[House Hearing, 112 Congress] [From the U.S. Government Publishing Office] FROM THE 9/11 HIJACKERS TO AMINE EL-KHALIFI: TERRORISTS AND THE VISA OVERSTAY PROBLEM ======================================================================= HEARING before the SUBCOMMITTEE ON BORDER AND MARITIME SECURITY of the COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED TWELFTH CONGRESS SECOND SESSION __________ MARCH 6, 2012 __________ Serial No. 112-73 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC] [TIFF OMITTED] CONGRESS.#13 Available via the World Wide Web: http://www.gpo.gov/fdsys/ __________ U.S. GOVERNMENT PRINTING OFFICE 76-600 WASHINGTON : 2013 ----------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 COMMITTEE ON HOMELAND SECURITY Peter T. King, New York, Chairman Lamar Smith, Texas Bennie G. Thompson, Mississippi Daniel E. Lungren, California Loretta Sanchez, California Mike Rogers, Alabama Sheila Jackson Lee, Texas Michael T. McCaul, Texas Henry Cuellar, Texas Gus M. Bilirakis, Florida Yvette D. Clarke, New York Paul C. Broun, Georgia Laura Richardson, California Candice S. Miller, Michigan Danny K. Davis, Illinois Tim Walberg, Michigan Brian Higgins, New York Chip Cravaack, Minnesota Cedric L. Richmond, Louisiana Joe Walsh, Illinois Hansen Clarke, Michigan Patrick Meehan, Pennsylvania William R. Keating, Massachusetts Ben Quayle, Arizona Kathleen C. Hochul, New York Scott Rigell, Virginia Janice Hahn, California Billy Long, Missouri Vacancy Jeff Duncan, South Carolina Tom Marino, Pennsylvania Blake Farenthold, Texas Robert L. Turner, New York Michael J. Russell, Staff Director/Chief Counsel Kerry Ann Watkins, Senior Policy Director Michael S. Twinchek, Chief Clerk I. Lanier Avant, Minority Staff Director ------ SUBCOMMITTEE ON BORDER AND MARITIME SECURITY Candice S. Miller, Michigan, Chairwoman Mike Rogers, Alabama Henry Cuellar, Texas Michael T. McCaul, Texas Loretta Sanchez, California Paul C. Broun, Georgia Sheila Jackson Lee, Texas Ben Quayle, Arizona, Vice Chair Brian Higgins, New York Scott Rigell, Virginia Hansen Clarke, Michigan Jeff Duncan, South Carolina Bennie G. Thompson, Mississippi Peter T. King, New York (Ex (Ex Officio) Officio) Paul Anstine, Staff Director Diana Bergwin, Subcommittee Clerk Alison Northrop, Minority Subcommittee Director C O N T E N T S ---------- Page Statements The Honorable Candice S. Miller, a Representative in Congress From the State of Michigan, and Chairwoman, Subcommittee on Border and Maritime Security: Oral Statement................................................. 1 Prepared Statement............................................. 3 The Honorable Henry Cuellar, a Representative in Congress From the State of Texas, and Ranking Member, Subcommittee on Border and Maritime Security.......................................... 5 The Honorable Bennie G. Thompson, a Representative in Congress From the State of Mississippi, and Ranking Member, Committee on Homeland Security: Prepared Statement............................................. 7 Witnesses Mr. John Cohen, Deputy Counter-Terrorism Coordinator, U.S. Department of Homeland Security: Oral Statement................................................. 8 Joint Prepared Statement....................................... 10 Mr. Peter T. Edge, Deputy Associate Director, Homeland Security Investigations, Immigration and Customs Enforcement, U.S. Department of Homeland Security: Oral Statement................................................. 15 Joint Prepared Statement....................................... 10 Mr. David T. Donahue, Deputy Assistant Secretary of State for Consular Affairs, U.S. Department of State: Oral Statement................................................. 16 Prepared Statement............................................. 18 FROM THE 9/11 HIJACKERS TO AMINE EL-KHALIFI: TERRORISTS AND THE VISA OVERSTAY PROBLEM ---------- Tuesday, March 6, 2012 U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Border and Maritime Security, Washington, DC. The subcommittee met, pursuant to call, at 10:01 a.m., in Room 311, Cannon House Office Building, Hon. Candice S. Miller [Chairwoman of the subcommittee] presiding. Present: Representatives Miller, Rogers, Duncan, Cuellar, and Clarke of Michigan. Mrs. Miller. The Committee on Homeland Security, our Subcommittee on Border and Maritime Security will come to order. The subcommittee is meeting today to hear testimony from John Cohen, deputy counter terrorism coordinator, the Department of Homeland Security; Peter Edge, deputy executive associate director for homeland security investigations within U.S. Immigration and Customs Enforcement; and David Donahue, the deputy assistant secretary of state for consular affairs, on the vitally important topic of visa security. I would recognize myself for an opening statement. Since 9/11 our border security efforts have been very focused on stopping illegal immigrants and illicit drugs from entering our country, and we have really principally focused much of our efforts on our Southwest Border. However, estimates--some estimates as high as in the 40 percentile of all illegal aliens that are