tv Key Capitol Hill Hearings CSPAN April 5, 2014 5:00am-7:01am EDT
5:00 am
i believe it was her driver's license and social security number, to this open fax line. she asked, do i put it to your attention? >> i would hope not. there is a fulfillment center. they have an approach to secure personal information. we have to verify things like whether people are able to purchase coverage under the law. >> are people who are privy to
5:01 am
that fax machine? -- that did?dded >> yes you can. >> described that for me. >> we work with maximus which is a company that covers personal information. they work in medicaid and many states. they are a very big company that has tough policies. they do it in a bunch of states. >> the final question i have is the number of enrollees. as a part of your measurement of the success of your exchanges,
5:02 am
do you have a cost per enrollee? $100ryland has spent . ision to build the website that right? about $2000 per enrollee? >> we have enrolled 295,000 people. years look over several -- this is how to get coverage. >> they previously had coverage. >> the vast majority of them did not. these are people who have gained coverage since january 1. >> the individual market is
5:03 am
getting access to insurance. isn't it not a fair measurement? they could have had access previously. >> no. they couldn't. the vast majority of people in maryland like single adults did not have coverage. .ow they have coverage gr single adults did not have medicaid coverage. >> i don't object to my colleague having extra time. i disorder make sure that equal time is granted. i just want to the record to show. >> if the gentleman was here to see mr. cummings, i am being
5:04 am
less greedy with the time. mr. cummings was appropriately useful with his time. >> with the gentleman yield? >> i used the exact amount of time. back.ill yield but to chairman it, thank you for your generosity. i was not objecting. i was trying to make sure that the minority was given equal time. >> i am going to do some thing out of order. you have been seated for two and a half hours.
5:05 am
5:06 am
activities. the budget includes $45.6 billion for intelligence programs. here are the opening statements. the rest of the hearing was hot held behind closed doors. this is 30 minutes. >> today is the first of to events the subcommittee is hosting related to the defense intelligence budget. from theear undersecretary for defense. will hold a second session with senior intelligence officers of each of the military services as well as special operations command.
5:07 am
ourocus on making sure that war fighters have the best possible intelligence support. we are support combat agencies. their them to describe efforts to support military operations and help the dod anticipate future conflicts. each of these agencies is part of the intelligence community and has responsibilities to the government and the department of defense. bothis a delicate balance. missions are could go to our nation. we have been presented with numerous challenges. this is the current crisis in ukraine or terrorist groups or mitigating serious compromise of classified information, intelligence and the protection of it continues to be one of the most important parts of our national defense. i will yield to the
5:08 am
distinguished ranking member for any opening comments he would like to make. >> i want to thank our witnesses for being here today. i want to organize jim thornberry for organizing this important hearing. i hope the discussion will be productive and constructive as we continue to exercise oversight responsibility. first and foremost, i am concerned about the implications to the apartment from the leaks of the nsa contractor. information. assessmentssential and a very sobering one indeed. i want to get a better idea of what we know now and what we
5:09 am
don't know and what we are going to do about it. as dni clapper testified, this has nothing to do with nsa surveillance or collection but instead has dire impact on dod. i am concerned about the damage of the leaks on our men and women in uniform who are at risk each day. just as important, we certainly don't need to scrap every operation plan. shiftingdue to look at the priorities and policies. i appreciates picking to the magnitude of what we will face in the coming years. i am also interested in the progress of the clandestine service and its ability to meet strategic defense priorities. clandestine service
5:10 am
but it hasto the, enhanced capabilities and we are looking forward to an update on that. there have been growing pains. continuee the dod must to have a clandestine unit. that is a challenge in the intelligence community. how are we improving our capabilities and refining the requirements moving officers where they can be most effective and integrating and coordinating with others in the intelligence community. money budget perspective, of the budget is given back largely to the services. -- this putsge strain on agencies like yours.
5:11 am
as your partners on the hill, we want to avoid the breaking point and manage your risk wherever possible. ofwant to enjoy the benefits other parts of the department that would impair your activities. hearing, i like to discuss the overall defense strategy. with the department looks out over the next decade, is the apparatus postured to meet our priorities? is it correctly aligned to cover the globe and operate where we need to sustain our counterterrorism operation? i want to thank you for holding these important hearings. thank you again to our witnesses and your service to the nation. forward to a continued
5:12 am
and productive relationship to ensure the best intelligence posture for the nation. >> thank you joan. >> i want to thank -- welcome our witnesses. we will start with unclassified opening statements from each of our witnesses and then reconvene in a classified setting next door where each witness will then be able to make lassa fied remarks followed by questions. dr. vickers. i appreciate the opportunity to come before you today and year 2015e fiscal
5:13 am
budget request for defense and intelligence. i am pleased to be here with mike tesh and rick. we testified yesterday before the subcommittee. while the unclassified nature of our opening remarks keep us from discussing in detail many aspects of intelligence, we look forward to meeting in private and discussing more fully. givesorms policy and precision operation. it is our frontline of defense. the challenges we face are increasing and becoming more complex and our resources are declining. we miss to make the best use of resources given the challenges we confront. as the u.s. the i and the program executive and have oversight over the programs that
5:14 am
constitute so we call the battle space portfolio. bass boat request for creations is $13.3 billion, this does not include contingency funds overseas. it includes significant resources. defense intelligence collectively encompasses the defense portion of the national intelligence program and the ba portfolio. by close relationship with to workallows us seamlessly and manage resource and apply our intelligence capabilities in pursuit of our national security objectives. defensefive intelligence priorities. counteringterrorism, the proliferation of wmd and delivery systems, countering oppressive governments against their people such as in syria,
5:15 am
state on state aggression, and countering. the gaps in these priority areas, we are enhancing intelligence capabilities in five areas. enhancing lobo coverage, improving our ability to operate and anti-access aerial environment, sustaining counterterrorism, continuing to develop our cyber operation capability, and strengthening our counterintelligence capabilities and reforming our security clearance ross us to minimize insider threats. all four of us are committed to working with the congress to find the best way to continue to deliver intelligence advantage to our nation and our war fighters. thank you for the opportunity to address the subcommittee today i turned to my colleagues.
5:16 am
chairman thornberry, members of the subcommittee, i what to say thank you for your invitation to present our budget request. let me begin by saying i support the priorities under-secretary vickers outline. ourou have heard from generals in their appearances before the committee this year, the need for more intelligence continues to exponentially grow. persistent crisis of the middle east and developments in crimea and central africa and asia-pacific underscore the constant drumbeat for more war and specialized understanding and insight into the countless threats around the world. both you and i have a responsibility to our men and women to make sure smart decisions are made and take risk
5:17 am
where we must and maintain investments which will ensure our security into the future. dia has made significant changes to manage risk and ensure we will meet the increased operational needs and strategic challenges that threaten our military advantage. during my testimony this morning, i will highlight for priorities in a request. intelligence collection operation, analysis, investment in our workforce for professional the moment, and how we have reshaped much of our business practices and processes. first, ensuring the success of the defense by dustin services a priority not only of the dia but also the defense department and intelligence community as a whole. us which arehelped as a human intelligence capability and make progress in support of all defense.
