File size: 109,847 Bytes
5dfa941 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 |
<html> <title> - BUILDING THE INFORMATION ANALYSIS CAPABILITY OF THE DEPARTMENT OF HOMELAND SECURITY</title> <body><pre> [House Hearing, 109 Congress] [From the U.S. Government Publishing Office] BUILDING THE INFORMATION ANALYSIS CAPABILITY OF THE DEPARTMENT OF HOMELAND SECURITY ======================================================================= HEARING before the SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT of the COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED NINTH CONGRESS FIRST SESSION __________ FEBRUARY 16, 2005 __________ Serial No. 109-2 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC] [TIFF OMITTED] TONGRESS.#13 Available via the World Wide Web: http://www.access.gpo.gov/congress/ house __________ U.S. GOVERNMENT PRINTING OFFICE 20-542 WASHINGTON : 2005 _____________________________________________________________________________ For Sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; (202) 512�091800 Fax: (202) 512�092250 Mail: Stop SSOP, Washington, DC 20402�0900012005 COMMITTEE ON HOMELAND SECURITY Christopher Cox, California, Chairman Don Young, Alaska Bennie G. Thompson, Mississippi Lamar S. Smith, Texas Loretta Sanchez, California Curt Weldon, Pennsylvania, Vice Edward J. Markey, Massachusetts Chairman Norman D. Dicks, Washington Christopher Shays, Connecticut Jane Harman, California Peter T. King, New York Peter A. DeFazio, Oregon John Linder, Georgia Nita M. Lowey, New York Mark E. Souder, Indiana Eleanor Holmes Norton, District of Tom Davis, Virginia Columbia Daniel E. Lungren, California Zoe Lofgren, California Jim Gibbons, Nevada Sheila Jackson-Lee, Texas Rob Simmons, Connecticut Bill Pascrell, Jr., New Jersey Mike Rogers, Alabama Donna M. Christensen, U.S. Virgin Stevan Pearce, New Mexico Islands Katherine Harris, Florida Bob Etheridge, North Carolina Bobby Jindal, Louisiana James R. Langevin, Rhode Island Dave G. Reichert, Washington Kendrick B. Meek, Florida Michael McCaul, Texas Charlie Dent, Pennsylvania ______ Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment ROB SIMMONS, Connecticut, Chairman CURT WELDON, Pennsylvania ZOE LOFGREN, California PETER T. KING, New York LORETTA SANCHEZ, California MARK E. SOUDER, Indiana JANE HARMAN, California DANIEL E. LUNGREN, California NITA M. LOWEY, New York JIM GIBBONS, Nevada SHEILA JACKSON-LEE, Texas STEVAN PEARCE, New Mexico BOB ETHERIDGE, North Carolina BOBBY JINDAL, Louisiana JAMES R. LANGEVIN, Rhode Island DAVE G. REICHERT, Washington KENDRICK B. MEEK, Florida CHARLIE DENT, Pennsylvania BENNIE G. THOMPSON, Mississippi CHRISTOPHER COX, California (Ex (Ex Officio) Officio) (II) C O N T E N T S ---------- Page STATEMENTS The Honorable Rob Simmons, a Representative in Congress From the State of Connecticut, and Chairman, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment..................................................... 1 The Honorable Zoe Lofgren, a Representative in Congress From the State of California, and Ranking Member, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment..................................................... 2 The Honorable Christopher Cox, a Representative in Congress From the State of California, and Chairman, Committee on Homeland Security....................................................... 4 The Honorable Bennie G. Thompson, a Representative in Congress From the State of Mississippi, and Ranking Member, Committee on Homeland Committee............................................. 5 The Honorable Charlie Dent, a Representative in Congress From the State of Pennsylvania.......................................... 19 The Honorable Bob Etheridge, a Representative in Congress From the State of North Carolina.................................... 17 The Honorable Peter T. King, a Representative in Congress From the State of New York.......................................... 16 The Honorable James R. Langevin, a Representative in Congress From the State of Rhode Island................................. 20 The Honorable Sheila Jackson-Lee, a Representative in Congress From the State of Texas........................................ 25 The Honorable Daniel E. Lungren, a Representative in Congress From the State of California................................... 22 WITNESS Lieutenant General Pat Hughes, (Retired), Acting Under Secretary, Information Analysis and Infrastructure Protection, Department of Homeland Security Oral Statement................................................. 6 Prepared Statement............................................. 7 APPENDIX Material Submitted for the Record Questions and Responses submitted by the Honorable Bennie Thompson....................................................... 31 BUILDING THE INFORMATION ANALYSIS CAPABILITY OF THE DEPARTMENT OF HOMELAND SECURITY ---------- WEDNESDAY, FEBRUARY 16, 2005 U.S. House of Representatives, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment, Committee on Homeland Security, Washington, DC The subcommittee met, pursuant to call, at 2:06 p.m., in Room 1334, Longworth House Office Building, Hon. Rob Simmons [chairman of the subcommittee] presiding. Present: Representatives Simmons, King, Lungren, Pearce, Dent, Cox, Lofgren, Etheridge, Langevin, Thompson, and Jackson- Lee. Mr. Simmons. [Presiding.] The Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment will come to order. The subcommittee is meeting today to hear testimony on how the fiscal year 2006 Department of Homeland Security budget request helps further the information sharing and analysis capabilities of the Department of Homeland Security. I am told that we only have this room until 4:00 p.m., 1600 hours, today, so I will be short in my comments, and then we will try to extend to all members the opportunity to ask questions, but also remind them that the room will be made available to another group at 4 p.m. I would like to recognize myself for an opening statement. As we begin this first hearing of the Committee on Homeland Security, Subcommittee on Intelligence, Information Sharing and Terrorism Risk Assessment, I would like to start by thanking the Chairman, Chairman Cox, for his leadership in helping to establish the full committee as a standing committee of Congress. I look forward very much to working with my colleague, Representative Lofgren from California, as the Ranking Member of the subcommittee, and also the Ranking Member of the full committee, Representative Thompson, who is with us here today. I represent the Second District of Connecticut. On September 11, we lost 12 friends and neighbors. On September 11, we all failed in our constitutional responsibility to provide for the common defense. This subcommittee has a vital role to build our capabilities in intelligence, information sharing and risk assessment to help prevent another terrorist attack. I would also like to make a second point. I believe in bipartisanship when it comes to national security and homeland security. When I joined the U.S. Army almost 40 years ago, I put these dog tags around my neck. I wore them until I retired from the U.S. Army Reserve in the year 2003. These dog tags have my name on them, my serial number, my blood type and my religion, but there is no mention of party affiliation. During my years of public service, I have tried to be bipartisan. I look forward to conducting the work of this subcommittee in a bipartisan fashion. Information analysis and warning is perhaps the most important capability of the Department of Homeland Security. Intelligence must drive our protection decisions, resource allocations, and homeland security priorities. Since its inception in March 2003, the Department of Homeland Security has worked to construct a robust analytical capability and has dedicated itself to fulfilling the broad statutory functions outlined in the Homeland Security Act. The committee is encouraged by the progress to date, but there is a lot more work to do, and the responsibility for that work falls on us. General Hughes, you have some challenges and opportunities ahead of you. The Intelligence Reform and Terrorist Prevention Act of 2004 created a Director of National Intelligence and a National Counterterrorism Center. This new reality will require the office of Information Analysis of DHS to adjust to a new operating environment. IA must take this opportunity to continue to build on its initial progress and construct a fully functioning and operational Intelligence Community component, while ensuring that DHS maintains the vital link to its state and local partners, and also ensuring that as we work to protect the freedom and security of our homeland, we also continue to protect and preserve our civil liberties. The partnerships that you have engaged in have led to central communications links between the federal government and state, local, tribal and private sector officials. These links help to ensure that the men and women on the frontlines in the fight to protect our homeland have the essential information they need to help prevent another terrorist attack. I hope your testimony today will address how these links and partnerships are being strengthened and refined to help keep America safe. I welcome you, General Hughes, to the subcommittee today. I also want to thank you, as somebody who has also worn the uniform for, in my case, 37 years, 7 months, and 24 days, but who is counting. When you are having a good time, you do not count it all up. But I want to thank you for your very distinguished service to our country. I look forward to hearing your testimony. I would like now to recognizing the Ranking Minority Member of the subcommittee for any statement that she may wish to make. Ms. Lofgren. Thank you, Mr. Chairman. Thank you for calling this hearing to discuss the proposed fiscal year 2006 budget, building the information analysis capability of the Department of Homeland Security. Mr. Chairman, I look forward to working with you. I hope to be able to have a good, productive and professional relationship on this subcommittee, as I enjoyed in the last Congress with Chairman Thornberry. That was a very rewarding experience for me, and I think for Chairman Thornberry. We worked together as a team. We developed our hearings together. We decided our witnesses together. We wrote bills together. In the end of the Congress, we issued not a majority report and a minority report, but we issued one report from our committee. I hope that we will have that same level of success in standing up for our country and making sure that we are facing. General Hughes, I welcome you and I look forward to hearing your testimony, as we work with you as we seek to empower the critical exchange of information within the Department of Homeland Security. You have a difficult task, and I hope that the subcommittee will be able to help you as you work to enhance the department's capability to collect, aggregate, analyze and share information. I understand your office is responsible for four specific tasks: analyzing and mapping terrorism threat intelligence to vulnerabilities in the nation's critical infrastructure; sharing information with state and local governments and at times with the private sector on the public information concerning terrorist threats; meeting operational efforts regarding the homeland security advisory system; and providing intelligence analysis to senior DHS officials. As you may know, I served for 14 years on the Board of Supervisors for in Santa Clara County, so I have a very keen interest in how information is shared with local governments so that they can take appropriate action. I am also very interested in how we have assessed what is vulnerable so that we can effectively map the threats that we discover. Finally, I do not want to be a nag, but I am going to raise it anyhow. This is your first meeting before us and so I am going to cut a little slack to the department, but there is a Committee Rule, rule 11(j), that requires witnesses to have their statements to the committee in advance of the actual hearing. It is 48 hours that testimony is to be submitted, and we received your testimony just 4 hours ago. So this is not a senseless rule. I like to read the testimony before I come to a hearing and have the staff analyze it, and receiving it 4 hours in advance of a hearing just does not permit that. If we are going to do our job well, you need to help us by complying with that rule. So I hope I will never have to refer to that rule again, and I look forward to your testimony. Thank you, Mr. Chairman. Mr. Simmons. Thank you. That is a good and a useful comment to make. I would now like to recognize the Chairman of the full committee, the gentleman from California, Mr. Cox, who I just mentioned a few minutes ago has played an historic role, a truly historic role, in bringing about a full Committee on Homeland Security. I believe the reorganization of our government over the last several years is the largest