in our country just don't sneak across the border; they don't come in through the desert. They actually come in through the front door, so to speak, by obtaining a legitimate visa, and then they are here, they have a visa overstay, and they just simply never leave. To secure our Southwest Border we have spent literally billions of dollars on agents, on fencing, on cameras, and there is no question, of course, that many of these investments have brought tangible security gains to the border and have helped stem the tide of illegal aliens trying to cross the border on the southern part of our Nation. There is an important distinction to be made, I think, however, between those who are crossing the border largely in search of a better life and terrorists who abuse the visa process with the ultimate goal of actually destroying our way of life. To that end, I think that recent events should solidify in our minds the need to take really a holistic approach of border security and not view it as simply one-dimensional with all of the emphasis on one region of the country or only about security at the physical borders, whether that be the Southern Border, the Northern Border, our coastal borders. Entering a country and overstaying a visa has been the preferred method for terrorists actually to enter our country. The recent case of Amine el-Khalifi, who was a 29-year-old Moroccan citizen who allegedly attempted to conduct a suicide attack on the U.S. Capitol--that is not the first time that terrorists have exploited our visa process. In fact, el-Khalifi follows a long line of terrorists going back to the first World Trade Center attack in 1993 and, as this committee has noted many times, also includes several of the 9/11 hijackers, these terrorists who overstayed their visas and then went on to conduct or plan terrorist attacks. In fact, more than 36 visa overstayers have been convicted of terrorism- related charges since 2001. I was going to have the staff put up a slide, if they can get it up here. I think it is interesting to take a look at these faces on this slide and think about the visa violations of these high-profile figures and what has happened here. Clearly, more needs to be done to ensure the integrity of the visa system, including enhancements to Immigration and Customs Enforcement's ability to identify and promptly remove those who are overstaying their visas. Pushing out the border and conducting more rigorous vetting of visa applicants overseas through the Visa Security Program, which stations ICE officers and agents overseas, as well as the inclusion of fingerprints into the visa application process have made the visa process more secure than it was, certainly, before 9/11. However, I think we are all concerned with our ability to track and to promptly remove overstays who remain in our country. It is especially troubling that el-Khalifi lived illegally in the United States for more than 13 years before being identified by law enforcement. During that time he had several run-ins with the law, but ICE really only identified him as an overstay once a current terrorism investigation was underway by the FBI agents who el-Khalifi thought, of course, were al- Qaeda, actually. How many more visa overstayers are there out there who might pose a serious threat to the security of our homeland? We are all very concerned that ICE does not have a way to identify and track down overstays who entered the country prior to 2003, before our US-VISIT program was created, and we are concerned that we do not have a good enough handle on the number of overstayers that are in the country right now. ICE arrests and puts into removal proceedings only a small fraction of those who overstay their visa who, for the most part, are caught because they commit an additional crime and are identified through Secure Communities, which is a fantastic program. This committee has had a number of hearings about Secure Communities. It is an excellent, excellent program with tangible benefits. However, the administration's insistence on administrative amnesty through prosecutorial discretion, which el-Khalifi may have been eligible for before the start of this investigation due to his long presence in this country, certainly gives us pause, and it is clear that administrative amnesty could result in deferring action for some illegals who go on to commit more serious crimes and perhaps even those who would go on to try to commit a terrorist attack. So I look forward to hearing from our witnesses today on progress made since the creation of US-VISIT in 2003 on overstaying--identifying overstays, especially those who pose National security and public safety threats, and how the Department of Homeland Security plans to implement a comprehensive visa exit system that will prevent terrorists from successfully exploiting our visa system--a requirement, I might add, that was first mandated by Congress in 1996. Last September this committee held a hearing on the topic of visa security, and so this is sort of a follow-on hearing to that. Actually, it was during that hearing that we heard that the Department was