5:18 am
we've experienced a marked increase in performance. in terms of counterintelligence, this is a critical investment. thatt events remind us things can come in a accessible cost. investments create holistic fortegies counterintelligence and increases network monitoring and improves insider threat identification and fortifies a security conscious culture in our workforce. analysis is the core mission of dia. it is one of the largest portions of our budget. we are implementing new solutions to implement global coverage. we are forging closer ties with combat and command operations. our integrated centers use
5:19 am
analytic and collections work for maximizing support for decision-making answer to the policy. following in the first year of operation, our performance in response to ukraine and the south china sea and sub sahara africa and the ongoing civil war in syria highlight the benefit of multifaceted integration and collaboration as well is a strong combat and command. third, we have increased our forstments in our workforce festal develop the program as well as career broadening experiences. 21 separateted offices into one academy of defense intelligence, this was a cost savings of $3 million. additionally, we have re-emphasized training for our analytic workforce through a new career education program. in terms of career broadening
5:20 am
experiences, we rotated 200 and 25 personnel overseas and plan 320 further integrating the enterprise. to further prepare our workforce for an uncertain future, we have consolidated three of our military reserve offices and over 1200 reservists. the impact of all these changes is already seen an improvement in production and a decrease in theract instructors and number of days we get out of our component. we are taking steps to improve our contracting business process with a strategy. it reduces risk and shortens the livery time by six to nine months and mitigates the too big to fail trap we get into.
5:21 am
we are proud of our work with small businesses very and they generate the original ideas need for the future. small business contracting is less than 25%, we have nearly doubled our investment in small businesses reaching a new high of 31%. every three dollars we invest is invested in small business. youou review our request, will find we made hard choices and the right investments to ensure that our intelligence team is equipped with the right training and technology strengthened by partnerships across the whole government and around the world. we will continue to provide intelligence when ever and where ever required. thank you for your support and we look forward to questions. >> good morning chairman thornberry. thank you for the opportunity to discuss the national geospatial
5:22 am
program. thank you for your continued support to enhance defense intelligence. we are pleased to appear before you with dr. vickers. than 30 years in working in the defense intelligence, the cooperation and collaboration has never been a stronger. thepatial intelligence is analysis of information from a number of unique and highly technical sources that describe and visually depict physical features and geographically referenced activities on earth. we have been enter go in and look terry operations around the world and today it is one of the drivers for intelligence integration. everything in the world is someplace. at some time. provides critical
5:23 am
information to the defense community and military commanders and decision makers and troops in harms way and first responders. our content analysis and services enable mission planning, combat operations, strategic warnings, precision targeting, counterterrorism operation, counter proliferation, gps, and humanitarian assistance and disaster response. nga produces and sustains global aeronautical and maritime information for ella terry flight crews and sailors as well as civil mariners. records onlectronic more than 45,000 airfields and 116 million square miles of ocean and managing data on topographic features worldwide.
5:24 am
without this information, our ships would stay in port, our pilots would not fly, and our ground forces would not leave garrison. the second example is the integrated spatial view of the battle state that we provide. forcentifying capabilities, location, patterns of activity, relationships, and infrastructure around the globe, holdlp commanders emissaries at risk. -- adversaries at risk. we participate in mission planning, execution tom and follow-up. the intelligence we provide every day is critical to the planning and operation of intelligence agencies and military units fighting to protect all americans. in the broadest terms, the vision that drives us is putting
5:25 am
the best geo-in the hands of our servicemen. have new value for war fighters. looking ahead, nga's budget request includes funding for expanding our in linux -- our analytic capabilities. we went to anticipate national security threats. we want to have a skilled and diverse workforce. these investments are aligned with the number of long-term strategic initiatives that nga is pursuing to improve our contribution to the war fighter and the intelligence committee as a whole. we provide better access to our tradecraftnhancing
5:26 am
to discover key unknowns hidden in the masses of data. initiativesto these which focus on the long-term we have a the agency, close eye on immediate risks like iran, north korea, china, syria, afghanistan, and counterterrorism operations as well. i want to mention our progress towards financial auditability. we are going under our first full audit. it the result will help us identify areas requiring additional remediation as we move toward our goal of achieving an unqualified opinion of our financial statement. on behalf of the women and men of nga, thank you for your support. thornberry,
5:27 am
distinguished members of the subcommittee, thank you for the opportunity to address you today. on behalf of the national security agency, thank you for support. your support makes it possible for us to provide intelligence and information assurance to our diverse customer set, especially the combat and commanders in harms way. , we will support continue to do all we can to protect the nation and its allies. -- 2015 represents hard choices are addressed in an era of declining budgets. the budget we face will be more complex and present a new set of challenges. advertiseks well give -- adversaries.
5:28 am
to sustainend on nsa our understanding of foreign communication even as encryption becomes more automatic and more prolific. we must support our war fighters and policymakers today while preparing for the future to the development of next-generation capabilities all while protecting imus he ancillaries. budget keeps us on the path to accomplish these goals. we recruited and retrained and a talented workforce. we are leveraging our human capital by providing people with the most ideologically sophisticated and innovative intelligence capabilities. securityt in cyber will expand across the enterprise to meet the demand and speed of action required in today's world. executes threea funding streams.
5:29 am
ccp, the information systems security program, and the military program. let me describe them. ccp and nobles -- enables us to bring the global christological system to bear. our global intelligence infrastructure, and reporting mechanisms have been developed over time and resulted in the successful mission requirements. i look forward to giving nsa has anamples. investment plan for the challenges of getting security solutions they keep pace with fast moving technology sector. we must know that cyberspace and its risks, protecting
5:30 am
information and hardening systems. this ensures the systems will have the required security requirements. they will stand and recover from cyber attacks and intrusions. we are refining our strategies. we provide know how and technology to our suppliers and clients and improve the security of critical operations and information. nsa focuses on the delivery of reliable intelligence to ensure that our deployed forces can succeed in today's operations in a prepared to respond to future threats and technology. to previous investments for surveillance and reconnaissance capabilities. we provide support for art if
5:31 am
lloyd -- support for our deployed forces. nsa will also continue to support a joint tactical system that provides access to targets and use communication infrastructure. toengthening the department address cyber challenges, we will focus on the development of a strong cyber workforce and intelligence gathering in cyberspace. we provide cyber command and support, personal training, and infrastructure. we will invest in research and development of solutions that information.nable
5:32 am
i will conclude by saying that the nsa watch it reflects the necessary balance between today's reality and our commitment to supporting the war fighter. thank you for your support and helping maintain the tape abilities and serve as a key contributor to the protection of our nation. >> thank you all. we will immediately reconvene next door. the meeting stands adjourned.
