[Senate Hearing 107-651]
[From the U.S. Government Publishing Office]
EFFECTIVE IMMIGRATION CONTROLS TO DETER TERRORISM
=======================================================================
HEARING
before the
SUBCOMMITTEE ON IMMIGRATION
of the
COMMITTEE ON THE JUDICIARY
UNITED STATES SENATE
ONE HUNDRED SEVENTH CONGRESS
FIRST SESSION
__________
OCTOBER 17, 2001
__________
Serial No. J-107-45
__________
Printed for the use of the Committee on the Judiciary
U. S. GOVERNMENT PRINTING OFFICE
81-651 WASHINGTON : 2002
___________________________________________________________________________
For Sale by the Superintendent of Documents, U.S. Government Printing Office
Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; (202) 512-1800
Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001
COMMITTEE ON THE JUDICIARY
PATRICK J. LEAHY, Vermont, Chairman
EDWARD M. KENNEDY, Massachusetts ORRIN G. HATCH, Utah
JOSEPH R. BIDEN, Jr., Delaware STROM THURMOND, South Carolina
HERBERT KOHL, Wisconsin CHARLES E. GRASSLEY, Iowa
DIANNE FEINSTEIN, California ARLEN SPECTER, Pennsylvania
RUSSELL D. FEINGOLD, Wisconsin JON KYL, Arizona
CHARLES E. SCHUMER, New York MIKE DeWINE, Ohio
RICHARD J. DURBIN, Illinois JEFF SESSIONS, Alabama
MARIA CANTWELL, Washington SAM BROWNBACK, Kansas
JOHN EDWARDS, North Carolina MITCH McCONNELL, Kentucky
Bruce A. Cohen, Majority Chief Counsel and Staff Director
Sharon Prost, Minority Chief Counsel
Makan Delrahim, Minority Staff Director
------
Subcommittee on Immigration
EDWARD M. KENNEDY, Massachusetts, Chairman
DIANNE FEINSTEIN, California SAM BROWNBACK, Kansas
CHARLES E. SCHUMER, New York ARLEN SPECTER, Pennsylvania
RICHARD J. DURBIN, Illinois CHARLES E. GRASSLEY, Iowa
MARIA CANTWELL, Washington JON KYL, Arizona
JOHN EDWARDS, North Carolina MIKE DeWINE, Ohio
Melody Barnes, Majority Chief Counsel
Stuart Anderson, Minority Chief Counsel
C O N T E N T S
----------
STATEMENTS OF COMMITTEE MEMBERS
Brownback, Hon. Sam, a U.S. Senator from the State of Kansas..... 7
Cantwell, Hon. Maria, a U.S. Senator from the State of Washington 9
DeWine, Hon. Mike, a U.S. Senator from the State of Ohio......... 72
Grassley, Hon. Charles E., a U.S. Senator from the State of Iowa. 75
Kennedy, Hon. Edward M., a U.S. Senator from the State of
Massachusetts.................................................. 1
WITNESSES
Butterfield, Jeanne A., Executive Director, American Immigration
Lawyers Association, Washington, D.C........................... 41
Gutierrez, Lino, Acting Assistant Secretary of State for Western
Hemisphere Affairs, Department of State, Washington, D.C....... 19
Norton, Richard E., Executive Director, International Biometric
Industry Association, Fairfax, Virginia........................ 64
Papademitriou, Demetrios G., Co-Director, Migration Policy
Institute, Washington, D.C..................................... 53
Ryan, Mary A., Assistant Secretary of State for Consular Affairs,
Department of State, Washington, D.C........................... 11
Ziglar, James W., Commissioner, Immigration and Naturalization
Service, Department of Justice, Washington, D.C................ 24
EFFECTIVE IMMIGRATION CONTROLS TO DETER TERRORISM
----------
WEDNESDAY, OCTOBER 17, 2001
United States Senate,
Subcommittee on Immigration,
Committee on the Judiciary,
Washington, D.C.
The Subcommittee met, pursuant to notice, at 10:36 a.m., in
Room SD-226, Dirksen Senate Office Building, Hon. Edward M.
Kennedy, Chairman of the Subcommittee, presiding.
Present: Senators Kennedy, Cantwell, Brownback, Grassley,
and DeWine.
OPENING STATEMENT OF HON. EDWARD M. KENNEDY, A U.S. SENATOR
FROM THE STATE OF MASSACHUSETTS
Chairman Kennedy. We will come to order. We know that there
has been some news affecting exposures to anthrax to some of
the staff in our buildings and that is being dealt with very
effectively by the Sergeant at Arms and by the health
professionals that have been assigned to deal with that job. We
feel strongly, since immigration issues have important
implications in terms of national security and also to
terrorism, that it was important that we move ahead.
We have legislation that Senator Brownback and I have been
working on which we intend to introduce shortly. We have been
getting some good suggestions and recommendations from the
administration and from other groups. But we are very strongly
committed to moving in this area. There are many aspects we
must address. There are our combat troops, there is money
laundering, and also the development of effective bioterrorist
abilities. We are dealing as well with the challenges of
immigration as well as the challenges in the intelligence
community. So all of these make up very important aspects in
dealing with terrorism. It was our judgment that we ought to
move ahead with this hearing, and we are very grateful to all
of our witnesses here this morning.
It is a privilege to chair this hearing today on the
critical issue of border security and its critical importance
in preventing terrorism. And I welcome all our distinguished
witnesses and commend them for their commitment to this
important issue. I look forward to hearing from them today and
working with my colleagues to protect our borders effectively
and fairly.
Strengthening the security of our borders is an
indispensable part of this Nation's effort to prevent future
terrorist attacks. We must develop policies and enact laws that
meet the serious security threats we face from abroad, and we
must do so without obstructing the entry of the more than 31
million foreign nationals who legally enter the United States
each year.
Clearly, the screening of foreign nationals who seek entry
into the United States must be improved. To do so, we must make
better use of intelligence information to identify high-risk
individuals who are potential terrorists and make sure that the
information is in the hands of the proper authorities in time
to act.
Accurate and timely intelligence is critical. Federal
intelligence and law enforcement agencies maintain lookout
lists containing the names of foreign nationals who pose a
threat to our safety and security. To keep these persons out of
the United States, intelligence agencies and law enforcement
agencies must be able to share and update this critical
information with the Department of State and the Immigration
and Naturalization Service as quickly as possible.
The Office of Homeland Security should coordinate the
implementation of a comprehensive data-sharing system to
provide these front-line agencies with the critical information
that they need.
Weaknesses exist in the lookout system. Potential
terrorists often use aliases and obtain false or stolen
identification. Biometric identification technology can be used
to improve the reliability of the lookout lists and enhance
border security. Their use should be significantly expanded,
for inclusion in passports, visas, and other travel papers.
Biometric technology should also be used to screen incoming
travelers. Automated systems, such as INSPASS, should be
expanded where practical to screen low-risk travelers.
The United States, Canada, and Mexico can clearly do more
to coordinate border efforts against terrorists. Efforts to
share lookout lists, develop and improve joint inspection
regimes and facilities, and train intelligence and other
enforcement personnel should be expanded.
Yesterday, Senator Brownback and I met with our two
Ambassadors from Canada and Mexico who made good
recommendations, and today earlier we met with the Deputy Prime
Minister of Canada, who also had useful suggestions.
In addition, we should work more closely with our European
allies and other countries to develop agreements to share
intelligence databases and collect information on persons who
have engaged in terrorist activity or who may be a threat. And
up until the law which has just passed the Senate, there was a
prohibition of sharing that information, both for the United
States and also in gaining that information. We have made
progress on that in the legislation which is pending action now
in the conference.
We should also expand the number of pre-clearance sites
abroad. Currently, most foreign nationals are inspected by
immigration officers upon arrival at U.S. ports of entry. Use
of pre-clearance sites allows more time for thorough
inspections and can lead to the apprehension of suspected
terrorists before they arrive in the U.S.
Many airlines transmit their passenger lists to the
destination airports, enabling U.S. authorities to investigate
the list while the planes are en route. Transmittal of these
lists is currently being used in 75 to 80 percent of all cases,
but it should be used for all international flights.
In addition, full implementation of an automated exit/entry
system will enable the INS to monitor foreign nationals in the
U.S. more effectively. Implementation of this system has been
delayed because the INS has lacked the technology to implement
this measure at all ports of entry, especially at the land
borders.
I know Mr. Ziglar has made this case appearing before other
Committees about the importance of getting the resources. We
support those requests, and they should be given a high
priority.
Federal funding is also needed to implement and effectively
operate the electronic foreign student tracking system enacted
in 1996.
A related issue is the large number of U.S. educational
institutions authorized to enroll foreign students. Periodic
review is needed to ensure that these institutions are
professional and competent. That hasn't been done in the past.
It will be done in the future.
The implementation of all these tracking systems will
enable the INS to determine whether foreign nationals have
complied with the terms of their visas and help to enhance our
security and safety by identifying possible threats. We can
protect our Nation's security, without undermining our history
and heritage as a Nation of immigrants.
[The prepared statement and an attachment of Senator
Kennedy follow.]
Statement of Hon. Edward M. Kennedy, a U.S. Senator from the State of
Massachusetts
It's a privilege to chair this hearing today on the critical issue
of border security and its critical importance in preventing terrorism.
I welcome all our distinguished witnesses and I commend them for their
commitment to this important issue. I look forward to hearing from them
today and to working with my colleagues to protect our borders
effectively and fairly.
Strengthening the security of our borders is an indispensable part
of the nation's effort to prevent future terrorist attacks. We must
develop policies and enact laws that meet the serious security threats
we face from abroad, and we must do so without obstructing the entry of
the more than 31 million foreign nationals who legally enter the United
States each year.
Clearly, the screening of foreign nationals who seek entry into the
U.S. must be improved. To do so, we must make better use of
intelligence information to identify high risk individuals who are
potential terrorists, and make sure that the information is in the
hands of the proper authorities in time to act.
Accurate and timely intelligence is critical. Federal intelligence
and law enforcement agencies maintain ``lookout lists'' containing the
names of foreign nationals who pose a threat to our safety and
security. To keep these persons out of the United States, intelligence
agencies and law enforcement agencies must be able to share and update
this critical information with the Department of State and the
Immigration and Naturalization Service as quickly as possible.
The Office of Homeland Security should coordinate the
implementation of a comprehensive data sharing system to provide these
front line agencies with the critical information they need.
Weaknesses exist in the lookout systems. Potential terrorists often
use aliases and obtain false or stolen identification. Biometric
identification technology can be used to improve the reliability of the
lookout lists and enhance border security. Their use should be
significantly expanded, for inclusion in passports, visas and other
travel papers.
Biometric technology should also be used to screen incoming
travelers. Automated systems, such as INPASS, should be expanded where
practicable to screen low-risk travelers.
The United States, Canada, and Mexico can clearly do more to
coordinate border efforts against terrorists. Efforts to share lookout
lists, develop and improve joint inspection regimes and facilities, and
train intelligence and other enforcement personnel should be expanded.
In addition, we should work more closely with our European allies
and other countries to develop agreements to share intelligence
databases and collect information on persons who have engaged in
terrorist activity or who may be a threat.
We should also expand the number of pre-clearance sites abroad.
Currently, most foreign nationals are inspected by immigration officers
upon arrival at U.S. ports of entry. Use of pre-clearance sites allows
more time for thorough inspections, and can lead to the apprehension of
suspected terrorists before they arrive in the U. S.
Many airlines transmit their passenger lists to the destination
airports, enabling U.S. authorities to investigate the list while the
planes are en route. Transmittal of these lists is currently being used
in 75-80% of all cases, but it should be used for all international
flights.
In addition, full implementation of an automated exit/entry system
will enable the INS to monitor foreign nationals in the U.S. more
effectively. Implementation of this system has been delayed because the
INS has lacked the technology to implement this measure at all ports of
entry, especially at the land borders.
Federal funding is also needed to implement and effectively operate
the electronic foreign student tracking system enacted in 1996.
A related issue is the large number of U.S. educational
institutions authorized to enroll foreign students. Periodic review is
needed to ensure that these institutions are professional and
competent.
The implementation of all of these tracking systems will enable the
INS to determine whether foreign nationals have complied with the terms
of their visas, and help to enhance our safety and security by
identifying possible threats. We can protect our nation's security,
without undermining our history and heritage as a nation of immigrants.
Again I thank the witnesses for being here, and I look forward to
their testimony.
Effective Immigration Controls to Deter Terrorism
october 17, 2001
The terrorist attacks on September 11 made clear that the United
States current intelligence and terrorism prevention net leaves us
vulnerable to serious security dangers. Strengthening immigration laws
should be an indispensable part of the nation's efforts to prevent
future terrorist attacks. Effective immigration and border controls can
have a significant impact on our national security.
This week, Senator Edward M. Kennedy, joined by Senator Sam
Brownback (R-KS), is introducing legislation that will institute new
procedures and dedicate new resources to increase the likelihood that
potential terrorists can be detected and apprehended before they act.
This legislation will significantly improve the screening of foreign
nationals seeking entry into the U.S. and better secure the nation's
borders. By making better use of intelligence information to identify
high risk individuals who seek to harm us, and ensuring that timely
information is in the hands of the proper authorities, this legislation
will help the nation meet the serious security threats we face from
abroad, without obstructing the free flow of goods across our borders
or the entry of the more than 31 million foreign nationals who legally
enter the U.S. each year as visitors, students, and temporary workers.
This legislation will increase the development and implementation
of effective immigration controls to deter terrorism.
intelligence. technology, and cooperation
Accurate and Timely Intelligence Is Critical
Federal intelligence and law enforcement agencies maintain
``lookout lists'' containing the names of foreign nationals who should
not be admitted to the U.S. These are individuals who have criminal
records, who have been denied visas or previously deported, who are
suspected terrorists, or who require serious scrutiny for other
reasons. To successfully prevent the admission of these persons into
the U.S., all intelligence agencies and law enforcement agencies,
including the CIA, DIA, NSA, and FBI, must share this critical
information with the Department of State and the Immigration and
Naturalization Service in a timely manner.
Currently, some of this information is not shared with these two
agencies, which are responsible for making determinations about who is
granted a visa or is admitted to the U.S. Legislation is now pending
which will provide the Department of State and INS with electronic
access to the FBI's criminal history databases. The Department of State
and the INS should also have electronic access to all lookout lists
maintained by the CIA, DIA, NSA and FBI. The new Office of Homeland
Security should coordinate the implementation of a comprehensive data
sharing system to provide these front line agencies with the critical
information they need Senator Kennedy's legislation will require the
prompt development and implementation of a plan to provide the State
Department and the INS with timely electronic access to all lookout
lists maintained by the CIA, DIA, NSA and FBI.
Biometric Technology Can Improve Security
Weaknesses exist in the lookout systems in terms of identifying
terrorists seeking visas. Potential terrorists often use aliases and
obtain false or stolen identification. Biometric identification
technology can improve the reliability of the lookout lists and enhance
border security. The most common biometric data include fingerprint and
hand imaging, iris and retina scans, and facial recognition. These data
cannot be borrowed, or stolen, and forging them is extremely difficult.
These new technologies can match a unique identifying characteristic of
an individual with a name, and they need to be used effectively.
Machine-readable passports and visas are becoming more prevalent
and more difficult to counterfeit. Biometric data are currently being
incorporated into some immigration documents, and their use should be
significantly expanded, for inclusion in passports, visas and other
travel documents. With such technology, a traveler's identity can be
quickly and definitively verified by matching the identity with
biometric data incorporated in their documents.
Biometric technology should also be used to screen incoming
travelers. Systems, such as INPASS, which use biometric imaging, have
proven successful in screening frequent low-risk travelers. Such
systems should be expanded where practicable, since they enable more
resources to be allocated to anti-terrorist and security activities.
This legislation will authorize funding to study, develop and
implement the use of biometric identifiers in passports, visas and
other immigration documents, and the use of biometric technologies to
screen incoming travelers to the U.S.
A North American System
The U.S., Canada, and Mexico can clearly do more to coordinate
border efforts against terrorists. Cooperation between our countries
can be strengthened, taking into account each other's security
concerns, while still facilitating the movement of goods and persons.
Efforts to share lookout lists, develop and improve joint inspection
regimes and facilities, and train intelligence and other enforcement
personnel should be expanded.
Criminal smuggling rings, with knowledge of the weaknesses in our
border security, have developed into multi-billion-dollar-a-year
operations, and potential terrorists could use these smuggling
operations to cross the border. Detecting and shutting down smuggling
operations requires close cross-border cooperation, and these border
security efforts must be strengthened.
In addition, we should work more closely with our European allies
and other countries, to develop reciprocal agreements to share
intelligence databases and collect information on persons who may be a
potential threat or who have engaged in terrorist activity.
This legislation authorizes the Department of State and INS, in
conjunction with the Office of Homeland Security, to study the costs,
procedures and implementation of a Perimeter National Security Program
for the U.S., Canada, and Mexico. It will also authorize a substantial
increase in staffing and resources for the INS and Department of State
to enhance security along the nation's borders.
screening individuals before they arrive in the u.s.
Consular Offices: The First Line of Defense
Most foreign nationals traveling to the United States must apply
for visas from U.S. consulates abroad. Consular officers, who tend to
be junior personnel with little job experience, interview applicants to
determine whether they are eligible for visas. Until now, consular
screening has focused primarily on detecting visa overstayers,
examining indicators such as bank accounts, which have no bearing on
whether the applicant is a security risk. Although this focus is
important, more emphasis is needed on issues of security. We should
build a corps of knowledgeable and experienced consular officers,
skilled in screening for security threats.
This legislation will require the Department of State to provide
specialized training for consular officers in the effective screening
of visa applicants who pose a potential threat to the U.S.
Immigration Checks at Airports Abroad:
Foreign nationals are generally inspected by immigration officers
upon arrival at U.S. ports of entry. In some high-volume airports
abroad, U.S. immigration checks are performed at pre-clearance sites at
the point of departure, where travel documents are inspected before an
individual boards a U.S.-bound plane. Pre-clearance sites should be
expanded. They allow more time for thorough inspection. While a U.S.
inspector has no authority to arrest a suspected terrorist at a pre-
clearance site, the U.S. could cooperate with authorities who do have
the power to apprehend suspects.
This legislation will examine the expansion of pre-flight
inspection sites abroad, including the number, location, cost,
staffing, and training of personnel.
Sharing Passenger Lists:
Once travelers have boarded, many airlines voluntarily transmit the
passenger manifest to the destination airports. Passenger lists are
investigated while the planes are enroute. Once the planes have landed,
authorities can intercept passengers who are on the lookout lists.
Transmittal of airline manifests is currently being used in 75-80% of
all cases, but it should be used for all international flights. The
State Department should also transmit electronic versions of its visa
files to inspectors, so they are available at the time of inspection.
This legislation will require all international commercial air
carriers to provide passenger manifest information in advance of
arrival.
monitoring foreign nationals in the u.s.
Automated Exit/Entry System
Upon arriving in the U.S., non-citizens, including permanent
residents and temporary foreign visitors, workers, and students,
complete a form, called the I-94 form, which they are supposed to
return when they leave the country. Upon departure, travelers are
required to return the I-94 forms to airline representatives, who are
supposed to turn them over to the INS. Compliance is inconsistent, as
not all carriers return the I-94 forms to the INS.
Persons leaving the country at land borders are also supposed to
turn in I-94 forms, but many do not. These forms are currently
completed by hand, and cannot be used to track the departure of
specific persons until entered into a computer.
In 1996, Congress enacted legislation mandating the development of
an automated entry/exit control system to record the entry of every
non-citizen arriving in the U.S. and match it with a record of
departure. The INS lacked the technology to implement this needed
measure at all ports of entry, especially at the land borders, without
serious disruptions. Last year, Congress enacted legislation to
establish reasonable implementation deadlines. The Attorney General is
required to implement the integrated system by December 31, 2003 at all
air and sea ports. For the 50 busiest land border ports of entry, the
system would be implemented by December 31, 2004, and for all other
land border ports, by December 31, 2005.
Technology is available to implement electronic entry/exit controls
at all air and sea ports, but it is costly. Other countries utilize
electronic controls that could be models for a similar U.S. program.
For example, Australia has an electronic visa that is incorporated into
the airline ticket. Implementation should be funded by the federal
government, and airline compliance should be mandatory.
Since implementation at land borders is more difficult and has the
potential of disrupting commerce, additional time and resources will be
needed to establish effective exit controls at these borders. In the
meantime, other steps can be taken. The U.S. has experimented with
commuter lanes that permit officials to pre-screen applicants, and to
issue more secure documentation and devices for automobiles, to
expedite crossings without sacrificing security. Such programs should
be expanded to permit rapid crossings of low-risk commuters and enable
the INS to concentrate its resources on those who have not been pre-
screened.
This legislation will authorize funding to implement an automated
entry/exit system at all ports of entry, using technology standards,
biometric identifiers, and machine readable documents to confirm and
record identity. It will also expand the use of existing automated
systems at land ports of entry to screen low-risk travelers.
Monitoring Foreign Students. In 1996, Congress established a
program to collect information on non-immigrant foreign students and
exchange program participants. The CIPRIS program was designed to apply
to non-immigrants with F (student), J (exchange visitor), or M
(vocational) visas. Information collected includes name and current
address, major field of study, termination date and reason for
termination, the number of credits completed per year, and any
disciplinary action taken against the student.
A pilot phase of this program ended in 1999, but the system has not
been implemented nationwide. Universities and colleges expressed
serious concerns about the costs and administrative burdens of the
tracking program. Some of these concerns were addressed in legislation
last year, but other problems persist. They include lack of adequate
funding for State Department consular operations and INS monitoring
systems; gaps in reporting systems that make it impossible for the INS
to know when foreign students leave, or when they fail to show up for
their programs; and inadequate support for university officials
responsible for ensuring compliance with visa requirements.
Federal funding is critical to implement and effectively operate
the this tracking system. The INS has estimated that the cost of
implementation is approximately $32 million over the next three years.
Gaps in the tracking program should be closed by requiring the INS to
notify institutions of a student's entry into the U.S., and requiring
institutions to report to the INS the non-appearance of any student
reported and any student who heaves the program.
A related problem is the large number of U.S. educational
institutions authorized to issue forms to allow foreign students to
obtain visas. Currently, more than 26,000 institutions are authorized
to enroll foreign students. Periodic review is warranted to ensure that
these institutions are professional and competent. They should certify
that they agree to comply with the reporting and recordkeeping
responsibilities or risk losing their authority to enroll foreign
students.
This legislation will authorize funding to implement the automated
student tracking system, expand the types of schools covered by the
system to into include flight, language, and other vocational schools,
close gaps in record keeping and reporting requirements, and require a
review of institutions authorized to enroll foreign students.
An Integrated Approach
The implementation of an automated entry/exit system and the
student tracking system will notify authorities whether foreign
nationals have left the country under the terms of their visas, and
whether foreign students are properly maintaining their status.
But, it is important to remember that foreign students represent
less than two percent of the 30 million temporary visitors admitted
annually to the U.S. And the vast majority of foreign visitors,
students and workers who may overstay their visas are not criminals or
terrorists.
Focusing INS resources on those who fail to comply with the terms
of their visas will do little to enhance our national security. Linking
these tracking systems to lookout systems and law enforcement
databases, however, will enable the INS and law enforcement agencies to
screen foreign nationals more closely and identify and apprehend those
who do present a threat to our national security.
This legislation will authorize the development of a cross-agency,
cost-effective electronic system to enable tracking systems to be
interfaced with intelligence and law enforcement data systems.
Again, I want to thank our witnesses for being here, and I
will recognize Senator Brownback for his comments.
STATEMENT OF HON. SAM BROWNBACK, A U.S. SENATOR FROM THE STATE
OF KANSAS
Senator Brownback. Thank you very much, Mr. Chairman. I
appreciate that and I appreciate our witnesses, and I think
this is a most timely and pressing topic in our combating
terrorism and our protection of our people and our way of life.
First, let me applaud the efforts of this Congress to react
promptly to the terrorist threats that face us. In only a
month's time, our represented officials came together and
passed an extensive anti-terrorist package, a tough,
thoughtful, bipartisan piece of legislation, along with a
number of other pieces of legislation, to allow us, to help us
to combat this war on terrorism. That will arm our Government
well in the fight against terrorism.
I also applaud several of our colleagues, Senators
Feinstein and Kyl, for their insightful hearing last week on
technology and terrorism and this Subcommittee for today's
hearing on effective immigration controls to deter terrorism.
Personally, I find the commitment and patriotism that echoes
through these halls to be truly inspirational. United we do
stand.
Nonetheless, the terrorist attacks of September 11th have
unsettled the public's confidence in our Nation's security and
have raised questions about whether our institutions are up to
the task of intercepting and thwarting would-be terrorists.
Given that the persons responsible for the attacks on the World
Trade Center and the Pentagon came from overseas, our citizens
understandably ask how these people entered the United States
and what can be done to prevent their kind from doing so again.
Clearly, our immigration laws and policies are instrumental
to the war on terrorism. While the battle may be waged on many
fronts, for the man and woman on the streets immigration is the
front line.
Of course, we must be vigilant not to punish the innocent
in our efforts to ferret out the criminal, nor should we allow
our values or out economy to be compromised. But we have a duty
to the American people to take measured steps to keep
terrorists from reaching our shores.
At this stage we must get a clear lay of the land. We must
assess precisely where our immigration laws and practices are
succeeding and where they must be improved.
The war against terrorism is a war won by information. The
more information we have, the better our chances of winning.
The more information our defenders can share, the stronger our
line of defenses. The better grasp we have on our immigration
procedures and practices, the better we can secure our borders
and our safety.
Mr. Chairman, I am hopeful that this hearing will bring to
light how best to utilize our immigration laws and resources to
deter terrorism. I look forward to hearing the insights and
recommendations of our officials from the Immigration and
Naturalization Service and from the Department of State. I
welcome the testimony of our learned witnesses from the public
sector.
I might add my comments as well to the comments that
Senator Kennedy put forward about we are working together on a
bipartisan piece of legislation to try to address specific
areas where there may be difficulties, where we need to tighten
up overall on our immigration system. People in this country
deserve a system that allows people into the country that want
to be helpful to America, but keeps people from the country who
want to harm this country. And I think that is all of our goals
and our objectives. And we have put forward, as Senator Kennedy
has articulated, several ideas already that we think would be
useful in pressing this forward to secure our borders in the
front-line war, and that front line in this war on terrorism
being the immigration policies and procedures that we practice
as a country. I look forward to your comments.
Chairman Kennedy. Thank you very much.
Senator Cantwell has been very much involved in the
development of our legislation on immigration policy issues,
and we welcome her, if she would say a word.
STATEMENT OF HON. MARIA CANTWELL, A U.S. SENATOR FROM THE STATE
OF WASHINGTON
Senator Cantwell. Thank you, Mr. Chairman. I thank Senator
Kennedy for holding this hearing on what I consider to be one
of the most important issues in the fight against terrorism.
How can we effectively secure our borders from terrorists? By
improving the quality and sharing of identity information;
improving the screening of foreign nationals seeking entry on
U.S. visas; improving the awareness of comings and goings of
these foreign nationals as they enter and exit our country; and
increasing the number of Border Patrol and immigration
personnel at our borders.
Mr. Chairman, we must strengthen the security at our
border. Last week, we passed a major anti-terrorism bill that
contained a number of provisions that will enable law
enforcement and the community of intelligence gatherers to
obtain and share vital information regarding persons who are a
threat to the U.S.
One of the most important new tools I was pleased to have
included in this legislation is the requirement that State and
Justice develop a visa technology standard based on biometrics
to help secure our border and make certain each individual who
seeks entry into our country on a visa is the person he or she
claims to be and that there is no reason to keep that person
out of the country.
American citizens and the citizenship that they get comes
with a deeply valued privilege, and that is the right to
privacy. But to require a fingerprint or digital photograph of
an alien seeking to enter our country is a reasonable and
effective way to improve our ability to keep terrorists out of
the country while still welcoming a vibrant flow of legal
aliens.