rolling out an enhanced biographic program which would add an additional layer of security to the visa process, and so we are interested today to hear about the progress that we have made on that program as well as what the plans are to develop an exit system. More than 10 years ago on that day in September we learned a very hard lesson, and as the 9/11 Commission has noted--this is something they actually said in their recommendation in their report--the 9/11 Commission said, ``For terrorists, travel documents are as important as weapons.'' That, I think, is an important statement for all of us to reflect upon. Four of the 9/11 hijackers, as I mentioned, had overstayed visas--a missed opportunity to prevent the attacks which caused the deaths of nearly 3,000 people. Without the hard work of the FBI and the bravery of their undercover agents Amine el-Khalifi may have been successful in carrying out his planned attack on the Nation's Capitol, so obviously we would all like to offer our sincere thanks and congratulations to the brave men and women--the agents who were involved in that investigation. Great job on that. You know, if we are serious about controlling who comes into the Nation and preventing another attack we need to get serious about an exit program. It has been more than 2 years since the exit pilot program was in both Detroit and Atlanta, and we are still waiting for the Department to really articulate a plan to move forward with a comprehensive exit plan in the air environment or elsewhere, for that matter. So it is long overdue for a plan to move the Nation toward a viable and cost-effective exit solution and we will be very interested in the testimony of the witnesses today and we appreciate them all coming. But at this time, Chairwoman now recognizes the Ranking Member of the subcommittee, the gentleman from Texas, Mr. Cuellar, for his opening statement. [The statement of Chairwoman Miller follows:] Statement of Chairwoman Candice S. Miller March 6, 2012 Since 9/11 our border security efforts have been focused on stopping illegal immigrants and illicit drugs from entering the country; chiefly our Southwest Border. However, some estimates are that 40 percent of all illegal aliens do not sneak across the border; they come in through the front door by obtaining a legitimate visa and simply never leave. To secure our Southwest Border, we have spent billions of dollars on agents, fencing, and cameras--there is no question that many of these investments have brought tangible security gains to the border and have helped stem the tide of illegal aliens attempting to cross the border. There is an important distinction to be made between those who cross the border, largely in search of a better life, and terrorists who abuse the visa process with the ultimate goal of destroying our way of life. To that end, I think recent events should solidify in our minds the need to take a holistic view of border security and not view it as one- dimensional with all of the emphasis on one region of the country, or only about security at the physical borders. Entering the country and overstaying a visa has been the preferred method for terrorists to enter the country. The recent case of Amine el-Khalifi, a Moroccan citizen, who allegedly attempted to conduct a suicide attack at the U.S. Capitol, is not the first time terrorists have exploited the visa process. In fact, el-Khalifi, follows a long line of terrorists, going back to the first World Trade Center attack in 1993 and includes several of the 9/11 hijackers who overstayed their visas and went on to conduct or plan terrorist attacks. In fact, more than 36 visa overstayers have been convicted of terrorism-related charges since 2001. Clearly, more must be done to ensure the integrity of the visa system, including enhancements to Immigration and Customs Enforcement's ability to identify and promptly remove those who overstay their visa. Pushing out the border and conducting more rigorous vetting of visa applicants overseas through the Visa Security Program which stations ICE agents overseas, as well as the inclusion of fingerprints into the visa application process have made the visa process more secure than it was before September 11. But I am also concerned with our ability to track and promptly remove overstays who remain in the country. It is especially troubling that el-Khalifi lived illegally in the United States for more than 13 years before being identified by law enforcement. During that time, he had several run-ins with the law, but ICE only identified him as an overstay once the current terrorism investigation was underway by the FBI. How many more visa overstayers are out there who pose a serious threat to the security of the homeland? I remain concerned that ICE does not have a way to identify and track down overstays who entered the country prior to 2003, before US- VISIT was created and am concerned we do not even have a good handle on the total number of overstayers in the country right now. ICE arrests and puts into removal proceedings only a small fraction of those who overstay their visa, who for the most part