reorganization we have encountered since World War II, with the National Security Act of 1947 and the creation of the Department of Defense. With that massive reorganization goes a requirement to oversee the Department of Homeland Security. Chairman Cox has been a critical component in making sure that the Congress lives up to its obligations in these difficult, historic times. Mr. Chairman? Mr. Cox. Thank you, Mr. Chairman. I want to begin by welcoming Chairman Simmons to this subcommittee. We are picking up the work that was carried on in the Select Committee on Homeland Security during the last Congress. I do not think there is any question that by background, Congressman Simmons is well suited to chair this subcommittee. I do not think there is any question either that Zoe Lofgren of California is very able and equipped to serve as our Ranking Member on this subcommittee. General Hughes, as you know, we have been on this committee, at least as it was constituted in the last Congress, aggressive supporters of your responsibilities in the Department of Homeland Security. Since the last Congress, we have enacted legislation creating a national Intelligence Director and creating the NCTC that will have profound impacts on the Information Analysis responsibility within the Department of Homeland Security. I note that this is not a packed hearing room and it is in some senses ironic because I do not believe we will ever focus on anything that is more central to the government's responsibility in protecting Americans from terrorism than what we are going to be talking about today. So to those of you are here, you are involved in a very important undertaking on behalf of our country. The Homeland Security Act of 2002 gave the department a new overriding counterterrorist mission that had not previously been the job of any part of the federal government. It sought to enable to department's success in this new mission through a Directorate of Information Analysis and Infrastructure Protection. The information analysis portion of that directorate is the intelligence piece overview with prevention, particularly when it comes to the eventual threat of terrorists armed with nuclear weapons, not dirty bombs, but real nuclear weapons, or terrorists armed with bio-weapons, particularly bio-engineered weapons that are designed to be resistant to antidotes and vaccines that we might have stockpiled. There can be no overstating the importance of prevention. That is what this is all about. During the Cold War, I think we understood that dealing with the response and recovery from a nuclear exchange was not plan A, plan B, or plan C. We were very much focused on avoiding that nuclear exchange. Likewise, the prospect that terrorists might apply weapons of mass destruction now or in the future has to cause us to focus enormous attention on prevention. That is what we hope, notwithstanding the passage of the 9/11 Commission Recommendations Implementation Act, we can continue to do under the legal mandate of the Homeland Security Act. The memorandum of understanding on information sharing of March 2003 was a truly unprecedented undertaking between the Attorney General, the Director of Central Intelligence, and the Secretary of Homeland Security. Its purpose is to move information along and through these three communities free of the longstanding constraints that existed prior. There are some signs that are less encouraging or convey a mixed message about our potential to achieve what we envisioned when we wrote the Homeland Security Act and in passing the law in 2002, and when this memorandum was agreed to in 2003. I hope today, General Hughes, that we have the opportunity to understand from you exactly where we are headed and whether we have the resources to get there. I thank you, Mr. Chairman. Mr. Simmons. I thank you for your comments. Now, the Chair would like to recognize the Ranking Member of the full committee, Mr. Thompson from Mississippi. Mr. Thompson. Thank you, Mr. Chairman. I am appreciative of you calling this hearing at this time. Even though we cannot discuss the numbers for this department in open session, I think there are some issues that we need to get on the table real quick for the sake of the public. I guess about 2 months ago, Ms. Lofgren and I had an opportunity to look at the vulnerabilities of our infrastructure by state. We were somewhat dismayed, Mr. Chairman, at how inconsistent that list was by state, and we are really concerned that somehow we have to have some standardization associated with that infrastructure list. As I understand it, there are some 85,000 vulnerabilities identified from miniature golf courses to shopping centers and what have you. But I am concerned about it, and I want to make sure that we address it this year so that we all, as members of this committee, can feel comfortable that those critical infrastructures in our districts clearly are being identified so that they can be protected. In addition to that, I am concerned about this information sharing across the board, whether or not we have satisfactorily changed the culture of the department so that they are actually talking to each other. We hear comments all along about departments being territorial with their information, and if we are indeed protecting the homeland. We ought to make sure that all those agencies involved in protecting us are communicating with each other. So I look forward to this hearing and many more around this subject. Obviously, I look forward to your testimony, General Hughes. Thank you very much. Mr. Simmons. I thank the gentleman for his comments. As somebody who worked for the CIA for 10 years, and then finally in military intelligence for over 30 years, sharing information is a hugely important issue. Security is important, but a perfectly secure piece of information which is not disseminated is of no use. So what we have to do is come up with a balancing act. We have to balance the needs for security with the needs for sharing so that we can better protect the American homeland. So that is a very good point. General Hughes, thank you again for coming before the subcommittee today. I will apologize to you in advance. I will have to vacate myself from the chair in a few moments to meet with the Secretary of the Navy in a prior commitment. I trust that our distinguished full committee Chairman will be able to carry on in my absence. I will be back as soon as possible. Thank you for being here today, and we look forward to hearing your testimony. STATEMENT OF LIEUTENANT GENERAL PATRICK HUGHES (RETIRED), ACTING UNDER SECRETARY FOR INFORMATION ANALYSIS, AND INFRASTRUCTURE PROTECTION, AND ASSISTANT SECRETARY FOR INFORMATION ANALYSIS Lieutenant General Hughes. Thank you very much. I am glad to be here today, too. I may have been the victim of a biological attack before coming here. I am a little ill. Mr. Simmons. Spread it around. Lieutenant General Hughes. I am trying not to. I hope you will forgive me if I have to cough or blow my nose or something. My apologies. I liked your opening comments very much. I, too, have worn a set of dog tags around for a long time, and have the same frame of reference. I note that this is quite different, however. I did not realize, I don't think, before I came to the Department of Homeland Security how different it is to come into my office in the morning and find myself examining a map of the United States and operating in the construct of our national values and civil liberties and rights of American citizens, as compared to the military application of force in an overseas environment. It is quite interesting to me, and has caused me to have to shift to some degree my mind set. I think I would like to apologize to the Congresswoman for the delay in our testimony getting here. I would merely say we did submit it on time, but the clearance process did not respond. We will do our best, though, and your point is not only well taken, but understood. So thank you very much. I believe from your comments and Ms. Lofgren's comments and others that I have to clear the air here. Otherwise, I will proceed in this hearing under false pretenses. My last day on this job will be March 15. You are speaking to someone who will not be carrying out for the most part many of the hopes and dreams that you have as a federal official, but in my future I will continue to support the Department of Homeland Security, and I will do everything I can to support the government in the future. I would just like you to know that, because it sounded like in your comments you did not know that, and you expected me to be continuing in this job. I hope that is not too much of a surprise to you. Mr. Simmons. Well, you are on the hot seat right now, so let's just keep you there until you disappear. Lieutenant General Hughes. That is fine. I am not trying to avoid anything. I merely want you to know my tenure here is relatively short. I would be glad to answer questions about that, if you would like me to include any ideas I might have about my replacement. The last comment I would like to make to you all is that I have lived through the last year and a few months with you. I have come before you on a few previous occasions formally and several times informally. I have appreciated every opportunity I have had to talk with you and interact with you. I can look you directly in the eye and tell you that we have made progress. We have made a lot of progress. In some cases, it is not smooth or very attractive, but it is real. We are continuing that progress. The dedication and devotion of the people who are carrying out the work of the Department of Homeland Security, if you have that in your mind, you can never be in doubt. We do require guidance and direction and we do require measuring and rating at times, and we do require a steward and admonition and wisdom from others. But the heart, the spirit, the devotion and the dedication to duty is present in all of those who serve in this department. Thank you very much. I will be happy to answer questions you ask. [The statement of Lieutenant General Hughes follows:] PREPARED STATEMENT OF PATRICK M. HUGHES Good morning Chairman Simmons, Congresswoman Lofgren and distinguished Members of the Committee. It is a pleasure to appear before you today to discuss the Information Analysis (IA) capability of the Department of Homeland Security (DHS). This time of year marks the two-year anniversary of the actual ``stand up'' of the Department. We have really been able to support the intelligence and information needs of the Department for about 13 months. As we transition much of the senior leadership of the Department and as we anticipate the arrival of our new Secretary, we clearly intend to work to improve our capabilities, but it is important to acknowledge the tremendous efforts of the many individuals who have worked tirelessly to bring together a functional and effective intelligence support organization. I want to specifically mention the extraordinary men and women of the Information Analysis and Information Protection Directorate (IAIP) with whom I am so proud to have served. These superb professionals, laboring often in the background, are focused on the business of the Department and the Nation because they are 100 percent committed to our mission and our Nation's security. Judging from the feedback I have personally received, and according to my professional judgment, we--they--are making a difference with our effort to provide accurate, timely, actionable, and cogent information to the customers we serve. It is also important to recognize the impressive strides made in the area of information sharing, collaboration and cooperation at the Federal level. We have worked hard to develop more robust and deliberate interaction with our Federal partners, particularly with the Federal Bureau of Investigation. Our joint efforts with the National Counterterrorism Center (NCTC), our relationships with DOD and the Central Intelligence Agency (CIA) and other key departments, such as Justice, State, and Energy, have greatly advanced our collective capabilities and relationships. Our current information sharing and collaboration environment within the government is far superior to that which existed before the establishment of DHS and has notably improved during the past year. We look forward to the advent of the Director of National Intelligence and continuing progress throughout the intelligence community. Our efforts to build a DHS intelligence capability are oriented around three overarching imperatives. These are: building and expanding capacity within the Department; furthering our coordination and liaison efforts with all of our stakeholders, domestic and foreign, government and non-government; and, creating and distributing the work products that will ensure we all have the right information, at the right time, in the right way. . . to protect and preserve. In short, we are doing our job supporting the Department of