Aliens seeking to visit, to go to school, work, engage in
business will provide the consular office considering that visa
application with some type of biometrics, most likely
fingerprint and digital photograph, so that we can compare the
identity information with that of persons who are unwelcome in
the United States. With this technology, we will be able to
confirm the person presenting a visa at the border with the
information that they need.
The technology standard is not prescriptive, and I am well
aware that there are many different types of technologies
available here and in Canada and in other places. And I have
left it to the agencies to determine what type of information
sharing should be required as part of the visa program.
Let me note that I recognize that technology will be only
as good as the information system which it is put into, and,
therefore, facilitating a technology that compels cooperation
between agencies will be very important. I hope to aid in
changing the non-technology barriers to data sharing.
Further, I am willing to work with the chairman and Senator
Brownback and my other colleagues to assure that uniform
practices that will feed the system with critical information
on the State Department and INS need to be also working on an
international basis with our allies so that our northern
perimeter will be as good as that technology standard.
Mr. Chairman, again, I look forward to hearing the comments
from the witness, and thank you for holding this very important
meeting.
Chairman Kennedy. Thank you.
We have been joined by Senator Grassley.
Senator Grassley. Thank you very much, Mr. Chairman.
I think that we need to better share information. The INS
needs all relevant information at its disposal that will
identify and track down immigrants who are on watch lists of
other countries.
The second point I would make is that we should implement
technologies needed to prevent illegal or criminal aliens from
entering. We need to create tamper-resistant visas and
passports. We need to invest in an effective biometric system
and provide the scanners to read the information on border
crossing cards. I know that Mr. Ziglar is going to lay out
about that testimony and has instructed his staff to expedite
database improvements. He specifically mentions the Student
Exchange Visitor Information System.
Unfortunately, delay in the implementation of this system
has and may continue to have detrimental effects on our
Nation's security, and that is very unacceptable. We want to
help the colleges and universities, and in turn, I believe that
colleges will want to help us in our war on terrorism.
Pursuant to this, I wrote Attorney General John Ashcroft
and requested immediate consideration of Federal funding to
speed up implementation of the student tracking system. I
propose that the Justice Department use a portion of the
emergency anti-terrorism funds approved by Congress to fund the
start-up of the student tracking system. Additionally, the
Department should clearly outline the responsibilities of
schools who wish to retain foreign students.
Finally, I realize that the Immigration Service does not
have the enforcement tools to go after every foreign student
whose visa expires. And even if Federal agencies are sharing
data and using the best technology we can create, the INS will
still face problems in catching the bad guys.
These are situations in which we can enlist State and local
support. By implementing Section 133 of the Illegal Immigration
Reform and Immigrant Responsibility Act, the Department of
Justice can enter into agreements with local law enforcement
agencies in order to allow qualified officers to help in the
investigation, apprehension, and detention of illegal aliens.
The enemy could be among us, and the threat certainly
remains before us. Now is the time to act on what we know are
problems. I already identified a number of problems and
concrete solutions. We need to move forward with the proposals
that we have discussed since September the 11th.
I thank you, Chairman Kennedy.
Chairman Kennedy. Thank you very much.
It is an honor to introduce our first panel: Assistant
Secretary of State Mary Ryan; Acting Assistant Secretary Lino
Gutierrez; and INS Commissioner James Ziglar.
Ambassador Ryan has been a distinguished leader at the
State Department since she joined the Foreign Service in 1966.
She became Assistant Secretary of State for Consular Affairs in
1993. Before that, she had served as Deputy Assistant Secretary
in the Bureau of European and Canadian Affairs, as Ambassador
to Swaziland, and in numerous embassies and positions in the
State Department.
Ambassador Gutierrez has also had a distinguished career in
the State Department, where he is now Acting Assistant
Secretary for Western Hemisphere Affairs. He has served as
Ambassador to Nicaragua and has also been posted to the
Dominican Republic, Portugal, France, and the Bahamas, and has
extensive knowledge on border security issues.
Commissioner Ziglar is well respected by all of us in the
Senate who know him well, and I am honored to welcome him back
to this Committee in his new position as the Commissioner of
Immigration and Naturalization Service. Mr. Ziglar worked
closely with all of us in the Senate in his outstanding years
as the Senate Sergeant-at-Arms. He has also served as a
managing director of Paine Webber and Drexel Burnham Lambert,
as Assistant Secretary of the Interior for Water and Science.
He had also practiced law for many years and was a clerk on the
U.S. Supreme Court for Justice Harry Blackmun.
I thank all of you for being here. We will recognize Ms.
Ryan.
STATEMENT OF MARY A. RYAN, ASSISTANT SECRETARY OF STATE FOR
CONSULAR AFFAIRS, DEPARTMENT OF STATE, WASHINGTON, D.C.
Ms. Ryan. Mr. Chairman, members of the Committee, thank you
for the opportunity to appear before you today to explain the
role of the Bureau of Consular Affairs, and most particularly
our visa processing system, in our country's border security
program. I have a much longer statement, Mr. Chairman, which I
would like your permission to submit for the record.
Mr. Chairman, the resolve of the Department of State and
the Bureau of Consular Affairs to be full partners in the war
against terrorism is stronger than ever. In my testimony today,
Mr. Chairman, I will describe what we have been doing to make
our consular name check systems the best in the world and our
plans to make them even better in the future. I will also
address the procedures for visa issuance and the scope of the
Department's data sharing with intelligence and law enforcement
communities.
I can say with confidence that we are using today a state-
of-the-art visa name check system, and we continue to seek and
explore new technologies to expand our capabilities. If there
is one thought that I can leave with the Subcommittee today, it
is that any name check system is and will be only as good as
the information we receive to put into it.
Let me begin by noting that all visa cases are processed
using the automated name check system, which prompts the name
check through the Department of State's centralized lookout
system known as CLASS. A consular officer must review all hits
before the case can be formally approved for printing. There is
no override to this procedure. Simply stated, it is not
possible to issue a visa unless the name check has been
completed and reviewed by an officer.
The Department also has in place special headquarters
clearance procedures for nationals of certain countries,
including students, such as those on the State Sponsors of
Terrorism list, as well as for those whose planned travel
raises concerns about unauthorized access to sensitive
technologies.
Once approved, a visa containing numerous safety features
and a digitized photo is placed in the alien's passport. I
should point out that the period of visa validity has nothing
to do with the period for which the alien may remain in the
United States. A visa permits the alien to apply for entry to
the United States. Only INS may authorize such entry and
determine the alien's length of stay.
Now, let me briefly describe our visa name check database.
CLASS, which stands for Consular Lookout and Support System,
contains about 5.7 million names concerning foreigners, most of
which originate with visa applications at our consulates and
embassies abroad. INS, DEA, the Department of Justice, and
other Federal agencies also contribute to our system. We in
turn have provided approximately 500,000 lookout records to
other agencies through real-time electronic links to the
Interagency Border Inspection System, known as IBIS.
In the aftermath of the World Trade Center bombing in 1993,
the Bureau of Consular Affairs funded a counterterrorism tool
known as TIPOFF. This utilizes sensitive intelligence and law
enforcement information from the CIA, the NSA, FBI, and our
overseas posts concerning known or suspected terrorists.
The TIPOFF staff screens all incoming intelligence reports
and other sources of information for the names and biographic
data of known and suspected terrorists. Permission is obtained
from the relevant agencies to declassify identifying data of
suspected terrorists, and then that data is entered into CLASS
at IBIS.
The Visas Viper program is another integral part of TIPOFF.
The Visas Viper staff, in close coordination with the Bureau of
Consular Affairs, solicits information on suspected terrorists
from overseas posts for inclusion into the database. Beginning
in 1996, with the help of Congress through retained machine-
readable visa fees, Consular Affairs undertook a major
modernization of our systems. By 2001, all visa data collected
abroad, including photographs of the applicants, is being
replicated to the Consular Consolidated Database and is made
available to posts abroad. This year we deployed a pilot
program to share limited non-immigrant visa data with INS
inspectors at the port of entry at Newark, and we are very
pleased that INS will soon expand use of this replicated data
to all ports of entry. This will provide each INS inspector
with a photo to compare with the person in front of them, a
system cheaper than fingerprints and just as effective.
The Consular Lookout and Support System is modern and
extendable. Our name check system remains robust because we
continue to upgrade it. Allow me to outline a few of the
initiatives that we have underway right now.
For many years, we have sought access to FBI criminal data
on aliens applying for non-immigrant visas. I am very grateful
to Members of Congress that legislation has been introduced
that would provide us this data. I particularly want to thank
you, Mr. Chairman, Senator Brownback, and others on the
Subcommittee for introducing S. 1452 on September 21st.
I realize that my time is almost out, and--
Chairman Kennedy. This is very important.
Ms. Ryan. Should I just continue?
Chairman Kennedy. Please.
Ms. Ryan. I don't want to take too long.
We will also soon introduce improved field backup name
check systems for use when telecommunication links are
interrupted, and by summer 2002, every visa-issuing post will
have a local backup that closely approaches the abilities of
the CLASS mainframe.
Photographs are key to our exploration of biometrics.
Because every visa application already contains a photograph,
we capture a biometric identifier on all applicants right now.
For this reason, we have for some time been investigating the
use of facial recognition technology for identification
purposes.
Pilots at our posts in India and Nigeria have proved very
promising, and in late August, we launched a pilot at the
Kentucky Consular Center aimed at detecting invalid diversity
visa applications. We will soon test the abilities of facial
recognition software to compare visa applicants to a sample
database of photographs of suspected terrorists. We seek to
expand the pool of such photographs through liaison with other
Government agencies. We are also consulting with private sector
users of facial recognition technology.
We will also soon complete field-testing a new, more secure
non-immigrant visa and design a machine-readable, secure
immigrant visa that will, in conjunction with the data-share
program, virtually eliminate photo substitution. We are also
planning to develop a forensic documents lab to give us an
independent capability to detect and counter fraudulent or
counterfeit U.S. and foreign visas and passports.
Mr. Chairman, all of these initiatives, past, present, and
future, have been made possible because of a very wise decision
by the Congress a few years ago to permit us to retain machine-
readable visa fees. Since 1994, when we were given the
authorization to charge and retain these fees, we have spent
every penny sensibly and judiciously. We continue to rely on
MRV fees, as we call the machine-readable visa fees, to finance
the salary and basic benefits of virtually all American
employees who provide consular services. Permanent and uncapped
MRV fees are essential to continuing our efforts to enhance our
border security program.
Mr. Chairman, in our free society, we must continue to
improve the security of our borders while keeping our hearts,
our minds, and our economy open to new ideas, new people, and
new markets. CA has been and will continue to be a full partner
in the battle against terrorism.
I close with the point that I made at the outset. We cannot
be the effective outer ring of border security if we don't get
information on people who seek to harm our country from
intelligence and law enforcement agencies. Information sharing
is key to the protection of our Nation.
Thank you, Mr. Chairman, and members of the Committee for
allowing me to appear before you today. I will be pleased to
try to answer any questions you may have.
[The prepared statement of Ms. Ryan follows:]
Statement of Mary A. Ryan, Assistant Secretary for Consular Affairs,
Department of State
Mister Chairman and Members of the Committee:
Thank you for the opportunity to appear before you today to explain
the role of the Bureau of Consular Affairs, and most particularly our
visa processing system, in this country's border security program. I
only wish, Mr. Chairman, that the context for this hearing could be
different. In that case I could open these remarks by saying how happy
I am to appear before you, because I am proud of the systems we have
developed over the past several years and that we work very hard to
improve each and every day. I would convey again my appreciation for
the help that the Congress has given the Department to improve our
consular systems by allowing us to retain machine-readable visa (MRV)
fees. However, I appear before you today keenly aware of the terrible
tragedy that befell our country and all civilized countries on
September 11.
In my testimony, Mr. Chairman, I will outline for you what we have
been doing to make our consular systems the best in the world and our
plans to make those systems even better in the future. During my tenure
as Assistant Secretary, the Bureau of Consular Affairs (CA) has been
continually engaged in efforts to design, deploy, and improve the
systems that help flag for our consular officers terrorists and
criminals among visa applicants. I can say with confidence that ours is
a state-of-the-art system that functions as it was designed. At the
same time, we continue to seek and exploit new technologies to
strengthen our capabilities. If there is any single point I can leave
with the Committee, it is that that any namecheck system is and will be
only as good as the information we receive to put in it.
Visa Processing
I will first focus on non-immigrant visa processing and explain
briefly how applicants are processed so that you will understand the
environment in which out systems operate. Applicants for non-immigrant
visas submit a written application, with a passport and photo, for
adjudication by a commissioned consular officer or other designated
U.S. citizen. Locally engaged staff assist in visa processing but are
not authorized to approve and issue visas.
Visa applications are processed using sophisticated automated
systems. Data entry automatically prompts a namecheck through the
Department of State's centralized lookout system (CLASS, the details of
which I will discuss later in my testimony). A consular officer must
review all hits before the case can be formally approved for printing.
There is no override for this feature; it is not possible to print a
visa unless a namecheck has been completed and reviewed by an officer.
Consular officers evaluate applications by looking at the full
range of criteria established by U.S. immigration law. They review the
credibility of professed plans for travel to the U.S. For most visas,
applicants must establish that they intend to visit the U.S. only
temporarily, are qualified for the visa classification sought, and will
undertake only activities consistent with the particular visa status.
Applicants must also establish that they are not otherwise ineligible
to receive a visa under one of the specific grounds of ineligibility in
the Immigration and Nationality Act, including terrorism, drug
trafficking and alien smuggling.
In addition to namecheck results, consular officers use a
combination of experience, knowledge of local economic, political and
cultural conditions, and common sense to evaluate applications.
Supporting documentation may be solicited and reviewed as needed. When
there are specific signs of fraud or deception, an investigation may be
conducted using consular anti-fraud resources.
The ever-growing numbers of visa applications has meant that
consular officers must reach decisions in individual cases rapidly. To
assist them in doing so, our namecheck technology provides results in
real-time. We have used outside linguistic experts to make our search
criteria for ``hits'' as helpful as possible. We have instituted
sophisticated Arabic and Russian/Slavic algorithms to identify names
regardless of transliteration variations, and are presently developing
a similar algorithm for Hispanic names.
Once approved, a visa containing numerous security features and a
digitized photo is placed in the alien's passport. The maximum period
of visa validity is ten years for multiple entries. The validities of
different types of non-immigrant visas are determined on the basis of
reciprocity with each foreign government. I should point out, Mr.
Chairman, that the period of visa validity has nothing to do with the
period for which an alien may remain in the United States. A visa
permits an alien to apply for entry to the U.S., but only the INS may
authorize such entry and determine the alien's length of stay.
Visa data, including photos and pertinent biographic data, is
electronically forwarded to the Consolidated Consular Database
maintained in Washington. This database also contains information on
refused applications.
Immigrant visas are for persons intending to reside permanently in
the United States. U.S. citizens and legal permanent resident aliens,
as well as prospective employers, file with the INS petitions on behalf
of certain relatives and employees. A special element of U.S.
immigration law is the Diversity Visa (DV) for which ``winners'' are
chosen by lottery. Like non-immigrant visa applicants, immigrant visa
and DV applicants must undergo namechecks. In addition, an FBI employee
at the National Visa Center does a National Criminal Information Center
(NCIC) criminal history check of these applicants.
I should note that, while immigrants are covered by NCIC screening,
nonimmigrants are not. I'll return to the solution to this problem,
which I hope is imminent, in the context of our namecheck system.
The Namecheck System
Integral to visa processing is the namecheck system. CA is well
aware of the importance of sharing and receiving critical intelligence
and criminal data from intelligence and law enforcement agencies. In
addition to ensuring that no visa is issued without a namecheck, we
have worked hard over the past decade to deliver more information from
other agencies to our visa officers via the namecheck system.
Our lookout database, the Consular Lookout and Support System
(CLASS), contains about 5.7 million records on foreigners, most of
which originate with the visa application process at our consulates and
embassies overseas. A variety of federal agencies contribute lookouts
to our system. INS has provided over one million records, and DEA about
330,000. Customs is working with us to provide 20,000 or more lookouts
from its serious drug violator records by the end of this year. We in
turn provide Customs, INS and other agencies using the Interagency
Border Inspection System (IBIS) with approximately 500,000 lookout
records through a real-time electronic link.
We also provide our officers, and the INS, with data on lost and
stolen foreign passports to prevent the use of such passports by
impostors.
TIPOFF and Visas Viper
In the aftermath of the 1993 World Trade Center bombing, the Bureau
of Consular Affairs--as part of the Department of State's border
security program--funded a border security and counterterrorism tool
known as TIPOFF. It was developed, and is managed, by the Bureau of
Intelligence and Research (INR), utilizing sensitive intelligence and
law enforcement information from the CIA, NSA, FBI and our overseas
posts concerning known or suspected terrorists. TIPOFF's objective is
to detect these individuals either as they apply for visas overseas, or
as they attempt to pass through U.S., Canadian, and Australian border
entry posts. (Data-sharing programs were implemented with Canada in
1997, and with Australia in 2000.)
The TIPOFF staff in INR screens all incoming intelligence reports,
embassy cables and other sources of information for those documents
containing the names and biographic data of known or suspected
terrorists. Following strict procedures approved by the respective
intelligence and law enforcement agencies, permission is obtained to
declassify names, nationalities, passport numbers and dates of birth of
suspected terrorists. This data is then entered into CLASS and the INS
and Custom Service's IBIS system. Consular officers overseas encounter
``hits'' based on TIPOFF data in the regular course of their work. The
CLASS database contains over 48,000 such records. TIPOFF has passed
approximately 23,000 records to INS and other inspection services at
ports of entry via IBIS, which uses a higher standard of biographic
data for its entries.
The Visas Viper program is an integral part of TIPOFF. The TIPOFF/
Viper staff works in close coordination with CA to solicit information
about suspected terrorists from overseas posts. This data is included
in the TIPOFF database and watchlisted in CLASS and IBIS. A procedural
adjunct to the Visas Viper program, called TIPPIX, incorporates
terrorists' photographs into the TIPOFF and IBIS databases.
TIPOFF performs the following important functions:
t helps preclude the inadvertent issuance of visas to
terrorists whose names are known to intelligence and law
enforcement agencies;
It warns embassies and consulates that certain
applicants may pose a security risk;
It alerts intelligence and law enforcement agencies
that a suspected terrorist is applying for a visa;
It provides a means for informed decisions to be made
on whether to issue a visa for operational or other policy
considerations, or deny the application;
It enables INS and Customs to detect suspected
terrorists who may have obtained a visa prior to being
watchlisted in CLASS, or who are attempting to enter the U.S.
through the Visa Waiver Program (VWP);
And it provides operational opportunities at border
entry points through use of ``silent hits'' or other handling
codes.
We are also comparing new TIPOFF hits in the Consular Lookout and
Support System with visa issuance information in the Consolidated
Consular Database, to determine if a subject of derogatory information
was issued a visa before the hit was created.
Security Advisory Opinions
We also address cases posing potential security threats using
Security Advisory Opinion procedures. We have concluded a series of
agreements with law enforcement and national security agencies
concerning categories of individuals of concern. Such persons are the
subjects of a cable prepared by a consular officer and disseminated
electronically to all appropriate agencies for an in-depth clearance.
The Department of State has designated Cuba, Iran, Iraq, Libya,
North Korea, Sudan, and Syria as state sponsors of terrorism. Visa
applications by officials and diplomats of these countries for the most
part must be submitted to the Visa Office for review and an advisory
opinion as to ineligibility before a visa can be issued. (This
requirement does not presently extend to diplomatic/official visa
applicants from Syria.) Non-official visa applicants from these
countries are also subject to a wide range of special clearance
procedures based on their background, the nature of their proposed
visit, and the type of visa they are seeking.
Based on agreements with the FBI, we also maintain a variety of
special clearance procedures--beyond the regular CLASS namecheck--for
numerous other nationalities, including Afghanistan. The reasons for
these special clearance procedures vary, but include concerns related
to espionage, technology transfer, economic sanctions, and human rights
violations.
In addition to these nationality-specific clearance requirements,
we universally require special clearance for applicants of any
nationality who are the subject of the most serious CLASS lookouts. We
similarly require special clearance for applicants whose planned travel
to the United States raises concerns about unauthorized access to
sensitive technologies, even if there is no lookout entry for the
individual. Consular officers are also asked to submit for a security
advisory opinion any other cases that they feel raise security
concerns, regardless of namecheck results.
The Consular Consolidated Database
Our data-sharing efforts are not, however, limited to the namecheck
system. We are now delivering more information to our visa officers via
a globalized database of visa records. Beginning in 1996, thanks to the
help of Congress with retained MRV fees, Consular Affairs undertook
major modernization of our systems. By March 2001, all visa data
collected abroad was being replicated to the Consular Consolidated
Database. In May 2001, we made the Consular Consolidated Database
available to all our visa officers abroad. The photo and details of
visa issuance, once only available locally to the post taking action,
are now available in real-time to all visa offices worldwide. Visas can
be checked at any point in the issuance process against all issued and
refused visas worldwide, and consular management in Washington now has
access to up-to-the-minute information about visa and passport issuance
around the world.
Data-Sharing with the INS and Other Federal Inspection Services
We are working to widen the flow of information to relevant Federal
Inspection Services. We are mindful of the challenges that INS faces in
inspecting millions of foreign visitors at ports of entry. We have a
number of initiatives underway to share additional information with INS
in order to improve border security. As I mentioned earlier, the
Consolidated Consular Database allows us to make visa information,
including digital non-immigrant visa photographs, immediately available
both in Washington and at all consular sections worldwide. We want INS
to be able to make good use of this data, in particular photos of each
individual who has been issued a visa.
Since the mid-1990's, State and INS have had a cooperative program
which has resulted in State forwarding to INS, for use at ports of
entry, electronic data on 55% of all immigrant visa recipients. The two
agencies have cooperated in exchanging information at all stages of the
immigrant visa process, from approving petitions to issuing legal
permanent residence cards. We are about to make certain software
changes that should allow complete sharing of immigrant visa
information with INS within the next year.
The Department is prepared to share all of its replicated non-
immigrant visa files with INS as soon as the Service is ready to
receive it. Towards that end, in July 2001, we deployed a pilot program
to share limited non-immigrant visa data with INS inspectors at Newark
and with the INS forensic document lab. The program was expanded to
Miami in September, and INS plans to make the data available to all
ports of entry over the next several months. We look forward to the
time when we can share all of our replicated files with all INS ports
of entry, as they will give INS inspectors near real-time access to
data that will allow them to better detect fraud and facilitate
legitimate travelers. In the meantime, INS inspectors have access to
our electronic visa data via telephone contact with the Visa Office.
Looking Ahead: Improving and Extending our Systems
The Bureau of Consular Affairs has staff specifically dedicated to
technical development to ensure we maintain state-of-the-art tools for
adjudicating visas. The Consular Lookout and Support System is modern
and extendible. Our namecheck system remains robust because we continue
to upgrade it. We are committed and are actively working to expand
datasharing with INS, other federal inspection services and law
enforcement agencies.
a. gaining access to fbi ncic iii data
We need access to FBI criminal record data (NCIC III) on aliens to
assist consular officers in their adjudication of visa applications and
have been seeking authority for such access for many years. We already
screen our immigrant applicants using FBI information and want to do
the same for non-immigrant applicants. We envision a system of index
records on aliens (excluding all U.S. citizens and legal permanent
residents) that is added directly to the CLASS lookout system and that
will signal there may be derogatory FBI information on an applicant. I
am grateful to Members of Congress that this legislation, which would
also ensure INS access to such information, is included in the counter-
terrorism measures now moving through Congress. Mr. Chairman, I also
want to thank you, Senator Brownback, and others for introducing S.
1452, which would provide NCIC III access to us and INS.
b. short-term improvements to visa systems
This winter we will introduce improved field backup namecheck
systems. By summer 2002 we plan to deploy a ``real time update''
feature for these systems that will give every visa processing post a
local back-up that closely approaches the abilities of the mainframe
CLASS system.
Before the end of this year, we will modify our existing database
of lost and stolen blank foreign passports to accommodate entries by
Foreign Service posts of individual, foreign passports that are
reported as lost or stolen. Lost and stolen passport data will continue
to be shared with federal inspection agencies through IBIS.
Specific enhancements aimed at giving visa officers more detailed
lookout information have been in the works over the past year. By
spring 2002, we will deploy features in our nonimmigrant visa system
that will increase the scope of data associated with our lookout
entries. Using scanning, we will begin augmenting the lookouts with
global, electronic access to refusal files (and photos) now kept at
individual Foreign Service posts.
c. facial recognition
As I have said, Mr. Chairman, every visa application contains a
photograph, which means we already capture a biometric indicator for
every applicant. Accordingly, we have been investigating the use of
emerging facial recognition technology in the consular business
process.
Evaluations comparing non-immigrant visa photos at posts in India
and Nigeria proved promising in identifying impostors presenting
fraudulent applications. In late August, we launched a pilot at the
Kentucky Consular Center for Diversity Visas aimed at detecting invalid
applications from persons working around our procedures. We will soon
test the capability of facial recognition software to compare a sample
database of photographs of suspected terrorists to those of visa
applicants. We seek to expand the pool of photographs available for
this use through efforts with other USG agencies.
d. document security
We soon will complete field-testing a new, more secure non-
immigrant visa. Laboratory tests have shown that it is much more
tamper-resistant than the current version. We will also complete design
of a machine-readable, secure immigrant visa that will, in conjunction
with the data-share program, virtually eliminate photo-substitution. We
will provide our consulates with special secure ink with which to
cancel visas, so that efforts to ``wash'' or ``recycle'' genuine visas
will be much more difficult.
We are planning to develop within the Bureau of Consular Affairs an
independent capacity to detect and counter fraudulent or counterfeit
U.S. and foreign visas and passports by creating a new office built
around a forensic document laboratory. This office also would
coordinate all Bureau efforts to assess biometrics technologies.
e. human resources
Using MRV fees, the Department currently funds the salaries and
benefits of 2,130 full-time positions. MRV funds will also be required
to increase consular staffing worldwide, to address growing demands in
the visa adjudication process. We are committed to an effective
training program for consular employees, including an intensive one-
week training course for consular field officers on namecheck systems
and linguistic concepts.
Machine-Readable Visa Fees Provide the Means for Improvements
Mr. Chairman, all of these initiatives--past, present and future--
have been made possible because of a very wise decision by Congress a
few years ago to permit us to retain machine-readable visa (MRV) fees.
Since 1994, we have spent every penny of these fees sensibly and
judiciously. As I mentioned, the Bureau of Consular Affairs relies upon
MRV fees to finance the salary and basic benefits of virtually all
American employees who provide worldwide consular services as well as
to make improvements to our systems. Permanent and uncapped MRV fees
are essential to continuing our efforts to enhance the nation's Border
Security Program. With this funding authority, we can ensure we have
sufficient personnel to cover staffing and training gaps and to help
meet peak season workloads. We can also adjust staffing to compensate
for additional anticipated steps in the visa adjudication process and
other changes to increase security.
This funding allowed us to modernize our consular systems, and some
of our future proceeds will go into further system upgrades, such as
the scanning of our refusal files to augment lookout information. Other
major expenditures looming include establishing additional back-up
capabilities for the sophisticated automated systems that support both
CLASS and the Consolidated Consular Database.
The level of resources available to federal border agencies greatly
affects our progress, particularly in interagency sharing of visa
information. We must continue to work closely with other agencies on
data-sharing to ensure full access to information for consular
officers. We are anxious to provide visa data to federal inspection
services and would like to see more rapid progress. Modernization of
other agencies' systems--including more modern protocols in data
exchange and more secure, flexible connectivity--is key to significant
progress. We actively participate in the Border Agency Partnership
(formerly IBIS), which aims to tackle these problems.