are caught because they commit an additional crime and are identified through Secure Communities--which I think is a fantastic program that helps identify criminal aliens. However, this administration's insistence on administrative amnesty through prosecutorial discretion--which el-Khalifi may have been eligible for before the start of this investigation, due to his long presence in the country, gives me great pause and it is clear that administrative amnesty will result in deferring action for some illegals who go on to commit more serious crimes--and perhaps even those who will go on to commit a terrorist attack. I look forward to hearing from our witnesses today on progress made since the creation of US Visitor and Immigrant Status Indicator Technology (US-VISIT) in 2003 in indentifying overstays, especially those that pose National security and public safety threats, and how the Department of Homeland Security plans to implement a comprehensive visa exit system that will prevent terrorists from successfully exploiting the visa system--a requirement, I might add, that was first mandated in 1996. Last September this committee held a hearing on the topic of visa security--and during that hearing we heard that the Department was rolling out an enhanced biographic program to add a layer of security to the visa process; I am very interested to hear about the progress made on that program as well as what plans are in place to develop an exit system. More than 10 years ago on that day in September, we learned a hard lesson--as the 9/11 Commission noted, ``For terrorists, travel documents are as important as weapons.'' Four of the 9/11 hijackers had overstayed visas--a missed opportunity to prevent the attacks which caused the death of nearly 3,000 people. Without the hard work of the Federal Bureau of Investigation, and the bravery of their undercover agents Amine el-Khalifi might have been successful in carrying out an attack on the Nation's Capitol, so I would like to offer my sincere thanks to those agents involved in this investigation. If we are serious about controlling who comes into the Nation and preventing another attack, we need to get serious about an exit program. It has been more than 2 years since the exit pilot in Detroit and Atlanta and the Department has yet to articulate a plan to move forward with a comprehensive exit plan in the air environment or elsewhere. It's long overdue for a plan to move this Nation toward a viable and cost-effective exit solution. With that I'd like to recognize the gentlemen from Texas.Mr. Cuellar. Thank you, Madam Chairwoman. I am pleased that this subcommittee is meeting today to examine the issue of immigration overstay. Cases such as the 9/11 hijackers and more recently the Capitol Hill bomber have underscored the potential homeland security threat posed by individuals who enter this country on visas but overstay the authorized--or should I say the authorized period of time in the United States. Of the approximate 11.5 million to 12 million unauthorized resident alien population that was mentioned a few minutes ago, an estimated 33 to 48 percent are overstayed. Not everybody crossed the river; not everybody swam across the Rio Grande, as some people think. But there are actually 33 to 48 percent of them are--got here through a legal method. Of course, the overwhelming majority of individuals who enter this country do so for legitimate purposes. Even of those who enter the United States illegally or enter legally but overstay, the majority pose no threat. However, a small handful of people seek to enter this country for evil purposes. Since 2001 the Department of Homeland and the Department of State, with the direction from Congress, have taken important steps to identify, locate, and address overstays, particularly those that may pose a security or a safety risk to our communities. Within the Immigration and Customs Enforcement, ICE, and the Counterterrorism and Criminal Exploitation Unit they are primarily responsible for overstay enforcement. However, the CTCEU is not the only entity within ICE that removes overstay. Indeed, the primary responsibility for apprehending and removing overstays and other aliens who do not have lawful immigration status rests with ICE Enforcement and Removal Operation--Removal Operations--the ERO. Various programs, from the Secure Communities to the Criminal Alien Programs--Program, identify and remove overstays from this country every day. However, more remains to be done. I was encouraged to hear that at our last hearing that we had DHS had reduced the backlog of overstay cases by half, and I hope to hear on that, and congratulations on that effort that you are doing. I look forward to hearing where DHS has continued to make strides in this particular area and what else can we do to try to help you continue those strides. I also hope to hear about how the administration's plan to move U.S. visas functions to ICE and CBP will help those agencies fulfill their respective missions more effectively. At the subcommittee's September 2011 hearing on visa security I also expressed my concern about the