5:34 am
>> it is a book and art and is handmade. it is more than just the words that are in the book. it is the structure of the book. the paper that is used. text or nore is text. it is all of that. it is amazing. printmaking is one of the places we will visit on book tv. at 430 p.m.. assistant homeland security
5:35 am
says little or no information is given to lost passport databases. he testified before the house homeland security subcommittee. willce miller says she introduce legislation aimed at requiring or countries to share data about lost passports. the subcommittee says this bill would prevent travelers from boarding planes with false documents. it was revealed the two iranians were on the malaysian flight with stolen passports. this is one hour and 25 minutes. >> the committee on homeland security, subcommittee on border and maritime security will come to order. the subcommittee is meeting today to examine the issue of passport security. we're certainly pleased to be joined by mr. alan bersin who
5:36 am
has been with this committee in the past and resort appreciate his attendance her here today. his thesis is negative or international affairs at the department of homeland security. mr. john wagner, excuse me, it's also been before the subcommittee for. we pressure his attendance today. is the deputy assistant director of the u.s. customs and border protection and brenda sprague to as the deputy assistant secretary for passport services at the department of state, and mr. shawn bray was the director of interpol washington. united states national central bureau. i will more formally introduce them in just a moment. but let me recognize myself for an opening statement here this morning. and first of all of course let me start by saying all of us must and prayers are with the families of those killed and wounded at fort hood, a terrible, terrible incident that them in in my ranking member's state of texas. and certainly as we begin the
5:37 am
very to school -- difficult task of what went wrong with be mindful to support the men and women who wear the uniform not only been overseas but certainly when they get, when they return home as well. this morning we're going to be talking about travel document security which is the cornerstone of the united states' effort to secure our homeland, it's integral to pushing our borders out, the building of terrorists and others who seek to do is harm hinges in large part on the building into trouble. if you make are for terrorists to cross our borders without being detected, future acts of terrorism hopefully can be prevented. and i want to begin a committing the department of homeland security of the department of state for the great progress made as we have strengthened the so-called out a ring of border security. today we conduct more vigorous vetting, early in the process. we stationed dhs personnel and high-risk countries to prevent persons of concern from boarding a plane are getting a visa and
5:38 am
where using biometrics to detect visa fraud. and in the past three years is subcommittee has actually held six areas hearings on visa and document security because we sorely understand the importance of the 9/11 commission's recommendations, and one of the conclusions actually as they said that for terrorists, travel documents are as important as weapons. vulnerabilities in our documents security can be exploited by those who would do us harm so we must have robust measures in place to deter and to ultimately detect those traveling on false documents. to that end we would certainly dismayed to from press reports that two of the passengers on the malaysian flight 370 bordered the aircraft using stolen passports, and while of course as been reported we don't have any reason to believe that these individuals were involved in an act of terrorism, it sort highlights the vulnerability in the aviation systems abroad. our thoughts and prayers go out to the families who are still waiting to learn what has
5:39 am
happened to their loved ones and which would hope and pray that that plane will soon be found. in the united states for the work of the department of homeland security, we've made the necessary changes to keep the flying public secure, and the building of passengers to board a flight bound for the united states with known, lost or stolen passport is very, very low. in the years after 2001 the international committee through interpol created a lost and stolen travel document database that is -- send information to a central repository and check against that database to make sure no one could enter a country or board a plane with a known, lost or stolen passport. unfortunately, only three countries in the world routinely check flight manifest against that database. the united states of course, the united kingdom and the united arab emirates. so there is no question that more countries should follow our
5:40 am
lead, otherwise international travelers, including americans who travel internationally, are at risk. according to interpol, in 2013 travelers bordered international flights more than a billion times without having to passport numbers checked against the database. tools are in place to determine if the passport has been reported missing, and we should use every avenue at our disposal to encourage countries to do the right thing, including offering technical assistance where appropriate. in addition to not consistently checking the lost or stolen passport database most countries are not consistently sharing lost and stolen passport information with the interpol database. the overwhelming majority of the 40 million records in the lost and stolen database comes from visa waiver program countries. in large part because it is condition for visa free travel to the united states. however those countries do not routinely check their flight manifest against the database.
5:41 am
and as a result i will be exploring and introducing legislation and legislative solutions to encourage countries within the visa waiver program to do so. because without time reporting of lost or stolen travel documents become straight difficult for cbp through the advanced targeting system to determine if someone is lying on a false document before they present themselves to a customs officer at an airport. if a terrorist is intent to hijack an airplane, it might be duly. and even though the united states has a robust screening in vetting process for travelers, it doesn't mean our work in this area is done. i understand cbp just recently began to check passengers on outbound flights against the lost and stolen database. we certainly are interested in hanging from our witnesses today why that wasn't done before. finally, i want to get an update on the work that the department of homeland security and cbp and the state department, and interpol, done since 9/11 to prevent those with lost, stolen and fraudulent passports from
5:42 am
getting on a plane bound for the united states. while americans should be confident that teach-ins is doing good work vetting all of the appropriate databases, we can and should work with our international partners to strengthen aviation security for americans who travel abroad. this subcommittee stands ready to assist in any way that we can. and the chair would not recognize my ranking member, on the subcommittee, a gently from texas, ms. jackson lee for her opening statement. >> thank you very much, madam chair. good morning to the witnesses. thank you so very much for your presence here today, and thank you again, madam chair, for reminding us as i intended to do of the tragedy that occurred in my home state, my neighbors at fort hood, texas, and to again offer to those men and women who have been brave enough to put on the nation's uniform to fight in faraway places, our deepest concern and sympathy, certainty for the families have lost their
5:43 am
loved ones who, as i indicated, are willing to serve in the united states military, and certainly those who were injured. this is the second time that this tragedy occurred at fort hood, and second time that we've had to embrace those who, as i said, are our neighbors. i mourned with them in 2009 and will continue to do so now. i hope this committee will have an opportunity to address the question of protecting even as this is a military issue, protecting our men and women while they're on domestic soil, and view it as a cause for zero tolerance for these kinds of incidents on the nation's domestic military bases. again, my sympathy do not only the men and women at fort hood and the leadership, but also to the people of the state of texas. this is another tragedy that we
5:44 am
are facing, trying to find solutions, and i would make mention that even as this has gone into many, many days, that we still express our concern for the families of the passengers of malaysia airlines flight 370. i hope that it will not be their final and as there's been no determination as to what occurred to that particular flight. but today i am appreciative that we are holding this hearing as i spoke to the chairwoman in the immediacy of the hours of determining that there were passengers on that flight that have fraudulent passports. survey there have been continuing investigations and whether not we have concluded that there was no connection, we do know that passengers traveled with fraudulent passport. and as well but american citizens were on that flight. while many questions remain unanswered regarding the tragic disappearance of flight 370, we do not know as i indicated what connection those two passengers may have had.
5:45 am
to its demise, if any. to iranian nationals were allowed to come using italian and an australian passport -- posturing passports had been injured in interpol stoler a lost passport database. reports suggest that these individuals were not criminals or terrorists but rather a asylum-seekers hoping to reach your. nevertheless, the fact that at least in certain countries travelers can readily board aircraft using passports that do not belong to them is a cause for concern. if a couple of asylum-seekers can do it, so can terrorists or criminals. and after 9/11 and even in other countries before that, we know that we live in a different territory with different actors and different reasons for their actions. in fact, they are known examples of terrorist comment on fraudulent documents. according to interpol, master money the 1993 world trade
5:46 am
center bombing in new york committed his crimes after traveling internationally on a stolen passport. also the so-called white widow of a london july 2005 suicide bomber is wanted in kenya and currently at large with aliases linked to a fraudulent passport and a passport reported stolen. evidence that this is a problem. it is my understanding that the u.s. is ahead of most of the rest of the when it comes to preventing individual talent a loss, stone or fraudulent doctors. department of homeland security systematically checks all travelers documents against appropriate lost and stolen database. these checks yield results. for example, in fiscal year 2013 u. fiscal year 2013 u.s. customs and border protection, cbp, reviewed 17,710 possible hits against lost and stolen databases resulted in 496 individuals being denied from boarding planes to the u.s.