Closing
Mr. Chairman, we live in a free and open society. These
characteristics, so precious to all Americans, make our country a
magnet to those who seek greater political, economic and social
opportunities, as well as a target for those who hate us and seek to do
us harm. We must continue improving the security of our borders while
keeping our hearts and our economy open to new people, ideas and
markets. CA has been and will continue to be a full partner in the
battle against terrorism. Although the freedom and openness we value so
much make totally foolproof systems virtually impossible, I am
confident that our current system is state-of-the-art and functions as
it was designed. I am also confident that we are on the right track
with our efforts to find new technologies and institute data-sharing
arrangements with other agencies.
I close, Mr. Chairman, with the point I made at the outset of these
remarks--the effectiveness and success of our systems rely not only on
the quantity, but also on the quality and timeliness of the information
that goes into it.
Thank you, Mr. Chairman, and members of the Committee, for
permitting me to share my thoughts with you today. I would now be
pleased to answer any questions you have for me.
Chairman Kennedy. Very good, very helpful.
Ambassador?
STATEMENT OF LINO GUTIERREZ, ACTING ASSISTANT SECRETARY OF
STATE FOR WESTERN HEMISPHERE AFFAIRS, DEPARTMENT OF STATE,
WASHINGTON, D.C.
Mr. Gutierrez. Thank you, Mr. Chairman.
Mr. Chairman and members of the Committee, thank you for
the opportunity to appear before you to discuss the areas of
cooperation between the United States and the countries of the
Western Hemisphere, in particular Canada and Mexico, in
strengthening and securing our mutual borders.
The Western Hemisphere, perhaps more than any region in the
world, has benefited from the free flow of trade, people, and
ideas, and the U.S. has been a natural focus of that flow. What
the U.S. Government has discovered in the past month, however,
is that this flow, in addition to creating a natural
commonality of interest, has also created a need to work
closely together to better secure our mutual borders against
terrorists and other criminals. We agree that strengthening the
security of our borders has become an indispensable part of the
Nation's efforts to prevent future terrorist attacks.
Most importantly, our shared border with Canada to the
North and Mexico to the South represents our greatest
challenge: how to effectively guard against terrorism. Both
Mexico and Canada are working closely with the United States to
address these challenges. Our cooperation with Mexico on border
security has been a priority for many years. Even before the
September 11th attacks, our efforts at working together on
border security this year had intensified following the
President's February trip to Mexico to meet with President Fox.
Border security and safety are one of the pillars of the High
Level Working Group on Migration, and both Secretary Powell and
Attorney General Ashcroft have been closely engaged in the
issue with their Mexican counterparts since April. Their
efforts products renewed vigor in bilateral cooperation at
identifying and dismantling alien smuggling rings in Mexico,
increased intelligence sharing at the border between the U.S.
and Mexican law enforcement agencies, and by means of the
border liaison mechanism, resulted in improved cooperation
through increased personal contact by officials on both sides
of the border. The Fox administration has shown consistently a
willingness to work with us in ways not imagined as possible
just a couple of years ago. The Government of Mexico responded
immediately to the September 11th terrorist attacks with
concrete actions to tighten border security and to cooperate
with U.S. law enforcement officials.
I have submitted a written statement to the Committee for
the record which includes examples of Mexican cooperation.
Right now I'll mention a couple of examples.
The Government of Mexico offered full cooperation with FAA
authorities to survey all international airports in Mexico. The
Mexican Government instituted special visa screening procedures
for nationals of over 50 countries. No visa can be issued
without advance approval from officials in Mexico City.
The cooperation from Mexican agencies has been active and
outstanding. Every law enforcement, military, and intelligence
entity has worked tirelessly with us. There have been dozens of
leads initiated by Mexican authorities. An embassy agency head
described the level of cooperation as ``extraordinary.''
We had been working with Mexican authorities prior to
September 11th to encourage them to review and tighten their
policies in the transit of third-country nationals through
Mexico. The Mexicans have made progress in certain areas,
particularly on their southern border, with stemming the flow
of immigrants transiting Mexico to the U.S. While the
overwhelming majority of those who attempt to enter the U.S. do
so for economic reasons, we have insisted that Mexico do more
in this area to ensure that potential malafide migrants do not
take advantage of alien smuggling networks to the U.S.
Since September 11th, Canada has become a key partner in
the war on terrorism. On the day of the attacks, Canada allowed
some 245 international flights headed for the United States to
land at its airports. The upwards of 27,000 passengers,
including many American citizens, were cared for by the
Canadian officials and the Canadian people for several days.
Currently, significant Canadian military assets, including a
four-ship task force, are being folded into our military
response. Canada has been a staunch and forthcoming ally.
Again, my written statement lists a number of examples of
Canadian cooperation. I will mention a few.
On October 15th, the Canadian Government introduced in
parliament sweeping anti-terrorism legislation which gives
police more authority to crack down on terrorists and cut off
fundraising for suspected terrorist groups.
On October 12th, the Canadian Government announced a $55
million (Canadian dollars) boos in the budget of the Royal
Canadian Mounted Police to create new border and national
security teams, update forensic technology and databases, and
increase protection of key sites.
Another $49 million package was announced in Ottawa last
week that will provide for 100 additional immigration officers
at border points, increased efforts to deport illegal entrants,
and new fraud-resistant identity cards for legal immigrants.
Our cooperation with Canada on shared border security is
extensive and in-depth. There are six bilateral fora currently,
including Border Vision, the Shared Border Accord, the Canada-
U.S. Partnership, the Cross-Border Crime Forum, the Bilateral
Consultative Group on Counter-Terrorism. All these will be
meeting in the near future to discuss additional steps.
We interact daily with Canadian ministries, parliament, the
media, and the Canadian people. We have redoubled our efforts
since September 11th, and those efforts are paying dividends.
The countries of the Western Hemisphere have demonstrated
that they are important allies in the effort to condemn and
combat terrorism. Many countries of the hemisphere--most
importantly Canada and Mexico, who share our physical borders--
are working cooperatively with the U.S. to examine policies and
develop efforts to strengthen border security. More needs to be
done throughout the hemisphere to adopt modern investigative
techniques, improve airport security, encourage a sharing of
information, cooperate in law enforcement and financial
investigation efforts, and monitor and suppress money
laundering and alien smuggling, which are criminal activities
that also provide resources for the terrorists. We are urging
all countries of the hemisphere to sign and ratify the 12
international conventions that address terrorist threats and to
implement fully the terms of the UN Security Council Resolution
1373 with respect to blocking terrorists' access to fund. We
are a party to ten of these conventions and have signed two:
the 1998 Convention for the Suppression of Terrorist Bombings,
and the 1999 Convention on the Suppression of Financing of
Terrorism Crimes. We are pleased that the Senate Foreign
Relations Committee is receiving testimony on these two
remaining convention on Thursday, and we urge the Senate to
review and ratify them expeditiously.
Our hemispheric commitment to confront terrorism will be
demonstrated by the concrete measures we take as sovereign
governments and as a community of governments to arm ourselves
against this worldwide threat. We will continue to call on our
hemispheric neighbors to join us in our counterterrorism
efforts and in sending a unified message that these criminal
activities are not welcome in our neighborhood.
Thank you.
[The prepared statement of Mr. Gutierrez follows:]
Statement of Lino Gutierrez, Acting Assistant Secretary, Bureau of
Western Hemisphere Affairs
Mr. Chairman and Members of the Committee:
Thank you for the opportunity to appear before you today to discuss
the areas of cooperation between the United States and the countries of
the Western Hemisphere--in particular Canada and Mexico--in
strengthening and securing mutual borders.
In the aftermath of the September 11 terrorist attacks, the
countries of the Americas have responded strongly and positively
against international terrorism and in solidarity with the United
States, and have supported our efforts to construct an international
counterterrorism coalition. A tragic testimony of the degree to which
our fates are linked is the list of thirty of the Hemisphere's thirty-
four nations which lost citizens in the September 11 events--among
those nations directly affected, El Salvador counts 121 dead and
missing, the Dominican Republic 42, Canada 24, and Mexico 18.
The Western Hemisphere, perhaps more than any region in the world,
has benefited from the free flow of trade, people and ideas, and the
U.S. has been a natural focus of that flow. What the USG has discovered
in the past month however, is that this flow--in addition to creating a
natural commonality of interest--has also created a need to work
closely together to better secure our mutual borders against terrorists
and other criminals. We agree that strengthening the security of our
borders has become an indispensable part of the nation's efforts to
prevent future terrorist attacks.
Expressions of solidarity and sympathy are being matched by
concrete actions by the nations of the hemisphere. Hemispheric
governments are beefing up security measures, sharing intelligence, and
looking at ways to improve border security. For example, on October 12,
the Caribbean (CARICOM) heads of state issued an anti-terrorism
declaration pledging to put in place the ``necessary measures to comply
with new international safety regulations on planes, at airports arid
sea ports.'' Additionally, the OAS Inter-American Committee Against
Terrorism (CICTE), which met in a special session on Monday, October
15, is coordinating OAS member states' efforts to reduce the ability of
terrorist groups to operate in the hemisphere, including enhancing
border cooperation and travel document security measures. As part of
this cooperation, CICTE member states have been briefed by top U.S. and
Canadian government experts in the areas of counterterrorism, terrorist
financing, and border controls.
Most importantly, our shared border with Canada to the north and
Mexico to the south, which covers a distance of over 6,000 miles,
facilitates--under normal conditions--the legal crossing of
approximately 1.6 million people and almost 2 billion U.S. dollars per
day in trade with Canada and Mexico. Although this impressive level of
activity demonstrates the positive effects of trade and globalization,
it also represents our greatest challenge: how to effectively guard
against terrorism. Both Mexico and Canada are working closely with the
U.S. to address these challenges.
mexico
Our cooperation with Mexico on border security has been a priority
issue for many years. Even before the September 11 attacks, our efforts
at working together on border security this year had intensified
following the President's February trip to Mexico to meet with
President Fox. Border security and safety are one of the pillars of the
High Level Working Group on Migration, and both Secretary Powell and
Attorney General Ashcroft have been closely engaged in the issue with
their Mexican counterparts since April. Their efforts produced renewed
vigor in bilateral cooperation at identifying and dismantling alien
smuggling rings in Mexico, increased intelligence sharing at the border
between U.S. and Mexican law enforcement agencies, and, by means of the
Border Liaison Mechanisms, resulted in improved cooperation through
increased personal contact by officials on both sides of the border.
The Fox administration has shown consistently a willingness to work
with us in ways not imagined as possible just a couple of years ago.
The government of Mexico responded immediately to the September 11
terrorist attacks with concrete actions to tighten border security and
to cooperate with U.S. law enforcement officials.
Some examples:
Mexican authorities stopped two U.S. residents on
September 12 entering at Mexicali with suspicious documents.
Mexican immigration picked up 30 individuals in
Tijuana and sent them to Mexico City for questioning.
An additional four people were picked up September 17
in Durango for questioning.
Mexican authorities worked closely with their U.S.
government counterparts inside Mexico to investigate
evidentiary leads such as an ice pick on a plane from the U.S.,
a suspicious piece of luggage with Arabic tapes and documents,
and reports of suspicious crop dusters near the U.S. border.
The government of Mexico offered full cooperation with
FAA authorities to survey all international airports in Mexico.
The Mexican government instituted special visa
issuance screening procedures for nationals of over 50
countries. No visas can be issued without advance approval from
officials in Mexico City.
The cooperation from Mexican agencies has been active and
outstanding. Every law enforcement, military and intelligence entity
has worked tirelessly with us. There have been dozens of leads
initiated by Mexican authorities. An Embassy agency head described the
level of cooperation as ``extraordinary.''
We had been working with Mexican authorities prior to September 11
to encourage them to review and tighten their policies on the transit
of ``third country'' nationals through Mexico. The Mexicans have made
progress in certain areas, particularly on their southern border, with
stemming the flow of immigrants transiting Mexico to the U.S. While the
overwhelming majority of those who attempt to enter the U.S. do so for
economic reasons, we have insisted that Mexico do more in this area to
ensure that potential malafide migrants do not take advantage of alien
smuggling networks to enter the U.S.
As part of this effort, the Government of Mexico has been proactive
in identifying and disrupting rings of alien smugglers on the U.S.
border and throughout Mexico.
canada
Since September 11, Canada has become a key partner in the war on
terrorism. On the day of the attacks, Canada allowed some 245
international flights, headed for the United States, to land at its
airports. The upwards of 27,000 thousand passengers, including many
American citizens, were cared for by the Canadian government and the
Canadian people for several days. On the Friday following the attack,
some 100,000 Canadians attended an official memorial ceremony on
Ottawa's Parliament Hill to pay tribute to the victims. Currently,
significant Canadian military assets, including a four-ship task force,
are being folded into our military response. Canada has been a staunch
and forthcoming ally.
Other examples of Canadian cooperation include:
Working hand in hand with us on investigating
literally thousands of leads in the wake of the September 11
terrorism attacks.
On September 12, Canadian border guards arrested a man
carrying several bogus pilot licenses as he tried to enter
Canada from the U.S. Canadian officials immediately handed him
over to U.S. authorities.
Canadian authorities detained and turned over to us a
passenger on a flight diverted from the U.S. to Canada on
September 11 after he was found to be in the possession of
several airline uniforms.
Canadian officials are also working closely with their
U.S. counterparts to investigate the discovery of box-cutter
knives found aboard an Air Canada flight scheduled to fly from
Toronto to New York, but grounded at the last minute on
September 11.
In-depth security interviews were imposed for refugee
claimants in the weeks after September 11.
On October 12, the Canadian Government announced a S55
million (Canadian dollars) boost in the budget of the Royal
Canadian :Mounted Police to create new border and national
security teams, update forensic technology and databases, and
increase protection of key sites.
Another $49 million package announced in Ottawa last
week will provide for 100 additional immigration officers at
border points, increased efforts to deport illegal entrants,
and new fraud-resistant identity cards for legal immigrants.
Canada has announced airport improvements worth USDS60
million for more bomb detectors, staff, and modernized computer
systems.
The Canadian Government has also introduced in
Parliament new anti-terrorism legislation giving police more
authority to crack down on terrorists and cut off fundraising
for suspected terrorist groups.
Our cooperation with Canada on shared border security is extensive
and in-depth. Coordination is based in six bilateral fora--Border
Vision. whose overall goal is a bilateral, strategic approach to
migration which will strengthen the integrity of the border through
information and intelligence sharing, policy coordination, joint
overseas operations and border cooperation; the Shared Border Accord,
whose goal is to develop new and innovative programs that will
facilitate bilateral trade and the movement of people; the Canada-U.S.
Partnership, announced by the two countries' heads of government in
1999 to look at cross-border issues and provide a framework for non-
federal stakeholders to air their views; the Cross-Border Crime Forum
to address crime issues; the Bilateral Consultative Group on Counter-
Terrorism to bring both countries' top counter-terrorism experts
together annually; and the Integrated Border Enforcement Team, a
bilateral, multi-agency law enforcement group of police, customs and
immigration officials.
In all of these areas, the Bureau of Western Hemisphere Affairs'
most appropriate role is advocating and coordinating policy with the
highest levels of Canadian political and policy decision-making. We
advocate forcefully for U.S. government policies through our Embassy in
Ottawa and our seven consulates across Canada. We interact daily with
Canadian ministries, Parliament, the media, and the Canadian people. We
have redoubled our efforts since September 11. And those efforts are
paying dividends. Our Canadian friends have recognized that there are
some weaknesses in their immigration law and have introduced
legislation to, among other provisions, make refugee/asylum claimants
excludable even if they are merely suspected of terrorist ties, and
given Canadian law enforcement increased access to advance passenger
information on incoming flights. And, on October 15, the Canadian
government introduced in Parliament sweeping anti-terrorist
legislation, which includes giving police authority to tap phones and
electronic mail, and makes it a crime to harbor a terrorist. It also
takes the step of making it a crime to raise funds or participate in
activities of terrorist groups.
The ability of the Canadian government to secure its homeland will
only help us in securing our homeland. A higher level of confidence
about who Canada is admitting at its ports of entry would assist us
greatly in allowing us to focus our northern border resources where and
how they will do the most good. Canada feels the same way about us.
Even greater information and intelligence sharing, and the development
and sharing of new technologies, will allow both countries to focus
more on the commonality of our immigration efforts. With 1.2 billion
dollars in trade crossing our mutual border daily and 200 million
people annually, the goal should be to foster this invaluable flow of
people and goods while also increasing safeguards against threats. We
are confident that our Canadian partners share this goal, and stand
ready to work with us to make it happen.
Conclusion
The countries of the Western Hemisphere have demonstrated that they
are important allies in the effort to condemn and combat terrorism. In
addition to the numerous expressions of condolence and solidarity,
events in Washington (including the invocation of the Rio Treaty by
States Parties at the OAS on September 19 and the extraordinary
convocation of OAS foreign ministers on September 21) were important
measures of our support within the hemisphere.
In addition. many countries in the hemisphere--most importantly
Canada and Mexico who share our physical borders--are working
cooperatively with the U.S. to examine policies and develop efforts to
strengthen border security. More needs to be done throughout the
hemisphere to adopt modern investigative techniques, improve airport
security, encourage countries of the region to work among themselves to
share information, cooperate in law enforcement and financial
investigation efforts, and monitor and suppress money laundering and
alien smuggling, which are criminal activities that also provide
resources and logistic support for terrorists and other malefactors. We
are urging all the countries of the hemisphere to sign and ratify the
12 international conventions that address terrorist threats and to
implement fully the terms of UNSC Resolution 1373 with respect to
blocking terrorists' access to funds. We are a party to ten of these
conventions and have signed two: the 1998 Convention for the
Suppression of Terrorist Bombings and the 1999 Convention on the
Suppression of Financing of Terrorism Crimes. We are pleased that the
Senate Foreign Relations Committee is receiving testimony on these two
remaining Conventions on Thursday and we urge the Senate to review and
ratify them expeditiously.
Our hemispheric commitment to confront terrorism will be
demonstrated by the concrete measures we take as sovereign governments
and as a community of governments to arm ourselves against this
worldwide threat. We will continue to call on our hemispheric neighbors
to join us in our counterterrorism efforts and in sending a unified
message that these criminal activities are not welcome in our
neighborhood.
Chairman Kennedy. Thank you.
Mr. Ziglar?
STATEMENT OF JAMES W. ZIGLAR, COMMISSIONER, IMMIGRATION AND
NATURALIZATION SERVICE, DEPARTMENT OF JUSTICE, WASHINGTON, D.C.
Mr. Ziglar. Mr. Chairman and members of the Committee, I
appreciate the opportunity to appear today to talk about border
control issues in the context of the anti-terrorist effort.
Needless to say, Mr. Chairman, I am very pleased to be before
this Committee. As you know, historically I have a great
affection for this Committee, as you well know, going back to
the 1960s when I worked up here in this Committee, and I am
obviously, for other reasons, very interested in your work in
my new role.
Chairman Kennedy. It goes back to the 1965 Act of the
elimination of the national origin quota system, the Asian
Pacific triangle.
Mr. Ziglar. That is right.
Chairman Kennedy. I remember. A very important piece of
immigration legislation eliminating discrimination.
Mr. Ziglar. Exactly.
Chairman Kennedy. We know that you have been interested in
these issues for a long time.
Mr. Ziglar. Obviously, Mr. Chairman, I also was very
pleased to be the Sergeant at Arms and am forever grateful for
that opportunity.
I had a couple of questions this morning from the press
that prompt me to say something that is not in my notes, but I
think it is important to remember, particularly in the context
of this Committee, this Subcommittee, and that is that the
issue that we are facing in the country here is not an issue
about immigration. It is an issue about evil. Immigrants are
not terrorists. Immigrants are people who want to come to this
country to share in this country and to contribute.
The people that we are talking about, the hijackers, they
weren't immigrants. They were non-immigrants. They were people
who were coming trying to visit our country to do damage. There
are millions and millions and millions of people who want to
come to this country not as immigrants but as visitors. And we
have to control our borders to make sure that those kinds of
people, obviously an immigrant, somebody who wants to emigrate
to do harm, we obviously need to know who they are, too. But we
need to keep this in the context that immigration is not a bad
thing, that immigrants are not terrorists. There may be some
among their groups, but we don't need to lump all immigrants
into this, and I think that is an attitude that I see
developing, at least among the press, based on the questions I
am hearing. And I just think we need to keep that in context.
When I started this job 2 months ago, I was looking for a
big challenge, but I had no idea that I was going to get the
challenge that I face, the turn that has come. When the
President gave me a goal or gave me some goals for this
agency--and I think I talked to each one of you about taking
this job--there were three things that really needed to be
done: one was to restructure the organization in a way that it
could fulfill its enforcement and service missions more
appropriately and more efficiently; secondly was to modernize
the management processes and structures so that it could carry
out those missions; and thirdly was to modernize and
synchronize the technology infrastructure of the INS so that it
also could do a better job at carrying out its missions.
Well, I have to tell you, from my point of view the mission
that was set before me before September 11th is exactly the
same mission today, and that is, the only way we are going to
help protect the American people from the kind of evil that we
saw on September the 11th is to have a more efficient and
effective government and to have a more efficient and
efficiency Immigration and Naturalization Service.
I think it is worth noting that the INS bears a very heavy
burden that most Americans don't realize. We share a
responsibility at the ports of entry with the Custom Service
and vetting people and things that come across those borders.
But between those ports of entry, the 6,000 miles of border
that we have, land border that we have in this country, the INS
has sole responsibility for patrolling that.
People don't realize that we have more than 500 million--I
think it was 530 million people cross our borders every year.
That is a staggering number. And, frankly, about 350 million of
them are non-U.S. citizens, so there are another 175 million
U.S. citizens that cross. But 350 million non-U.S. citizens
cross our borders every year. And most of the people come over
here through visa waiver programs or other exemptions. So they
never have shown up at one of Mary Ryan's places to get a visa.
They come under other programs.
Most Americans don't realize that we have got less than
5,000 inspectors throughout the entire world in the INS to
process these hundreds of millions of people who want to come
to this country. Most people don't realize that we have about
2,000 intelligence officers and investigators who are charged
with the responsibility around the world of dealing with
undocumented aliens, overstays, smuggling, human smuggling
rings, and criminal aliens that are among us. That is 2,000 for
a huge number of people.
As I noted, this is a very heavy burden to bear.
Without a doubt, the tragic events of September 11th have
focused the Nation and the Congress on the management of our
borders. I have got to tell you, Mr. Chairman, that the INS is
a willing, enthusiastic, and cooperative partner in this fight
against terrorism. I believe that we have the will, we have got
the determination, and with your help we will have the human
and other resources necessary to meet that challenge. But we
are moving ahead. We are not waiting for people to tell us what
to do.
For one thing, let me tell you that, first, we are going to
present to you probably next week a reorganization plan at the
INS. I am moving forward with those goals, notwithstanding what
occurred on September 11th, and we are going to present to you
a reorganization plan that has now been approved by the
Attorney General personally. It is in the process of being
approved at OMB, and it is substantial and it is significant in
terms of the way we will do our business at the INS.
In the technology area, we are moving very rapidly to
engage force multipliers so that we can do our job better. We
are developing an enterprise architecture plan that is based
upon a study and a design that we worked out with GAO. I might
add that the GAO used us as a guinea pig to design and approach
the enterprise architecture throughout the Government. We are
the original organization that will be using this structure to
design the enterprise architecture.
But we are not waiting for that plan to be in place in
terms of developing our technology. We are presently going
forward using an investment review board process, an interim
technology enterprise architecture structure to start building
our technology that will fit on this platform, that will be
hopefully interrelated with all the other Government agencies.
Mr. Chairman, with your support--and you talked about the
SEVIS system, and I know that is important to everyone on this
panel. The SEVIS system is the student tracking system which I
think was also known as CIPRIS at one point. It has been the
product of a lot of controversy up until recently. There was a
lot of opposition to it from the academic establishment. There
was opposition in Congress because of the fees and that sort of
thing. That is a system that, with your help, with some
appropriations, we can get started moving that system forward,
and we can beat the deadline or meet the deadline, certainly,
that the Congress set originally of 2003.
Mr. Chairman, you mentioned in your opening remarks the
number of institutions that are involved in that system or that
can issue I-20s for students. That is a huge issue. There are
almost 74,000 institutions in this country that can issue I-
20s, and we have never really screened them out or done
anything like to see who is it that is actually issuing I-20s
and bringing students in.
I can tell you, last week I started the information-
gathering process that we can start screening and qualifying
these people. I think that is a huge issue, and it is something
that we are very focused on.
Mr. Chairman, we are integrating our various enforcement
databases into something called the ENFORCE system. One of the
criticisms, and a legitimate criticism, of the INS and other
institutions in our Government is that we have databases all
over the place, but nobody knows what data the other people
have, a bunch of stovepipes. That is true in the INS. There is
no question about it.
We are in the process of developing an overall database, if
you will, called ENFORCE where all of this information we have
lodged in all these different places will go into that ENFORCE
system.
We already have integrated that with our IDENT system,
which is a biometric identification system. People get IDENT
and other things confused. They think IDENT is a database. It
is not. It is an identification system that tells us who this
person is that we have in front of us; then what you need to
know once you figure out who the person is, what do you know
about that person. And that is what we have done. We have
integrated those, and we are trying to integrate all of our
database systems, and we are making a lot of progress at doing
that.
The so-called IAFIS system, which is the FBI system, which
is a ten-print I.D. system, is also being integrated with the
IDENT system pursuant to the instructions of the Congress. We
are making some pretty good progress on that. We are going to
be rolling out our first transitional work station on the
IDENT/IAFIS system. We will be doing that very shortly, and
that will take us ultimately to an integration of those two
systems.
The entry/exit system that you mentioned that I have been
very interested in, again, we are on track to have that system
up and running by the congressionally mandated 2003, and we are
going to use the IBIS system, which Mary Ryan referred to, as
our platform for the entry/exit system. That will be a very
good tool for us in terms of tracking people who are in
overstay status.
As I have mentioned a number of times, the idea that people
that overstay, that we can somehow track them, given the number
of people that come into this country, is pretty hard to do
unless we want to put somebody on everybody who is in the
country or if we want to plant a chip in their or something
like that. That is not possible. But we do need better
information about who these people are and the fact that they
have overstayed, and that is what the entry/exit system will
do.
With your help, we can complete the border crossing card
system, and with your help, we can expand the IDENT system
which has been stalled since the year 2000 because of some
moratorium and some other things that have been imposed upon
us.
Mary Ryan mentioned, Mr. Chairman, that we came to an
agreement last week to deploy the Consolidated Consular
Database to all of our ports of entry out of the State
Department system. This is a good example of working together.
That system, which is a facial recognition system or a digital
photographic system, is going to be deployed, and it is going
to be deployed within the next 3 months to all of our ports of
entry. It will substantially enhance our ability to detect
fraud and to figure out if the people we have in front of us
are really the people who they say they are.
Mr. Chairman, just a couple of other things. I know my time
has long since run out. We need to do some other things, and I
have included a bunch of them in my testimony. But some of them
are to substantially increase the number of our Border Patrol
agents, our intelligence officers, and our investigators and
our inspectors. We have got to have more of those people if we
are going to do our job.
We need to require air carriers--and you mentioned this--to
provide us with advance passenger information so that even
before somebody boards, we know who is getting on that plane,
or at least from the name point of view we know who is getting
on that plane; and then after the plane takes off, to confirm
who is on that plane so that by the time they get to a port of
entry, we have some information that we can gather on those
folks.
Finally--and this is extremely important, and Senator
Cantwell mentioned this, and I can't emphasize it enough
because I know Mary Ryan and I feel very strongly about this,
and that is, cooperation among Government agencies,
intelligence agencies, information-gathering agencies, and
those kinds of agencies. The sharing of data and making that
data available to all people interested in this process is
absolutely critical for us to have a good line of defense
against people who are coming into this country who want to do
harm to our country.
Mr. Chairman, we have got to increase security. There is no
question about that. But in doing that, we must not forget
those things that made our country truly great. It is our
openness to new ideas and to new people, a commitment to
individual civil liberties, shared values, innovation, and the
free market. If in response to the events of September 11th we
sacrifice those things in search of security, the terrorists
will have won. And in the end, we will be left with neither
security nor freedom.