Homeland Security and in my view doing it well. As we evaluate and assess the roles and mission of the Office of Information Analysis (IA), I believe we must acknowledge IA's role within the broader construct of DHS. IA should be considered the Office of Intelligence for the Department. This essential function will include building out the intelligence infrastructure for DHS Headquarters and ensuring the establishment of common Intelligence Community (IC) standards that apply to the ``intelligence elements'' of the ``components'' of DHS. The 9/11 Commission Report specifically cited the continuing need to assimilate and analyze information from DHS' own components. IA needs to better integrate, coordinate, correlate and fuse these activities and the intelligence information they produce, in partnership with all component intelligence elements. IA, acting as the Departmental intelligence office, is developing a plan for the integration and collective application of all DHS component intelligence organizations in a way that will achieve greater synergy in this mission area. IA is and will continue to develop as the Departmental intelligence support element, while continuing to pursue its statutory obligations under the Homeland Security Act. As you know, IA is a part of the Intelligence Community and its funding is provided by the Intelligence Authorization Act, the specifics of which are classified. While I cannot go into classified specifics in this open forum, I am more than ready to discuss IA's budget with you in an appropriately classified session at your convenience. We have a dynamic vision of how intelligence and information will be analyzed, how the analytic elements of the Department will be managed to achieve optimum benefit, and how to develop a budgetary strategy that will unify the programs related to intelligence activities and information analysis across DHS. A major collaborative study is currently under way within the DHS to establish the baseline for this effort. In addition, we seek to reshape the Department's efforts consistent with the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA) and the new authorities of the Director of National Intelligence (DNI). No less important is the need for adequate facilities, analysts, and program resources to assure that the complex and difficult process for obtaining and analyzing intelligence is managed, operated and sustained. It is not sufficient to simply create authorization for fully funded U.S. Government employees without also providing the resources to properly house these intelligence professionals in facilities that are designed and constructed to facilitate the receipt, handling, analysis, and storage of highly classified material in order to protect and preserve our security. To that end, the 2006 budget request includes $38 million to allow IAIP to fit out facilities that meet security and information technology requirements and allow IAIP to access and analyze intelligence, collaborate with our partners and execute the mission we have been given. IAIP came into the Department with no legacy facilities and no predetermined permanent housing. We now have a plan to occupy both swing and permanent facilities that fit our needs, and this funding request will enable us to complete that plan. As we work toward building IA's capability, we have framed our thinking around a new paradigm that seeks to encompass ``all information necessary to protect and preserve the homeland.'' Within that environment are subsets of information such as defense or military information, intelligence information, law enforcement information, homeland security information, and critical infrastructure information as well as public and private sector information. All of these types of information make up the vast array of intelligence that DHS needs to do its job. DHS is a fully vested member of the IC and the Office of the Assistant Secretary for Information Analysis represents the Department in all IC venues, ensuring that DHS interests and requirements are fully represented and considered among the community. IA analysts have access to the most sensitive national intelligence regarding international and domestic terrorist threats, and the interaction with their peers throughout the IC continues to develop and improve. Much of the information we receive comes to us from IA analysts' connections to the Joint Worldwide Intelligence Communications Systems (JWICS), NCTC Online, the IA Automated Message Handling System (AMHS), the Homeland Security Information Network (HSIN), the Open Source Information System (OSIS), and a variety of other formal and informal (i.e., analyst-to- analyst) mechanisms. These information streams from external sources are augmented by our own internal reporting from DHS components. We are increasingly well informed, but not yet satisfied with this endeavor. The range of intelligence and information coordinated by IA from the IC, and our state, local, tribal, municipal and private sector partners; as well as from all DHS entities with intelligence and operational capabilities, is both impressive and daunting. These entities--and their products--continue to be an important part of how IA does its work. IA's relationship with our colleagues in the Infrastructure Protection (IP) Directorate is critical to our success. Jointly we are able to deliver threat-informed vulnerability analysis and data- supported risk assessments regarding our critical infrastructure to our constituents and customers--notably the private sector, which owns the vast majority of our nation's critical infrastructure. IA is an integral part of the Homeland Security Operations Center (HSOC) effort to monitor and communicate on all matters of homeland security interest 24x7. Intelligence from DHS components that IA correlates and analyzes provides invaluable perspectives and insight for the entire Federal government. From a citizen providing a Patriot Report on suspicious activity, to Border and Transportation Security (BTS) reports regarding individuals of interest trying to enter the United States illegally, or US Coast Guard reports regarding suspicious activity near critical infrastructure. Such information is provided to IA through the same methods the larger IC uses: the physical presence of DHS component and IC element liaison officers within both IA and the Homeland Security Operations Center (HSOC), strong linkage between the HSOC and our constituents, and communication between analysts and leadership. In fact, the presence of representatives of 30 separate Federal and local representatives within the HSOC provides a perspective and collaboration capability that is virtually unique. Additionally, coordination within DHS is aided by regular meetings of the intelligence chiefs of each entity, led by the Assistant Secretary for Information Analysis. It is not sufficient to just produce information. In order to be effective, information must be shared. DHS has developed this capability and in cooperation with our Federal partners and is coordinating information sharing among previously unconnected systems. For example, DHS has collaborated with the Justice Department on the DOJ Law Enforcement Sharing Plan. Further, the Homeland Security Information Network (HSIN) is a ``system of systems'' that provides discrete communities of interest for Law Enforcement, Counter Terrorism, Analysts, Emergency Management, and Critical Infrastructure groups to collaborate and share critical information in real time. In addition, the DHS network provides the ability to pull together participants from all of these communities, into a shared space to collaborate, during any period when the threat creates the need. Further, as a direct result of the Department's Information Sharing and Collaboration (ISC) initiative to cooperate and work jointly with other Federal partners, DHS and DOJ/FBI have established the first ever capability to share information between our respective communications and automation networks. Specifically, we were able to connect the Homeland Security Information Network with the Regional Information Sharing Systems (RISS) and Law Enforcement Online (LEO). More needs to be achieved but we are on the right track Already, the DHS ISC Program has engaged other Federal, State, local, and Tribal, information sharing programs in an effort to create synergy by fostering mutual awareness of their key programs and capabilities, and creating a forum to garner feedback on policies and procedures under development at the Federal level. Additionally, this effort has resulted in the first ever capability to share information among the State, local, and tribal information sharing systems. IAIP's fiscal year 2006 budget request includes $7,482,000 for ISC. The Department is budgeting an additional $5,000,000 from the Chief Information Officer and $4,000,000 from the Working Capital Fund to bring the total funding for ISC in fiscal year 2006 to $16,482,000. In addition to receiving information from these entities, IA is routinely sharing information and collaborating at all levels--from the Federal Government and the IC to State and local officials. DHS component organizations also serve as a conduit through which information and warnings can pass to government at all levels. Thus, IA's continuous information sharing and collaboration with the HSOC, BTS, USCG, and other DHS entities, provides valuable information to all of the men and women responsible for protecting the homeland. It is IA's specific focus on the protection of the American homeland against terrorist attack that is unique among its IC partners. This focus provides invaluable information and assistance not only to State, territorial, tribal, local, and private sector officials that receive accumulated threat information, but also to DHS components that use the information, trends, and indicators to inform and prepare operators and decision makers on the front line. The relationship IA has with the HSOC, BTS, and other DHS entities translates into continuous information sharing and collaboration that provides a unique threat picture and actionable information to those who are vital to protecting the homeland. The Department of Homeland Security is a prime example of how changes have been made within the Intelligence Community, the counterterrorism community, the law enforcement community and the response community to work more cohesively as well as more collaboratively, and to assure information is shared as fully and completely as possible. This represents a dramatic change from conditions as they existed before September 11th, 2001 and an very impressive change from even one year ago. DHS plays a central role in the counter-terrorism and homeland security effort as we continue the work of communicating intelligence and information to our partners in the federal government as well as with the State, territorial, tribal, local, major city and private sector officials charged with protecting the people and infrastructure of the United States. We are proud of our work and our place in the larger national defensive network and we look forward to a safe and secure future for our nation. Mr. Chairman and Members of the Committee, this concludes my prepared statement. I would be happy to answer any questions you may have at this time. Mr. Simmons. I thank you for your testimony. What we will do is I will ask a question and then I will go to my left and right by order of appearance at the time of the gavel and thereafter, after of course our Chairman and Ranking Member have had their opportunities. I commanded a military intelligence unit in the mid-1990s that created a handbook for open source intelligence that was eventually adopted by the U.S. Army as doctrine. I have had a personal interest in open source intelligence ever since. I have traveled to Special Operations Command in my capacity as a member of the Armed Services Committee. I have gone to open source conferences. I have met with officials from around the world who have an interest in this capability. It seems to me that open source acquisition or open source intelligence, that is intelligence that is created from the collection and analysis of open sources of information, lends itself particularly to the intelligence challenges of the Department of Homeland Security for two reasons. One, in some respects the information that we are relying on or looking for may come from that small municipal county sheriff's department, for all we know. It needs to be transmitted quickly, and it does not need to be classified in and of itself. Two, products that are derived from open source acquisition and analysis often do not have to have the same level of classification as those that are collected through other venues, so it is more readily available to share with the American people. Cost is also a factor. Where are we in the development of this capability in support of the mission of the Department of Homeland Security, and where would