5:47 am
already in fiscal year 2014, cbp has reviewed 10,806 possible hits resulting in 159 individuals in denied boarding but i also want to thank homeland security and the various agencies relevant to the issue of our border security for the extended perimeters and improved security that we've had post-9/11. we are clearly, as i've often said, in a better place than we were. thank them again for the service at what we've been able to benefit from. since flight 370 incident, not just arriving passengers but also those departing this country. while overdue, this step should post our remaining -- should close the remaining loophole applied to or from this country. hope to hear from our dhs witnesses debate about why the party passengers had not really been included in their checks and whether any analysis have
5:48 am
been done such going to determine whether passengers have been departing the u.s. on documents that do not belong to them. i also hope that we will be able to embrace and declared the airline industry as we move forward on a number of ways to ensure the safety and security of the traveling public. hope to here from all over what this is about how we can encourage our international partners to follow the lead of you as an handful of other countries that regularly check travel documents against intervals database. it is my understanding that traveling on loss, still are otherwise fraudulent travel documents has already come place in certain parts of the world. doing so is made possible because fewer than 20 of interpol's 190 countries systematically check passports against s. ltd. although the flight 37 incident has focused attention on the vulnerability was already known to interpol. in fact, speak at the seventh annual world summit in february just before flight 370 incident,
5:49 am
interpol secretary-general noble lamented that only a handful of countries are systematically using sltd to screen travelers. when that technology and device is available, leaving our global security apparatus vulnerable, exploitation by criminals and terrorists. the world is getting smaller. traveled from all over the world to all over the world, this is simply unacceptable. helped her from her witnesses debate about how we can encourage other countries, particularly those would work closely with on aviation security matters to begin regular screening passengers or doctors against interpol's the database. it is in that then i will be looking to draft legislation dealing with the enforcement aspect of this particular aspect of aviation travel. the security of the traveling public including u.s. citizens traveling between foreign countries can well be at stake
5:50 am
as well as those traveling from foreign countries to the united states as well as americans leaving our soil and traveling elsewhere around the world. again i think chairwoman miller for holding today's hearing, and the witnesses for joining us. at this time i ask unanimous consent to allow mr. swallow, a member of the full committee, to sit and question the witnesses at today's hearing. >> without objection. >> i yield back. >> i thank the gentleman. other members of the committee are reminded that helping statement might be submitted for the record. we are pleased today to have as an agent for very distinguished witnesses joining us today spent allow me to indicate that i am called to be part of a quorum in a market and i'll be away for just a moment. i think the chairwoman for her courtesy. >> certainly. a busy morning here on the hill and we will be having votes a little after 10 so we will move a long.
5:51 am
mr. alan bersin is the assistant secretary for national affairs and chief diplomatic officer for the department of homeland security. previously mr. bersin service commission for u.s. customs and border protection. mr. john wagner is acting deputy assistant commissioner for the office of field operations in u.s. border protection. mr. wagner from serve as executive director and passenger programs was responsible for all travelers admissibility related policies and programs. ms. brenda sprague served as deputy assistant secretary of state for passport services in the bureau of consular affairs, a position she held since july of 2008. and in this capacity this break oversees a network of 28 agencies and centers that are responsible for the exception -- adjudication and issuance of u.s. task force. mr. chabot is the director of interpol washington, the nsa's national central bureau, a position he has held since 2012.
5:52 am
as director the xml for the attorney general as the official u.s. represents to interpol. mr. bray has been focused on improving partnerships between the other 189 interpol member countries and the u.s. a federal, state and local tribal law enforcement counterparts. careful statements about what is will appear in the record and the turn of recognizes mr. bersin for his statement. >> thank you, madam chair, ranking member of the, i appreciate this opportunity on this subject. the international criminal police organization or interpol is the world's largest transnational police association with 190 member countries today. each member country as a national central bureau to conduct interval activities and could make its services within its national territory. on the service is interpol provides to the law enforcement entities of every member country is access to its sltd, stolen and lost travel document
5:53 am
database. this database contains over 49 records provided by nearly 170 of the organization's members. on march 9, interpol confirmed that two of the passports used by passengers that boarded malaysia and fought through some have been recorded and installed a lost travel documents a base. as noted by the ranking member, interpol secretary-general ronald noble noted to the surprise of many that very few countries systematically query the sltd database for the purpose of verifying whether a passport has been reported as lost and stolen. even more troubling is the miniscule rate at which countries outside of europe, canada and the united states visa waiver countries our country bidding information to the database. madam chair, as you noted since 9/11, the united states government and the american people have addressed the security vulnerabilities exposed so tragically on that day.
5:54 am
in the 12 years since any thoroughly bipartisan fashion in which this committee has play significant role, we have together constructed a multilayer, fully automated, in agency approach to homeland security. as additional vulnerabilities have been revealed, and are revealed, we examine and respond to them properly in concert with the concert. -- congress. eveas we do so to in the contexf lost and stolen passports. when an individual seeking admission to the united states presents a foreign passport, whether he or she seeks admission by land, by commercial air or by sea, that passport to screen against the sltd database prior to admission. in fact, many cases on multiple occasions. doubt as mr. wagner will explain we screen outbound passports in a way. most countries in the interpol committee do not screen travelers against the database as thoroughly as we did in the
5:55 am
united states. meaning not at all. the alarming number of countries that report very few and in some cases no lost or stolen passport data to the sltd database. as a condition for participation as the chair noted, these a waiver countries are required to do so. the united states, canada and europe as those of the other the deputy partners according have provided a vast majority of the 49 records in the slt database. some of the most populous countries in the world note of it including china, india and indonesia have contributed few if any records to the database. despite the remarkable department of the database, 49 records added in the past 12 years, the lack of data provided by many interpol member countries remains significant. i have had the honor of serving on the interpol executive committee, and as vice president of the americas since novembe
5:56 am
november 2012, and i've been urging the organization to prioritize the sltd program and other border security efforts as core functions of interpol. to be sure, madam chair, congressmen, there are real and current challenges to this vision. despite the fact that dhs and the united states national central bureau have worked to incorporate recommendations for data reporting and response times into interpol's standard operating procedures, many countries have not been able to connect their agencies and interpol does not require them to do so. the task ahead is encouraging our partners to more fully utilize the sltd database and to engage in these kinds of border screening and security efforts. this can only add to this that from a standpoint of american security. i look forward to exploring with you how we may best approach this latest challenge.
5:57 am
it will not be the last, madam chair, and congressmen, but i take from our past experience that we can forge and resolve this matter in a satisfactorily cost-effective way. thank you for this opportunity again, and i look forward to responding to your questions. >> thank you very much, mr. bersin. mr. wagner. >> chairman miller, ranking member lee and testing which members of the committee. thank you for the opportunity to appear today and to discuss our u.s. passports are good for appreciate the opportunity to join my colleague conspicuously important issue supports the core mission of cbp. today i would like to discuss the sources of information of able to see bp, how we query this information as well as operational responses in a different travelers are desperate to deliver cbp officers to access real-time and reliable information on all travis seeking admission to the estateestates is critical for antiterrorism and anti-fraud
5:58 am
efforts. however, secure modern document may be today, cbp must ensure that a traveler isn't fraudulent presenting another individuals valid passport or other travel documents with the dog is stolen or intentionally provided to enter the united states. cbp uses interpol stolen a lost travel document database, and department of state called through lost and stolen passport and support systems in the air land and sea environments to verify the validity and status of travel documents. cbp also uses the sltd data on a citizen of a visa waiver program country applies for travel authorization through the electronic system for traveler authorization also known as esta. cbs tonight over 98,000 s. does since 2008 for lost and stolen records. and all travel environment air, land, and sea, cbp officers were troubled it was against tax which is our primary database that includes access to many enforcement systems including lost and stolen test -- and edit
5:59 am