Thank you, Mr. Chairman. I appreciate it.
[The prepared statement of Mr. Ziglar follows:]
Statement of James W. Ziglar, Commissioner, Immigration and
Naturalization Service
Chairman and Members of the Committee, I want to thank you for the
opportunity to testify on the topic of ``Effective Immigration Controls
to Deter Terrorism.'' I am always pleased to return to the Senate. I
shall always be grateful for the opportunity I had to serve as the
Senate Sergeant at Arms from November 1998 to August 2001.
Although I have served as Commissioner for only two months, I have
not viewed that as a liability in responding to the tragic events of
September 11, primarily because of the highly professional career
public servants who have provided me with mature advice and assistance.
These tragic events, however, have provided an opportunity for me to
examine, with a fresh eye, the management, personnel, technology, and
policy capabilities of the INS.
Steps to Improve Security
Even before September 11, we were examining how we can improve the
INS, at all levels, and especially in the area of technology. We
recognize that technology is a huge ``force multiplier'' that we must
employ effectively at the INS if we are to accomplish our mission.
Pursuant to the mandates of the Clinger-Cohen legislation, in
response to the recommendations of the General Accounting Office (GAO),
and because it makes good business sense, the INS is currently in the
process of developing its Enterprise Architecture. This project
represents our long-term, strategically-oriented approach to
accomplishing the information driven aspects of the INS mission. We
began the planning for this project in October 2000 and I expect the
final delivery of this project, the transition plan to our target
architecture, to be ready at the beginning of the 3rd quarter of FY
2002. In addition, as part of our overall restructuring initiative, I
encouraged our employees at all levels to think ``outside the box'' as
to how we can better accomplish our mission. They responded with a
number of creative ideas, some of which we are still evaluating.
However, within the context of what is already known to be ``doable''
and effective, we are considering a series of measures that would
strengthen our enforcement capabilities. We are working within the
Administration to determine how to implement these measures. Some of
our ideas are as follows:
Border Patrol
As requested in the President's budget, increase the
number of Border Patrol agents and support staff along the northern
border, while not neglecting the continuing needs along the southwest
border. Such increases should also include necessary facilities,
infrastructure and vehicles.
Provide additional agent support equipment and technology
enhancements. Unfortunately, neither the Senate nor the House currently
is funding the President's request at $20 million for ``force
multiplying technology.''
Expand access to biometric identification systems, such as
IDENT.
Inspections
In the Inspections area, as we proposed in our FY 2002
budget, we believe we should increase the number of Inspectors at our
Ports of Entry.
Require inspection of all International-to-International
Transit Passengers (ITI) so that all travelers who arrive in the United
States are inspected.
Informatton and Technology Initiatives
Require carriers to submit Advance Passenger Information before
boarding passengers (whether the passenger is heading to the United
States or attempting to depart the United States) to assist in
preventing known or suspected terrorists, criminals, and inadmissible
passengers from boarding.
Make Advance Passenger Information data widely available to law
enforcement agencies, enhancing the ability to identify potential
threats prior to departure from or arrival in the United States, as
well as to prevent the departure of individuals who may have committed
crimes while in the United States.
Implement the National Crime Information Center Interstate
Identification Index (NCIC III) at all ports of entry so that aliens
with criminal histories can be identified prior to or upon arrival in
the United States. NCIC III should also be available at all consular
posts, INS service centers and adjudication offices to help identify
aliens who pose a potential threat.
Improve lookout system checks for the adjudications of applications
at INS service centers.
Improve INS infrastructure and integration of all data systems so
that data from all sources on aliens is accessible to inspectors,
special agents, adjudicators, and other appropriate law enforcement
agencies. This initiative is ongoing.
Personnel Issues
Waive the calendar-year overtime cap for INS employees to increase
the number of staff-hours available by increasing the overtime hours
people can work. This proposal is included in the Administration's
Anti-Terrorism Bill.
Other Initiatives
Re-examine and potentially eliminate the Transit Without Visa
Program (TWOV) and Progressive Clearance to prevent inadmissible
international passengers from entering the United States.
Reassess the designation of specific countries in the Visa Waiver
Program to ensure that proper passport policies are in place. This
initiative will require the concurrence of and joint participation by
the Department of State.
Explore alternative inspection systems that allow for facilitation
of low risk travelers while focusing on high-risk travelers.
And review the present listing of designated ports of entry, in
concert with the U.S. Customs Service, to eliminate unnecessary ports.
This will allow the INS to deploy more inspectors to fewer locations
making for a more efficient use of resources.
Database Improvements
In addition to the measures cited above, I have instructed my staff
to move forward expeditiously on two database improvement projects
mandated by Congress. While neither is a panacea, both would be an
improvement over the status quo. First, there has been much attention
paid to student visas in recent weeks. Today, the INS maintains limited
records on foreign students and is able to access that information on
demand. However, the information is on old technology platforms that
are insufficient for today's need for rapid access. That is why we are
moving forward with the Student Exchange Visitor Information System
(SEVIS), formerly known as CIPRIS. Objections, primarily by the
academic establishment, have delayed its development and deployment.
However, with the events of September 11, that objection has virtually
disappeared. INS, with your help, will meet the Congress' date of
January 2003 to start implementation of SEVIS with respect to all
foreign nationals holding student visas. I hasten to add that there is
a critical need to concurrently review and revise the process by which
foreign students gain admission to the United States through the I-20
certification process as we build the system.
Second, substantial attention also has been paid to entry and exit
data. Currently, the INS collects data on the entry and exit of certain
visitors. The data, most of which is provided to the INS in paper form
to meet our manifest requirements, first must be transferred by hand
from paper to an electronic database. This is an extremely inefficient
way of processing data which delays access to the data by weeks and
months. Knowing who has entered and who has departed our country in
real time is an important element in enforcing our laws. The Data
Management Improvement Act, passed in 2000, requires the INS to develop
a fully-automated integrated entry-exit data collection system and
deploy this system at airports and seaports by the end of 2003, the 50
largest land ports of entry by the end of 2004, and completing the
deployment to all other ports of entry by the end of 2005. The
legislation also requires a private sector role to ensure that any
systems developed to collect data do not harm tourism or trade.
The INS already uses limited airline and cruise line data that is
now provided voluntarily as an integral part of the inspection process
at airports and seaports. We will work closely with Congress, other
agencies, and the travel industry in the coming months to expand our
access to needed data and to enhance our use of that data to ensure
border security and more complete tracking of arrivals and departures.
There has also been a great deal of focus on the databases used to
identify persons who are inadmissible to the United States or who pose
a threat to our country. The INS, the Customs Service, and the
Department of State's Bureau of Consular Affairs have worked diligently
over the past decade to provide our ports of entry and consular posts
with access to data needed by our officers. The data contained in the
National Automated Immigration Lookout System (NAILS), the Treasury
Enforcement Communications System (TECS II), and the Consular Lookout
and Support System (CLASS) are uniformly available to our ports of
entry through a shared database called the Interagency Border
Inspection System (IBIS) that is maintained on the U.S. Customs Service
mainframe computer. Last week, I announced that INS and the Department
of State have agreed to aggressively deploy the Consolidated Consular
Database to INS ports-of-entry within the next three months. This will
provide inspectors with the capability to verify rapidly and
definitively the identity of visa-holders seeking admission to the
United States. This new functionality will be provided to inspectors at
ports-of-entry through the IBIS system.
Through IBIS, the officers at our ports of entry can also access
limited data from the National Crime Information Center (NCIC).
Immigration and Customs officers have long had the capability to check
NCIC wanted persons data on a limited basis. Only recently have
immigration inspectors been authorized to routinely use NCIC criminal
history data (NCIC III) to identify criminal aliens in advance of their
arrival. This capacity now exists at two ports of entry. Before
September 11, the INS was working to expand the availability of this
valuable data source to additional locations. Legislation is being
considered to ensure this expansion is successful. I strongly support
this legislation.
Many people who cross our land borders do so with a Border Crossing
Card (BCC). The INS and State Department have been working aggressively
over the past several years to replace the old Border Crossing Cards
with the new biometric ``laser visa.'' Based on the statutory deadline,
holders of the old BCC can no longer enter the country. The new BCC has
many security features that make it a much more secure entry document.
Both at and between our ports of entry, the INS has used a
fingerprint identification system known as IDENT to track immigration
violators. This system has provided the INS with a significant capacity
to identify recidivists and impostors. Congress has directed the
Department of Justice to integrate IDENT with access to the FBI's
automated fingerprint system, IAFIS, and we have been proceeding toward
that objective with the FBI and under the Department's direction.
The Limits of Technology
There is no quick fix, technological or otherwise, to the problems
we face. We must work with advanced technology and do all we can to
improve our systems. But we should not mislead ourselves into thinking
that technology alone can solve our problems. Technology must be
coupled with a strong intelligence and information-gathering and
distribution system if we are to leverage our resources and maximize
our capabilities. That will require the seamless cooperation among the
many government agencies involved.
It should be noted that more than five hundred million inspections
are conducted at our ports of entry every year, and hundreds of
millions of people enter the United States without visas, either
because they are U.S. citizens, through visa waiver programs, or other
exemptions from the normal visa process; the INS has only 4,775
Inspectors to process these hundreds of millions of visitors and
approximately 2,000 investigators and intelligence agents throughout
the country who are available to deal with persons who have entered
illegally, are criminal aliens, or have overstayed their visas or
otherwise have violated the terms of their status as visitors in the
United States.
If we are to meet the challenges of the future, we need to make
changes at the INS and we are in the process of making those changes.
The structure of the organization and the management systems that we
have in place are outdated and, in many respects, inadequate for the
challenges we face. Our information technology systems and related
processes must be improved in order to ensure timely and accurate
determinations with respect to those who wish to enter our country and
those who wish to apply for benefits under our immigrations laws. The
management restructuring of the INS is on its way--a mandate the
President and the Congress have given me--and the improvement of our
information technology systems is moving ahead and can be accomplished
with the help and support of Congress.
Mr. Chairman, I would like to say one word about INS employees and
the events of September 11. Within hours of the attacks, the INS was
working closely with the FBI to help determine who perpetrated these
crimes and to bring those people to justice. Within 24 hours, under
``Operation Safe Passage,'' The INS deployed several hundred Border
Patrol agents to eight major U.S. airports to increase security,
prevent further terrorist incidents and restore a sense of trust to the
traveling public. At America's ports of entry, INS inspectors continue
to work tirelessly to inspect arriving visitors, while ensuring the
flow of legitimate commerce and tourism. Meanwhile, despite the
tragedies and the disruptions, our service operations have managed to
complete over 35,000 naturalizations nationwide and process thousands
of other applications since September 11. America should be proud of
the extraordinary effort of these men and women.
Looking Ahead
It has been said that after September 11 ``everything has
changed.'' I hope that is not true. America must remain America, a
symbol of freedom and a beacon of hope to those who seek a better life
for themselves and their children. We must increase our security and
improve our systems but in doing so we must not forget what has made
this nation great--our openness to new ideas and new people, and a
commitment to individual freedom, shared values, innovation and the
free market. If, in response to the events of September 11, we engage
in excess and shut out what has made America great, then we will have
given the terrorists a far greater victory than they could have hoped
to achieve.
Thank you for this opportunity to appear, Mr. Chairman. I look
forward to your questions.
Chairman Kennedy. Thank you very much, Mr. Ziglar, for your
very comprehensive testimony.
We have a very important and interesting panel that will be
following this panel, so we will use 7-minute rounds in this
time.
Mr. Ziglar, the media has reported that hundreds of foreign
nationals have been detained by the INS and FBI since the
morning of September 11th, and many are suspected of having
ties to Al Qaeda or other terrorist organizations. Others are
described as material witnesses. But the category includes
people who may have been neighbors of the hijackers or have
other possible associations that may well be innocent.
What can you tell us about the cautions the INS and
Department of Justice are taking to ensure that the basic
rights of innocent persons swept up in the early stages of the
investigation are being adequately protected?
Mr. Ziglar. Mr. Chairman, we have been--let me back into
the answer. We have been releasing a number of people based
upon the information provided us by the FBI and based upon
investigations and that sort of thing. And the number of people
that we have in detention roughly is about 146, I think as we
speak today, and that has, of course, come down from the
numbers that you may have seen in the past.
That is the INS custody. I can't speak for the warrants and
the other part of the process which we are not involved in.
We have a process that we have to charge somebody within 48
hours, and so that we have given notice to the court that we
have someone and we charge them, and they are then entitled to
a bond hearing. Those people that have gone forward on bond
hearings, in some cases it has been continued. In some cases,
judges have allowed us to continue to detain people.
There are reasons for detention of somebody who is out of
status. You have to remember that these people, all these
people, are out of status. They are not here legally at the
moment.
One of the reasons for continuing detention is to--
Chairman Kennedy. All the people, then, that the INS has
detained are not here legally?
Mr. Ziglar. To my knowledge, everyone is out of status. If
that is not true, I will let you know, but that is my
knowledge.
One of the issues, of course, in whether you detain
somebody is whether there is a flight risk, and way before
September 11th, flight risk was always a big problem if you had
somebody out of status and they were trying to stay here. So
that is one of the grounds for staying. If they are a potential
harm to the community, that is another ground. Obviously if
they are aggravated felons under the 1996 Act, that is yet
another ground.
Mr. Chairman, you know about me. I am big on due process
and I am big on civil liberties and that sort of things. And
certainly under my administration here, I am doing my best to
make sure that people's civil liberties are not violated and,
more importantly, that the process is honored, even though we
have a crisis on our hands.
To my knowledge, we are going through the process, and we
are keeping people in the process from the INS perspective. I
can't talk about the rest of what is going on elsewhere because
I don't know.
Chairman Kennedy. So your answer, as I understand it, is
that they are out of status, that they are here illegally, and
that you are following the same kinds of procedures with
regards to them that were in place prior to September 11th.
Mr. Ziglar. Absolutely.
Chairman Kennedy. Let me come back to Mary Ryan. In the
time I have available, there are a number of items, so I will
try and ask the questions quickly, and if we get the response
as well.
I am interested in your reaction to the development of a
consular corps. I think many of us have known that those that
have been in the area of that responsibility have been
wonderfully dedicated people, in many instances younger members
of the corps. It is a very, very tough, demanding job, and it
is not one that has offered great opportunities for career
advancement and otherwise. And one of the suggestions from one
of our colleagues that has been thought about, Senator Bob
Graham of Florida talked about the development of a consular
corps that would not be greatly dissimilar from the Corps of
Engineers in the military. It is a separate career, and there
is a lot of professionalism, and there is a good deal of
satisfaction developed through there, and esprit as well.
I wanted to get your reaction.
Ms. Ryan. Senator, I would argue with you that that is
probably not the best way to go. I think what we have now in
the Foreign Service is a generalist corps. We have four
specializations, one of which is consular, and the people who
are doing that work are proud of being Foreign Service officers
and proud of being consular cone officers.
I think that if you went to a consular corps, in fact, you
would even further limit career opportunities for those people
in the corps. Right now we are getting more--not quite yet our
share, I would argue, but more of the opportunities to serve as
ambassadors and as assistant Secretaries, as deputy chiefs of
mission, and as principal officers. And I think to take us out
of the State Department and the Foreign Service and put us into
another area would limit those opportunities considerably. You
would not be able to hope for an ambassadorial assignment if
you were in the consular corps separate from the State
Department and separate from the Foreign Service.
I hear a lot of talk about how our newer officers, our
younger officers don't like the work, and I am sure that that
is one of the concerns that you have and others have. But I
would say to you, Senator, that they do the work with
dedication and commitment. And they are proud to do the work.
They are patriots. We don't talk about Government employees
very much anymore as patriots, and I think we have to start
talking about it again.
It has been a long time since President Kennedy challenged
my generation about the nobility of public service, and still
we get really talented, really wonderful people to come into
our Government and to come into the Foreign Service, into the
civil service. And they don't come for the money. As you well
know, the salaries are very low, and particularly at the lower
grades, and a lot of these people have very big student loans
to repay. And they don't come for prestige because, frankly,
Senator, Mr. Chairman, there is no more prestige in serving in
the Government, unfortunately. It has been a long time since
anybody talked about public service and the need to serve our
country and give something back to our country, which has
nurtured us and supported us and protected us. And I hope that
out of this tragedy of September 11th we start hearing more
call for people to join the Government and join in the fight
against terrorism.
Chairman Kennedy. Well, I think that is a wonderful
expression, and I think you deserve great credit, 35 years in
the service of our country. We have had a good opportunity to
work with you over a long period of that time. I personally
have high regard for you and for the work that you have done.
The real question is how we get support for the consular
corps, obviously in intelligence, which you have raised, and
all the rest. But this is an issue about how we can make sure,
in this process to use all our assets--our experience, the best
in technology, and our intelligence. Out of that 550 million,
we are talking about those handful of people that are out
there, and we want and need the best in terms of technology to
be able to use intelligence and experience to
protect our nation. And we need to examine all of these issues
to do that. But I appreciate your references.
My time is up, but I am still going to ask the question. On
the time for adopting the machine-readable passports, I want to
get your answer quickly on that. Then I had a question for Mr.
Ziglar, we collect resources to be able to use from the fees of
immigrants, and we are using those fees for our new technology.
Is that the way we want to try and fund it? With the challenge
that we are facing now, should we depend upon those fees to be
able to bring your agency up to the kind of full speed ahead in
terms of the newer technologies? I would just ask those two
questions. I will hear from Mary Ryan first.
Ms. Ryan. Senator, on the first question about machine-
readable passports, I think you mean in connection with the
visa waiver program. Is that right, sir?
Chairman Kennedy. Yes.
Ms. Ryan. Every country that is in the visa waiver program
has a machine-readable passport now, except for Switzerland,
which is going to introduce the machine-readable passport in
2003. But all the others have machine-readable passports, and
they are issuing them now to their citizens.
The other question on visa fees, Mr. Chairman, I am
enormously grateful to the Congress for giving us the
authorization in fiscal year 1994 to charge a fee and to keep
the money, because that has made all the difference in how we
are able to do our work, a tremendous boost for us in consular
operations.
We would have collapsed in the 1990s without that money,
and this is money that the alien pays to apply for a non-
immigrant visa. So all the money--and it is now a fortune; it
is about $400 million a year--comes from aliens paying for the
privilege of applying for a visa. And that means no taxpayer
money has been used for our improvements. And we have automated
the world. We are online. Every visa post has online
connectivity to our CLASS database in real-time. And we can get
instant information from it. As long as the information is in
there, we can provide the consular officer in the field, no
matter where he or she is, with this information instantly. And
it is thanks to the wisdom of the Congress in giving us this
authorization to charge and keep this money and our ability to
spend it wisely.
Chairman Kennedy. You don't want to talk about it too much
because someone will try and get their hands on it.
[Laughter.]
Mr. Ziglar. Mr. Chairman, I am really glad you asked that
question, and I can talk about it for a long time, but the
answer is that if we want to develop our technology base,
whether it is the SEVIS system or anything else, we simply have
got to have the money up front to do it. Paying it on a pay-as-
you-go basis, a revenue-as-you-go basis is very, very difficult
because, as you know, you have got to have the money in the
bank before you can commit under the Federal rules.
So if we don't have the money, we can't commit, and that
means that we drag these projects out over a very long time.
Appropriated money up front and preferably no-year money so
that we can make these commitments beyond one year would be
extremely helpful to expediting the process. And even if you
want us to pay it back, I mean, make us a loan, but we need the
money to get going.
Chairman Kennedy. Very good. Thank you.
Senator Brownback?
Senator Brownback. Thank you, Mr. Chairman. I find so many
statements here that I agree with and a lot of questions that I
have at the same time.
I want to thank you for your comments, Ms. Ryan, about the
nobility of public service. I met with my staff this morning
and mentioned to them that the terrorism war on the United
States, if I could put it that way, has been going on for 10
years and the front line has been our diplomatic corps and our
men and women overseas. And on September 11th it reached our
shores, and right now the front line is the Hart Office
Building and in places here that it is taking place. There is a
true beauty and nobility of that service, and I appreciate your
mentioning that.
I also want to say to Mr. Ziglar, I appreciate his comments
about the problem here, and not to cast all immigrants into
this stew, we had a few people, non-immigrant visas that were
issued here, that sought to do us harm and, unfortunately,
accomplished that. But let's not compromise our values or our
economy in a process of dealing with this. So that is why the
issue becomes, I guess, far trickier and more difficult to hone
in on.
But that is what I want to try to do, and that is what we
are working on in the legislation that we have here. And I
would invite all of your input to us, as we try to craft this
and get this out in a quick fashion, as to what is it that we
need to do and what we need to be putting forward.
On a primary note, first and foremost, you talk about
information sharing and the stovepipes that are currently in
place. Are each of you confident that we are getting those
stovepipes broken down and the information being shared in a
timely fashion? And if not, what are the problems?
Mr. Ziglar. Senator, I would have to say this: You have got
to remember, I haven't been down there but 2 months. I did have
a month's experience before all of this happened. It was clear
to me that there was a lot of information holding and not
sharing among a lot of agencies. That has gotten a whole lot
better since September the 11th on what I would have to regard
as a patchwork basis, and Mary can certainly speak for herself
as to how she feels about it.
I think there is a slow but inevitable cultural change
going on that says that we can't have this happen again, and if
sharing of information--or lack of sharing of information was
one of the problems, we have got to get over it and quit
playing bureaucratic games with information.
I think we are getting there, but I think there is a long
way to go. Certainly at the ports of entry and at the consular
offices around the world, we need a lot more information from
intelligence agencies and law enforcement agencies that we can
access on a real-time basis to determine whether the person
standing in front of us is somebody who should not be here, is
inadmissible to the United States.
I think Ambassador Ryan certainly made that point in her
testimony. I couldn't endorse what she said more strongly.
Senator Brownback. Ambassador Ryan, are the stovepipes
being broke down?
Ms. Ryan. I hope that the Commissioner is right about the
stovepipes are being broken down. I am not completely confident
that they are. I think that there is still a very great concern
among the intelligence and law enforcement agencies about
protection of sources and methods, which I would think after
September 11th has to give way to concern for protection of
lives.
We are the front lines. The consular officer overseas is
the front line of defense of this Nation. We are the outer ring
of border security, and we have been trying, for example, for
quite a long time to get FBI NCIC III access. And we were
denied over and over again because we are not a law enforcement
agency. I think that has to change. I think there has to be a
recognition that we are on the front lines, that we have a
responsibility to protect our Nation just as they do, and that
they have to give us the information. I don't really care how
they do it or what sort of code system they want to use to
protect the information, but they have to give us the
information.
Senator Brownback. Did we know about these gentlemen that
were involved in the terrorist activities from some of our
intelligence community information that wasn't shared with
State or INS?
Ms. Ryan. Senator, I don't know that. What I do know is
that we had no information whatsoever on those 19. I don't know
whether--
Senator Brownback. The State Department did not.
Ms. Ryan. The State Department had no information. In our
CLASS lookout--
Senator Brownback. Do we have it in other places in the
Government--
Ms. Ryan. --we had nothing on them. I don't know whether
that means there was no information or whether the information
was not shared with us. I just know we had nothing on any of
the 19.
Senator Brownback. Mr. Ziglar?
Mr. Ziglar. The same is true with us. Now, whether there
was other information someplace else, I don't know the answer
to that either, like Ambassador Ryan. But we didn't.
Senator Brownback. It seems like that is something that--
Chairman Kennedy. If the Senator would yield, does the
Central Intelligence Agency give you names of terrorists?
Ms. Ryan. The Intelligence Agency does give us names
through the Visas Viper program and through TIPOFF, which is
run by our intelligence and research bureau. And, in fact, they
have given us thousands of names over the years, since we set
up that program. But they don't give us--in my opinion, we do
not get all the information.
Senator Brownback. Well, if I could interrupt you as well,
as I understand, Ambassador Ryan, they give you information but
it is on a haphazard basis. It is not necessarily a timely
basis. You may get it a month or 2 months after it is acquired.
And so there is no system, and it really is a patchwork and
almost kind of a ``who do you know'' type of system that has
been in place. Is that correct?
Ms. Ryan. It is not as effective as I think it should be.
For example, on a couple of the terrorists, we were given names
in August and asked to revoke visas. And when we looked at what
they gave us, we had no information on one, one had been
refused a visa, and two had been issued. One visa had already
expired. And that was in August.
I don't know when they had that information. I don't know
when they got that information. But you do wonder, if they knew
it in August, when they might have known it earlier than
August.
Senator Brownback. My point in this--and I am sensing your
frustration, having been around this for some period of time--
is that with the front line of the war on terrorism being on
our shores here, in New York City and Washington and Nevada, in
places all across this country, the issue of protection of
sources and methods within the intelligence community, which I
fully support and I think is appropriate, but we have got to be
able to design some system that, if the terrorist is the person
that tries to move in amongst us and blow themselves up along
with a number of us at the same time, then we have got to try
and find that needle and have all the information absolutely
available.
Mr. Ziglar's point about we have 350 million entrants, non-
U.S. citizens, across our border every year and that we are
looking for a dozen, 50, something like that, seeking to do us
harm, that is more than the proverbial needle in a haystack.
And so the information sharing that we have to have is probably
the most critical component of our protection of ourselves in
this war on terrorism.
Mr. Ziglar. Senator, let me make one point. There is no
silver bullet. A lot of these folks that were involved in this
thing were young, had no records; there was no intelligence to
gather on them. They had been recruited at very young ages.
They had never been in trouble. So there may never be any
information on them because there is no information to gather.
So you are faced with a faceless enemy sometimes.
Now, obviously there are other situations where you may be
able to gather information about people. So it is not a silver
bullet. If we shared every piece of information we had with
every Government agency everywhere, we might still not be able
to detect everybody who intends to come here and do harm to us.
Senator Brownback. But we could do a lot better.
Mr. Ziglar. We can do a lot better, absolutely, and we need
to. But I just want to make sure that people don't think that
there is a silver bullet that will absolutely protect us.
Senator Brownback. I think I am more looking for a magnet
for that needle in the haystack.
A couple quick comments, and then I will pass along. One is
on this biometrics system for people coming into the country,
which I think is very important and I hope we can speed its
implementation. You gave some time lines on that which I might
want to discuss with you.
We just had the Deputy Prime Minister of Canada in, and we
were talking about standardizing how we would do the biometrics
testing, because apparently different countries are looking at
different ways, in particular as we look at a North American
perimeter in all probability, that we need to be working
closely with the Canadians and Mexicans, the Mexican
Government, at least on establishing that standardization and
doing so in a quick fashion.
I applaud your looking at the number of schools that can
authorize student visas and their standard reviews. At
Pittsburg State University in my State of Kansas over the
weekend, the President was talking about the international
students there, a wonderful gift to the school, really, because
it really helps them and it is a diverse population that they
really like. But then also I hear of stories of other places,
and I am really questioning that. So I am glad you are looking
into that.
Finally, God bless you all. This is a tough task, but you
are all up to it, and I really appreciate your coming forth
here. You help inspire confidence in us, and I think in the
people, that we are on top of this and we are hardening our
targets here at home at the front line, the programs we are
doing of who gets into the United States, and yet still not
compromising our values or our economy.
Ms. Ryan. Thank you, Senator.
Chairman Kennedy. Senator Grassley?
Senator Grassley. Yes, thank you very much.
This talk about a silver bullet--and I don't disagree with
what Mr. Ziglar said, but it reminds me of a certain lethargy
we have in Government of willingness to share information. And
I think the terrorist attack just surfaced a problem that
permeates Government over a long period of time, that somehow,
you know, the CIA or any agency this could apply to, but the
CIA, it is our work and we have got certain information. It is
almost like we have got a proprietary right to it, and some
other agency has got their work and their proprietary interest
in it. And instead of having an attitude we ought to have--and
I think we are getting this attitude now along the lines of
what Ms. Ryan says, that there is an attitude of cooperation
and patriotism and public service, that this isn't this
agency's work and our property and this agency's property, but
it is the property of the American people, and we are all in
this boat together. And under the circumstances we are in right
now, we might sink or swim together. So I guess we have got to
change the bureaucratic attitude that has been there for a long
period of time.