so-called recalcitrant countries. These countries refuse to accept the return of their nationals or use of lengthy delay tactics to avoid taking these nationals back that are unlawfully in the United States. Again, just as an illustration, the--this is only an example of this recalcitrant countries: Pakistan has an average travel document issuance time of 149 days; China has a time of 148 days; India has a time of 267 days; Bangladesh has a time of 434 days; Cambodia has 277 days; Vietnam has a time of 285 days; Iraq has 594 days. When you look at--and I emphasize to my friends, since I live on the border--everybody thinks that everything is coming from Mexico and South America, but for my friends, let me give you some days. The average time for documents from those countries: Guatemala, Honduras, El Salvador, Dominican Republic, Columbia, Mexico, and Ecuador takes an average of--going down that order--9 days, 5 days, 23 days, 22 days, 13 days, 36 days, 34 days, respectfully. You compare it to 594 days, 285 days, 277 days, 434 days, 267 days, 148 days, 149 days, that shows you why I think we need to put an emphasis to make sure that we use our resources in a better way. I know I have talked to John Morton about this several times. I will see him again tomorrow. Again, Mr. Edge, Mr. Cohen, I ask you to continue working, and Mr. Donahue, with the State Department. I understand diplomatic relations; I understand all that. But I think we need to put a little bit more pressure on those countries to get them to do that, because it is costing the taxpayers a lot of money, and I have the costs as to how much it costs for some of those countries. So I would like to hear more details from our witnesses today about why visas continue to be issued to individuals from those countries, and at what rate, and as well as recommended steps for improving actions. Again, so again, if we are still giving those visas out to those countries, we understand they are very difficult in taking those folks back when they need to take them back. I think we need to rechange our--and--and look at the steps in addressing that. So, Madam Chairwoman, I thank you for holding this hearing and I thank all the witnesses for being here today. Mrs. Miller. Thank the gentleman for his comments. Other Members of the committee are reminded that their opening statements could be submitted for the record. [The statement of Ranking Member Thompson follows:] Statement of Ranking Member Bennie G. Thompson March 6, 2011 Some in Congress seem to believe that securing America's Southwest Border is the answer to our Nation's illegal immigration concerns. But an estimated 40 percent of individuals unlawfully present in the United States actually entered this country legally and have simply overstayed. Among those millions of people may be a handful who seek to do us harm. Addressing this so-called ``overstay'' issue is essential not only to immigration control, but also to homeland security. Certainly, the 9/11 attacks focused the Federal Government on the importance of securing the visa process and addressing the potential threat posed by certain individuals who remain in the United States after their visas expire. Under Democratic leadership in the 110th and 111th Congresses, this committee held hearings on the issue of visa overstays. I am pleased the subcommittee is also examining the issue today. I would like to hear from our DHS witnesses about what tools they need to be more successful at locating and addressing individuals who have overstayed their visas in the United States--particularly those who may pose a safety or security threat to this country. I also hope to hear from our State Department witness about what they are doing to prevent individuals who are likely to overstay from receiving visas in the first place. As part of the effort to address the overstay issue and in accordance with a 9/11 Commission recommendation, Congress has repeatedly required the Department of Homeland Security to deploy a biometric entry-exit system under US-VISIT. Such a system would help DHS determine whether an individual has departed the United States or has remained in this country. Yet more than a decade after September 11, 2001, DHS is still without a biometric exit system. The lack of significant progress toward this mandate has been troubling to those of us who believe a biometric entry-exit system is essential to border security. However, last year DHS made significant strides by eliminating about half of the 1.6 million record backlog in US-VISIT. Much more remains to be done, however. I hope to hear from our DHS witnesses today about how they are working to resolve the remaining backlog cases, as well as how the Department is moving forward to identify cost-effective technology for implementing biometric exit at ports of entry. Finally, I would note that I was pleased to see the administration's proposal in the fiscal year 2013 budget request to transfer US-VISIT's functions to CBP and ICE. US-VISIT in its current configuration has so far failed to meet its mandate. By moving the program's functions to CBP and ICE, it