it in the air and see if i'm cbp as extra advantage of receiving airline travel information prior to departure from the foreign location to this enables cbp to address potential risk factors and admissible issues prior to boarding the aircraft. cbp will coordinate our national targeting center and our assets overseas in immigration advisory program or in preclearance oma cornet directly with the airline to prevent boarding in cases where the esta has been denied for the traveler does not have a replacement document to the one reported lost or stolen. cbp has recommended over 650 no board recommendations to carriers in the last 18 months. in all environments cbp chordates with interpol when matches are returned from the sltd. many of the cases are actually travelers with no malice i think it. there simply travelers headed for a lost document, but later
6:00 am
founded and are trying out to use it for travel. in ms. casey bp will verify the person's identity and if the passport is a u.s. passport we will allow the traveler to proceed but will seize the passport and returned to the department of state. in other cases the travel will have a valid replacement document for the lost and stolen one and cbp will verify that they are the to bear and about the traveler to proceed. this often occurs in the air environment when the traveler hasn't updated their airline profile with an airline and the old passport data has been transmitted to us. if the travelers found to be present a lost or stolen passport as an impostor or is altered and tempered with a passport in any form, cbp will take appropriate law enforcement action against that traveler. in the last 18 months see pscs over 300 lost and stolen documents using attempt to enter the united states fraudulently. to enhance passport security operations, cbp has developed a carrier liaison program which provides training to airlines
6:01 am
and security companies and identifying improperly documented passengers destined to the united states. cop keating provides airline personal hands-on instruction fraudulent document identification or passenger assessment, posture identification and traveler document verification. to date the clp has trained 33,600 airline security personnel. winters encountered a lost or stolen document, clp training instructs teachers to contact the regional carrier liaison groups that are 20 for seven operations maintained at airports in new york, miami and honolulu. the rcl just respond in real-time to carry increased concern to plenty of the total document presented. after a determinadetermina tion a loss of some travel docket has been made, they will make the recommendation to board the passenger or denied boarding. so in concert with a part of cbp strive to ensure that travelers who present a risk are abruptly interviewed or vetted before boarding a flight bound for the united states in any document
6:02 am
his address before traveling to give. cbs place opposite the strategic airports overseas to work with carriers and host nation authorities and has built strong liaisons with airline represents improve our ability to address threats as early as possible and effectively expand our security efforts beyond the physical port abuse but these efforts seek to keep our transportation sector safe and prevent threats from ever reaching the united states. these efforts also enhanced efficiency and create savings for the us government and the private sector by preventing inadmissible travelers from traveling to the united states. and for the opportunity to testify today and i'm happy to answer your questions. >> think you very much, mr. wagner. the chair recognizes mr. sprague for her testimony. >> chairman miller, distinguish most of the committee to thank you for the opportunity to testify today about the many things the department of state does to promote the security of u.s. passport and to deter passport for appreciate your
6:03 am
focus on this important topic. we at the department of state believe to prevent passport fraud we need to focus on five areas. a sophisticated document with technic advanced security features, a robust and vigorous education system, real-time sharing of data, a proactive anti-fraud program, and outraged u.s. citizens to educate them -- i'm sorry. to educate them about the important form of identification. because of the access of passport provides, we spend years creating products with high-tech security features in photo biometric and secure limiting micro-printed, color shifting ink enhanced electronics that render these documents virtually impossible to counterfeit. but it's the sophistication of u.s. passport increases, so did efforts of those attempting to commit passport fraud. today's passport fraud most often involves fraudulent birth certificates, fake identities
6:04 am
and the look-alike photos. passport adjudicative spend hours annually in mandated trained to make certain that they have the skills to identify there is types of fraud. we also integrate several real-time fron front-end databae checks into our education system. but this is not enough. as recent events have shown, even a well-designed, well educated passport still if on ability in the wrong hands. domestically we counter this by reporting lost, stolen and revoked passports detected, the system and custom border protection used to screen arriving passengers at u.s. ports of entry. in turn cbp transcends us u.s. passport its season at u.s. borders so that we can identify patterns and determine whether the better submits a fraudulent passport application internationally we lead the way in reporting lost, stolen and revoked passport data to the interpol lost and stolen travel document. we provide interpol with
6:05 am
real-time data including the passport number and date of issue so it is accessible to member law enforcement authorities worldwide. we also require all countries in our visa waiver program to report lost and stolen data to interpol if they wish to maintain vwp status. the departments of state and homeland security use the sltd to that visa applicants inbound flights and doesn't manifest and people crossing mentors at all u.s. ports of entry. if you this is about international law and border enforcement agencies, the sltd effectively prevents impostors and is lost or stolen passports they bought or obtained fraudulently for travel. though i would our documents and systems are strong, there is never time to rest on our laurels. the u.s. passport is one of those sought after documents in the world. not only is it an international can't document it is also a legal form of identification and might be used to determine
6:06 am
eligibility or endowment benefits, to apply for driver's license, to confirm employment eligibility, to qualify for a mortgage or to open a bank account. this means we must continually assess the passport security features and design for potential vulnerabilities and incorporate new measures as technology advances. through our website, travel top state.gov after committee outreach by our 29 passport agencies, we remind you citizens of the importance of safeguarding their passport and provide guidance for reporting to us if the documentation is lost or stolen. we continually review our methods to improve our passport issuance system and fraud detection capabilities. and look for new ways to partner with other agencies to educate the public and strengthen existing procedures. we welcome opportunities to expand the efforts with federal, state, local and international agencies to protect our citizens
6:07 am
and promote safe, secure and legal travel throughout the world. thank you again for the opportunity to appear before you today. i'm happy to answer any questions you may have. >> thank you very much, mr. sprague. mr. sprague. thatcher never get jesus mr. bray for his testimony. >> thank you, chairman miller, ranking member jackson lee and distinguished members of the subcommittee. it is an honor to be today to provide you with an overview of interpol stole the lost travel document database or sltd. dashing stl p. before this i'd like to echo the previous statement of the pen regarding the tragedies there's a malaysia airlines flight 370. our thoughts and prayers remain with the families and loved ones of the flight passenger and crew. this incident servicers to underscore the need for coordination and collaboration across international borders great a safer, more secure world for us all. as you're aware the international criminal police organization commonly known as interpol is the largest police
6:08 am
organization in the world. membership is comprised of the national police the first from 190 member companies. all of which participate in the organization on a voluntary basis to interpol exist to ensure and promote the widest possible you to assistance between these police authorities. in order to achieve this high level of cooperation each interpol never should country is required to establish and maintain a national central bureau. interval washington is that national central bureau for the united states. a component of the department of justice were unique in that we are also omitted by the department of homeland security. enough for six year of operation interpol washington is or but a multisector workforce consisting of a full-time staff from the department of justice and an additional senior personnel represent more than 30 years law enforcement agencies. simply stated our mission is to visit the international police cooperation, communication and investigations through interpol on behalf of the united states. we support and heavily utilize interpol's database and resources, it's global, secure global complete situation in the
6:09 am
i-20 47 and what to publish this nation. it is the it would force him that connects the uc berkeley with interpol which with resources but also correctly with our 189 other member country partners. the use of its databases are governed by interpol tools in the processing of data. it is these rules allow interpol washington to extend the service and data including sltd to u.s. law enforcement. in accordance with our internal information sharing session interpol washington is next and the ability to query sltd to all authorities to existing u.s. law enforcement data systems. the sltd itself is essentially a search of a positive stolen and lost passport, visa and attended document information designed to prevent illicit international travel and false impersonation by criminals and terrorists. a query against the database to which there' there is a naturalt in the return of only information about the suspect document itself but will not
6:10 am
include personally identifiable information about the document holder. although stronger encouraged by interpol, participation in sltd is voluntary and does very country by country the u.s. has embraced as a pd in its efforts as the critical point of its persecuting and transportation strategy. in the united states the bureau of consular affairs at the department of state as a designated target and source for the stove and lost passport data that is popular into the stove and last travel database. the u.s. making over 39th of the more than 49 records contained in the sltd. u.s. participation in sltd is managed at interpol washington by our operations and command center. working on a 24 by seven basis recorded the entry of that data into the u.s. passport data into the sltd, and also verify and result in matches against the database by either for or domestic authorities. in 2013, u.s. law enforcement border security and council authorities already sop in more
6:11 am