Along this line, I want to ask my first question of Mr.
Ziglar, and I go back to your confirmation hearing. I asked
about the information sharing between the Immigration Service
and the Internal Revenue Service. I was told that your agency
does not verify tax information from immigrants with the IRS,
particularly the matter of whether the immigrants are paying
taxes. The INS needs to work with the IRS, I believe, in regard
to immigrants who come to this country on work visas. The INS
should work with the IRS to verify an immigrant is actually
working. If the immigrant on a work visa is not working, the
INS needs to have him tracked down, just like we track down
foreign students who don't show up at their designated school.
The Internal Revenue Service has certain data that can be
extremely useful to all law enforcement, particularly the INS,
in its efforts to track down violators. So I am asking you
today to make sure that the appropriate information from the
IRS is being pursued by the INS. No one knows if any of this
would have stopped the attacks of September the 11th. They are
obviously not a silver bullet. But we need to make sure that we
work to prevent terrorism with every weapon that we have.
So I would like to know whether you agree with me on this
matter and what you can do with the IRS information to better
make use of it and what limitations there are that might
prevent you from getting the IRS information you need, assuming
that you don't have to change law--or maybe you do have to
change law.
Mr. Ziglar. Well, Senator, I couldn't agree with you more
that the exchange of information and that particular kind of
information could very well be very valuable in a law
enforcement or immigration law enforcement context.
At the time of my confirmation hearing, you and I know
Senator Kennedy and a number of other members of the Committee
asked me to look into a number of things, which I was doing
during the course of my first month there, and September 11th
came along and I have not focused on some of those questions.
But I can tell you this: In terms of this investigation, I have
noted the presence of the Treasury Department, the IRS in that
context. And it is something that I believe that going forward,
certainly from our perspective, will be valuable information
for us to know, particularly as hopefully we ramp up our
efforts to identify those people who are overstaying their
visas, for example,, or overstaying their welcome, if you will,
and identifying them and using that potentially as a way of--I
hate to use the words ``tracking them down,'' but tracking them
down.
Senator Grassley. Would you be able to maybe look into my
specific questions and then give me an answer in writing, maybe
in 5 days? Would that be--
Mr. Ziglar. Yes, I will do my best, sir.
Senator Grassley. Thank you.
Also, in your testimony before the House Subcommittee on
Immigration, you mentioned the database system called ENFORCE,
which draws on other databases that the INS has. Could you give
us more detail about that technology and if the database would
improve data sharing within the agency?
Mr. Ziglar. I would be happy to talk to you about that
because I am excited about what we are doing. ENFORCE is, for
lack of a better technical terms, is a consolidating program, a
consolidating database that draws from the many databases we
have in the enforcement side of the INS. But, more importantly,
or as importantly, it also has the capacity to reach out and
access the databases of other Government agencies. For example,
we could reach out and get data from the Department of State
and bring it into our system so that we have one place where we
can go and find out information about whoever it is.
That system, the ENFORCE system, which is, you know,
cutting-edge from our point of view, it is trying to deal with
the stovepipe effect of having all this information in one--
getting it in one place instead of having it in a hundred
different places. It has also been integrated with our IDENT
system. Now, the IDENT system is one that--it is a fingerprint
system, a biometric system, and as we pick up people or in
certain circumstances we get their fingerprints, it goes into
this electronic database. Somebody can show up in front of us.
We put their fingers into this reader. It tells us who they
are. That doesn't necessarily tell us anything about them.
We then go to ENFORCE through this same system, and that
gathers the information from all of our databases as well as
reaching outside.
Now, is it fully functional yet? No, it is not. We are
taking our different stovepipe modules, if you will, and
integrating them into ENFORCE as we speak. We were doing that
before September the 11th. This is not something that we are
hurrying up and trying to get done as a result of September
11th. It is something the INS was doing before.
And if I could just make one point, I know the INS has
taken a lot of heat for a lot of things and a lot of criticism,
and a lot of it has been justified, and the people there will
tell you it has been justified. But an awful lot of real
progress has been made at that organization to address the
technology, to address the information issue, to address the
management issues there. And I found the organization a much
better organization than was painted to me as I was going
through the confirmation and the people there are very
dedicated. They want to do the right thing, and they have done
the right thing, in my view, certainly since September 11th.
They have performed superbly, magnificently.
Senator Grassley. Thank you, Mr. Chairman.
Chairman Kennedy. Thank you. Thank you very much.
We appreciate all of your testimony and responses to
questions. We will be continuing. We look forward to working
with you.
Mr. Ziglar. Thank you.
Ms. Ryan. Thank you.
Mr. Gutierrez. Thank you, Mr. Chairman.
Chairman Kennedy. It is a privilege to introduce our second
panel: Jeanne Butterfield, executive director, American
Immigration Lawyers Association, an American immigration law
foundation; Demetrios Papademetriou, who is co-director and co-
founder of the Migration Policy Institute; and Richard Norton,
who is executive director of the International Biometric
Industry Association.
Jeanne Butterfield has been a strong advocate for fair and
efficient immigration laws for many years. Before joining the
American Immigration Lawyers, she served as legal director of
Centro Presente, a Central American refugee center in Boston,
and worked in private immigration law practice. She is an
expert in a wide range of immigration challenges, including
family- and employment-based immigration issues, and refugee
and asylum issues. She has extensive experience working with
government agencies to ensure the fair and effective
implementation of our immigration laws and regulations.
Dr. Papademetriou helped establish the Migration Policy
Institute. Before that, he was a Senior Associate at the
Carnegie Endowment for International Peace, where he directed
the International Migration Policy Program. He has impressive
experience dealing with North American border issues, migration
management, and many other major immigrant issues. He recently
co-authored a book entitled, ``Caught in the Middle: Border
Communities in an Era of Globalization.'' In addition the
Migration Policy Institute has recently published an extensive
paper called ``Immigration and National Security'' discussing
immigration reforms in light of the terrorist attacks.
Richard Norton founded the International Biometric Industry
Association in 1998 to represent the interests industry
manufacturers in the use of biometric technology; executive
vice president of Identification Technology Partners;
previously a consultant on border control technology, served 19
years at the Immigration and Naturalization Service, been a
leader on border control for many years, advising airlines,
airports, governments, and technology providers on biometric
technologies.
I thank all of you for being here. Ms. Butterfield, we look
forward to your testimony.
STATEMENT OF JEANNE A. BUTTERFIELD, EXECUTIVE DIRECTOR,
AMERICAN IMMIGRATION LAWYERS ASSOCIATION, WASHINGTON, D.C.
Ms. Butterfield. Thank you very much, Mr. Chairman, and
distinguished members of the Subcommittee. I really appreciate
this opportunity to present my views on current U.S.
immigration policy, and I hope that my written testimony
provides some useful perspectives on how we can develop--
Chairman Kennedy. We will include all of the testimony. The
written testimony will be made a part of the record.
Ms. Butterfield. All right. Thank you. To develop
immigration controls that are effective in deterring terrorism
and enhancing our Nation's security. We need to undertake these
reforms to our immigration system with a very fundamental
understanding, which I know you all share: that we are a Nation
of immigrants, that immigration remains central to who we are
as a country and helps explain our success as a people and a
Nation. We have to take on this task as well with the clear
understanding that it is precisely in times of danger that we
must fiercely defend our Constitution and the protections and
liberties that distinguish us from other nations.
My testimony overviews some of the current measures and
powers that the INS and Department of State already have that
can be used more effectively, I believe, if properly
coordinated with good intelligence information to deter
terrorism. And you have heard about that already this morning.
I will also include here some proposals about new measures
that Congress could and should consider that would add perhaps
to our deterrence capabilities. So let me just touch on briefly
to remind us what our current powers and procedures are that
really don't require enhancement in terms of new laws, but
perhaps require more effective integration with intelligence
data.
Current immigration law provides the Government with
extraordinary powers to deny admission to any person who we
believe might be intending to come to the United States to
violate our laws and endanger our safety. You have heard from
Ms. Ryan earlier that consular officers, as you know, around
the world have virtually unreviewable discretion to deny a visa
to any person for any number of reasons listed in our statutes.
And I enumerate those in my written testimony. But let me just
call one to your attention.
A person who a consular officer or the INS has reasonable
grounds to believe seeks to enter the United States to engage
even incidentally in any unlawful activity is simply
inadmissible. So I think we have the tools in our statutes. The
question is how do we apply them and how do we make those
determinations. And I know you are being very thoughtful about
the many thorny questions that poses.
Unfortunately, our laws are only as good as the information
available to those who are enforcing our laws, and we have yet
to devise a system that will allow a consular officer in an
overseas post to gaze into a person's heart or mind and somehow
divine their intentions. Stricter scrutiny I think can deter
the casual criminal, but it is unlikely to deter those who have
no known criminal record, no evidence of association with any
known terrorist organization or activity, and yet whose heart
is intent on committing a heinous crime amongst us, sometimes
years hence.
We have in our laws, secondly, extensively grounds of
deportability which give the Government the power to deport
anyone who has engaged in any terrorist activity, including
planning, material support, harboring, and all of these grounds
are listed, again, in my written testimony.
Again, in this instance, the Government has the full power
to deport anyone who presents a danger here on terrorism
grounds, but deportation, as we know, is no deterrence for
those who fully intend to end their lives while committing a
heinous terrorist act.
The third set of powers that we currently have which you
talked earlier with Mr. Ziglar about are the detention powers.
We currently have the powers at our disposal to detain someone
pending and continuing through their deportation hearing and
any subsequent appeal. And it is those existing powers which
have allowed the INS to detain, as Mr. Ziglar said this
morning, I think currently some 146 persons on suspected
immigration violations. And those powers are also being
contemplated to be expanded in the legislation that the Senate
enacted last week, which would give the Attorney General new
power to certify someone as a suspected terrorist or somehow
involved in terrorist activity, and would trigger a mandatory
detention power.
I appreciate the work that you, Senators, and your staffs
have done to really ensure that these new powers, when enacted,
will not be abused and that there will be some safeguards and
court review and protections to make sure that detention is
necessary to protect national security and does not go on
indefinitely.
I would just remind us all in passing--and, again, more
elaborated in my written testimony--that we also have at our
disposal the Alien Terrorist Removal Court, an extraordinary
set of justices put together to hear secret evidence cases that
was created in our 1996 law, which has not yet been convened or
used, but that is at the Government's disposal should they need
it.
We have expedited removal, which allows the INS o turn
people back right at the port of entry, and screen people,
again, it is the second point of review, really, after the
consular visa issuance decision where, again people are subject
to all the grounds of inadmissibility and can be put through an
expedited hearing.
We have extensive reporting requirements. You have already
talked about the SEVIS system for student reporting and the
current procedures in place to verify departures, so I will not
elaborate on those.
Let me turn just briefly to other new measures that we
should be considering, some of which you have already heard
about. I want to add my voice to those of Mr. Ziglar and others
who say, first and foremost, with all of these measures, we
need increased funding for the INS and the Department of State.
In order to effectively fight terrorism by enhancing our
intelligence capabilities, DOS and INS need to upgrade their
technological infrastructures. These new databases we are
talking about and all of the real-time shared information are
not inexpensive, and I don't believe that that funding can come
strictly from user fees. I think it needs direct Federal
appropriations, and I urge the Senate to address that concern.
There are several new technologies that are very promising,
and I know that you heard about some of them, the face
recognition from Ms. Ryan earlier today, the lookout lists and
the need to integrate and make all of the Federal law
enforcement agency and intelligence agency lists available one
to the other. And I will not elaborate there.
Pre-inspection I think is one area that perhaps hasn't been
touched on and I would urge you all to consider expanding. We
do have pre-inspection at foreign airports currently in five
countries in the world, and this is a procedure that allows a
more calm and considered, perhaps, review of a person's
admissibility before they even board an airplane. I think that
program is a really useful one and could be expanded in several
places in the world and would be very promising in creating
some of those layers of security, perimeter layers, starting
with the U.S. consuls abroad, then pre-inspection at the
foreign airports, then the transmittal of the passenger list
that Mr. Ziglar talked about; and finally, upon arrival in
North America, increased cooperation amongst North American
nations to create this kind of perimeter safety zone. And I
know my colleague Demetri is going to address that further.
I want to conclude with just two concerns as we consider
all of this, including the exit/entry control system. I know
that the Senate heard testimony a couple of years ago about the
exit/entry control system at the land borders, and I want to
just urge your review of that information that was provided at
the time.
I am from Michigan originally, and the Ambassador Bridge in
Detroit is one that I have crossed many times. And in that
testimony that you all heard some years ago, many experts
pointed out that the Ambassador Bridge has 30,000 vehicle
passings every day. And if we could design a very efficient and
fast system and could determine that only half of those
vehicles needed to be entered into our exit/entry control
system and that process only took 30 seconds, you would have
basically 4 or 5 days of backlog traffic simply to implement
that system at that one land border. And I think that addresses
the concern that Mr. Brownback shared earlier about we can't
take measures that are going to undermine our economy and hurt
our cross-border commerce. And that is a very real concern
here.
The final two points. In all of these measures, we have to
be mindful of the continued needs of asylum seekers and our
international and domestic obligations to afford protection to
those fleeing persecution. Pre-inspection at foreign airports
is well and good, but in that process we are going to need to
provide trained asylum officers so that those seeking our
protection are not merely excluded somewhere overseas where we
never then hear about them. There is a challenge there, I
think, that is a very real one that we need to take to heart.
Finally, all of this data collection and recordkeeping is
only as useful as the correlation with good intelligence
information. I think we keep coming back full circle to
intelligence. If we were able to document the entry and exit of
all of the 30 million non-immigrants who come in and out each
year to this country, and that created some big giant database.
What would that tell us? Would that tell us that the person who
overstayed their visa for a week or two weeks or even a month
did so to spend an extra week at Disney World, or because
Grandma had a sinus infection and couldn't fly on the airplane,
or for some other purely innocent reason? Or does it tell us
that the person overstayed and is intending somehow to commit a
heinous crime amongst us? That is where all of the data
collection in the world is not going to make us any more secure
or safe unless we find a way efficiently and in a focused
manner to correlate it with good intelligence, intelligence,
intelligence.
As the current situation calls out for change in the
direction of more effective means of deterring terrorism, we
can't lost sight of these fundamental values of this Nation of
immigrants. As we seek to create new means to isolate
terrorists, we must take care not to isolate America in the
process.
Thank you.
[The prepared statement of Ms. Butterfield follows:]
Statement of Jeanne A. Butterfield, American Immigration Lawyers
Association
Mr. Chairman and Distinguished Members of the Subcommittee:
My name is Jeanne A. Butterfield and I am the Executive Director of
the American Immigration Lawyers Association (AILA). I appear today as
an observer and participant in the development of U.S. immigration
policy for nearly twenty years, eight of those years with AILA. AILA is
the national bar association of nearly 8,000 attorneys and law
professors who represent the entire spectrum of applicants for
immigration adjudications.
I appreciate this opportunity to present our views on current U.S.
immigration policy and I hope to provide some useful perspectives on
how we can develop immigration controls that are effective in deterring
terrorism and enhancing our nation's security. We need to undertake
this task on several fronts, with immigration reform being one
important aspect of the effort. As we develop reforms in this area, we
need to make sure that they are effective. We cannot allow false
solutions to real problems to lull us into a degree of security we have
not achieved.
We need to undertake reforms to our immigration system with this
important understanding: that we are a nation of immigrants, that
immigration remains central to who we are as a country and helps
explain our success as a people and a nation. Furthermore, we must take
on this task with the clear understanding that it is precisely in times
of danger that we must fiercely defend our Constitution and the
protections and liberties that distinguish us from other nations.
We must recognize that existing laws and procedures offer us
significant protections and pose certain problems. I thus will begin
with an overview of current measures and powers that the Immigration
and Naturalization Service and Department of State already have that
can be used more effectively, if properly coordinated with good
intelligence information, to deter terrorism. I will conclude with some
proposals about new measures that Congress could mandate that would add
to our deterrence capabilities.
CURRENT POWERS AND PROCEDURES
1. grounds of inadmissibility
Current immigration law provides the government with extraordinary
powers to deny admission to any person we believe might be intending to
come to the United States to violate our laws and endanger our safety.
Consular officers in posts around the world have virtually
unreviewable discretion to deny a visa to any person for any number of
reasons listed in our statutes. Further, as a second layer of
deterrence and protection, anyone who is issued a visa abroad is
subject a second time to these same grounds of inadmissibility when
they present themselves to an INS inspector for inspection and entry at
any U.S. port of entry (airport or land border). A person can be denied
admission on either of these two occasions denied a visa in the first
instance, or denied entry in the second.
The Immigration and Nationality Act (INA) provides several broad
national security-related grounds upon which any person can be denied a
visa to enter the United States:
a) a person who a consular officer or INS has ``reasonable ground
to believe'' seeks to enter the U.S. to engage, even incidentally, in
any unlawful activity is inadmissible (INA Section 212(a)(3)(A)(ii));
b) a person who has engaged in terrorist activity is inadmissible
(INA Section 212(a)(3)(B)(i)(I)); terrorist activity is broadly defined
and includes, among the more commonly identified activities such as
hijackings, the following range of activities (INA Section
212(a)(3)(B)(ii) and (iii))
1) the use of any firearm with the intent to endanger the
safety of even one individual;
2) the solicitation of funds for terrorist activity or
terrorist organization;
3) the solicitation for membership to engage in terrorist
activity or in an terrorist organization;
4) the provision of any type of material support for terrorist
activity or for any person who plans to commit a terrorist
activity;
5) the gathering of information on potential targets, or any
preparation or planning of a terrorist activity;
c) a person who a consular officer or INS has ``reasonable ground
to believe'' is likely to engage after entry in any terrorist activity
is inadmissible (INA Section 212(a)(3)(B)(i)(II));
d) a person whose entry or activities in the U.S. the Secretary of
State has reasonable ground to believe would have potentially serious
adverse foreign policy consequences for the United States is
inadmissible (INA Section 212(a)(C)).
These extensive grounds of inadmissibility make it clear that the
United States has extensive power and grounds to deny a visa or entry
to anyone it has reason to believe may endanger the national security.
The question properly before the INS, Department of State and U.S.
Congress is how the various agencies that implement and enforce these
laws can be provided with the necessary and timely intelligence
information they need to properly apply these grounds of
inadmissibility and prevent those who intend to commit terrorist acts
from entering the country.
Unfortunately, our immigration admissions and visa issuance systems
and laws are only as good as the information available to those
enforcing them. We have yet to devise a system that will allow a U.S.
consular officer or an INS inspector to gaze into a person's heart or
mind and divine their intentions. Stricter scrutiny may deter the
casual criminal, but it is unlikely to deter those who have no known
criminal record, no evidence of association with an terrorist activity
or organization, yet whose heart is intent on committing a heinous
crime some months or years hence.
2. grounds of deportability
Once in the United States, any temporary non-immigrant (visitors,
students, temporary workers) or lawful permanent resident can be
detained and deported if they engage in terrorist activity.
Again, the grounds for deportability are broad, and give the
government the power to deport anyone who has engaged in terrorist
activities, including all of the activities enumerated above: planning,
fundraising, soliciting for membership, providing material support for
an organization's terrorist activity (INA Section 237((a)(4)(B).
A person is also deportable if he has engaged in ``any other
criminal activity which endangers public safety or national security
(INA Section 237(a)(4)(A)(ii)). This ground of deportability does not
require any criminal conviction.
If the government only later learns that a person was involved
overseas in a foreign terrorist organization, or had otherwise engaged
in a terrorist activity, that person too is later deportable, on the
grounds that he was ``inadmissible at time of entry''.
Finally, an immigration judge has the power to deny asylum or other
relief from deportation to a person who is otherwise eligible for that
relief, if the person represents a threat to national security.
Specifically, the statute includes mandatory bars to asylum relief for:
(a) anyone who ``there are reasonable grounds for regarding. .
.as a danger to the security of the United States (INA Section
208(b)(2)(A)(iv)); or
(b) the alien is inadmissible or deportable under several of
the terrorism-related grounds of inadmissibility or
deportability (INA Section 208(b)(2)(A)(v)).
In short, the government currently has broad and sufficient powers
to deport anyone who presents a danger to the United States on
terrorism grounds. Of course, deportation is no deterrence for those
who fully intend to end their lives while committing a terrorist act.
3. detention powers
The INS currently has very broad powers to detain someone pending
and continuing through their deportation hearing and any subsequent
appeal. Under current law, immigrants charged with deportability for
terrorist activity or certain violent crimes have been found ineligible
to even apply for release from custody (INA Section 236(c). For those
immigrants who have the right to seek release on bond before an
immigration judge, that request can be, and is often, denied if the
person is deemed to be a threat to national security, a danger to the
community or otherwise present a risk of flight.
The current regulations, recently amended and republished as an
interim final regulation in the Federal Register by Attorney General
Ashcroft (8 CFR Part 287, amending Section 287.3(d), provide further
that a person may be detained without a warrant of arrest under the
authority contained in Section 287(a)(2) of the INA. Under the
regulation, as currently in force, a determination about whether actual
immigration violation charges will be brought against a person will be
made within 48 hours of the arrest, except in the event of an emergency
or other extraordinary circumstance in which case a determination will
be made within an additional reasonable period of time, whether the
alien will be continued in custody or released on bond or recognizance
and whether a notice to appear and warrant of arrest as prescribed in 8
CFR parts 236 and 239 will be issued. `` (emphasis added)
It is these already extraordinary powers of detention that have
allowed the Attorney General to detain some reported 165 persons on
suspected technical immigration violations in recent weeks, with no
determination being made to date for many about whether they will in
fact be charged or not. The question must be posed here: what is ``an
additional reasonable period of time'' under the regulations? Is two
weeks reasonable in current circumstances? Is five weeks unreasonable?
Those being detained, the press, the advocacy community and the
Congress surely deserve an answer to this question.
In new powers contemplated in the pending ``USA'' Act (S. 15 10),
the Attorney General will be given the power to implement mandatory
detention of anyone he ``certifies'' that he has reasonable grounds to
believe fall within the definition of ``terrorist'' or ``terrorist
activity'' as outlined above. This new power will prevent a person so
``certified'' from seeking release on bond, whether or not the person
is charged with deportability based on terrorist grounds or is simply
charged with a technical visa violation.
These broad new powers, when enacted, must be used carefully and
not be used to detain individuals indefinitely without proving that
their detention is necessary to protect national security or the
public.
4. alien terrorist removal court
Congress in 1996 created the new Alien Terrorist Removal Procedures
(INA Section 501 through 507). These procedures were designed to allow
the government to conduct deportation hearings with the use of secret
evidence. While the new court was to be composed of 5 district court
justices appointed by the Chief Justice of the U.S. Supreme Court, a
single justice is empowered to consider classified information
presented ex pane and in camera.
In recognition of the extraordinary nature of such proceedings,
certain protections were provided, including the right to be informed
of the nature of the charges and a ``general account'' of the basis for
the charges (the secret evidence), and the right to be represented by
assigned counsel at government expense. (INA Section 504(b) and (c).
To date, this new Alien Terrorist Removal Court has not been
convened. The government has, however, used ``secret evidence'' in
regular deportation hearings, primarily in the context of bond
determinations and in opposing applications for discretionary relief,
such as political asylum or adjustment of status. (See, for more
details about past secret evidence cases, Akram, Susan, Scheherezade
Meets Kafka: Two Dozen Sordid Tales of Ideological Exclusion,
Georgetown Immigration Law Journal, Fall, 1999; 14 Geo. Immigr. L.J. 5
1)
The use of secret evidence is anathema to a democracy. Its use, in
the rare instances where the government strongly believes it is
necessary to protect the life of confidential sources, should be
confined to proceedings in the ``Alien Terrorist Removal Court''. The
law governing these special proceedings, in recognition of their
extraordinary nature, at least mandates certain protections, such as
appointed counsel, for the accused.
5. expedited removal
The 1996 Illegal Immigration Reform and Immigration Responsibility
Act (IIRAIRA) also provides the government with extraordinary new
powers at U.S. ports of entry to deny admission and summarily remove
any person who the INS inspector believes is presenting fraudulent
documents, including a facially valid visa if there is some reason to
believe that the visa was obtained through fraud or misrepresentation,
or if the person is believed to be attempting to enter the U.S. for a
purpose inconsistent with the terms of the visa.
The new expedited removal provisions have been scrutinized
extensively because they run the danger of sweeping into their orbit
legitimate asylum seekers who are most likely to be fleeing their
persecutors without having first obtained proper travel documents. We
must be careful not 'to create a process that a terrorist with adequate
funding, education and documents can penetrate, but which turns away
legitimate asylum seekers who have no documents and who are too scared
or traumatized by abuse to adequately make their claim at the border.
However, the expedited removal powers contained in our immigration
statutes give INS inspectors sweeping and unreviewable power to deny
entry to suspected terrorists and return them on the next flight out. A
person so excluded cannot obtain a visa to enter the U.S. for at least
five years.
Clearly such powers must be used carefully and with adequate
protections. The hapless visitor with entirely legitimate business
purposes who is returned on the next plane to Singapore and denied a
visa for the next five years has little recourse. There must be a means
to challenge such mistakes, and to obtain a waiver of the five-year
ban. In previous times, such a person could request a hearing before an
immigration judge and present evidence to prove that their intent was
legitimate. No more, under the terms of the 1996 laws.
However sweeping and subject to abuse, these powers do provide
another existing means to deter terrorists. But, as outlined above,
these powers to deny admission and summarily exclude are only as
effective as the intelligence information provided to the INS inspector
at the port of entry. What we do not want to see as a result is
thousands of legitimate visitors and even refugees being summarily
excluded, while international criminals and terrorists, who have the
means to purchase or otherwise obtain valid documents, slip through
undetected. That unfortunately may be the result of these expanded
powers.
6. reporting requirements:
The operation of current reporting requirements for foreign
students and the arrival and departure of passengers both are areas
needing significant improvements.
a. Student Reporting
More than 500,000 foreign students last year were enrolled in
colleges and universities around the country. These students are a
vital part of our higher education system. In California, the state
with the greatest number of international students, just over 66,000
students from 19992000 brought $1.6 billion dollars into the state's
economy. Foreign students have made enormous contributions in the
advancement of technology and science, and graduates from American
colleges and universities have gone on to lead nations and shape
history.
We have long understood that the opportunity to study in this
country comes with rules and responsibilities that affect both the
students and the institutions. All foreign students must apply for a
visa and must be able to prove that they are not inadmissible to the
United States. Since at least 1985, colleges and universities approved
to receive foreign students are required to gather and report
information about foreign students to the Immigration and
Naturalization Service.
This information includes the student's current address, date of
commencement of studies, the student's written application for
admission and other supporting documents the school uses to determine
eligibility, the date and reason for termination of a student, and any
academic disciplinary actions taken against the student due to any
criminal convictions.
In the aftermath of the 1993 bombing of the World Trade Center, the
INS created the Coordinated Interagency Partnership for Regulating
International Students (CIPRIS) as a pilot program to provide for the
electronic transfer of student information between institutions and the
INS. In 1996, IIRAIRA mandated that INS fully implement the CIPRIS
system by 2001. After 1996, the INS found that it could not address all
the technical problems and asked Congress for an extension of 2001
deadline.
Although the program to provide for the electronic transfer of the
information collected on foreign students has yet to be implemented,
colleges and universities are still required to collect and report the
data to INS, and an INS officer can request access to it at any time.
At intervals specified by the INS, but not more frequently than
once a term or session, the Service's processing center is required to
send each school a list of all foreign students who, according to
Service records, are attending that school. A designated school
official at the school must note on the list whether or not each
student on the list is pursuing a full course of study and give the
names and current addresses of all student visa holders not listed,
attending the school and other information specified by the Service as
necessary to identify the students and to determine their immigration
status.
The designated school official must comply with the request, sign
the list, state his or her title, and return the list to the Service's
processing center within sixty days of the date of the request. Failure
to follow any of the procedures and regulations will result in the
withdrawal of the schools approval to receive non-immigrant students.