you like to see us go? Lieutenant General Hughes. We have explored a number of avenues with regard to open source information. I have been a proponent of it for a long period of time. I have to tell you that I have discovered along the pathway that I have taken, anyway, that there are some problems with it. A lot of information from open sources, much of it is erroneous, wrong. When we use it exclusively without cross-checking it with something else, we have found, I have found, it has been my experience, that it usually gets us in trouble. So I think while I think there is great power in this source of information, I also think we need to tread carefully in using it, and understand the context in which it can be used. We have on our computers now in the IA element the OSIS. It stands for the Open Source Intelligence System that the intelligence community is the proponent for and now provides numerous search engines, databases, media files, download capabilities of all kinds, including photographs, pictures of the ambient culture and environment around the world. We have all that at our fingertips right now. We have had guest speakers on this topic we have tried to inculcate in the homeland security intelligence analysis the power of, the idea of open source intelligence. I do not know whether you are familiar with a gentleman named Robert Steele. Mr. Simmons. I am intimately familiar. Lieutenant General Hughes. Okay. Mr. Simmons. I think you know what that means. [Laughter.] Lieutenant General Hughes. Yes, I do. I do. Robert Steele, for all of his many interesting characteristics, has been something of a pioneer in this field. We have had him come and talk to us. It was a very interesting talk and very deliberative and engendered a lot of discussion. I think that with Robert Steele's views as something on the far end of the utility spectrum, you may think of never using open source information as the other end of that spectrum. We are trying to find utility and balance along that spectrum. Once again, I think it has great potential and we are very knowledgeable about it and using it. Mr. Simmons. Thank you for that response. I would like to recognize the gentlewoman from California, Ms. Lofgren. Ms. Lofgren. Thank you very much. I am concerned about the number of contractors that are in the department, instead of full-time employees, not just in IA, but throughout the department. One question I have, without getting into the numbers, which we cannot, is whether you are confident that we have sufficient budget authority to actually have staff, as opposed to contractors, in the upcoming fiscal year. Lieutenant General Hughes. Yes, ma'am. I believe that the budget authority is not in question here. Finding the expertise is a problem. And accompanying this, to the best of my ability to characterize the truth here, it is true that the contractors have offered us and we have taken advantage of their offer, some very fine people with some tremendous technical expertise that we were not able to acquire in any other way. Back to the fiscal realities of this, those people are costing us more money than a federal employee would. However, you cannot get them. We have not been able to get them by hiring them off the street. They are a limited supply and high demand. Ms. Lofgren. I know we cannot go into the numbers in this open session, but I would be interested in a secure setting to take a look at where that balance is so we can get a handle. I know in some of the other aspects of DHS, I have a better handle on the contractor-to-employee ratio and how it is working. I would like to do that if I could arrange that with you. Lieutenant General Hughes. I would be happy to do it. In lieu of reading, which might take a longer time, I can get an information paper back to you that has the details at either the unclassified level or at the level of classification that we have. Ms. Lofgren. Why don't you do that, and then if I have further questions, we can follow up further. Lieutenant General Hughes. I am happy to do so. Ms. Lofgren. I appreciate that. In thinking about the task that you face, is it fair to say that the largest part of the IA job is to map the intelligence collected by other agencies to the critical infrastructure information maintained by IP? If that is the case, I am wondering what influence you have, if any, on the state of the critical infrastructure listing and analysis, and how much that is impairing your task? Lieutenant General Hughes. First, the answer to the first part of your question, is that our primary or most critical function, my answer to that, I am sorry to say, is no. Our primary task and our most critical function has become, and I think it is logical for this to happen, departmental support across the board, working as an all-source intelligence producer for the department. That is really our work in its primary form. The most important part of that work is to continue that interface between IA, the intelligence part, and IT that does the risk analysis and vulnerability assessment, but I will have to tell you that it is a little bit hard for all of us to understand, the risk analysis and vulnerability assessments are not done strictly on the basis of threat. They are done with civil characteristics in mind. One of them is apparent vulnerability to possible attack using means of attack. Another idea that is applied here is whether or not a particular kind of infrastructure has proven to be attackable if gaps are not closed and if vulnerabilities are not reduced. Another idea behind it is the value of the infrastructure, whether it has ever been attacked or not. That is kind of a strategic assessment. As an example, I think Mr. Thompson mentioned miniature golf courses or something like that. Obviously, when you are using good common sense, not high- faluting intelligence, and you are weighting the importance of a miniature golf course against a nuclear storage site, hopefully most people would choose the nuclear storage site. That does not mean, however, that something in between those two extremes does not need some kind of protection. Ms. Lofgren. I know my time is up, but the concern I had with the latter question is that in fact the miniature golf site is on the list and the nuclear power plant is not. So if part of your job is to map the threats to the listing of the critical infrastructure, and the critical infrastructure is just random, how do you do that job? Lieutenant General Hughes. That should not be the case. I am not familiar with the specific part of the list that you are telling me the nuclear power plan is not on there, but let's suppose that that is accurate. That is a mistake and we need to fix that. Ms. Lofgren. Okay. Thank you. Lieutenant General Hughes. You are welcome. Mr. Cox. [Presiding.] General, I would like to go into some of the numbers in this open session, and I do not see any reason that we cannot discuss the programmatic figures here. My understanding with staff is that these are all open. I would like to talk about threat determination and assessment, evaluation and studies, the homeland security operations center, and the new account for information sharing and collaboration. I wonder if, just to set the stage for discussion of this, if you could describe for the subcommittee what each of these programs is in chief focused upon, starting with TDA. Lieutenant General Hughes. I hope I can do this right, but it is not a classification issue. It is a knowledge issue, so I am going to have to refer to a book. The first one you wanted to talk about, sir, was? Mr. Cox. Threat determination and assessment. Do you know what I can do also, I mean, we are sort of constrained to go through this program by program in order to talk about it in this open session, but I would like to get into what is the nub of your work. The figures that I have before me include the programs for threat determination and assessment, evaluation and studies, homeland security operations center, and information sharing and collaboration. I wonder if you could begin with whichever of these is closest to the core function of IA to do all source intelligence fusions? Lieutenant General Hughes. Obviously, threat determination and analysis is a primary factor. I am not sure exactly what you want to know, but if you want to know if our budget is adequate, the answer I believe is yes. Mr. Cox. To the extent that threat determination and assessment is central to your mission, it would disturb me, then, that we are cutting its budget. Lieutenant General Hughes. I do not know if you should be disturbed about that, sir. We are not cutting it too much. The issue here is the threat determination, after you initially make it on a piece of fixed infrastructure, does not really need too much work after that if nothing changes. So once you lay down a baseline, you may not need quite the same level of effort that you did in the past. You do not have to re-do that baseline. Mr. Cox. Over time, we have been working with the department and with you directly to make sure that you acquire the number and quality of analysts necessary to perform IA's function. To what extent do these programmatic figures for TDA, for evaluation and studies, for the operations center and for information sharing and collaboration reflect the number of analysts that you have at your disposal? Lieutenant General Hughes. In the case of the operations center, there is no parallel at all. The operations center generally has people in it who are doing what I would refer to as information transfer. They are getting information in from any source at all. They do not analyze the information. They put it in the right bins. They alert people to the fact of the information. They pass it to others. They do any analytic endeavor. Mr. Cox. I note that the operations center is getting a big plus-up of, it looks to eyeball it, of about 40 percent. Likewise, evaluation and studies is getting a healthy increase. The threat determination and assessment account, on the other hand, is being reduced, and the explanation that has been provided to committee staff is that it is due in large part to a decrease in purchasing from government accounts and a decrease in advisory services needed for this account. To be perfectly honest with you, I do not have any idea what that means. So I do not know whether or not I need to be concerned. I know what our chief programmatic concerns are, and that is that we continue to help you build a core of talented analysts who can carry the full statutory mission forward of all source intelligence analysis, and make sure that even post- 9/11 Act, that the Homeland Security Department is a major participant in the intelligence community at the NCTC. Lieutenant General Hughes. I think your concern is well founded. If I could try it from a macro level, our overall budget I think is about 2 percent reduced, but money has been shifted around inside the structure of the IAIP to meet needs that we believe are present. Part of the plus-up in the HSOC is to handle COOP requirements and to meet the needs of the information flow that we anticipate is going to come into the department from greater feeding of information. This is raw information from the state and local sectors. In other words, we think after fielding homeland security information network, and that is JRIES with a new name on it, and after upgrading it to the secret level, we will be getting a lot more raw information. Handling that, processing it, is part of the plus-up that you see there. The idea of whether or not I can characterize what this set of words or phrases means exactly is kind of a mystery to me, too. In fact, I do not know if I could explain it. But I think the idea here is to get the information into not only the operational channel, but the intelligence channel for analysis concurrently. Lots of information that comes, especially the state and local and private sector, does not require much analysis in its initial form. It is a spot report, a patriot report, a person's call-in of suspicious activity. That may indeed be a piece of information that has to be put into the analytic environment, but standing alone it can also be passed to operators and actors for their initial appraisal of the information. To use the phrase, the phrase has become so unpopular, to connect the dots, the connection of the dots still goes on, but it kind of rests in the background for some of this information. The foreground is the initial use of the information in an operational setting, but we have shifted money around to do that. Mr. Cox. My time has expired. The gentleman from Mississippi, the Ranking Member of the full committee, Mr. Thompson. Mr. Thompson. Thank you, Mr. Cox. General Hughes, can you provide this committee with a breakdown of those contractor services that we are paying for over and above normal personnel costs, as information that you get back to us? You do not have to comment on it. Just provide to us. Lieutenant