than 238 million times. accounted for proximate 30% of all query activity worldwide. these queries result in more than 25,000 matches against the database, the of 100 of which were resolved administratively. small number of these hits, however, represent a series potential concern and were referred to appropriate law enforcement authorities for further investigation. as you can see, interpol washington is aggressively pursued the use of sltd to enhance and support on national security investigation. we will also continue to explore additional applications for sobt to further assist our law enforcement can be to ensure the safety of the american people. chairman miller, ranking member jackson lee, and distinguished of the subcommittee i appreciate the opportunity to testify about our role and support program and i've be pleased at any questions you have at this time. >> thank you very much, nestled appreciate all of the witnesses your it's been very, very informative. i think they're interesting issue and something that i think the united states congress needs
6:12 am
to be looking at a bit more. because really the purpose of this hearing, first of all, we have a great story to tell, as has been mentioned here this money. the united states has a great story to tell about how significantly we have ratcheted up our security, our document security, et cetera, for our american citizens, particularly flying domestically here since 9/11. it really is a remarkable achievement by our nation i think. and so i think, i want to make sure that our united states systems do recognize and take a high degree can't have high degree of confidence and comfort level in the fact of what is happening with our various government agencies when our citizens are traveling domestically here. but as we are very aware now, and i think the american citizens are much more aware, because of the tragic of the malaysian flight 370, that if
6:13 am
you are an american citizen and you are traveling internationally, particularly from one international country to another, they don't have the same type of security with their data documentation that we do. and suppose we know that, but yet we need to look at what types of things we could do perhaps to incentivize others to improve a bit, particularly when they see in the malaysian flight 370 there were american citizens traveling on that aircraft. and so since that has happened, the world continues to search for that flight, we decided to have this hearing this morning really to look into this issue a bit and explore what kinds of options we might have. and certainly one that comes to mind immediately and has been mentioned here of course extensively, and there's a
6:14 am
testament today in our opening comments, both myself and the ranking member, i mean, we have 38 countries, a list of 38 countries that do, these are our friends. these are our allies, these nations that are under the visa free travel, the vwp program. and this is a program that the united states started back in the '80s really as a way to expedite travel from our allied countries into the united states and for tourism, for commerce, et cetera. and since 9/11 we have had great success with them. certainly checking, or giving us information, if there is a lost or stolen passport. so that is all good. however, it is interesting and it really comes like i think because of the malaysian flight that these same countries are not really checking as they
6:15 am
could for the potential stolen or lost passport under database when people are getting on their flights. and so again these are other nations, and i think the united states obviously they are our friends, allies consider but we do this particular program with them, and i'm just wondering, i mentioned in my opening statement, it's my intention we are looking at introducing legislation that would require them as a participant in this program to really not only just regulate submit information on lost and stolen passports, but really for these countries also to routinely check the database for passengers who are boarding these flights. and i mean, you look at the list of the countries here. as i say, these are our friends and allies, closest allies in the world. look at france and germany and
6:16 am
greece, ireland, italy, et cetera. this information is available, and in some ways it would seem to me that many of these countries don't need to incentivize by the united states. perhaps they will start doing it on their own at what has come to light with malaysia's flight. i guess i would throw the question out, maybe start with mr. bersin. what is your thought about actually legislation about something like that and what you think would be the reaction of our allied countries for something like that? would they consider it an intrusion? what would you you about the on something like that? >> madam chair, so of course you recognize that pending the submission of legislation this is, which the department would have a formal review process, this is in good faith response to your -- >> at i appreciate that. there has not been legislation introduced by as i said it is my
6:17 am
intent to do so. >> is looking at. >> is looking at the what and which visa waiver countries operate now, we do require them to pipe of the database so that every time someone comes -- populate -- on the way to the united states we have been queried the database, maintained by interpol operate as ms. sprague indicated and find lost and stolen documents, and the number is great because of the requirement. also when you get on a foreign airline and they come, someone is coming on a foreign airline from those countries, we get the same benefit because the advanced passenger information requirement of games to any flight from any country, whether visa waiver or else coming to the united states. the question you raised which is whether as a condition of protecting into visa waiver program they ought to be compelled to scream against the database with regard to all flights, regardless of whether
6:18 am
the coming towards us are going elsewhere, poses an interesting policy question. it does address the issue that we see highlighted by malaysian airline or flight 370 and the two iranians using the lost or stolen passport issued in italy and austria. is a legitimate issue. i believe though that we are going to have to assess whether of all the things that we would require that do not have a direct impact on us, whether that would be one of them, i think it's an open question. ..
6:19 am
>> a lot of countries don't have the capacity to do that. those databases are therefore that government access. it really becomes a technology resource issue for a lot of the government to do. in the cases where we have had some close partners develop these systems, we have also brokered some arrangements to help them target that information and help them review it. we have located some of our personnel on the ground to work with their a 40's to help adjudicate that manifest.
6:20 am
we have officers in panama and mexico. there is an extension of our advisory program. we can work with travelers countries,nto those to help them -- we have had some success with the use of lost and stolen documents entering panama and mexico. we will continue to push certain countries to expand on those agreements. really on those capabilities. really on those capabilities. >> following up with mr. wagner because it was in your testimony or one of you that testified at the cbp was going to be just starting a screening for lost in the store when passports and i know you've been doing that on the in-bomb flights. can you tell us what we are doing and why we are doing that and how it advantages us from the security risk standpoint?
6:21 am
>> we get 100% of the passengers departing the united states manifests. historically we have screened them for some of our top threats that we face the terrorist screening, no-fly hit with some of the targeting and analysis. we've recently added to the lost and stolen database to the manifests and screaming. we are looking now i want to see 60 to 80 hits a day total. we are looking to program the systems to be able to see if we can administratively reconcile so we are not chasing down administrative actions. the old database person is interred.
6:22 am
as we've seen on the inbound the majority are reconciled in the administrative manner cause they have a replacement document and they lost and found the document so we see ways we can help them pinpoint the ones that are with qualified intent and depart the u.s. on the stove and document. and we are working to see if they can build and prohibiting printing the boarding pass when they get the hits to reconcile the information and respond. it is properly credentialed the person leverages a lot of that as well. even though we are talking about peace and passports activity i
6:23 am
think interpol is an interesting organization and you mentioned all of the members countries. for instance if you had germany got on an aircraft flying into the united states would they be sharing that information with us? not just other threats. so i understand how the information sharing works in the organization. >> it can be received from germany and other countries. we routinely receive information regarding traveling sex offenders from a generally registered offenders in many countries that have a registry for that but for the countries that may be notifying us. we communicate that information
6:24 am
immediately to the determination can bthatdetermination can be me disability in the united states but that's one story. there is information regarding criminals, terrorists that are chain-smoking on a daily basis. at the command center is 24 by seven, 365 s 365 so they procesd over 30,000 messages to and from the law enforcement community. this is the work we do every day into vs ltd has been a component of the work we do to enhance u.s. security. as we spoke about it is a department of justice concern. there are no officers there. it is law enforcement and tools to help us overcome linguistic and sometimes cheap traffic
6:25 am
barriers with other foreign countries. as you said it's been a success story we will be able to build upon in the future. >> as indicated that we can receive information on the criminal records and in fact it is the vehicle that they can communicate and there are sex offender registered but that information was not come unless there is a specific case or law enforcement inquiry. unless that sex offender or murderer unless that record is in the fbi database we had no
6:26 am
routine insight into what is in the data records of other countries. that's the issue. if there is a specific case or inquiry they would receive that information but the point is it's not a routine data exchange because we don't have routine access to german criminal records anymor any more than the routine access unless there is a case towards the criminal records. >> of the subcommittee and the full committee is interested in pursuing legislation in regards to biometrics etc. and that is the only sure fire wa surefire f verifying somebody's identity in this case we are only talking about foreign travelers into the united states.