The INS is working with colleges and universities to develop this
system electronically. The electronic system is only beginning to be
implemented as an operational prototype with 21 educational
institutions. The failure, if any, of the student tracking system is
not the absence of laws, but the lack of resources. Congress needs to
provide funding to get this system up and running and maintained in
those schools authorized to enroll foreign students.
As the prototype is expanded, the INS needs to assess and report to
Congress on the feasibility of this system, and whether it can improve
the security of the U.S. relative to implementation costs, and do so in
a way that does not intrude excessively on the privacy rights and civil
liberties of students.
b. Verifying Departures
Requiring airlines and other passenger carriers to identify
passengers' arrivals and departures has been a part of our laws for
many years. Passenger carriers are required by law to deliver to the
immigration officers at the port of arrival and departure a list or
manifest of the persons on board such vessel or aircraft. According to
the law, ``such lists or manifests shall be prepared at such time, be
in such form and shall contain such information as the Attorney General
shall prescribe by regulation as being necessary for the identification
of the persons transported and for the enforcement of the immigration
laws. ``
This language grants broad power to the Attorney General to decide
when and how an airline identifies its passengers. The problems we now
have with identifying who is coming and going from our shores are
technological, not legal. In 1997, the Office of the Inspector General
found that the principal INS record-keeping system for tracking
nonimmigrant overstays, the Nonimmigrant Information System (NIIS),
does not produce reliable data.
Normally, passengers arriving in the United States fill out an I-94
form and present it to the INS inspector upon arrival. The inspector
collects the arrival portion of the form and returns the departure
portion to the passenger. The arrival portion is sent to an INS
contractor, who inputs the data into NIIS. When the person leaves the
United States, the airlines are supposed to collect the departure
portion of the I-94 form and provide it to the INS for input into NIIS.
The data is then matched by MIS to identify nonimmigrant overstays.
The OIG report found that the MIS data is incomplete and unreliable
due to missing departure records and errors in records processing. MIS
does not contain departure records for a large number of aliens, most
of whom the INS assumes have left the United States. The INS believes
that many of these unrecorded departures result from airlines failing
to collect departure forms, aliens departing through land borders, data
entry errors, records being lost through electronic transmission or
tape-loading problems, and the failure of the system to match arrival
and departure records.
The question that Congress must ask, as it considers the possible
expansion of procedures to verify departures, is what use can be made
of the extraordinary amount of data that would be collected under such
procedures. The U.S. admits over 30 million non-immigrant visitors per
year. If data regarding departures shows that just five percent of
these visitors fail to depart at the end of their authorized stay, that
information still does not inherently make us safer as a nation, nor
does it deter terrorism.
NEW DETERRANCE MEASURES
What do we need to further enhance our nation's security? Enhancing
this country's intelligence capacity is key. Any changes that we make
to our immigration policy will work to the degree that they interface
with, and take advantage of, enhanced intelligence information. Any
such reforms must meet our due process and civil liberties concerns and
standards.
There is much Congress and the Administration can do. Needed
reforms include increased funding for the DOS and INS, increased access
to lookout lists, reforms at our consulates, the use of new
technologies, direct government funding of these technologies, more
pre-inspections abroad, mandated in-flight transmittal of passenger
lists, the creation of a North American Perimeter Safety Zone, and a
workable entry-exit control system. These measures will help us to
increase the layers of protection that stand between us and any
potential adversaries from abroad.
We need to remember that our best protection derives from keeping
targeted people from entering the U.S. Such measures are more effective
and easier to implement than measures that focus on persons after they
enter the United States. In all cases, we need to make sure that we
keep out people who want to do us harm, not those seeking to come to
our country for the reasons that people have always come here,
including reuniting with their families, working or escaping
persecution. The following new measures to increase security and
deterrence should be carefully considered:
1. increased funding for dos and ins
It is important to increase funding and data access for the
Department of State (DOS) and the Immigration and Naturalization
Service (INS). At present, both agencies' computer systems are
technologically obsolete, with different offices often unable to share
information with the other, and some offices, especially those
overseas, not even having computer capacity. In order to effectively
fight terrorism by enhancing our intelligence capabilities and
improving our border security, both the DOS and the INS need increased
funding to upgrade their technological infrastructures. Such funding
needs to come from direct federal appropriations. INS and DOS increased
technological capacities cannot be supported through user fees. This
enhanced capacity to meet our security needs is a national function
best supported through the federal government.
2. the use of new technologies
Given the complexities of gathering, sharing and making accessible
a great range of information about individuals and their identities, it
is critical to make use of existing and emerging technologies to
achieve the most reliable means of verifying identity. Traditionally,
fingerprinting has served this function. However, any standard based on
fingerprinting has significant limitations that new technologies can
overcome. Lookout systems and other data networks can be further
improved by the use of new technologies that can match a unique
identifying characteristic of an individual with a name. One of these
new, unintrusive technologies is a face recognition system that uses
cameras to scan a person's face and compare the picture with a database
containing the photos of persons about whom the authorities are
interested. The database for this technology would contain only the
images of persons the authorities are looking for and is relatively
inexpensive.
The federal government needs to fund the development and use of
these new technologies and make sure the various federal agencies
coordinate compatible efforts in this area.
3. access to lookout lists
U.S. federal agencies, as well as international law enforcement
officials, need direct access to the various lookout lists maintained
by different agencies. These lookout lists include the names of people
who should not be admitted to the U.S. or should be pulled aside for
questioning should the authorities come into contact with them.
Increased funding would allow the agencies to build up their
technological capacities so that, for example, DOS and INS. would be
able to directly access the FBI and other agencies' databases to review
information that would help them determine whether someone should be
allowed to enter the U.S. or be granted a positive response to an
application or petition. Such direct access would enable law
enforcement agencies to act immediately to identify those high-risk
individuals who seek to enter the U.S. or receive other immigration
benefits. These lists need to be integrated and accessible, with the
information updated in a timely manner.
We also must include safeguards against potential abuse of this
data that would limit the redissemination of such information, ensure
the security and confidentiality of such information, protect privacy
rights of individuals who are subject to such information, and
establish procedures that determine who stays on and is removed from
these lists. Such safeguards will become even more necessary as the
lists increase in size and unfamiliar names from various regions of the
world may be incorrectly keyed in. We must make every effort to ensure
the accuracy of the names on the list so that the wrong individual is
not targeted.
4. consulate reforms
Our intelligence gathering can be further improved by changing some
of the operations of our consulates. As noted above, consulate staff
cannot do their job if they have neither the necessary intelligence
information nor the technological capacity to access, upload, and
download this intelligence information in a timely manner. In addition,
we need to upgrade the status of the consulate officer who interviews
an applicant to assess whether the applicant is allowed to enter the
U.S. Currently, this function tends to be performed by more junior
personnel with less experience. In the future, each post should be
required to have a core of civil service specialists who would remain
at certain posts or be rotated between posts to increase the level of
experience of the person who is making the important decision about who
is given a visa to come to the U.S.
Furthermore, this decision needs to be reviewable. In these times
of heightened scrutiny such review is vital to ensure the integrity of
the system. We should welcome such a review as part of the checks and
balances that are central to our democracy and vital to our system of
protections. We recommend providing any applicant for entry or a visa,
in writing, the reason for the denial of entry and an avenue for review
of any denial based on this information. In those cases where the
adverse decision is affirmed, the applicant should be provided with a
means of appeal to the U.S. District Court in the District of Columbia
5. pre-inspection
U.S. pre-inspection programs are in effect in only S countries in
the world--Canada, Ireland, Bermuda, the Bahamas, and Aruba. In these
locations, passengers are in effect ``pre-inspected'' for admission to
the U.S. before ever boarding a plane--passports are checked and names
are run against the lookout list. This pre-inspection process allows
more time for inspection and increases the likelihood of a more
thorough check.
This procedure would move our system from one that focuses on a
person's point of entry into the U.S. to one that focuses on their
point of origin. The INS and DOS together would need to recommend where
such pre-inspections should take place, as it would be impossible to
undertake this procedure at every airport in the world. It also would
be important to deal with host countries about any sovereignty issues
that might arise when someone is to be arrested, with U.S. officials
working cooperatively with authorities at the pre-clearance site who
have the power to arrest and detain. Such cooperation should include
assurances that suspected terrorists are not released because the host
country authorities do not view the threat as seriously as does the
U.S.
Congress needs to carefully examine and weigh the costs of such a
pre-inspection program. As with other programs to increase security and
deterrence, the federal government will need to find ways to fund such
initiatives. The cost of setting up and maintaining an overseas INS
inspections staff is not an insignificant one.
Furthermore, any pre-inspections system must provide for
mechanisms, including specially trained personnel, to assure that
legitimate asylum seekers are afforded a meaningful opportunity to seek
protection. The balancing of increased security needs and strengthened
deterrence measures against terrorists with the obligation under U.S.
and international law to protect those fleeing persecution must be
maintained in a way that does not exclude asylum seekers from
protection. Stringent pre-inspection at foreign airports much be
accompanied by expanded asylum determination or ``credible fear''
screening, so that asylum seekers can continue to the U.S. to pursue
their compelling and legitimate claims.
6. in-flight transmittal of passenger lists
Mandating at the time of take off that all airlines transmit
passengers' names to the destination airport to be checked against the
look out list is another important security tool. Through their
reservation systems, airlines know in advance who will be flying to the
U.S. Transmitting the list in advance would give U.S. authorities the
opportunity to compare the passenger list to the lookout lists, thereby
preventing from entering or apprehending those who should not be
permitted to enter the U.S. Currently, about 75% of airlines transmit
these lists.
The effectiveness of such a system also depends on the INS having
adequate technology and personnel on the receiving end to make swift
and efficient use of the incoming information.
If pre-inspection is conducted with meaningful safeguards to
guarantee protection for asylum seekers, then the transmission of
passenger lists should not compromise the safety of asylum seekers who
may be en route to the U.S. Again, however, as Congress considers
measures to strengthen and mandate such data collection and
transmission, it must include explicit safeguards to assure meaningful
access to asylum protection for those who truly need and deserve it.
7. north american perimeter safety zone
To further enhance our intelligence, the U.S. needs to employ
multilateral strategies with Canada and Mexico to enhance the security
of all three countries to create a North American perimeter.
Such a North American perimeter will bolster security through law
enforcement coordination, intelligence sharing, and better joint use of
enforcement resources. Such coordination and cooperation would reduce
the chance that someone wishing to do harm to the U.S. would travel to
one of our neighboring countries and then cross by land into the U.S.
Beyond our immediate neighbors, the U.S. needs to more closely
cooperate with our European allies in particular and share information
that each of our intelligence services have collected. Consistent with
the need to protect the privacy of innocent persons, we should have
access to their version of the lookout lists, and reciprocate by
sharing our information.
Any cooperation among governments in the region in immigration
enforcement should include a plan to ensure that asylum seekers have
meaningful access to protection. While Mexico has recently acceded to
the refugee convention, access to asylum remains problematic,
particularly for migrants intercepted at Mexico's southern border.
Access to asylum procedures in Central American countries is even less
assured.
On the other hand, Canada should not be pressured into diminishing
protections for refugees. All countries in the region can and should
strengthen security measures. However, none should be required to lower
their protections for refugees to the ``lowest common denominator.''
As North American security cooperation also addresses the issues of
smuggling and trafficking, the European experience is particularly
relevant regarding protection for asylum seekers. UNHCR commissioned a
report that concluded that the majority of asylum seekers arriving in
the European Union have been smuggled or trafficked. The report also
states that in the European Union ``the effects of blanket enforcement
measures, such as common visa policies, readmission treaties, carrier
sanctions, and airline liaison officers (pre-inspection personnel) act
to deny refugees the possibility of illegal exit from the regions of
their persecution.''
The report recommends that European nations review their migration
and asylum policies to open other channels to people fleeing
persecution in their native countries. This includes incorporating the
right to seek asylum and the responsibility of non-refoulment into
antitrafficking and anti-smuggling policy, recognizing that trafficking
and smuggling are both ``inherently abusive'' and that both trafficked
and smuggled persons can be refugees, improving reception conditions,
and increasing family reunification.
Our government, while working with Canada, Mexico, and other
partners in the region to eradicate terrorism, should also ensure that
meeting the protection needs of asylum seekers is included as part of
any plan.
8. entry-exit controls
Congress needs to ensure adequate personnel and technological
improvements at and between our ports of entry. The August 2001 GAO
Report, ``INS Southwest Border Strategy: Resource and Impact Issues
Remain After Seven Years,'' clearly identifies that our security risks
apply to both our borders.
To that end, it would be helpful to enhance our data gathering at
airports by mandating an entry/exit system that would collect and
correlate data about arrivals and departures. Certain airlines
currently collect such information on a voluntary basis. This important
security function should be government-mandated and funded. The data
collected will only be useful if correlated -with better intelligence
data.
An entry-exit system has been discussed for land border points of
entry into the U.S. Such a system would be difficult to implement,
would be exceedingly disruptive to commerce, and most importantly,
would contribute little to the security of the U.S. A June 1998 report
from the Senate Judiciary Committee, then chaired by Senator Orin Hatch
(R-UT), noted the catastrophic delays that would accompany the
implementation of a Section 110 entry-exit system at land borders. For
example, the report cited testimony from an earlier hearing of a
witness who estimated that ``assuming the most efficient and remarkable
entry and exit procedures in the world that will take only 30 seconds
per vehicle, and making the equally optimistic assumption that only
half the vehicles have to go through the procedures, that would amount
to an extra 3,750 minutes of additional processing time each day'' at
the Ambassador Bridge in Detroit. The witness then pointed out that
there are only 1,440 minutes to a day, which means that implementing a
Section 110 entry-exit system at that land border port of entry would
lead to a delay of more than 2 \1/2\ days.
Importantly, the report also notes that it is highly questionable
if implementing Section 110 would ultimately provide any assistance in
prosecuting individual visa overstayers, and has nothing to do with
stopping terrorists or traffickers. An automated entry-exit control
system's database will in no way provide information as to which
individuals might be engaging in terrorism or other unlawful
activities. We must not fool ourselves into believing that implementing
an entry-exit control system at land borders will increase our
security: It is a false solution that will hurt our commerce and trade
and not contribute to our safety.
Again, as in most forms of data collection and record keeping, the
usefulness of the data is very dependent on the quality of the
intelligence information with which it is correlated. Did the vast
majority of these people who failed to depart on time do so for
innocent reasons? Did they stay an extra week at Disney World? Did they
delay departure to attend a friend's wedding, or because Grandma could
not fly on account of an ear infection? Did they eventually depart, one
week or two weeks or even a month late? Or are they the tiny, even
miniscule minority who intend to stay to commit some heinous act of
terrorism in the United States?
How do we make sense of this data that we can and will collect? Who
looks at it? Who runs the cross checks, against what data bases? What
do we know about someone, or what can we learn from our overseas
intelligence sources that was not available when the visa was issued
that will tell us whether the person is someone we should seek out and
investigate? How do we find the person anyway, even if we have verified
that he has not departed the United States in a timely fashion? All of
these complexities must be carefully considered before Congress rushes
to implement additional reporting and departure information collection
or a new exit/entry control system.
AFFIRMATION OF THIS NATION'S DIVERSITY
In the current environment, it is especially important to reaffirm
that this nation's strength and future reside in our unity as a nation,
the diversity from which we draw our strength, and the democratic
principles on which our country is based. President Bush, the Congress,
and individual members of Congress, and many members of the general
public all have condemned the violence directed against Arab-Americans,
Muslim-Americans, and Asian-American communities by misguided people
who wrongly blame these communities for the terrorists' heinous acts.
We must continue to support diversity and condemn violence and hate
crimes.
CONCLUSION
In conclusion, let us remember that U.S. immigration policy is
based on a number of values that relate to the core social and economic
principles on which our nation was founded. These values are
complementary and interweave to create the rich fabric that is
beneficial to all Americans. Among the most important values are:
The unification of American families;
Employment related immigration to keep America strong in a
global economy;
Asylum protection for refugees fleeing persecution;
Naturalization based on allegiance to the principles contained
in our Constitution and laws;
Immigration policy that is implemented through a well-regulated
system based on law, with fair, uniform, and predictable
requirements.
As the current situation calls out for change in the direction of
more effective means of deterring terrorism, we must not lose sight of
these fundamental values of this nation of immigrants. As we seek to
create new means to isolate terrorists, we must take care not to
isolate America in the process.
Mr. Chairman, thank you very much for this opportunity to share my
thoughts and perspectives with the Committee. I and other members of
AILA remain available to discuss these matters with you at any future
time. We look forward to working closely with you on legislative
efforts to enact these policy proposals.
Chairman Kennedy. Very fine.
Senator Brownback. Well, said.
Chairman Kennedy. Dr. Papademetriou?
STATEMENT OF DEMETRIOS G. PAPADEMETRIOU, CO-DIRECTOR, MIGRATION
POLICY INSTITUTE, WASHINGTON, D.C.
Mr. Papademetriou. Thank you, Mr. Chairman. Good to see you
again, Mr. Brownback.
I must say that I find myself in a bit of a peculiar
position because your opening statement and the comments of my
colleagues so far have pretty much covered most of the things
that I might have said. I guess I should start with a general
point which I hope that we are going to keep in the front part
of our heads as we move forward with legislation and its
implementation, which is that whatever it is that we opt for,
it should not be policies that make us feel good; rather, they
should be policies that are smart and hard-headed and can be
implemented in a way that really advances our security
interests. And I think an awful lot of the discussion about
databases and intelligence cooperation and stovepipes and
horizontal kinds of cooperation are very, very important, but I
hope that we will apply this kind of a test before we would
move forward with any initiatives.
As you mentioned, Mr. Chairman, most of my testimony deals
with the findings and recommendations that come out of a book
to be formally released at the end of this month, on the 30th.
It is called ``Caught in the Middle: Border Communities in an
Era of Globalization.'' Needless to say, the research for that
book was done almost in a different era, back in 1998 and 1999.
It was written in the year 2000. It just happens to be released
now because that it is when it came back from the publisher's.
But as we were reviewing the book, my colleague and I,
Deborah Meyers, who is also my co-author, we found that there
is an awful lot in that book that actually makes sense after
September 11th, even more so perhaps than it made sense before
the 11th.
If I were to sort of break the pattern here in my testimony
and talk about an overall insight that we got from many weeks
of field research, both along the U.S.-Canada border and along
the U.S.-Mexico border, there is a certain resistance on the
part of bureaucracies to basically ask some of the questions
that I hope we need to ask them, and we will, and ask for
greater accountability. In other words, we saw a certain
mindlessness in a certain way of doing things simply because
that was the way that they had always done things. And I think
that this may indeed be the very time for us to ask ourselves
how we might do things more smartly rather than how much more
money can we throw at these bureaucracies.
I was very impressed with the fact that this was a major
conclusion of the book, and yet that happened before the 11th
of September.
I will go through about two or three out of ten major
findings of the book, and I will be happy to explain those
during the Q and A. But basically what we tried to find out
were the answers to the following three questions: How do the
NAFTA partners perceive and conduct their border inspection
responsibilities? Are such inspections done in the most
effective and manner--and consistent with other important
public policy priorities? And what are the effects of these
actions on the life of the communities that straddle NAFTA's
international borders? Because, as you mentioned, Mr.
Brownback, we shouldn't forget that there are other national
priorities. We must protect ourselves, but we must also not
sink our economy or ignore the lives of people who live in
communities that straddle these borders.
Among the general findings, one is that national government
policies toward border control tend to be inconsistent, even
erratic, with patterns often ranging from inattention to the
wrong kind of attention. And we found this to be the truth
along a single border, across both borders, and sometimes
simply from one port of entry to another port of entry. I hope
that the events of the last month or so may focus the mind of
the managers of these processes in order to at least increase
consistency in the way in which we deliver those functions.
Another general finding was that the adoption of a model of
tight controls and the empowerment of border officials to
exclude people with little accountability have become breeding
grounds for arbitrary behavior by national government
personnel. They also create more opportunities for corruption
and encourage the growth of market forces designed to defeat
border controls.
Simply put, what this suggests is that when we come up with
additional policies and when we come up with new systems that
we wish to fund, we should be mindful that they are indeed the
right systems and they are applied consistently and, indeed, do
not defy other national priorities, which is what we found.
And a third, and I believe the last, general finding that I
want to talk about is that there is a remarkable degree of
community-devised cross-border cooperation on issues such as
public health, access to education, environmental protection,
joint regional planning, and, yes, law enforcement and
security. So I hope that as we, in our capital here, are
beginning to develop ways for doing things differently at the
border, that somebody also is communicating with the interests
within the local communities and taking their recommendations
and their concerns into account, because they have many
interesting ideas that may actually make us better at what it
is that we are trying to do.
I wanted to quickly go through three major recommendations.
First, I think that border control should be conceptualized
as a means to an end rather than as the ultimate policy goal as
sometimes reflected in political rhetoric and bureaucratic
initiatives. I was very pleased to hear your comments, Mr.
Kennedy, because they relate precisely to this recommendation.
The second one is that all three national governments must
show uncharacteristic adeptness in adapting their border
management and enforcement practices to local conditions.
Again, it is very, very disturbing to see using a single set of
practices, a single methodology, across an entire border or,
for that matter, two borders.
And the third recommendation stems from the second one,
that there should not be a one-size-fits-all approach to the
issues at hand, and this is an important recommendation.
Then we talk about what kinds of things we might perhaps do
differently, jointly, initially with our friends in Canada and
then over time, and after we test the possibility, with Mexico.
And these perhaps fall a bit outside of the box. This is really
thinking prospectively as to how we might do things better that
serve the multiple interests that a border inspection regime
must serve, not just about refugees but also about economic
interests and what have you. And we have about ten or so
recommendations, and we are asking for the customs agencies to
try to see whether they need to perform all the functions they
are performing where it is that they are performing them
currently. In other words, there is now technology, a lot of it
off-the-shelf technology, that can be used to seal cargos and
to actually send along all the information along a variety of
passageways so we don't really have to do some of those things
at the border.
We should consider employing risk management strategies.
The science is very well developed, and there are great
opportunities for us to allow more of the resources, the
limited resources that we have to be focused on bad practices
and bad people rather than inconveniencing everyone, without
any loss in security.
The third one involves possibly thinking about how we might
do things together with our NAFTA partners, in this instance,
again, Canada. Is it possible that some of the functions that
the customs or the immigration agencies have to perform could
be perhaps performed jointly, but performed only once, perhaps?
With the right technology, the right suggestions or
legislation, and the right kinds of agreements between the
United States and Canada, we can be much more efficient and at
least as effective in terms of our primary responsibilities and
concerns. And this can, again, apply both to Immigration and to
Customs.
We should also consider whether we need to staff borders
with agents from different agencies like we do now between the
Customs and the Immigration Service. The Canadians have as the
primary inspection agency the customs agency. I am not saying
whether it should be Customs or Immigration. But if you want
consistent delivery in terms of the priorities that we set, why
not have a single agency do the primary function, primary
inspection, and then have the other agencies to do backup,
secondary inspections?
Why not use the private sector--
Chairman Kennedy. I will give you another minute or two
because I want to hear from Mr. Norton, and then we will have
some questions.
Mr. Papademetriou. Okay. Why not use the private sector? We
have an extensive system of customs brokers and private
bondsmen. We can give them an additional responsibility and
force them to be more accountable than they have been to date.
And as my colleagues have mentioned, let's try to use to the
fullest extent possible pre-clearance and intelligence
cooperation with our colleagues in Canada and Mexico. In fact,
even a common visa regime which allows each country to issue
visas along the same criteria on the maximum, the largest
number of countries, where that can be possible, while
identifying the few areas in which we must continue to
disagree, may actually provide much greater security for us
than the status quo.
I will stop here, and I hope to be able to answer some of
your questions.
[The prepared statement of Mr. Papademetriou follows:]
Statement of Dr. Demetrios G. Papademetriou, Co-Director and Deborah
Waller Meyers, Policy Analyst, Migration Policy Institute
I. INTRODUCTION
Mr. Chairman, Members of the Subcommittee. Thank you for asking me
to testify today regarding border security issues and options. My name
is Demetrios Papademetriou, and I am the Co-Director of the Migration
Policy Institute. I am testifying on behalf of myself and my colleague
Deborah Meyers.
Our testimony is based on the research and recommendations in our
book, Caught in the Middle: Border Communities in an Era of
Globalization. This book will be publicly released on October
30th, and is the culmination of three years of work in a
comparative project studying border communities and border management
issues along five different international borders U.S.-Canada, U.S.-
Mexico, Germany-Poland, Russia-China, Russia-Kazakh. My remarks today,
however, will focus on immigration and border issues that relate
specifically to the U.S.'s neighbors and NAFTA partners, Canada and
Mexico.
Clearly, our book was written well before the tragic events of
September 11 and report on research conceived about three years ago,
carried out primarily in 1999, and completed last year. Yet, our
insights and conclusions seem to us to be remarkably relevant today. We
found a troubling lack of interest in applying even the most modest
``effectiveness'' test to our border management methodologies. In fact,
we identified no particular effort, really, not particular interest, in
the independent evaluation of the dominant control methodology. More
tellingly, perhaps, we identified no attempt to think systematically
about whether alternative responses to the challenge might have a
greater or lesser chance of success. This slavish adherence to doing
``more of the same'' has had several perverse effects, including
papering over the human effects of the new enforcement status quo and
disregarding a policy's effects on the communities in which people live
and through which goods and people pass--communities that have become
the terrain where the manifestations of numerous conflicting
perspectives play themselves out.
It is indeed the residents, businesses, and public and private
institutions of border communities who most directly absorb the costs
and benefits from both freer movement and greater controls. How do
these communities navigate these issues, conflicting aims and all? What
is life like for those who live and work at the interface of two
countries? What is the local perspective on the movement of people and
goods that pass through a community; does anyone else care about it?
Does the perspective vary from one community, or one border, to
another, and what accounts for any variance? What input, if any, do
local communities have into national policies that ultimately affect
them? What creative solutions have they found to address the challenge
of such policies? Our effort attempted to shed some light on all of
these questions.
Two points of departure dominated our conceptualization of the
research project. The first was a clear sense that, left on their own,
national governments and bureaucracies would do what comes most
naturally to them: national governments will reassert control
(particularly when feeling a degree of threat) and the relevant
agencies will seek to convert such fears into additional resources,
growing in size and influence. The effectiveness of the effort,
however, seems to have only an uncertain association with the resources
committed to border controls. Somewhat paradoxically, saturation
policing and other forms of vigorous control seem to produce numerous
perverse by-products, including a boom in official corruption and the
growth in powerful black markets in virtually all aspects relating to
the defeat of the control effort-from false documents to sophisticated
smuggling networks. (Notwithstanding that tendency, our research found
local cross-border initiatives continue to occur, even flourish, under
all of these scenarios.)
The second was an idea that many border communities had become
concerned
with the fact that decisions that affect them directly on issues of
borders and their management were being made without their
participation. In an era of pronounced devolution, much of it
admittedly more rhetorical than real, that decision locus exclusively
in the national capitals, with little pretense of consultation with
local communities-struck us as worthy of further investigation. We
suspected that the continuing function of borders as the physical
location where real and symbolic expressions of state sovereignty meet
probably explained why domestic decisions about them are seemingly made
``unilaterally'' by central governments.
Our overall conclusion? Unless the politics make it absolutely
impossible, governments are better off working cooperatively and with
the market to expand the legal means for the entry of their nationals
in other states' territories. Acknowledging the economic and social
facts on the ground and regulating a practice thoughtfully, stand a
much better chance of achieving important public-policy goals than
denying the legitimacy of some of the reasons for the practice's
existence and trying to stamp it out through force.