General Hughes. Yes, sir. Mr. Thompson. To your knowledge, are you aware of any problems with any of those contracting services as of this date? Lieutenant General Hughes. I am aware of some problems. Mr. Thompson. You are? Lieutenant General Hughes. Yes. Mr. Thompson. Can you also provide this committee with a listing of those problems? Lieutenant General Hughes. I will. Mr. Thompson. Thank you. With respect to the mapping the threat to vulnerabilities, what is your opinion of those vulnerabilities that have been identified, just in general? Do you think in your opinion those vulnerabilities meet the test of mapping? Do you think it is 50 percent complete? Just give me your honest opinion of it. Lieutenant General Hughes. My honest opinion is that we are far from finished. Indeed, we are now using a term called ``complex urban environment.'' We are treating the major cities especially, but also the industrial outliers and some other parts of the United States that have a concentration of activity that is of interest to us, and we believe it might be of interest to the terrorists, as an organism, so that if you kick the shin of a large complex city, the city may also get a headache at the same time as the shin hurt, because the thing is so interconnected. It is very much like an animal or a human. The nervous system of the city may indeed be affected by a kinetic blow. That is an important concept. I know it sounds a little ethereal, perhaps, but it is not. It is a fact. So probably the most common example of this is the electricity. You turn off the electricity, you turn off a lot of capability. If you turn the electricity off for a short period of time, you can live with it, not a problem. If you turn it off hard for a long period of time, we would have difficulty performing some of the functions we now take for granted. So that is an example. The electricity itself is what you have to attack in order to do that, or the control mechanisms associated with it. That fact, that idea that a hospital, as an example, when it runs out of fuel and its alternate power source does not operate anymore, and the electricity is still off, means that that is a vulnerability you have to assess carefully. If you did not assess it properly and have enough vision to see that after 3 days you were going to run out of fuel, there may not be a way to get more fuel because the pumps at the fuel station do not work because the electricity is off. Mr. Thompson. Okay. Lieutenant General Hughes. More than you wanted to know about it. Mr. Thompson. Well, I just want to know if we identified the hospital as a potential target. Lieutenant General Hughes. Absolutely. Mr. Thompson. Yes, okay. With respect to your present position, have you any access to all intelligence available? Lieutenant General Hughes. Yes, I have, but I have to tell you that not everyone who works for me has. Mr. Thompson. What was the problem with others not having access to that information? Lieutenant General Hughes. There is in the intelligence committee, it remains to this day, a culture in which a known person with a certain track record, having been polygraphed and background investigations done repeatedly over time, and a certain amount of dependability built into that background, and perhaps maybe you could even call it familiarization, the old- boy network, that culture has something to do with what level of trust and confidence others are willing to place in you. Mr. Thompson. Mr. Chairman, if I could. So if Congress passes an Act mandating agencies to share information, do I understand you to say that that is still subject to whether or not certain individuals want to share that information with other agencies? Lieutenant General Hughes. I probably would not put it quite like that. It is subject to the rules governing the information itself and who has access to it for what reasons. Mr. Thompson. Mr. Chairman, I guess my point is, if we pass an Act saying that these agencies have to share this information between them, I am now hearing that there is some other standard out there somewhere that prevents that information being shared. Lieutenant General Hughes. Let me just tell you, if I may respond to this, this always has been in the intelligence business in the government, something called the ``need to know.'' The ``need to know'' rule still applies, and for the most sensitive kinds of intelligence, about very specific activities, the ``need to know'' rule still is at work. My personal view, by the way, is it should be. You should not tell everyone every single thing every single day. You should make sure that the key persons who are involved in this work know the essential issues each and every day, and I believe that has been done in my case. Mr. Thompson. Well, I think we will probably have some more opportunities for discussion. Thank you. Mr. King. [Presiding.] All right, Mr. Thompson. General Hughes, let me thank you for your service, and I certainly wish you well after March 15. In a way, I will be following up on Congressman Thompson's question, or maybe expanding it a bit. Obviously, information analysis is a work in progress. You have described it that way yourself. How has the passage of the Intelligence Reform Act impacted on that, either positively or adversely? Do you feel that the sharing is working the way it should? Is it better than it was before? Do you feel constricted? Again, how does it impact on the Department of Homeland Security? Lieutenant General Hughes. The first part of the answer is it is a lot better than it was. Mr. King. Because of the legislation being passed, or just because of the evolving of time? Lieutenant General Hughes. To be very frank, sir, I have not personally seen or observed any change since the act was passed that could be attributed directly to the act. Any of the changes that have occurred were ongoing prior to the act being passed. The act is going to take some time to reach fruition, to have impact. I think it is a very good act. I fully support it. I think the advent of a Director of national Intelligence is an important piece of that act and will cause the sharing function, the interoperability and commonality among the information systems to occur so that sharing can be better facilitated, and numerous other functions that we all think are laudatory. That will happen. It is ongoing, and much of it was ongoing before the act was passed. That is just a fact. Over time, since September 11, I have seen a marked improvement. Indeed, in the past year, as I stated in my written testimony, there has been a distinct qualitative and quantitative improvement in the information that is being shared in the intelligence community. By the way, parenthetically, in what can be distinguished from the intelligence community, is the law enforcement community, which as we all know is the nexus that makes Americans nervous, but it is a nexus that has to occur in the battle against terrorism and the battle against destabilizing forces inside our culture. So that is working. We have a much better information relationship than we ever did with the FBI. Actually, it is improving right along. Every few days, we make some kind of improvement. Is it perfect? Is it everything we could wish for? No. But the improvement is so dramatic that I am loath to criticize it in any way. I am happy to characterize it as something that we ought to keep going. Mr. King. I have to ask you, is there anyone that you are willing to criticize? Are there any elements within the intelligence community, the law enforcement agencies, who you feel are not cooperating with the spirit of the post-9/11 world that we live in? Lieutenant General Hughes. I am not willing to criticize them. Mr. King. Could you question them? Could you enlighten us as to perhaps areas we should be looking at, where there is not full cooperation being given? Lieutenant General Hughes. I think you ought to do what you are doing now, which is continuing to press the entire intelligence community and the culture to the degree they possibly can to have broad and full information sharing. Just continue the pressure. It is working. I, for one, ascribe that success not to the practitioners of intelligence, but to you, the Congress. You have brought pressure to bear, and I thank you for it. Mr. King. If we were in closed session, could you direct us as to where we should apply more pressure, you know, in one place rather than another? Lieutenant General Hughes. No. I do not think so. I think I have given you an honest answer today. Mr. King. Okay. Also in your opening statement when you mentioned the fact that you would be leaving on March 15, you sort of enticed us with a statement that if we have any questions to ask you about suggestions that you might want to make, we should ask them. Let me ask you: Do you have any suggestions as to the future, regarding the department or regarding your specific position? Lieutenant General Hughes. I hope we can continue this work, strengthen it. We need the support of Congress and obviously we need the support of this committee and the subcommittees of the committee that are named after the work of securing the homeland. You need to be first for effectiveness, change, progress in the future here on the Hill. You also need to be our advocate to some degree. I certainly make a plea for that to continue. My view is that we did not have the same kind of supporting mechanism in Congress when we first started out at the so-called ``legacy'' or older agencies and departments did have. We are slowly building that. I see the permanence of this committee finally recognized, I think a year late at least, as a manifestation of that. I cannot see how you could view it any differently. Mr. King. Thank you, General. The gentleman from North Carolina, Mr. Etheridge. Mr. Etheridge. Thank you, Mr. Chairman. Let me join my colleagues and thank you for holding this hearing. General Hughes, thank you for being here. We are going to miss you. Lieutenant General Hughes. Thank you, sir. Mr. Etheridge. I wish you all the best. My State of North Carolina is a participant in the regional information sharing system or the RISS program. My question is, what is the status of linking the homeland security information network to RISS? How do you propose that we avoid duplication and confusion when we try to make these linkages so they will work best for the American people? Lieutenant General Hughes. RISS and LEO, the law enforcement side of that, can link now to JRIES. The names kind of run together here, but the homeland security information network is being empowered right now by the JRIES system which was an old Department of Defense system. That system was brought over to the Department of Homeland Security and put in place. Most people who have looked at it think it is an effective and efficient system. RISS and LEO both were able to link to it. It is not really hard to do. However, I believe that what we should have is a narrowing down of these systems and maybe even one system with one name, which can then be managed technically by one organizational entity. That is what I would like to see. That has proven to be an unpopular idea because of the investment that has been made in each of these separate systems. There are others besides RISS and LEO and JRIES out there. So I think another year or so of maturity and perhaps field evaluation may show, I am hoping it will show, that the power of combining these systems should be facilitated as rapidly as possible. Mr. Etheridge. General, let me follow that up, because it seems to me if we can get to that, and the sooner the better, because we save not only time, but we will save money. My personal view it would be a lot more effective for the American people and for those who use it. Would you agree or disagree with that statement? Lieutenant General Hughes. I completely agree. Mr. Etheridge. Is there some way, then, that this committee can help facilitate that movement and the maturity of that system? Lieutenant General Hughes. I think you can. I would like to invite you to have the proponents of the homeland security information network come here before this committee and give you their views and RISS and LEO also and others. I think that would be an excellent thing for you to do. Mr. Etheridge. Thank you, sir. I will encourage the leadership to take a look at that at some point. I think that is real cost savings, and would be very effective for the American people. I understand that DHS is attempting to provide useful intelligence to state and local first responders. How does IA handle the raw data and reports that you get from state and local officials coming in from the local? For example, what is the procedure for a police officer to report a suspicious activity that they may find, or any law enforcement officer, that ultimately could be used that may very well forestall a major problem that Homeland Security is responsible for? Lieutenant General Hughes. Right now, a police