6:27 am
they are an important tool for something like that perhaps from the department. do we have a comment on that? >> i would never pretend to be an expert but as you know they provide ten fingerprints and of course those can be verified at the entry so the most reliable biometric accepted his fingerprints and they are already collected. >> one of the requirement requit congress imposed is that we enter into something called the preventing and combating serious crime agreements. there's also a national security agreement that's required that would facilitate the exchange of information and we do have with the 38 countries in agreement
6:28 am
and in fact with some countries that are not members we have those agreements. but we are at the very dawn of creating the exchange and one of them is biometric we can inquiry each other's fingerprint databases and if ther there's ad light alert to call the police authority to say what is that about. >> certainly the information is power. such a critical component of the security that we appreciate that and the chair recognizes the ranking member. >> let me thank the chairwoman
6:29 am
and the witnesses again. in my opening statement i mentioned it to individuals and i'm going to mention them again because in the present circumstances of the malaysian flight 370, the investigation initially has not pointed to the individuals having criminal intent to bring the plane down. what is attributed to these individuals in false passports is a benign but important issue of a desperation added that the bike drop and 50 and sympathy. i don't want that determination to cloud how serious this hearing is and how crucial that we have a construct that will let the world know this is a
6:30 am
very serious issue and the witnesses already know that in actuality he was convicted of masterminding not just a traveling soldier standing by the wayside about masterminding the world trade center bombing and many have made note of the fact that it's something that didn't wake america up. it was so unusual we didn't attribute it to the beginning change in the psyche of those that want to do america harm but he was traveling internationally on a stolen passport and of the widothewidow that is now wantedn kenya is linked to fraudulent passport.
6:31 am
we must leave here with the idea that solutions are possible and i would like to put on the record that interpol has taken note travelers have boarded flights more than 1 billion times without having their passports checked against the lost travel documents. that is very much a wake-up call so i would ask you what impediments with respect to technology privacy concerns that are blocking or keeping countries and what is your view of how the u.s. might be able to be hopeful to these countries? you are correct with the observation on the 1 billion -- >> that is a large number. >> very large. you indicate some of the
6:32 am
difficulties the countries have. these include not only resource free strains in terms of lacking the money and priority of a budget decision. it also involves the lack of technological know-how to set up the kind of sophisticated information technology systems that are required to create this kind of automated checking. it also involves as you indicated the invisible requirements or constraints of privacy and the lack of coordination between immigration authorities and police authorities of the provincial levels in foreign countries. all of those together within institutional, create an institutional capacity to operate the kind of automated vending systems that we have. having said that, we have to have a strategy with regard to those countries that are critical to our security to
6:33 am
ensure at the very least they populate the stolen and lost travel document database. the important requirement for us in the near term is that we have the data to be able to see who may be traveling to the united states. the second requirement is to figure out again based on flow of passengers what strategic capacity building efforts we ought to engage in to help countries build up the kind of technological and capital requirements to build up the systems and while we do that, to some extent we don't, for example, at the department of homeland security have capacity buildinbuilding fund and fundine sector funding in which to do that. so when we go out to do that they grant from the state department or the defense
6:34 am
department we have to do that so-called aldehyde which we regularly do. >> that you have no budget line items that would allow you to dip into the funds and be engaged in that kind of capacity building? >> that's correct. >> when the secretary went to visit with countries dealing with tsa responsibilities in foreign countries, what outreach was that? >> with regard to tsa because of the responsibilities for the screening and airport security has a limited separate line budget with regards to providing technical assistance on airport security no other component to my knowledge has a separate line item that would permit the kind of capacity building.
6:35 am
>> let me quickly pursue this very briefly. you said that despite the fact they work to incorporate recommendations on response times and the standard operating procedure they do not require member countries to implement them. do you have recommendations on this? >> as i said in response to the chairs question requiring other countries to screen the database is an issue we need to debate but populating it has a direct and immediate impact on our security so if we go down that route and mandates or capacity building efforts i would focus on getting data into the database that we could screen.
6:36 am
whether we could cooperate with interpol and other organizations such as the civil aviation organization is one we also need to explore as we move forward. >> but there is a question with mr. wagner. cbp has screamed arriving passengers. you haven't screamed departing pax to the passengers i think you started after malaysia 370. mr. bersin said he doesn't believe any other agency have capacity building. i need a yes or no on that and then whether this indicates our
6:37 am
ability in the human trafficking issue because i would imagine that that is also a possibility for individuals being smuggled todathey may be on a fraudulent passport as well but the question is you just started giving the exiting passengers. why haven't you done it and then what about the impact getting our hands around the passports on human smuggling? >> we've recently added to the lost and stolen documents to the outbound manifest screening that we do. we will focus primarily on the terrorist screening database is and other types of national security. but we will call out some of the administrative heads. >> we will be working to come up with a better --
6:38 am
>> do you believe in issues dealing with human smuggling and trafficking? >> and assuring people that are properly credentialed. as far as the capacity building i don't think we have a line item for it but we do put a lot of resources into doing that and work with the department of state to fund those activities and like i mentioned before helping the governments build these advanced passenger information systems to get the manifests, to do the targeting and analysis and helping ex- change that information is critical to a lot of our priorities. i have questions i will put in the record and ask for a response from the committee and i will ask about how you discern the possible hits but do you do if a possible hit is discerned.
6:39 am
now the chair recognizes the gentleman from mississippi. >> in an effort to share information to the passports as a criteria in the visa waiver program countries must sign agreements with united states regarding the sharing of lost and stolen passports. through participation in the program that nations have agreed to share the lost and stolen passport information. doctor bersin, do the countries routinely share information on lost and stolen passports in interpol backs >> yesterday due into there was regular checking that we do to see that that requirement is met that would be a preview of how many entries have been made by the countries and if th that
6:40 am
problem arises we will remedy that. >> are there any countries that are noncompliant? >> at this time no and asked several of us noteasseveral of e testimony of the 40 million records 96% of them come from the visa waiver countries or aspiring in which the requirement to populate the database is set. >> if the country becomes noncompliant what actions would you take? >> first would be the communication between the program office working with the components on hsi to point out the deficit and overtime we haven't met the situation yet
6:41 am
but there would be the authority of the secretary's office with secretary johnson to take steps to see that that effort was enforced in the law. >> we haven't had this instance happened yet. what would be a realistic amount of time, three months or six months quick >> because of the importance to the security vetting we wouldn't want that to be an extended period of time. i know everybody seems to be in compliance right now but is there a hurdle to providing the information you hear from the partner nations? >> with regards to the visa as the chair pointed out at the outset of these are the closest allies in the country with whom we share the most experienced
6:42 am
that have developed sophisticated information systems operating through, so with regard to the countries we have the infrastructure in place. >> as a result of the requirement to you think the sharing has been increased into the program has been successful? >> i appreciate you can be named this hearing and exploring the legislative options so soon after the vulnerabilities have been exposed and appreciate the testimony that we've heard from the experts today and want to thank mr. wagner and mr. bersin for the response and the outbound passengers from the
6:43 am
u.s. in light of the flight 370 tragedy and everything else that you described but to build upon something the ranking member has asked about the capacity building with other countries around the world you responded that there is not a line item currently but can you talk a little bit more starting with mr. bersin and continue with mr. wagner about funding the capacity and efforts into the second question you may also want to address in the same way that we are exploring the legislative options in the fixes you've already put in place maybe talk about what other countries have done over the last three weeks so if you would
6:44 am
start. >> starting with the second question in the aftermath of the interpol statements come of secretary general ronald noble has been publicizing the issue and countries around have taken note of the problem and while it's too soon to say that it's resulted in changes it has created an awareness that didn't exist before and i think we will be seeing different countries within the constraints of the systems and cultures into the wall taking action and we should continue to encourage the populating database and also the screening. with regards to capacity building there are instances in which they have received state
6:45 am
department grants through programs to help countries build the capacity. my point is it's always on a grand basis and there is no long-term capacity building line item to say we are going to do this and encourage all of the countries in north america from colombia or pinnacle to build a system so that any time someone comes into the north american aerospace or port we would have insight who is on those planes. to do that would take a large budget. mr. wagner is in a better position to give the experience and can allow anin panama all ad others but the larger vision is that over the next ten years while we cannot build the measures we built here we can put a minimally required
6:46 am
satisfactory system in place from ten of all to the arctic but that would take it budget appropriation and i was us. >> i would think every country and every person in the world that gets on an airplane has a shared interest so we have the allies we've already described. the uk is already pursuing this but we also have countries like iran who have safety concerns. is there any way we can provide resources or encourage others especially wealthy countries to share the burden to make sure everyone is participating? i would love to find from you or mr. wagner what the cost is so we know what we are talking about. do you have a thought on this?