II. RESEARCH AIMS AND FINDINGS
A state performs an array of inspection functions at the border,
many of which are clearly essential to good government and all which
serve some public interest. This fact, however, does not obviate the
need to ask whether the functions are all essential, whether they can
be done only at the border, whether the manner in which they are done
is the most appropriate one, and how the lives of border communities
are affected by how functions are delivered. Most importantly, perhaps,
and like most governmental functions that are both very costly and
intrusive, the delivery of the functions itself demands that the
relevant agencies meet stringent effectiveness and accountability
standards. The research considered three broad policy questions:
1. How do the NAFTA partners perceive and conduct their border
``inspection'' responsibilities?
2. Are such inspections done in the most effective and
efficient manner (and consistent with other important public
policy priorities)?
3. What are the effects of these actions on the life of
communities that straddle NAFTA's international borders?
Maintaining a focus on border community life as a consistent
priority across all research sites, we focused on three outcomes.
1. Cataloguing and understanding existing local initiatives
toward greater cooperation between border communities located
on different sides of an international border;
2. uunderstanding better the similarities and differences in
that regard among such communities; and
3. Extracting and contextualizing ``best practices'' in local
self-management with regard to cross-border matters.
Field research results were then used to assess and develop a
perspective on the state of integration within North America, and
particularly within the North American Free Trade Agreement space, and
to articulate a vision for such integration in fifteen or twenty years.
The project's principal research hypothesis was that at the local
level, communities on both sides of a common border were thinking (and
when allowed, acting) creatively and often collaboratively in response
to common problems and in pursuit of common interests. Although the
degree of cooperation and the motives for cooperation vary
significantly across borders and border regions, in almost all
instances examples of cooperation were found to exist-thus validating
the hypothesis.
The following are among the most robust general findings of the
research.
1. The interests of border regions typically receive inadequate and
at times unwelcome attention from national governments. This is
typically due to the fact that central governments think of their
responsibilities toward borders within the framework of ``reasons of
state.'' The post-September 1 I environment makes this point more
starkly than we could have hypothesized. Such thinking, especially when
``security'' concerns enter the mix, reinforces the tendency of
bureaucracies to make decisions unilaterally and leads to the
devaluation of local dynamics and preferences. For instance, along the
U.S.Mexico border, anxiety about drugs and unauthorized immigration has
led to fortifications and an active policing framework that gives short
shrift to the border's other principal function: facilitation of legal
traffic and trade.
2. National government policies toward border control tend to be
inconsistent, even erratic, with patterns often ranging,from
inattention to the ``wrong kind'' of attention. Both extremes kindle
discontent and, except in emergencies, both can generate calls for more
autonomy on transborder issues of greatest concern to a locality or
region. Communities along many of the borders we studied desire greater
autonomy. In many instances, however, communities make fundamentally
contradictory demands. For instance, along the U.S. southwest border,
many U.S. communities, while calling for greater order and security,
simultaneously call for easier commercial access to consumers and to
workers from across the border.
3. Most central governments use symbols and language that reinforce
the imagery of borders as ``zones of exclusion. `` One is often struck
by the lengths to which some governments go to establish and demarcate
their state's distinctness and identity-from the display of massive
flags to the creation of a no-man's-land and the building of actual
fortifications. Such views, however, often contrast sharply with those
of the locals, who are much more likely to consider the border a place
of commercial, social, and cultural interface, part of an often single
community-some of which just happens to be in a foreign political
jurisdiction. Many communities along both U.S. borders feel (and act)
this way.
4. The adoption of a model of tight controls and the empowerment of
border officials to exclude people with little accountability have
become breeding grounds for arbitrary behavior by national government
personnel; they also create more opportunities for corruption and
encourage the growth of market forces designed to defeat border
controls. Nowhere is this phenomenon more evident than along the U.S.
southwest border, although behavior at other borders follows the same
general rule. As an example of arbitrariness, U.S. immigration
officials at different crossings seem to interpret their authority to
exclude inadmissible entrants quite differently, resulting in
dramatically different outcomes. With regard to official corruption,
international smuggling networks are now widely thought to be able to
corrupt government officials virtually anywhere.
5. Border communities typically approach both the challenges and
the opportunities of deeper cross-border relations in a remarkably
pragmatic fashion. Communities along the U.S.-Canada border typify this
behavior, although below the radar screen of newspaper headlines and
the rhetoric of politicians this is now a nearly universal phenomenon
along uncontested borders. In fact, as cross-border contacts increase,
local officials from both sides, in partnership with business
interests, religious organizations, and community-based and other
nongovernmental actors, seek to play increasingly significant roles in
the ongoing discussions about and the making and implementation of
policies that affect their lives. Clearly, not all communities are
equally active in this regard and few are successful in influencing
their fate in measurable ways. However, the existence of institutional
frameworks that encourage and formalize input, can make a significant
difference in outcomes. Two other factors also facilitate better cross-
border understanding: the growth in cross-border civil society
contacts, and official efforts to consider local perspectives along
borders.
6. Business and commercial interests are the drivers of better
cross-border relations across all research sites. In fact, some
observers argue that many border communities share a single business
culture in what often amounts to symbiotic, even single, markets. This
holds true regardless of the degree to which business contacts are
formal or informal. Not everyone shares the enthusiasm of commercial
interests for more 5 cross-border openness, however, and, as a result,
the vision of cross-border relations promoted by business interests can
complicate matters when it is in conflict either with that of other
local interests or with national priorities and regulations. Such
conflicts are further exacerbated when national regulations, and/or the
way in which they are implemented by representatives of national
bureaucracies at the border, are internally contradictory or are
thought to be at significant variance with the broader local economic
life. At times, local communities seek to take initiatives to redress
the perceived imbalance.
7. There is a remarkable degree of community-devised cross-border
cooperation on issues such as public health, access to education,
environmental protection, joint regional planning, and law enforcement.
In most instances, such cooperation seems to be unaffected by the ups
and downs of the national conversation on borders and, more precisely,
the conversation within the national capital. Local concerns about the
tone and flavor of these conversations have been heightened by a
growing appreciation that discussions about borders inside national
capitals seem always either to over- or under react to the real issues.
Community views, on the other hand, are typically closer to the facts
on the ground than is political rhetoric, and are better attuned to
local needs and nuances. These range from a finer sense of increasingly
common destinies and, perhaps to a lesser degree, human and ethnic
solidarity.
8. Investments in the economic and social development of border
regions and cities are at best an intermittent affair and tend to be
inadequate even in the best of circumstances. Models of how to invest
in a border region include the distribution of significant funds
through supranational institutions (the EU ``Euro-regions'' model) and
the potentially very significant U.S. investments in transportation
corridors which allow investments in Canada and Mexico. A third
potential model is the embryonic U.S. development efforts at its
southwest border by the Interagency Task Force for the Economic
Development of the Southwest Border, impaneled by the Clinton
Administration. A final model comes from the Pacific Northwest, where
remarkably well-organized cross-border public/private efforts have been
able to make considerable progress in securing funding from state,
local, and U.S. federal sources to pursue the objective of adapting
national policies to the region's unique requirements and
opportunities.
9. There is an increasing array of experiments with a variety of
``extraterritorial'' arrangements designed to facilitate commercial and
socio-cultural interests. For instance, the United States has
experimented with permitting Mexican border inspection functions to be
performed deep within U.S. territory during the Christmas season (in
order to reduce delays at the border as large numbers of Mexicans
return home for the holidays). The United States and Mexico have
reciprocally expanded the zone for the less restricted movement of
Mexicans in Arizona to 65 miles (and for Americans into Sonora for 100
kilometers), mostly as a means of encouraging access by Mexican
nationals to U.S. commercial establishments. Finally, in most major
Canadian airports, the United States has a deeply institutionalized
pre-clearance system for customs, immigration, and associated agencies
for travelers to the United States, and together with Canada it is
taking the first tentative steps toward sharing inspection facilities
and related items.
10. Next to being given short shrift by national authorities and
the lack of resources, lack of ``capacity'' may be the border
communities' greatest problem. It may be difficult to overemphasize
this point. The capacity gap spans the gamut of activities along
borders. It is clearly more pronounced in poorer countries, in remote
border communities, and in the communities most recently delegated
political power. It also exists, however, in communities lacking
sufficient physical capacity to handle the ever expanding traffic. The
need for capacity building goes beyond governance and beyond the public
sector, including the fields of education and health services and the
development of a culture of civil society that can hold the government
accountable for its decisions and can play a part in the development of
a broader base of social activism.
III. RECOMMENDATIONS
The rich and intricate tapestry of complex interdependence stitched
together by the case studies in this volume makes clear that
generalizations and, ultimately, policy recommendations need to
exercise extreme care not to oversimplify. The case studies also make
clear, however, that there is a great deal more going with cross-border
communities than many analysts have suspected and, more to the point,
than either national leaders or the national press have bothered to
recognize.
What, then, might one recommend that is consistent with and moves
toward the more open and cooperative future the research results
discussed in this volume imply? We are making three overall
recommendations.
1. Border controls should be conceptualized as a means to an end,
rather than as the ultimate policy goal portrayed in political rhetoric
and reflected in bureaucratic initiatives. Put differently, the
explicit end-goal of regulatory and enforcement efforts at the border
should be to manage the border effectively enough to prepare the ground
for the serious conversation about how best jointly to accomplish each
neighbor's principal public policy priorities while allowing more
organic forms of integration to proceed at a reasonable pace. One
implication of this recommendation is that the current set of
discussions and initiatives regarding the NAFTA partners' internal
borders should continue to proceed roughly along the paths they have
been following in the last year or so; this must be accompanied,
however, by an explicit reconceptualization and articulation of the
desirable endpoint. Focusing squarely on the greater use of technology
and on management innovations that improve both facilitation and
regulation and control must be part and parcel of this process-but,
again, they must not be the end points of the NAFTA relationships.
For the U.S.-Canada border, continuing along the path of the last
year or so but with a re-conceptualization of the end point means ever-
closer and more organic cooperation, a more explicit focus on
understanding and addressing differences, and far greater
experimentation. For the U.S.-Mexico border, this means that Mexico's
deeper engagement of the United States over the last year or so must
not just continue in earnest but in fact must accelerate further, and
it must shift gears. This bilateral relationship is too important for
either country to become distracted by the differences between them.
Although that engagement's centerpiece is the migration
relationship, the border cannot be left too far behind-if for no other
reason than that it is deeply intertwined with the migration issue.
2. All three national governments must show uncharacteristic
adeptness in
adapting their border management and enforcement practices to local
conditions. While in the U.S. context this recommendation may raise
important field-management concerns about the U.S. Immigration and
Naturalization Service (which has proven unable to rein in its field
managers and deliver many of its functions with consistency), the
principle nonetheless remains a powerful one. Whenever possible, field
managers should be encouraged to work in tandem with local communities
to deliver the various components of the immigration function in a
manner that is sensitive to and builds upon the particular
circumstances of an area.
Currently, hardly any border communities have either a strategy or
a mechanism for building their capacity to aggregate and articulate
their interests. (The U.S.-Canada border may be the only near-
exception.) Developing such strategies and investing in mechanisms-such
as a regular annual or biennial meeting of public and private-sector
interests along and across a single border-could address this weakness.
Such a regular forum would institutionalize the exchange of views,
facilitate the process of learning about each other's interests,
priorities, successes, and failures, and offer an opportunity to build
relationships and impanel issue-focused groups, as appropriate, to
promote common interests.
Central governments also should initiate regular, systematic
opportunities for local interests to be brought into the decision-
making process about issues that affect them. Such an initiative would
address a second systemic weakness of the status quo the lack of a
formal mechanism for communities to convey their interests to the
appropriate central government policy-making bodies in a manner that is
timely and thus enhances the prospects of a fair hearing.
3. There should not be a one-size-fits-all approach to the issues
at hand not even along a single border. History, topography, economy,
and the level of local engagement with the issue (both that of the
public sector and that of the for-profit and not-for-profit private
sectors), lead to enormous variability in the delivery of border
inspection functions, as do differences in outlooks and management and
the personal skills of the local managers of national bureaucracies.
These differences demand, and sometimes in fact result in, sensitive
and thoughtful approaches that respect and take advantage of
differences. These approaches, however, still need to be informed by a
single policy frame of reference and must reflect the levels of shared
goals and objectives between the two countries-that is, building upon,
rather than undermining, the increasingly seamless cooperation between
the two countries in a vast array of policy areas.
The importance of policy clarity and, more importantly, of policies
that have a real purpose-an end-goal or a vision-cannot be
overemphasized, nor can its absence, from virtually every border this
project has studied, be more pronounced. It is, in our view, the most
fundamental explanation for the relative state of confusion about the
management of borders, and for the inconsistency with which it is
proceeding. As a result of this failure of imagination, states do not
seem able to learn from and successfully incorporate innovations in
managing borders, or in testing different management models and
alternative methodologies.
IV. THE VOLUME'S NORTH AMERICAN VISION
We call on the three NAFTA partners to commence initially domestic
processes to develop a strategic plan for changing the terms of the
debate about the border relationship with their immediate neighbors.
Whatever is agreed to must proceed from the assumption that if
negotiations are to succeed, they must recommend activities that are
gradual and evolutionary, and in each instance take into account the
interests of the affected communities. This implies much deeper levels
of national government/state (provincial) and local government
cooperation. It also implies far greater and more systematic
consultations with local stakeholders than any of the three national
governments is either familiar with or perhaps comfortable in
undertaking.
Our vision imagines the NAFTA's internal borders gradually (and in
temporal and substantive terms, unevenly) becoming irrelevant to the
point where their abolition could proceed without any measurable losses
in any of the important security, revenue collection, and even
``identity'' priorities of each partner, at least relative to the
results of the present course of action. The vision also imagines small
actual additional losses in ``sovereignty'' for any of the partners.
Any such ``losses,'' in fact, would in our view be offset by
substantial democratic surpluses for all three NAFTA partners.
Such a vision could be best approached from two distinct, yet
ultimately converging, tracks. Both require greater vertical and
horizontal consciousness-raising and greater and more systematic input
by local communities and their institutions-public and private. The
first track focuses on continuing the multiplicity of contacts, the
deepening of bilateral engagement, and the focus on pragmatic problem-
solving that has been the operational model for the past few years-if
intermittently so. The second track should focus on the kind of North
America the citizens of the three countries have a legitimate right to
expect in the not-too-distant future-and on how best to achieve it.
Some of this latter track's required elements will of necessity be
``defensive'' in nature; that is, they must ``protect'' citizens from
unwanted activities, practices, and products. Other elements will be
forward-looking and will be advancing broader citizen interests in
terms of prosperity, adherence to rules, protection of rights, and
fundamental conformity with the principles of humanitarianism. In its
totality, the proposed vision should hold the promise for doing better
by most people in each of the NAFTA partners along most of these goals.
Such a vision should include the following among its main elements:
1. Greater security from illegal activities and unwanted
products from outside the NAFTA space-including terrorism,
illegal immigration, drugs, and more;
2. Protection from illegal activities and undesirable products
that may be found inside the NAFTA region that will be no less
reliable than what each NAFTA partner enjoys now;
3. The nearly seamless movement of legitimate goods and people
seeking to cross internal NAFTA borders; and
4. Protection from the political ups and downs (the political
``mood swings,'' as it were) of one NAFTA partner or another
and, perhaps more importantly, from bureaucratic ``ad-hocism,''
affecting the vital interests of the other partners.
Is our vision realistic-particularly in the post-September 11
environment? We think so. Will critics think that it is realistic?
Probably not. In many ways, there are few things easier than shooting
down a vision. The three NAFTA capitals are full of people who know how
to say ``no'' a million ways. (Bureaucracies of all types are
particularly adept at saying ``no'' to changes in their mission or
culture. Ultimately, since it is bureaucracies that will implement any
vision, working with them will bear more fruit than working against
them.) Getting to ``yes,'' however, requires great political courage
and uncommon qualities of leadership. Nor can a vision of a different
future immediately provide fully satisfactory answers to all the
questions-legitimate or not-that one may pose. Realizing the vision
proposed here will be rocky and the outcome frequently will seem
uncertain. Furthermore, as with the early stages of any ambitious new
initiative, there will be winners and losers-and each NAFTA partner
will have to give priority to developing and implementing, policies
that address the concerns of those who will likely lose at the
beginning.
V. SOME INITIATIVES THAT CANADA AND THE U.S. CAN BEGIN TO IMPLEMENT AS
SOON AS POSSIBLE
Integration is a gradual process involving a myriad of incremental
steps and the building of trust. To begin, we suggest that each border
inspection agency be required to analyze each one of the functions it
performs at the border along four lines: First, must each of its
functions be done only at the border? Second, what are the costs and
benefits of doing that function at the border versus doing it
elsewhere? Third, can any of its functions be performed by an inspector
from a sister agency? Fourth, can any of the functions in question be
performed (after proper negotiations, training, etc.) by an inspector
from the other country?
We list below some concrete steps in the process of rethinking
border management. We expect these initiatives to be tested first with
Canada but expect that, over time, those that pass the tests, would be
gradually ``exported'' to the U.S.-Mexico border.
Customs could perform many of its inspections and collect
all applicable duties at the point where the cargo is loaded in North
America, employing available technology to ``seal'' the containers) and
transferring all the relevant information about the cargo
electronically to any other inspection point.
Customs could employ ``risk-management'' methodologies for
performing inspection functions and re-deploy some of the newly
``released'' personnel to joint investigative task forces with sister
agencies from either side of the border in order to uncover violations
of various types.
One NAFTA partner could handle inspections and the
collection of tariffs on behalf of the others or could do so jointly-
but always once-at the initial point in which a cargo from a non-NAFTA
country enters NAFTA space. Similarly, progress should be made on the
``unified port management'' concept for its potential to use resources
most efficiently while improving both service and the quality of
inspections.
Border customs inspections could be done only once-by
either national customs service-so as to accommodate variances in
staffing, physical infrastructure, and topographical idiosyncrasies.
The United States could copy the Canadian model of having
only one agency staff the primary inspection lanes, rather than having
both Customs and the Immigration and Naturalization Service. All
necessary inspection agencies would still retain a presence at the
border to perform secondary inspections.
Existing systems of customs brokers and private bondsmen
could be utilized to a far greater extent and given both greater power
and greater responsibility-and, by extension, made more accountable
(and penalized more severely) for failures - of either omission or
commission.
The private sector could be relied upon even more
consequentially in areas ranging from technology to the building of
better infrastructure wherever it might be needed, through liberalized
public-private partnerships and pay-as-you-go projects.
The INS could handle all third-country (non-NAFTA)
immigration controls at an individual's first point of entry into NAFTA
space. Pre-clearance technology and intelligence cooperation are in
many instances already significant enough to expect that this method
can be accelerated without any loss of control relative to 11 the
status quo. In fact, airport inspections are more accurate and can be
more efficient than virtually any system of inspections at land
borders, where visa and identity checks, even after September 11.
Canada and the United States could agree to a common visa
regime for the widest band of countries each country could accommodate
and exercise much greater care in the issuance of visas for the
citizens of countries for which visa-free entry could not be agreed to
by the other country.
Canada and the United States initially, the U.S. and
Mexico at a later point, and, eventually, all three NAFTA partners and
contiguous neighbors, could gradually liberalize the movement of each
other's nationals, thus freeing their inspection resources to focus
more on non-NAFTA nationals. (It is worth noting that despite having
reached absolute freedom of movement, intra-EU migration by EU citizens
is minuscule, at between seven and eight million persons, or about two
percent of the EU's population.) Potential exploitation of a country's
social support systems by nationals of another NAFTA country can be
addressed up front in a variety of ways, including requiring departure
within a specific time period if a job or other means of support hasn't
been found or by continuing the social protection mechanisms of the
country of origin for the initial few months after entry.
These recommendations are not made in a vacuum. Some tentative
steps toward the directions recommended here are already being taken,
the technology is readily available, and the large business sector that
accounts for most of the transborder initiatives and energy is thought
to be fully primed for cooperating in return for more timely and
predictable results. A vision, and political will, seem to be the major
missing ingredients.
We must also note that our vision has no room for supranational
bureaucracies a la Brussels. We believe instead in an integration
process that is organic and is thus built from the bottom up-and from
the periphery to the center, that is, from border regions to capital
cities, differing dramatically from the top-down approach the EU
practices even today. Europe's experience nonetheless reminds us that
progress on even the most intractable issues comes down to creativity,
leadership, local input, an overarching vision, - liberal amounts of
common sense, and a willingness to experiment and learn from others.
VI. CONCLUDING THOUGHTS
Few issues in the international system are as complex as those
surrounding borders. As this volume demonstrates, the roots of that
complexity include but go beyond the reality that borders are the most
direct physical manifestation of ``statehood'' and sovereignty. They
also are inextricably linked with competing policy priorities that
simultaneously expect border inspection systems to allow the swift and
efficient passage of legitimate people and products while unerringly
stopping illegitimate traffic and undesirable products. At their very
root, however, borders and their ``management'' or ``protection,''
however much these last functions may have changed in recent years, are
first and foremost political concepts, and can only be addressed
politically.
What relationships, then, might one anticipate within the NAFTA-
space in the years ahead? Canada's understandable preoccupation with
its U.S. relationship will continue to motivate that country to ensure
by any means necessary that the economic relationship continues to grow
in ways that guarantee the prosperity of its people. It is in fact our
contention that, substantively at least, the U.S.-Canada border is
likely to disappear before any politician finds the political courage
to negotiate its removal. Symbolic issues, of course, will need to be
addressed, as will the significant strengthening of police functions
both along the outside perimeter of North America and-an important
policy development-in the interior of each country, an intensification
that is already occurring.
Mexico, buoyed by and ready to draw on the democratic dividend
created by Mr. Fox's defeat of the candidate of the Institutional
Revolutionary Party (PRI) in the 2000 presidential elections, has found
the confidence to enter into bilateral negotiations with the United
States about a tough binational ``bargain'' on migration and border
issues. That bargain, whenever the post-September 11 climate allows it
to move forward, would offer Mexicans much greater access to the part
of the U.S. economy and labor markets in which it is already a major
player in return for far greater and much more active cooperation in
addressing the primarily ``law-and-order'' issues of concern to the
United States. Mexico's ability to deliver on the responsibilities it
would undertake under such a bargain would in turn determine the pace
at which it may begin to catch up with the U.S. treatment of the U.S.-
Canada border.
Finally, U.S. interest in the North American ``project'' envisioned
here (``acceptance'' may be a more appropriate term than ``interest '')
is likely to be tepid until it is convinced that it can accomplish its
own policy priorities less expensively, more efficiently, and much more
effectively than under the status quo. In that regard, it is the limits
of thicker and infinitely more expensive unilateral controls that may
persuade the United States to consider truly alternative ways of
dealing with these issues.
Mr. Chairman, Members of the Subcommittee: Ensuring our safety
requires a comprehensive, system-wide response that goes well beyond
the jurisdiction of this Subcommittee and includes not only the INS but
each and every public agency with which foreign entrants interact. Our
nation's security from foreign nationals who may wish us ill in the
months and years ahead rests on the simultaneous and sustained pursuit
of several initiatives.
This is an extraordinary task under any circumstances; it becomes
even more so, however, given our record as a people of a generally low
attention span on matters large and small. This tendency makes it all
the more important that we resist the twin impulsions of (1) throwing
money at the problem (this problem is too large and it can ``break the
bank'' rather quickly) and (2) rushing to create new and cumbersome
data 13 systems that may offer only marginal benefits to the common
objective of making our country more secure while having enormous long
term costs on who we are as a nation.
Based on our research, we believe that, over time, we can achieve
many more of our goals working together with the intelligence gathering
and law-enforcement agencies of our allies in this ``war on
terrorism,'' and particularly with those of our North American
partners-Canada and Mexico than we can do unilaterally. Seamless
cooperation in protecting our common North American space, what some
people now call ``perimeter defense,'' is a goal worth pursuing at a
pace and with as much vigor as prudence and the capabilities of each of
our partners allow.
Ultimately, Mr. Chairman, we can protect ourselves better through
``external'' controls, that is, actions that we might take before an
undesirable alien gains entry into our country than ``internal''
controls, that is, measures taken once one has been admitted. Put
differently, keeping undesirable individuals out of the US through
``front gate controls'' (that is, the visa issuance and border
inspection regimes), is both easier and more effective than attempting
to catch up with such persons after they enter the US. Focusing most of
our additional resources on prevention measures demands that we treat
our contiguous neighbors as the assets that they are (and can be) than
as the liabilities that some seek to make them.
Thank you, Mr. Chairman, for the opportunity to appear before you
and the Subcommittee.
Chairman Kennedy. Thank you very much.
Mr. Norton?
STATEMENT OF RICHARD E. NORTON, EXECUTIVE DIRECTOR,
INTERNATIONAL BIOMETRIC INDUSTRY ASSOCIATION, FAIRFAX, VIRGINIA
Mr. Norton. Mr. Chairman, Senator Brownback, thanks for the
opportunity to appear here today before this panel.
We are pleased to note the consensus we have seen today on
the need for greater use of biometrics and understand the
crucial role they can play. In the past, we think the
biometrics have been largely misconstrued as perhaps invasive
technologies that would be compromising privacy when, in fact,
the opposite is the case, and we are seeing a broad recognition
of that--really the only way to offer a technological silver
bullet here, to coin a phrase used by Mr. Ziglar, that can
offer security, that can offer convenience, and also protect
privacy at the same time.
The reason is that biometrics are stored as encrypted
digital information. They are not stored as an image, with rare
exception, and they can't be reverse-engineered to reveal
anything about the holder. They don't say anything about the
sex, the age, the race of the person's identity, and they can
truly place a lock and key on this information and protect it
from prying eyes.
Our message is simple: The U.S. has the tools to
immediately implement several important biometric-based
programs and make a difference right away. By consolidating
information, placing the proper equipment in the field, and
enabling real-time checks of the data, valid document holders
can be identified at any stage of the process, from application
at a consular post to departure from the United States.
Our recommendations are to do the following now:
First, deploy readers at the border that can verify the
identity of any holder of an alien resident card or border
crossing card. By the end of next year, there will be nearly 20
million of these documents in circulation, and all have
biometric information securely embedded in them. This
information can be relied on to determine if a holder is
properly linked to the document at the time they apply for
admission to the United States.
Second, we strongly urge the consolidation of all photo
images from all U.S. travel documents into the Interagency
Border Inspection System. Right now we have access to visa
information that is slowly coming on at several ports of entry,
and we are pleased to hear that this information may be
available more broadly in the future. However, U.S. passport
information is not in this database, nor is information
reliably accessed on ARC holders, that is, alien resident card
holders, and border crosser card holders. Doing so would give
the U.S. authorities the immediate ability to verify the
identity of any document holder.
And, third, we would like to recommend something that
perhaps wouldn't be seen as a replacement for the pre-
inspection program, but could certainly be made available
universally, which pre-inspection never will be, and that is to
add the images of suspected terrorists to this database that we
are talking about to the Interagency Border Inspection System
and make this a real-time system, driven by facial recognition
technology that can be used to verify the validity of a
document and the identity of the holder before the travelers
board the flight to the United States. Making the Advance
Passenger Information program universal is a good step, but it
does nothing to stop a terrorist at the airline gate.
Real-time access using facial recognition technology can
accomplish this goal while offering convenience, privacy, and
security to the traveler and without resorting to something so
dramatic as a national I.D. card.
There are additional steps underway. The FBI is looking at
how it can improve its automated fingerprint identification
system to provide the sorts of checks that are envisioned in S.
1452, introduced by the chairman last month. The U.S.
Government and other governments, along with airlines,
airports, and technology providers, are cooperating with the
Simplifying Passenger Travel program to try to rope in as many
bona fide travelers into a system of biometric identification
as possible and do this on an international basis.
Third, the International Civil Aviation Organization is
also trying to improve the documentation, being able to use
biometrics in a passport to validate who a traveler is, again,
deterring fraud, enabling us to identify people who shouldn't
be in the system, and facilitating the people who should be
allowed to pass freely.
Finally, we would like to add we have heard much here today
about the concern about privacy. As we explained, biometric
technologies do offer the ability to retain privacy without
eroding security. Ultimately, the citizens' trust is going to
have to be acquired by assurances that these systems are
properly regulated and properly maintained. The biometric
industry has been very aggressive about this and has advocated
controls for several years that would enable this sort of
system to be implemented with full confidence of the citizens
of the United States.
