, we differ with those priorities in many instances, so i think the american people will get a spirited, informative, and educational debate on the ryan budget, and i think that will do
10:58 pm
much to inform them of the priorities of both parties. as i say, we look forward to that budget. unemployment insurance, mr. leader, is being considered on the senate floor. i am not sure whether -- i know the cloture vote has been taken. i do not know if the final passage has been taken. does the gentleman have any expectation that if the senate passes that bill, either today or -- well, today, whether or not that bill might be on the floor next week? i yield to my friend. >> i thank the gentleman for yielding. first i would ask the gentleman just to refer to a letter by the national association of state workforce agencies dated march 19, to the majority and minority leader in the other body. this letter lays out the case for why the bill is unworkable.
10:59 pm
again, these are folks in the business of administering these programs. i would also say to the gentleman, i think the gentleman knows our position on that bill. it does not create any jobs, and right now we are in the business of trying to see how we can get people back to work when america works for more people. i would say to the gentleman, i look forward to joining him and focusing on that. i yield back. >> i think the gentleman for his comments. i'm informed by the ranking member of the ways and means committee that we also have a letter from the secretary of labor or one of the people who works with him indicating that they believe this would be workable, but very frankly notwithstanding the letters, let me ask the majority leader, mr. speaker, if in fact we made a perspective, that would clearly be workable, made it five months prospectively rather than three and a half months
11:00 pm
retrospectively and 1.5 months prospectively, through may 30. would that the an acceptable alternative, mr. majority leader? >> we want to provide a better environment for businesses to hire folks. folks that are chronically unemployed to access the skills necessary to build the job openings today. notsure his district, unlike mine, there are a lot of job openings that are left open because the workforce does not have access to proper training and skills. i look forward to joining with the gentleman and looking towards the future to how we can help those who are out of work get a job. i yield back.