officer or a police organization will make a report through law enforcement channels to the Federal Bureau of Investigation, and either concurrently or separately to the Department of Homeland Security. These reports can be made verbally by telephone, or in some cases by the RISS network or the LEO network or some other way, a lot of which are terminated at the Homeland Security operations center. So the FBI gets them and we get them, generally speaking. There are cases where we have heard about, where reports do not come concurrently to one or the other. Usually, the report usually goes to the FBI first, and does not come to the Department of Homeland Security as a matter of routine. We are pressing to fix that by, first, advertising our role in the law enforcement community and asking them to follow this procedure. I might add that we have begun in the past year, and we now have something over 300 reports that are jointly filed with the Federal Bureau of Investigation. Those reports carry a message with them in the body of the report that says if you have any further information, or if you have any indication of activity associated with this report or in any other way, please report it to your local joint terrorism task force and the homeland security operations center. Mr. Etheridge. Thank you, General. I see my time has expired. It seems like this is another area that we could press a little more on, because if the FBI is not sending that information over, and it is not being shared, that is not what we had in mind when we set up Homeland Security. Lieutenant General Hughes. The FBI, I need to add this, I hope I did not characterize this wrongly, the FBI is not a problem in this regard. The FBI, at least as far as I know, is not preventing information from coming to the Department of Homeland Security. The local police, the law enforcement authorities out in the states and localities, sometimes do not report that information concurrently. But when the FBI gets it, in most cases they pass it to us, and we do the same. Mr. Etheridge. Thank you for that clarification. Thank you, Mr. Chairman. Mr. King. The gentleman from Pennsylvania, Mr. Dent. Mr. Dent. Thank you, Mr. Chairman. General thank you for your service. My question deals with the credibility of threats. Obviously, the 9/11 report talked a lot about the need to know versus need to share, and how do you strike that proper balance. When information, before it is going to be shared, obviously you have to determine whether it is credible. What is the process for determining the credibility of these types of threats before you can disseminate that information out in a timely manner to the people who need to know? Lieutenant General Hughes. That is a wonderful question because we live each and every day, and it is what I would refer to as Hobson choice. Mr. Dent. A what? Lieutenant General Hughes. A Hobson choice--a ``damned if you do, damned if you don't'' kind of choice. If we send information that we get out rapidly without taking some time with it, it is apt to be wrong. But if we take some time to clarify it, too much time, it loses its importance and its value over time. We never know. We cannot know whether it is accurate or not immediately. So our choice has been to report it as rapidly as we can, knowing that that is going to lead to much information going out in the field which is wrong. We know that, but we are hoping that all the professionals that receive this information will somehow understand that and be able to live with it. Mr. Dent. Just to follow up, we spend a lot of time around here trying to determine answers to questions, and thank you for your service. Lieutenant General Hughes. Thank you very much. Mr. King. The gentleman from Rhode Island is recognized, Mr. Langevin. Mr. Langevin. Thank you, Mr. Chairman. General I want to thank you for being here and for your testimony. Thank you for your service to the country, particularly in your latest role at the Department of Homeland Security. You have made a great contribution. Lieutenant General Hughes. Thank you. Mr. Langevin. If I could just begin with IA's role in the intelligence community. The Senate report on the intelligence leading up to Iraq brought to light a tendency toward group- think. The information basically stressed the worst-case scenario, and a failure to question assumptions, if you will. The question I have is, has IA institutionalized measures to ensure that a similar type of intelligence failure does not occur here, and if so, what measures are in place and are they effective? Second, there is a truism in the intelligence business that to get included in the right meetings, that you have to be able to bring something to the table. So what products or expertise does IA currently bring to the rest of the intelligence community such that it is seen as a valuable contributor to the intelligence process? Lieutenant General Hughes. Thank you very much. In the first case, we think there is a problem consistently over time in the intelligence building, and you have to guard against it at all times. One of the things that it is up to leaders to do is to develop an environment in which any question could be asked, any premise can be challenged, any idea can be called to account. We just have to do that. We have to tell people the truth as directly and as clearly as possible. I would place the burden for avoiding group-think not on a process or procedure, but on leaders, specifically the leaders in the intelligence community, not merely at the highest level, and I would certainly hold them accountable, but also down to the mid-grade, middle-management level. They have to let analysts reign in their intellectual space and be able to think beyond some kind of artificial limit, to be able to deal in concepts in their own context without some kind of constraint or restriction. If we do not have that kind of environment in the intelligence community, then group-think will absolutely occur, you can depend upon it. I had a friend when I was in the military, an Israeli intelligence general. He happened to be a lieutenant colonel at the time of the 1973 invasion by the Egyptians across the Suez Canal. A captain came to him and said, those Egyptians are testing us each and every time we carry out war games, and we are not doing anything about it. The lieutenant colonel said, they are just war games. The captain said, they are not just war games; they are practicing. One of these days, they are going to continue. You know the rest of the story. The lieutenant colonel later regretted his failure in this function, and the picture of the dead from the front there was an intelligence analyst with chains and a big heavy locks around his head. That is the issue. We just have to somehow generate an environment that never allows that to happen in the United States. Mr. Langevin. General, if I could be clear in the understanding that you in particular in your department have things in place to make sure that consciously you have made sure that group-think is not going to be a problem? Lieutenant General Hughes. I have done the best I could to generate an environment in which any idea is welcome, any thought is fine. At some point, however, decision-makers have to make decisions. If your decisions over time prove to be flawed or faulty, then you obviously have a problem. The second part of your question, would you repeat it? Mr. Langevin. I want to know if it is true that in the intelligence business, to get included at the right meetings, you have to bring something to the table. So I wanted to ask what IA currently brings to the rest of the intelligence community such that you are seen as a valuable contributor to the intelligence process. Lieutenant General Hughes. I think that is right, that you do have to contribute. I think we are beginning to contribute something that is somewhat unique. I refer to it as domestic information. In the situation here in the United States, we are in partnership with the FBI that involves the concept of law enforcement information and intelligence all together to inform decision-makers and responsible parties about the context in which things are happening, and about potential events. This is not spying on the American people in any way, but it is understanding that there are persons inside our society and coming towards us who would do us great harm. We have to know where those people are, who they are, what their capabilities are, and what the potentialities are. The Department of Homeland Security represents unique capabilities in that regard. We are the people who inhabit and control the borders. We are the people who inhabit and control the borders. We are the people who take care of the brown water on the shores of our nation. We are the people who sense the environment to protect important persons from harm. We are the people who administer the safety of our transportation system. No one else does these things. I believe we are being recognized as bringing unique and very valuable, not only information, but skills and capabilities to the table. I will have to tell you that I still detect some resistance, among others, to mention of those ideas in the context of the Department of Homeland Security. There is still sort of a default mechanism out there that when you talk about transportation security, and you might say TSA. If you talk about the Coast Guard, you talk about the Coast Guard. But over time, some development of the concept of an umbrella organization is gaining strength and will come to fruition. That would be the development of a very valuable concept for the Department of Homeland Security, which can achieve intra-component synergy among all of these capabilities. The simple answer is, yes, we bring something to the table, now and more in the future. Mr. Langevin. I see my time has expired. Thank you for your answer to the questions, and again thank you for your service. Lieutenant General Hughes. Thank you. Mr. Simmons. [Presiding.] I thank the gentleman for his questions. If he refers to the bipartisan Senate Intelligence Committee report of last year, the first eight conclusions deal with issues of group-think, and a contributing factor to group- think is a lack of information. The gentleman from California is recognized, Mr. Lungren. Mr. Lungren. Thank you very much, Mr. Chairman. Thank you for your testimony, General, and thank you, more importantly, for your lifetime of service. We all appreciate that. Could you give us an idea of where you think your department's information analysis capability is right now? That is, if you have to say that complete success would be a 10, and we know we could never get to a 10; maybe 9 is what we can achieve because we are always changing for that last one. As you leave, where do you think it is? Lieutenant General Hughes. Five to six. Mr. Lungren. If it were five to six, for us to get up to nine, what are the very specific two or three priorities that you would have the department emphasize with your successor? Lieutenant General Hughes. The kind of experienced, analytic workforce, public employees that we can depend upon over time, that will stay in this occupational field and continue to do this work for a long period of time. This is not conventional or routine intelligence work. It is different. Second, improvement on facilities. The facilities are inadequate to the task. We need support in that area. Three, you need a full understanding of the remainder of the intelligence community about what it is that we are doing, why we are doing it, and how we are doing it. I think that is the third item on the list for a reason. That is the lowest priority. The first two are vital. I would mention that we need more time. Everyone keeps saying, and I heard the Chairman mention a ``two-year period.'' It is true that we have been in existence for over two years, but I can tell you that we were not functional when I arrived on 17 November, 2003, in the intelligence business. We had 27 people; we could not do the job. Time period has to be measured in capability and effectiveness. We were not effective. We are not completely efficient and we are not as good as we should be. The progress is real. We just need some more time. We also need more people of the right kind, government employees, better facilities and structures, and we need understanding and support. Mr. Lungren. General, when I was Attorney General of California, one of my responsibilities was the head of WSIN, the Western States Information Network, one of the RISSes around the country. Are we utilizing the RISSes around the country effectively in information gathering and sharing? Lieutenant General Hughes. Probably not as effectively as we should. That is a process that we began this past summer by having people from all of the states come here to Washington. We began to inform them about the methods of information sharing at that time. We have a plan in place to have that same kind of gathering again