6:47 am
>> we did work with mexico and panama on and the caribbean to help these countries with their authorities into the internal laws and regulations to complex of the manifest information to help fund them in the systems to actually go through and screamed that information and we have our personnel with this to share what we can so there's work to do with other developing develog countries and then there's also the developed world getting our allies to take like approaches to how we do this and you will find very degrees of capacities and authorities and privacy issues that it's a consistent message that all of our allies
6:48 am
should be doing it in a similar fashion. >> as a follow-up to today's hearing what you be able to come up with a ballpark figure and share that with the committee so we understand and maybe on the past experiences with other countries what it would take to fund the necessary capacity locally, not that the united states needs to bear that burden on its own, but just so we know what that number is it so that is the basis for engaging other countries that might give to fund that's because it's in everyone's interest. >> she described this in finer detail. there is an infrastructure background. there is one single that connects the 190 countries have interpol and it's the beginning of the kind of system that you're talking about but perhaps he can explain what the system is and why it is a potential
6:49 am
link in the area that you're exploring. >> we have notes in about five minutes. >> it is the backbone that connects the countries to not only interpol and resource databases to each other and the ability otothe ability of the co utilize this is centered upon its bureaus of the national central bureau becomes the cornerstone for making sure that the utilities tools are available. >> with that said the u.s. has been supportive of the interpol membership in the community specifically in central america. we helped install sites at specialized police units but also border control points as well. we are continue to work prior to the airline disaster we've been working with counterparts in mexico and other countries in the caribbean as well to
6:50 am
determine how we can better and most effectively assist them in fully realizing how the utilities and tools may be better serviced in their countries. and we will obviously work with interpol to determine how we can best come up with a global strategy for engaging countries sharing best practices and lessons learned from this process. it's been a process for the united states, one that's taken time to develop and we need other countries to ramp up as quickly as possible. >> recognize the gentleman from california. first the ranking member has a comment. >> i want to put on the record thank you for your leadership on this issue and a lighter that you joined on into this isn't taking your time but i hope you will submit -- i would like to submit the letter for the record. again thank you for your
6:51 am
leadership. >> thinthank you madam chair for allowing me to participate and the ranking member for supporting that request. and as others have stated, my prayers and wishes go out to the families of malaysia flight 370. but as we have often learned from aviation disasters, if there is any hope that has come out of it it is that we learn a lot about our own security and how to make passenger safety much better and i also want to note int if the chair miller submitted a letter to the department of homeland security and we appreciate the response that we received. and with senator schumer to
6:52 am
create this s. ltd database if they don't we simply won't issue than these us and i hope i can work with the chair and the ranking member on such legislation. mr. bersin from you we would've to north america's concern as well because i believe the country we should principally be tracking our ones who have airports near our borders. for example, and my colleagues district she has mexico which has a large international airport and in san diego you have to yell on a just to the south and washington state you have vancouver and of course new york montréal and toronto are not far. my question is what degree are the bordering countries to the north and south, canada and
6:53 am
mexico and of course in the hemisphere and a law and other countries, what percentage of passengers are being screened against the database traveling in and out of those countries? >> with regards to mexico, the figure mr. wagner can confirm what the 100% in terms of people entering mexico and could cross the border and come into the united states. with regard to canada, the canadians are fully cooperative with us and they screamed. we are in discussion with them about the full screening debut for their own citizens and as a result of this incident we will see a complete screening from the neighbors to the north. >> does that mean a flight originated in venezuela and landed in mexico 100% of the
6:54 am
passengers with a check? >> that's great with regards to the stolen and lost travel document database. >> suppose a flight originating from germany and coming to vancouver, 1100% be checked? >> with regards to against the canadian database, yes and against the s. ltd when there is a secondary inspection there would be a check and as i say we are engaged in canada is engaged in to see what it could do to complete the cycle. with regard to the point on north america the reason i focus is that it's not just the neighboring airports such as far as and el paso, san diego, but it's people coming from outside
6:55 am
the atmosphere into central america for example and traveling overland to the border so it's important for us to actually look at this as a continental problem, not a national one and i think president obama in the own the border action plan with the prime minister and canada recognizing perimeter security as a critical issue and our colleagues and partners share this notion. >> we are beginning to learn about check it whic such as a purchase program with interpol. what is the participation of u.s. airlines and hotels and other tourism companies right now as far as checking passports against the database as a point of purchase rather than 72 hours before the flight?
6:56 am
and i'm just talking about the united states. >> i believe that all passports are being screened not by the airlines necessarily at the plaintiff purchased but by cbp and domestic purchases is what we are referring to. >> but i check a program intended to have cooperation with the vendors, right? the airlines and hotels. >> right. the relationship, the public-private relationship exists in the u.s. for some time and has a better fact it's a model for the world. it's one that we have taken to interpol and the ie check if working group is in a developmental stage. interpol is beginning to look at how to balance requirements into the concerns of 190 companies
6:57 am
with a public-private partnership. having said that, the models that have been rolled out have been with hotels and they have seen success. they are now looking specifically at following the malaysian airline disaster at the transportation sector. >> is every purchase in the united states to travel outside or every purchase out of the united states to travel in the united states checked against the database at the point of purchase or closer to the departure or arrival? >> this will be the final question. >> when the tickets are purchased and checked out the counter. >> 100%? >> inbound flights to the u.s. yes. >> i want to thank the witnesses for being here. i think all of us have additional questions, so i would invite you all to separate those
6:58 am
for the witnesses and we will ask for a written response to the questions and again i appreciate you coming on short notice. we convened this hearing i had an idea and convened it pretty quickly particularly for helping us move on capitol hill. so we appreciate the witnesses coming this morning and in person went to the role that record will be open for seven days and without objection the committee stands adjourned. thanks again.
6:59 am
>> next, your calls and comments on "washington journal." than a preview of the elections in afghanistan. after that, remarks by james amos. c-span, bringing public affairs events from washington direct it to you, putting you in the room at congressional hearings, white house events, briefings and conferences, and offering complete gavel-to-gavel coverage of the u.s. house. all is a public service of private industry. we are c-span, created by the cable tv industry 35 years ago and brought to as a public service by your local cable or satellite provider. watch is in hd, like us on facebook, and follow us on twitter. pedro will discuss the unemployment and job numbers for march. and later, kevin mccormick
7:00 am
offer advice on federal taxes. and we will take your calls. next.ngton journal" is host: good morning. it's the washington journal for april 5. or youe-hour program f today. we want to hear from you about your local newspaper. if they are still relevant in your used readin news reading h. reporting lower ad revenues, layoffs for local staff. your local paper -- if you still read it
58 Views
IN COLLECTIONS
CSPAN Television Archive Television Archive News Search Service The Chin Grimes TV News ArchiveUploaded by TV Archive on