Our recommendations are completely detailed in our written
testimony, Senator, and we would be happy to answer any
questions about them. Thank you.
[The prepared statement of Mr. Norton follows:]
Statement of Richard E. Norton, Executive Director, International
Biometric Industry Association
Mr. Chairman and members of the Subcommittee, thank you for
inviting the biometric industry to offer its views at this important
proceeding. My name is Richard E. Norton, and I am the Executive
Director of the International Biometric Industry Association (IBIA).
IBIA is based in Washington, D.C. and represents the collective
interests of manufacturers and developers of biometric technology.
Biometric Technology
Biometrics are defined as the automatic identification or identity
verification of an individual based on physiological or behavioral
characteristics. The authentication of identity is accomplished by
using computer technology in a noninvasive way to match patterns of
live individuals in real time against enrolled records. Examples of the
patterns used for biometric identification include those made from a
finger image, the geometry of the hand, an iris, voice, signature, or
face. It is important to note that most biometric applications do not
store the actual image of the feature being measured. Instead,
biometrics secure systems and protect an individual's identity by
converting the measurement into an encrypted file. This biometric
record cannot be reverse engineered to determine a person's age, sex,
race or other sensitive information. Likewise, it cannot be used to
steal someone's identity.
With these characteristics, biometrics are the only technologies
that can offer both increased security and greater convenience. The
U.S. Government has been an early adopter of biometrics, first using
the devices to control access to highly sensitive facilities such as
nuclear power plants and weapons facilities. Now biometrics are
routinely employed to protect networks against intrusion by hackers, to
secure records from identity theft, to ensure benefits are disbursed to
the lawful recipient, and to protect borders.
Biometrics and Border Clearance
The U.S. has nearly a decade of experience with this latter
application. The Immigration & Naturalization Service has experimented
with biometric technologies at land and air ports of entry, and has
deployed its INSPASS automated kiosks at a number of major airports in
the U.S. and at immigration pre-clearance sites in Canada. While the
INSPASS system has not been implemented on a broad enough scale to
reduce the burden on the INS inspection mission, it is widely regarded
as a successful experiment that has worked as planned--in complete
security--for over eight years. Other countries have had similar
results: Canada, the Netherlands, Singapore, and Israel have
implemented biometrics in this demanding national security role and
found them to be robust and effective.
The question is how we take these low volume trials and efficiently
convert the lessons learned into a comprehensive system of controls
that tighten our border without causing service levels to deteriorate
to unacceptable levels. Fortunately, the tools are in place to
accomplish this goal: not only are the technologies reliable and
standards in place, but in several significant areas the U.S. has taken
preliminary steps that will enable us to make a measurable difference
at a reasonable cost. Furthermore, we are convinced there are ways to
accomplish our objectives at the border without having to resort to a
national identity card.
Elements of a Solution
In many respects the U.S. has the key elements of biometric-based
systems in place, ready to be converted into information that can be
tapped to identify travelers at ports of entry, applicants at visa
issuance posts overseas, and potential threats to national security as
they attempt to enter or move about the country.
First, INS has issued over five million of its highly secure Alien
Resident Cards (ARC) to permanent residents of the U.S. The Department
of State has used the same technology on nearly five million Border
Grosser Cards (BCC) that have been issued to Mexican citizens since
1999. By the end of 2002, over 20 million such cards will be in
circulation; by 2007, all ARCS will have been converted to the new
format. Both cards contain an image of the bearer's fingerprint that is
encoded in the optical zone of the card--a feature analogous to the
appearance and storage capacity of a CD-ROM, but with strong built-in
encryption that has effectively prevented forgery.
Second, all U.S. visas are produced from a digital file that
includes an image of the bearer. This image is now retained in State
Department files and, as with the image of the ARC or BCC holder, can
be used to help verify the identity of the person presenting the visa
through face recognition technology.
Third, border agencies have established a nearly universal system
for checking on the identity of passengers as they travel to the U.S.
The Advance Passenger Information System (APIS) calls for airlines to
forward biographical information to the Interagency Border Inspection
System, where lookouts are run and ports notified if U.S. authorities
want to closely examine a particular passenger. IBIS, if it is
converted to a real time, two-way communication system and expanded to
include automated links to ARC, BCC and passport data, can be used to
validate the identity of travelers before they board their flight to
the U.S. (see ``Recommendations'' below).
Fourth, the biometric industry has worked diligently to establish
the standards needed for true interoperability. In cooperation with the
National Institute of Standards & Technology, IBIA has created a
registry that enables any biometric device to be recognized on a
network. The industry and government also have worked together to
publish rules on how biometrics are to be integrated into computer
operating systems. . This is an exceptionally important advancement for
several reasons:
It allows multiple biometrics to be accommodated;
It allows the quick adoption of new biometric
technologies as they are developed in the future;
It permits the rapid exchange of information for
record checks; and
It enables the use of biometric information that has
been acquired by other sources, such as employers, airlines,
and government agencies.
Recommendations
With these pieces in place, there are a number of steps that can be
taken immediately to improve our capacity to properly identify people
who are arriving at U.S. borders:
deploy optical card and finger image readers.
ARCS and BCCs contain a finger image of the bearer. This image can
be extracted from the card by an optical card reader, and compared to
the ``live'' image of the person applying for admission to the U.S. by
using a low-cost finger image reader. The card is virtually immune to
compromise, and the process can be conducted without having to
establish a network connection to a central database.
standardize the retention of, and centralize, digital images for all
u.s. documents.
U.S. visa, ARC and BCC records contain digital images of the bearer
that, if centralized, can be used to verify the identity of the
traveler. The same process could be used to link U.S. passports to
their holders if the Department of State updates its system to include
the digital image of bearers of that document. If this information is
made available through IBIS, U.S. border authorities can have real-time
access to images of all applicants for admission, with the exception of
travelers entering under the Visa Waiver Program.
apply the use of face recognition technology to automate the
identification of u.s. document holders.
As an extension of the centralization process described above, any
image that is stored in the system can be used to generate a face
recognition template. This template can be compared to the template
that is produced by scanning the image on a travel document, or by
using an image from a video camera.
extend the document verification process to the airline check-in
counter.
Any system of border control and terrorist interdiction requires
airlines to be an intrinsic and effective-part of the process.
Currently, airlines have little to go on to determine if a traveler may
be improperly documented, or if a passenger poses a danger to the
aircraft. Being able to verify the identity of a U.S. document holder--
or compare a suspect against a terrorist database--will enable
resources to be focused on identifying those who cannot be quickly
verified against accurate records. Such improvements to our current
screening processes can be made by centralizing data and images in
IBIS, upgrading that system to enable near-real-time interactive
messaging between government and airlines, and by expanding the use of
advanced, ``full field of view'' document readers that can
automatically scan all of the information on the travel document data
page.
Other Initiatives
Other programs are certain to follow these first steps in building
an effective system for screening visa applicants and streamlining the
admission of bona fide visitors, U.S. citizens and returning residents.
Improvements to the Federal Bureau of Investigation Automated
Fingerprint Identification System can expedite the kind of record
checks envisioned in Senate Bill 1452, which was introduced by the
Chairman of this Subcommittee on September 21, 2001; cooperative
efforts such as the multi-stakeholder Simplifying Passenger Travel
initiative, sponsored by the International Air Transport Association,
will help the U.S. to identify a broader range of bona fide travelers
who have been vetted through biometric control systems implemented in
other countries; and further standardization on the use and storage of
biometrics on passports under the auspices of the International Civil
Aviation Organization (ICAO) will make counterfeiting, identity theft,
and imposter fraud more difficult for those with ill intent.
In closing, the industry would like to mention its efforts to
pursue these innovations without eroding the privacy and civil
liberties of American citizens, and without disrupting international
commerce. Biometric data is inherently secure and serves as a digital
lock and key on personal information; but ultimately the success of
these systems will depend on a traveler's trust that they will be
administered responsibly. The industry's policies and guidelines on how
to implement biometrics without diminishing public confidence is
described in detail at our website, www.ibia.org.
Thank you again, Mr. Chairman, for this opportunity to participate
in this distinguished panel. I would be pleased to answer any questions
you have about these recommendations, or about biometric applications
in general.
Chairman Kennedy. Just before coming to other questions, on
this issue of privacy could you just elaborate on that? What
are you talking about in terms of people having a sense that in
the biometric system their privacy issues are going to be
preserved or protected?
Mr. Norton. Well, as we explained, biometrics do protect
privacy by their nature because they are an encrypted file and
they can serve as a lock and key on personal information.
That being said, people still are concerned about biometric
information being stored. To say don't worry, trust technology
that it is taking care of you is an irresponsible statement to
make.
So an industry, what we say is that even if these
technologies have these inherent securities, then you should
have a system by which they are administered. You should have
careful controls over the access to the database. You should
let people know what the data is being used for. They should
know how it is being shared. They should have control over its
sharing if it is not for the explicit purpose of these
controls. And there should be careful regulation of how they
are administered, penalties imposed if people abuse this
information.
Chairman Kennedy. Okay. Could you provide some examples of
the technology that is currently available and could be
implemented by the INS? What are the costs involved in
implementing this system? You discussed applying facial
recognition technology to automate the identification of
documents. What is the cost and what is the time and what are
the principal sort of elements if the country was to make a
judgment to go in this direction?
Mr. Norton. There are many biometric technologies that can
be used, and many are very effective at solving this problem.
There is iris recognition, voice recognition, face/hand
geometry, finger imaging. But we have focused today
specifically on facial recognition and what it could offer
because it is--
Chairman Kennedy. Let me ask you just to back up. Do you
think it is advisable to try and get some international
standards so that we are all operating on the same plane, so to
speak? Is that advantageous?
Mr. Norton. Well, that is the direction that the
International Civil Aviation Organization is headed, is to look
at--they recommended, made a preliminary recommendation that
facial recognition be one of the primary biometric
technologies. The reason is speed and simplicity. We have
passports with photos in them. We issue documents and we are
now digitizing those photos and keeping them in records.
By applying a facial recognition template to these stored
images, you can very quickly validate who somebody is through
automated means. You don't have to have an officer standing
there comparing a document to a stored image. The system does
it automatically when you use a facial recognition template.
All of our documents have photos. It is the quickest way to
get to where we need to be.
Chairman Kennedy. Well, let me ask you, what is involved in
this? You know, if we are to move in that direction now, what
generally is the--what do you think is the cost, public-private
time frame? What is your own ballpark estimate?
Mr. Norton. Well, we have been consulting with the
officials who do manage the Interagency Border Inspection
System on a number of initiatives involving this sort of effort
and how the airlines, in fact, might even figure into this of
being sort of a second line of defense after the consulates.
And really what is required is to take this information that is
already available and pull it together, a fairly simple
administrative exercise. Apply facial recognition templates,
which is a very reasonable cost to do, just simply digitize
these images and make them referenceable by facial recognition
technology.
I think the biggest challenge is to make this system real-
time, to invest in the telecommunications infrastructure to
make it a reliable two-way system that can be instantly
accessed anywhere around the world. That will be the challenge.
I think that our agencies are up to that challenge and already
looking into those costs.
Chairman Kennedy. How far along are we in terms of the
technology in this? It is a constantly evolving technology. I
am familiar with some of it in my own State of Massachusetts,
which has done some of this and is working with the military,
primarily, in security areas. But what is your sense? How far
along are we in terms of the technology and what is your own
assessment on this?
Mr. Norton. Biometrics have been under development for
nearly 20 years, and the U.S. Government was an early adopter
of the technologies. They used them to protect very secure
national security facilities, nuclear weapons facilities,
nuclear power plants. And through the course of this sort of
evolution of the technology, they have been made very robust.
Working well and being low cost and easy to implement is
another question. But over the past 4 or 5 years, we have also
seen the prices drop dramatically, and we have seen the
standards put in place that enables these technologies to
seamlessly work within a system.
Briefly put, the technologies are robust, they work
reliably in many difficult environments, and the standards are
in place to move ahead now.
Chairman Kennedy. How would you compare it to the current
I-94 system in terms of integrity and accuracy, speed and
improving national security?
Mr. Norton. Well, the current I-94 system is really a mixed
bag. It is very difficult to track somebody out of the country,
especially, and it is a laborious process to automate this
information.
Proceeding with IBIS along the lines that we discussed--and
as Mr. Ziglar recommended--I think is an important first step.
The Interagency Border Inspection System has this information
already in it that is used to front-load the I-94 system. But
it not being taken advantage of. I think now that they have
established this link and realized that the Advance Passenger
Information program and IBIS and the I-94 program can all
operate together is a very important step, and I am glad to see
that it is being taken by INS. It will save money and it will
help solve the problem of identifying people in the country.
Chairman Kennedy. You mentioned that the International
Air--what is the organization that you mentioned trying to work
out a standard process in terms of--
Mr. Norton. There are actually two. The International Air
Transport Association is working on an effort with governments,
airports, airlines, and technology providers, and the
International Civil Aviation Organization is looking at
standardization of travel documents.
Chairman Kennedy. But they are consistent with their
objectives, are they? Is there a consistency with where they
are coming out?
Mr. Norton. Not only a consistency but a synergy. The IATA
effort in particular is looking at ways in which biometric
information can be voluntarily shared to enable people to move
seamlessly through the system, be carefully identified without
necessarily being slowed down. People have tended to forget in
this debate that we can't slow down commerce and we can't
inconvenience the traveler to the point where the industry is
disrupted and commerce is disrupted to the United States. We
feel these efforts, if carefully coordinated, can make progress
in the security area without diminishing commerce,
international commerce to the United States.
Chairman Kennedy. Mr. Papademetriou, let me just ask you
your reaction for developing a Northern American perimeter
strategy to combat terrorism.
Mr. Papademetriou. This is certainly one of the areas that
we must explore systematically with our Canadian friends
initially, and gradually, as the capabilities of our Mexican
friends develop further, with the Mexicans, too.
This is really all about adding an additional bite at the
apple in terms of defending ourselves. The outside--the real
first line of defense, as we heard earlier, is, of course, the
visa issuance process.
I think what Mr. Norton is suggesting, we have recommended
the same thing, but a pre-inspection system becomes a second
line of defense.
The third one becomes trying to really keep people outside
of the perimeter.
Our neighbors, both Canada and Mexico, are assets and they
can be made into far greater assets if we work with them rather
than being liabilities, which is what some people perhaps might
try to do. So, fundamentally, we are going to be building, if
we adopt some sort of a perimeter defense or a defense of the
North American space, we will be adding an additional and
welcome redundancy to protecting ourselves. And it makes sense
both in terms of defense but also in terms of protecting and
advancing our economic interests.
Chairman Kennedy. Thank you.
Dr. Butterfield, your view about the national
identification system for U.S. citizens and foreign nationals
in the U.S.?
Ms. Butterfield. Well, Mr. Chairman, I think that that is a
line that this Nation has not crossed until now, and I would
urge us to approach the question with a lot of cautions and
concerns about civil liberties, and with the question that my
colleague asked earlier about would it really do anything to
make us safer and more secure. If I were to have to carry a
national I.D. card and everyone else did and every immigrant
coming in had some kind of card, then the question is, again,
what does that tell us? Do I have to show it every time I buy
groceries, every time I make a bank transaction, every time I
rent an apartment?
What would its use be? What would a valid use be? What
would an overreaching use be? I think those are all questions I
would want to see considered before taking that step forward.
Chairman Kennedy. What about foreign nationals?
Ms. Butterfield. Well, again, I think that the perimeter
strategy, the layers of security and defense are the most
effective ones. I think, again, we have a problem with interior
verification. How do INS officials or employers, for that
matter, know to ask, you know, me for my I.D. or not, because I
am a U.S. citizen, but yet ask an immigrant to show some kind
of authorization. And I venture to say that Mr. Papademetriou
would be asked more often than Ms. Butterfield would. And so
then we get into issues about profiling and discrimination.
Chairman Kennedy. Maybe not in Boston.
[Laughter.]
Senator Kennedy. Senator DeWine?
Senator DeWine. Mr. Chairman, thank you. Let me first thank
you, Mr. Chairman, for holding this hearing. It is a very
important hearing, and I appreciate you doing it very much.
I have, Mr. Chairman, a statement which I would ask just to
be made a part of the record.
[The prepared statement of Senator DeWine follows:]
Statement of Hon. Mike DeWine, a U.S. Senator from the State of Ohio
Chairman Kennedy, thank you for agreeing to hold this important
hearing on our efforts to deter terrorism through immigration controls.
I thank our witnesses for coming to testify today, as well.
Before I say anything else, I want to make it perfectly clear that
I am not here to discourage legal immigration into our country. We
are--and always have been--a nation of immigrants. However, following
the tragic events of September 11th, we awoke to a whole new
world. We now are rethinking many of our nation's policies--from
national security measures and intelligence gathering to domestic law
enforcement and public health emergency procedures. Our immigration
policies are also at the a significant part of the debate on anti-
terrorism controls.
In examining current immigration policy and the terrorist threat,
we are presented with many questions: Do we focus on trying to keep
track of aliens we allow into the United States? Or, do we focus our
limited resources on screening those who have asked permission to enter
our country? The reality is that we must do both. We must do a better
job of screening aliens who enter the country, while at the same time
keep track of when and where those aliens enter and exit, and where
they are while they are here.
Let me talk for a moment about the scope of what we're facing. Last
year, the INS performed 529.6 million inspections of individuals who
crossed our borders either by land, sea, or air. As Commissioner Ziglar
noted in congressional testimony last week, over a half-billion
personal contacts were made with INS inspectors at our ports-of-entry.
After deducting American citizens who were inspected, 352 million
aliens were inspected in 2000. A little less than a third of those
aliens are permanent residents. That leaves 255 million inspections of
temporary ``nonimmigrant'' aliens who are crossing at U.S. ports-of-
entry.
It appears that this is the pool of entries in which we are
searching to find terrorists and others who are coming into the United
States for illicit purposes. Out of 255 million inspections, how on
earth are our law enforcement and other agencies responsible for these
individuals' entry supposed to identify 19 terrorists?
That's certainly a vast and overwhelming challenge. But, at the
same time, it is a challenge that we must meet. Congress expects it.
The American people expect it. Today, we want to know what needs to be
done meet this daunting task.
While I believe we can meet the challenges we face, I also believe
that it can be done only with the help of technology. I would like to
hear our panelists' ideas about how technology can be used to lessen
the terrorist threat with regard to immigration controls and
technology. What is your plan for using all available technology to
address immigration concerns?
Let me tell you what I have been thinking. In the Senate's recently
passed anti-terrorism package, I asked the Attorney General, in
consultation with appropriate agencies, to report to Congress on how we
can use our national biometric systems, such as the FBI's Integrated
Automated Fingerprint Identification System (IAFIS), to better identify
potential terrorists. Specifically, I asked how we can use the
automated fingerprint system to identify a person who holds a foreign
passport or a visa and may be wanted in connection with a criminal or
intelligence investigation in the United States or abroad. The idea is
that we would use the automated system to gather this information
before the issuance of a visa or entry into--or exit out of--the United
States.
I recognize that current INS technology is outdated and
insufficient to meet the new demands. We should leverage the
substantial investment taxpayers have made in the IAFIS system to
create a system of identification and verification that is fully
integrated with all relevant federal, state, and local agencies--all in
real-time. Currently, IAFIS has more than 48 million images and
exchanges information with almost all federal, state, and local law
enforcement agencies. I am not saying that this system is perfect, but
I am saying that we should use all of our available resources at our
disposal.
Again, thank you for participating today. I am looking forward to
hearing from our witnesses.
Senator DeWine. Mr. Norton, I am very interested in the use
of biometric technology to enhance security at our borders. I
think we are going to have to find a way to quickly implement
this type of technology. Over the last couple weeks, I have
attended a number of hearings here at the Capitol where
biometric technology has been discussed, and discussed at
length.
Witnesses have testified regarding the prospects for
biometric technology and have given examples of where that
technology is already in use. It has really, though, become
clear to me that there are two distinct uses for biometric
technology. Biometric technology can be used to verify the
identity of an alien who is holding a visa, or biometric
technology could be used to establish the identity of an alien
who applies for a visa or entry in the United States.
Most of the examples I have heard are applications of
biometric technology to verify identity. The State Department
cites the new laser visas or border crossing cards which
incorporate biometric technology. The biometric technology in
these so-called smart cards is really just to verify if the
person holding the card is the person to which the visa was
originally issued. There is no biometric search done by the
State Department when that individual is initially issued that
visa.
Now, when the State Department issues the original visa, it
relies on the information provided by the individual and the
name check process described by Ambassador Ryan. If the
individual provides false information to the State Department,
biometric verification and a laser visa doesn't really tell us
anything very useful.
I think we have a similar situation with the INS INSPASS
system, and in that case, the hand scan and the accompanying
card merely verify the identity of the card holder.
Now, I understand that the IDENT system could be used, can
be used to establish the identity of individuals who have been
entered into the system because they have been repeatedly
caught entering into the country illegally.
Now, aside from that limited use, are there any biometric
systems that are currently in use to establish the identity of
aliens who want to enter the United States? And a related
question is: If we want to positively establish the identity of
aliens entering the United States, don't we really need a
biometric system in place at our consular offices overseas? And
don't we need a real-time biometric identification system at
our ports of entry for aliens who have not gone through the
normal visa application process?
A long question and I apologize, but I am sure you can
handle it.
Mr. Norton. You raised a number of issues. First of all,
you are right. Verification is great technology once you know
who somebody is and you can verify who they are, link them to
an identity and a document. From that point forward,
verification operates very smoothly and effectively. INSPASS
has done so in complete security for 8 years, and other
countries have had similar success.
But you do have to make sure that you know who you are
dealing with, and that is why the criteria so far have been
strict as to who is enrolled in the INSPASS system. But how do
we bridge that and actually move into visa issuance and know
who we are dealing with?
There are a number of technologies that can be used. You
can streamline the interface between IDENT and the FBI IAFIS
system to do criminal record checks during the application
process for a visa. It will require some investment to do that,
but it would enable finger images to be checked against the law
enforcement database held by the FBI.
Another technology--
Senator DeWine. Excuse me. How big a deal is that as far as
a cost? Do you have any idea?
Mr. Norton. Well, I think the Department of Justice is
looking into that now, and investment is fairly significant. It
is about several hundred million dollars, I believe, to bring
it into--
Senator DeWine. But clearly doable.
Mr. Norton. But it is clearly doable.
Senator DeWine. Yes.
Mr. Norton. The second technology that can be used, another
very highly accurate technology, is iris recognition, but there
is no database of iris recognition enrollees. So once you have
identified somebody that way or start a record with iris
recognition, it is very effective at identifying a person at a
later stage in a one-to-many sort of search.
The third technology that can be used and the one that we
spoke to earlier was facial recognition. It may not be able to
automate that process, but it can be used very effectively to
call up a list of possibilities. If a consular official who
acquires a digital image from an applicant for a visa checks
against a database of images with that same image that they are
acquiring, they should be able to ascertain whether or not that
person may be wanted, may be known to intelligence authorities
as a possible terrorist. So it can be used as an effective one-
to-many search as long as there is human participation in that
determination.
You talked about real-time access to biometric information,
and that is precisely what we were recommending, and that is
that we take the images that we are currently containing in
separate databases, images of U.S. passport holders, of alien
resident card holders, border crosser card holders, visa
holders, and consolidate that information so that we can make
quick, real-time checks, even at the airline counter as people
try to board their flight to the United States. It does us no
good to know that person is already on the flight and headed
here, not only from a legal standpoint but from a terrorist
threat. And by making IBIS real-time and enabling those checks
using facial recognition, at least initially--because we have
that data, we have that information, we can use it to automate
the process quickly--we can make real progress.
Senator DeWine. Well, your testimony has been very helpful,
and I think your answer was very helpful. And I appreciate it
very much.
Let me ask Dr. Butterfield a question which maybe is a
little--I don't know if it is out of line, but I know that it
is in your area. It has to do with one of the U.S. Supreme
Court decisions from June of this year relating to the
detention of aliens, the Davis case.
My understanding of that case is that in some circumstances
the U.S. Government must release aliens who are supposed to be
deported. Let me give the example.
Say, for example, we have an alien who has entered the
country with forged or false documents. That person has come
into the U.S. and at some point we catch him and determine that
he is deportable. But we find out that he is a citizen of a
country that we don't have diplomatic relations with, Cuba, for
example.
My understanding is that the Supreme Court has said that we
cannot hold that individual in detention for more than 6
months.
Now, my question is: What happens with these deportable
aliens? Do we just let them go in the United States? Or are
they put on some form of probation? What actually happens?
Ms. Butterfield. Mr. DeWine, I think that you are correct
to a certain point. The Zadvydas decision said basically that
we can't just impose life sentences to imprisonment on someone
merely because their home country won't take them back.
But I think it really left open the question and said the
Government has to weigh and balance. If the person is truly a
danger to national security or to the community, then that is a
legitimate Government interest that will be balanced with the
individual's liberty interest. And so it merely mandated, I
think, the Department of Justice to make that determination on
an ongoing basis. And it urged them to look at, yes, could
conditions of release be imposed that would guarantee safety
and security and balance those needs.
I think to date--I was just told this morning, as a matter
of fact--that of the some 3,500 people detained in that very
situation, only about 300 have been released. But I think the
Court tried to strike a balance there.
Senator DeWine. Thank you.
Thank you, Mr. Chairman.
Chairman Kennedy. We thank all of you very much. We will be
keeping in touch with you. It was very, very interesting
testimony, and we are very grateful for it.
The Committee stands in recess.
[Whereupon, at 12:45 p.m., the Subcommittee was adjourned.]
[A submission for the record follows.]
SUBMISSION FOR THE RECORD
Statement of Hon. Charles E. Grassley, a U.S. Senator from the State of
Iowa
Thank you, Mr. Chairman.
This hearing is simply one of many that our Committee will have in
order to focus on ways to deter terrorism. Terrorists are taking
advantage of our immigration system. They roam freely within our
borders under the radar screen of the INS, the State Department, and
other law enforcement agencies. There is unanimous agreement that we
must secure our borders, and more closely monitor those we have let in.
First, federal agencies need to better share information. The INS
needs all relevant information at its disposal to identify and track
down immigrants who are on the ``watch lists'' of other agencies.
Second, we should implement the technologies needed to prevent
illegal or criminal aliens from entering. We need to create tamper-
resistant visas and passports. We need to invest in an effective
biometric system, and provide the scanners to read the information on
border crossing cards. Mr. Ziglar lays out a number of technology
initiatives in his testimony, and has instructed his staff to expedite
database improvements. He specifically mentions the Student Exchange
Visitor Information System.
Unfortunately, delay in the implementation of this system has and
may continue to have detrimental effects on our nation's security. I
find this delay unacceptable. We want to help the colleges and
universities, and in turn, I believe that the colleges and universities
will want to help us in our war on terrorism.
Last week, I wrote Attorney General John Ashcroft and requested
immediate consideration of federal funding to speed up implementation
of the student tracking system. I propose that the Department of
Justice use a portion of the emergency antiterrorism funds approved by
Congress to fund the start-up of the student tracking system.
Additionally, the Department should clearly outline the
responsibilities of schools who wish to retain foreign students.
Finally, I realize that the INS does not have the enforcement tools
to go after every foreign student whose visa expires. And, even if
Federal agencies are sharing data and using the best technology we can
create, the INS will still face problems in ``catching the bad guys.''
These are situations in which we can enlist state and local
support. By implementing Section 133 of the Illegal Immigration Reform
and Immigrant Responsibility Act, the Department of Justice can enter
into agreements with local law enforcement agencies in order to allow
qualified officers to help in the investigation, apprehension, or
detention of illegal aliens.
The enemy could be among us and the threat certainly remains on our
soil. Now is the time to stop talking and start acting. We've already
identified a number of problems and concrete solutions. We need to move
forward with the proposals that we've discussed since September 11.
I thank the Chair and look forward to the testimony from our
witnesses.
-