this summer, and we are sending out mobile training teams who help people understand how things can be improved in that regard. Mr. Lungren. Let me ask the question this way: Are we utilizing the RISSes as a platform to provide information to you? Or are you duplicating or replicating that? Lieutenant General Hughes. We are using the RISS, the law enforcement network, and others to the degree that we can. It is a cooperative effort. Mr. Lungren. Okay. Sure. I know you are loath to criticize anybody, and I will not ask you to do that here, but I will just give you some insights I have received from some law enforcement people on the ground or in middle-management positions. They still find a reluctance to share information from the feds on down, specifically with the FBI. I would normally say, ``Well, you are always having grousing like that,'' but when I was Attorney General, frankly, I can tell you it was very serendipitous as to whether or not we got a spirit of cooperation from the feds, whose need to know seemed to be the feds need to know, but you do not need to know. Much information in the domestic arena, frankly, can be gathered as well and sometimes even better by the many more law enforcement officers we have at the local and state level than we do not the federal level. They are much closer to the street. They have more contacts. They may not have all the contacts in the specific terrorist organizations, but they have contacts with a lot of people that may come into contact with them. It is debilitating for them to be viewed as second-class citizens, and to have the feds say, we have the view, we have the mileage, we have the right to know, and you do not. I see it expressed in this way. That is, with the color code system we have and the alerts that they receive, they told me that oftentimes they would receive these alerts without really underlying information. So they were told generally speaking the threat assessment was higher, but they did not have real information therefore to respond to that. That, to me, suggests an underlying lack of trust of local and state government that still pervades the federal establishment. Can you tell me whether you have seen that, number one; and number two, if you have, what steps in particular has your department taken to try and break that down? Lieutenant General Hughes. First, everything you said I have heard. We may know the same people. [Laughter.] Mr. Lungren. We will not put that on the record. Lieutenant General Hughes. I have to tell you that I think it is absolutely accurate. The phenomenon of the arrogance of the federal establishment in relationship to the state and localities with regard to information is well known. Mr. Lungren. Well, members of Congress excepted, of course. [Laughter.] Lieutenant General Hughes. Sir, you can believe whatever you want. I have heard a lot about this. [Laughter.] Mr. Lungren. Better watch it, General. Be careful there. Lieutenant General Hughes. I have to tell you that I think it is an accurate portrayal. The local effort feels like they are second-class citizens because of the attitude that is conveyed to them by some federal officials. I do not think that is across the board. I think it is somewhat circumstantial, but nevertheless, it is a fact. What we have done is, first, we are sending out a lot more information; that is simply a fact. We can prove that by simply showing you the documents we now send routinely to the states and localities. We did assemble them here, and we are going to assemble then here again this year. It is a participative effort. Admittedly, it was not much of a dialogue. That is too bad, but in the first instance we had a lot of things to put out to them. And they actually thought it was very worthwhile. This summer, we have meetings here in Washington again over a three-to four-day period. We hope to make it more of a dialogue and we will hear from that more. By the way, we have this in August, so if there is any possible way we could get a Congressman or a Senator to come and meet before that group and give your views, we would really appreciate it, because this kind of interaction is vital. We have also established, and we are establishing over time, relationships with people. Some of these relationships are very circumstantial and short-lived. I did not meet the sheriff of Las Vegas, even though I had telephone conversations with him and talked to him on a couple of occasions. I never met with this gentleman personally face to face until a few days ago. Indeed, when I met with him, he had his share of complaints. But he is the guy in charge of Las Vegas. What do I know about Las Vegas? Nothing. I am completely dependent on him to know primarily what is going on in Las Vegas. However, he recognizes, I think as most localities do, that occasionally, especially in the world of terrorism, big problems can come toward specific towns and cities that the town and city do not know about. That is a fact. It is the nature of the larger world of intelligence and counterterrorism. They do not come and rest and stay in exactly the target place, so that everybody and their brother gets to know them. They project themselves into these environments and, usually relatively rapidly in the target area, take action. So we are trying to get a mutual understanding of the phenomenon. We do at the national level, at the federal level, have something to contribute, and we should contribute that by passing it to the states and local authorities, and we are trying hard to do that. We have made improvements, and if they were sitting here in this room, I think they would say that. I think they would say, yes, things are better than they used to be. Mr. Lungren. Thank you, General. Mr. Chairman, could we ask the staff to work with the General's staff for us to be able to see when threat assessments are made, the level of information that is given to local jurisdictions, so that we might be able to see what we are really talking about, because I have had these complaints from law enforcement saying they have inadequate information once a threat level is given to them. Maybe we just need to look at it ourselves. Mr. Simmons. I would be happy to do that. I began my political career as a police commissioner, and in the post-9/11 environment, the new model is not local, state, federal each doing its own thing. The new model is communication between all levels. I know the Ranking Member has expressed to me her frustration over the same type of issue. My guess is that this is an important consideration for this subcommittee, and we will certainly look into it. Lieutenant General Hughes. If you do not mind, I must give you just another piece of information. Mr. Simmons. I do not want to deny you, but the distinguished lady from Texas, her questions, I know she has been here for a while, so make it brief, General. Lieutenant General Hughes. Okay, I will make it brief. The question you posed to me was in the context of the homeland security alert system, the changing of the colors. It is true that in the initial application of the changing of the colors, not much information was given. It is increasingly true, has been over time, since the Christmas 2003 and January, February, and March 2004 period, we have given more information. I will make sure you have the context of the question, there. But I think it is a very good thing to ask, to have us give you a better characterization of how much information we are giving out. Mr. Simmons. The distinguished lady from Texas, Ms. Jackson-Lee. Ms. Jackson-Lee. I thank the Chairman and the Ranking Member. General let me thank you for your service, and try to go quickly through my questions because of the time. I believe that one of the aspects of the IAIP's most important issues is the analyzing and integrating terrorist threat information and making sure that amongst any other agency that we relate to the homeland, I think of the FBI and the CIA as having their own constituency bases, even though we are trying to work very hard at the integration of those agencies, really in terms of fighting terrorism, the Department of Homeland Security signified to America that we are focused on their needs and providing them with the intelligence they need to understand the terrorist threat and to fight terrorism. As I look at the budget, and I know that this is particularly related to the intelligence needs, I think a point worth noting is that the President's budget indicates that government-wide spending for homeland security increases really overall by $1 billion. To put this in perspective, we all know that we are spending about $1 billion a week in Iraq and probably other added dollars in Afghanistan. In particular, I believe that there is an intent to hire an additional 73 more employees, and also to seek ways of improving our ability to analyze and integrate terrorist threat information, map threats against our vulnerabilities and implement actions to protect American lives. I know that we are going to lose your talent in March, and again let me thank you for your service, but how are we going to do that when we are looking at a potential cut of $20 million? Might I add to that question a statement that you made in your speech when you were able to say that we were able to connect the homeland security information network with the regional information sharing system, and I think the previous question raised that question. You yourself said that one needs to be achieved, but we are on the right track. If you could expand on what you gave to Congressman Lungren, and talk specifically about the ability to hire employees and try to improve what we are trying to with this budget cuts. Lieutenant General Hughes. If I understand the question right, ma'am, the budget cut is not an assured thing. The Department of Homeland Security expects plus-up in our overall budget as you described, and we do not expect for the budget to be cut back. That is our hope. Ms. Jackson-Lee. But if it is cut back, then you will have difficulty fulfilling your mission. Is that correct? Lieutenant General Hughes. That is true. That is correct. I would certainly hope that that does not happen. With regard to the idea of whether or not we can do the job and how well we can do it, the connectivity that we have out there with the RISS system and the LEO system and others, this is an evolutionary thing. We just discovered not long ago a system that is run by the Federal Protective Service, which is part of the Department of Homeland Security, which is a portal into law enforcement information the Federal Protective Service holds. That is within our own department and we did not know it existed until not long ago. So we are learning. We are developing over time. A lot of these things, even though they may seem self-evident, they are not. We have had to ferret them out. I think we are continuing to make good progress. The answer I would give to you and to the person who asked the earlier question is, connectivity is almost everything. If we do not have that, and I think the Chairman is familiar, information not shared is worthless. That is it. That gets to the central idea here. We can get the information. The next imperative is to share it. That is what we are all about. So we have been trying to build and make this interconnected network a system of systems, whatever names you want to apply to it. We want to make sure it is interoperable, that it has enough elements of commonality so that we can pass information horizontally and vertically throughout the system. That is what we would like to do. Ms. Jackson-Lee. Mr. Chairman, I appreciate the General's views, and Ranking Member, sort of focusing on our questions, but let me just say that this exercise poses a very difficult challenge, because it is very difficult when you have overlapping committees of jurisdiction such as the Budget Committee. Your expertise and the Ranking Member's expertise on some of the aspects of this, still the time is not long enough to sort of probe General Hughes and the knowledge that he has. Two points I think are key to this, and I would start out by saying that homeland security connotes security of the homeland. People think of the FBI and CIA, so you have a great responsibility. I think that this one sentence that he has, the pages are not numbered, but when he talks of RISS and the law enforcement online, one needs to be achieved, I think in our work we need to focus in on whether we have appropriate resources to make sure that the communication is going on in the homeland with law enforcement. Another point is, and I think it is very important, is this right-to-know rule. We look forward to your expertise, but I wonder whether or not this committee will have oversight to be able to refine that in this new post-9/11 era. For example, and I will close on this note, General Hughes, there is something called OTMs at the border, the southern border, other than Mexican nationals coming across. That has taken a new life, that there are potential individuals coming across that border that may do us harm. The border patrol agents then become a greater force with respect to their need to know, and they need to know classified information or information at a very high level. I am not comfortable that even in this budget oversight we have focused on it. General Hughes, I thank you for the one very great point that you said, if we cut the budget and do not provide you with the resources, you are not going to be able to do the job. I think that is our responsibility. I yield back, and I thank the Chairman for the additional time on the clock. Thank you. Mr. Simmons. I thank you for your comments. I think we are all aware that this is the first hearing of the permanent subcommittee. It is historic in that regard. The opportunities for us are pretty dramatic, but the challenges are also great. It is an area where we have to work together and share together to be successful. I thank you for your comments. I think they are right on the dime. We will keep the record open for 10 days for any additional written comments that anyone may wish to submit. I have a few remarks to make as closing remarks, but I would like to recognize my Ranking Member, if she has remarks she would like to make. Ms. Lofgren. This is just the beginning, obviously, and General, we do appreciate your being here today, even though we will not be seeing much of you for long. I think certain questions have become more ripe in our minds as we listened to you. The connectivity of the system obviously is important, whether it is the Internet or whether it is intelligence. Therefore, we are dependent on agencies both within DHS, but also without. So we certainly cannot do it today, I am thinking about the FBI system that we had great promise for, but did not produce, and how that is going to impact DHS. I have spent 10 years on the Judiciary Committee paying attention to immigration, and I am very well aware of the deficiencies in the technology and that aspect, and the impact it has on the ability to gather information that then could be shared. So I am hopeful that as we move forward in this year that we will be able to look at those as they connect and maybe get some improvements that will make us all safer. I did want to just follow up very briefly in writing, but comment that I am concerned about the ``need to know'' information issue. Certainly, the Congress cannot micromanage an intelligence agency. It would not be proper, but I am concerned that if that is an ad hoc decision being made in the agency, then we have maybe failed to actually have the policy, the ``who voted for'' implemented. I think we have to explore that further, Mr. Chairman. Finally, my colleague from California mentioned the frustration that local agencies have. I think that has improved somewhat with Director Mueller and the FBI task force. At least the feedback I am getting from law enforcement is much different than I used to. But what I am hearing form local law enforcement is that they never hear from DHS. It is invisible to them. So I think we need to sort through and be parochial. There are more people living in Los Angeles County than there are in over 20 states, and how we are dealing with the gigantic nation-state of California and whether that system is going to work for that state or not, and how we might format it so we really do have a system that is slick and works and protects us. I thank the Chairman for recognizing me. Mr. Simmons. Thank you. Just very briefly, back in 1981, I became the staff director of the Senate Intelligence Committee, working for Senator Barry Goldwater as the Chairman and Senator Daniel Patrick Moynihan as the Vice Chairman. Try that one on for size, staff. The Chairman is Senator Goldwater. Well, you are too young to even remember who he is; and the Vice Chairman was Daniel Patrick Moynihan, a good Republican and a good Democrat. One from the west and one from the east; one conservative and one liberal. I sat and worked with them for 4 years as they initiated what I consider to be professional congressional oversight of the intelligence community. I learned about the value of bipartisanship, and I learned about the value of listening to others when it comes to the intelligence business. I learned that you can put those differences aside if you are focusing on a common goal, which in that case was to build the intelligence community to preserve and protect our values and our people and our country. Regrettably, on 9/11 we failed in that regard. So the mantle has been passed to another generation of members of Congress and another generation of members of the staff, to do what we can do to preserve and protect our homeland, while at the same time preserving and protecting our civil liberties. That is an awesome challenge. In those days 25 years ago, we did not have a hearing room or spaces that were ours. We occupied the auditorium in the Dirksen Building. Today, we do not have a hearing room, I do not believe. We are looking for one, although this is much better than the auditorium of the Dirksen Building, I can assure you. But we should not let these little logistical challenges get in the way of the important work of this subcommittee and of course the important work of the full committee. I will leave you with a final thought. For the 4 years that I have been a member of Congress, I have never changed the license plate on my car. I know some immediately go out with a screw driver and put on that lovely congressional plate. But the plate that I have on my car has the simple phrase ``kung ho,'' which conveys enthusiasm and excitement, but as we all know comes from the Chinese word ``kung ho,'' which means ``work together.'' I look forward to working together with the staff, with the members of this subcommittee, with the Administration and others, to pursue the important agenda that we have before us. Thank you all for being here today. And thank you, General, for your participation. [Whereupon, at 3:37 p.m., the subcommittee was adjourned.] A P P E N D I X ---------- --________ Material Submitted for the Record Questions and Responses Submitted for the Record by the Hon. Bennie Thompson for Acting Assistant Secretary for Information Analysis Karen Morr on behalf of DHS Question: 1. General Hughes, one theme the Department has repeated in describing the President's Fiscal Year 2006 budget is consolidation. I think we all recognize that the current organizational structure at DHS isn't necessarily the best one, and that moving offices or functions can improve performance or reduce cost. Some agencies, including the office that distributes billions of dollars to first responders, rely on IA for threat information. However, some parts of DHS have their own intelligence departments-- including the Coast Guard and Secret Service as part of the Intelligence Community, but also TSA, the Federal Air Marshals, CBP, and ICE. Thankfully, many of these programs are unclassified, so we can talk about their budgets in public. TSA, for example, is requesting $21 million and 99 FTEs for Fiscal Year 2006. Question: 1. Given the trend within DHS for consolidation, for example the transfer of research and development activities to the Science and Technology Directorate, should IA have more control over all the intelligence operations in DHS? Intelligence is integral to the successful operations of the Department of Homeland Security (DHS). In our efforts to build a strong Department from its original 22 agencies, it is critical to coordinate DHS intelligence functions. The ability of the Department to conduct its mission is enhanced when components have synchronized intelligence activities. The Office of Information Analysis, in concert with the DHS components that have intelligence activities, is conducting a study with the intent of developing a plan to integrate key aspects of these activities. That study is reviewing several elements of the intelligence program, including mission areas and supporting functions. The results of this study will be presented to the senior leadership this spring. IAIP will continue to work to ensure the Department's intelligence activities are coordinated. Question: 2. With the first deadline on the ``Information Sharing Environment,'' as mandated by the recently enacted Intelligence Reform and Terrorism Prevention Act, occurring in less than two months, do you know what will be the role of DHS in operating or setting the rules for the ``environment'' The first deadline related to the terrorism information sharing environment (ISE) was met. The President designated John Russack as the Program Manager responsible for planning for, overseeing the implementation of, and managing the ISE pursuant to section 1016 of P.L. 108-458. Per our statutory authorities and responsibilities, DHS has a critical role in the development of all aspects of the ISE, including the establishment of the business rules for the ISE. DHS has been actively engaged in the work to date toward developing the ISE and will continue to have an active role in relation to this Department, our stakeholders, and the community at large. In particular, DHS has a unique role, as defined under the Homeland Security Act, for sharing homeland security information with state, local, and tribal governments as well as the private sector in relation to critical infrastructure. Specifically, Executive Order 13311 delegates to the DHS Secretary the responsibilities for procedures for prescribing and implementing information sharing as defined in Section 892 of the Homeland Security Act (P.L. 107-296). Improving information sharing has been and continues to be a top strategic priority for DHS. The Information Sharing and Collaboration Office (ISCO) was established in DHS to provide focus and coordination for these statutory and Presidential mandates. DHS is currently a key link among State, tribal, and local government, as well as the private sector critical infrastructure entities. The Department is already operating in critical information spheres (defense, intelligence, homeland security, law enforcement, private sector) and is providing strategic guidance to oversee the development of their intersection and collaboration to produce all information necessary to govern and protect and will coordinate these activities with the Program Manager. Question: 3. After the 2004 elections, then-Secretary Ridge said that there had been a decrease in chatter and that the threat of terrorist attack was lower than it had been in some time. Is that still the case, and if so, how do you account for that? Beginning in Summer 2004, we began to see a decrease in incoming credible and/or specific information mentioning direct threats to the United States. The reasons for the quantitative and qualitative decrease--which lasted through late February 2005--remain unclear. Since then, we have tracked a number of threat streams deemed credible and/or specific to Homeland-related interests, however we do not know if this is related to the natural cycle of the intelligence collection process or other factors more related to actual terrorist operational planning. Despite this relative increase in credible and/or specific reporting since late February, we continue to lack information indicating an imminent threat to the United States, as well as the timing, targets, or methodology of any potential operation. While the Department of Homeland Security (DHS) and the rest of the Intelligence Community are still analyzing each particular threat stream, as well as those streams collectively, they do reinforce our perception regarding al-Qaida's ongoing strategic intent to conduct another dramatic attack in the United States. This intent and possible planning is reflected in all-source intelligence reporting, vice a single collection discipline. We note that the reporting level from vague, low-credibility, or undetermined sources (call-ins, write-ins, walk-ins, media pronouncements, etc.) regarding possible attacks on the Homeland remains relatively constant and numerically more significant than reports from ``credible'' sources. Question: 4. What changes are being considered for the Homeland Security Advisory System, and will the system continue to be used in its current structure? The Homeland Security Advisory System (HSAS) has evolved throughout the history of DHS and currently includes the flexibility to assign threat levels for the entire nation, or a particular geographic area or infrastructure sector, depending on the credibility and specificity of available threat information. The HSAS is a collaborative process which takes into account current threat information and incorporates the perspectives of other federal entities (both within and outside of DHS); state, local, and tribal partners; and private sector stakeholders. DHS learns new lessons and continues to improve the system each time HSAS level changes are considered. <all> </pre></body></html> |