will be more closely aligned with the operational components that work with and rely on the program on a day-to-day basis. The transfer should bring efficiencies, and hopefully more progress toward implementing the mandated biometric exit system. I look forward to discussion about that transfer here today. In closing, I would note that while the issue before the subcommittee today is of great importance, I was dismayed to learn that ``Part II'' of last month's hearing on maritime cargo security hearing would not being held today as planned. It is my hope that the subcommittee will complete its work on that hearing in the near future. I thank the witnesses for being here today and I yield back the balance of my time. Mrs. Miller. I will just introduce, now, all three of our witnesses at the same time, and then we will start with Mr. Cohen. John Cohen serves as the principal deputy coordinator for counterterrorism at the United States Department of Homeland Security and as a senior advisor on counterterrorism, law enforcement, and information sharing. He has also served as the senior advisor to the program manager for the information sharing environment in the Office of the Director of National Intelligence. Peter Edge began his law enforcement career in 1986 with the Essex County, New Jersey prosecutor's office before his selection as a special agent with the U.S. Customs Service in Newark, New Jersey. In 2005 Mr. Edge was promoted to the position of assistant special agent in charge in the New York office where he led high-profile investigative components, such as the New York High Intensity Financial Crime Area, JFK International Airport, and the Immigration Division. Today he serves as the deputy executive associate director for homeland security investigations within the U.S. Immigration and Customs Enforcement. David Donahue is the deputy assistant secretary for visa services, Bureau of Consular Affairs. He has previously served as minister counselor for consular affairs in Mexico City and was the consul general in both Manila and Islamabad. So we certainly appreciate all of the witnesses coming. We have an excellent panel here today. We look forward to your testimony. The Chairwoman now recognizes Mr. Cohen. STATEMENT OF JOHN COHEN, DEPUTY COUNTER-TERRORISM COORDINATOR, U.S. DEPARTMENT OF HOMELAND SECURITY Mr. Cohen. Thank you, Chairman Miller, Ranking Member Cuellar, and distinguished Members of the committee--the subcommittee. Thank you for the opportunity to participate in this very, very important hearing. Madam Chairwoman, I have submitted written testimony and request that it be included as part of the record. Mrs. Miller. Without objection. Mr. Cohen. In your opening statements you and the Ranking Member both expressed concerns that terrorists and others who pose a risk to the National security of the United States seek to exploit the visa and visa waiver programs and travel to and remain illegally in the United States. The Department of Homeland Security certainly shares your concern, which is why, as you pointed out, over this past summer, at the direction of Secretary Napolitano, we began an intensive effort to address gaps to these programs by integrating and interlinking key law enforcement and National security information repositories with our immigration and travel systems. This effort began, as I described when I last met with you, as a very tactical effort intended to vet approximately 1.6 million records that were commonly referred to as the overstayed backlog. I would note that these records, under past regimes, would not have been vetted from a National security and public safety perspective. But for very obvious reasons that you have pointed out the Secretary instructed that they be so vetted. But through this effort, which included the efforts of ICE, CBP, US-VISIT, the National Counterterrorism Center, and others in the Federal Government, it led the Department to a better understanding and the development of a way forward for a more expansive overstay vetting system and a path forward for establishing an enhanced entry-exit capability. We continue to implement this effort, allocating $4.1 million from fiscal year 2011 funds and identifying an additional $10.9 million in fiscal year 2012 funds to pay for a series of system and operational enhancements. The result, today, leveraging the technical and operational capabilities of US-VISIT, ICE, and CBP, and our strong relationship with other Federal entities like the Department of State and NCTC, we recurrently vet all visa applicants, all visa holders, and potential overstays from a National security and public safety perspective. This recurrent vetting ensures that as new intelligence and new derogatory information is acquired by the Federal Government we can quickly and effectively target those individuals for enforcement actions, whether it be an FBI investigation or whether it be for some other type of immigration enforcement. These enhancements make it harder for individuals to overstay their visas and avoid detection, and conversely, make it easier for the Department to confirm when someone is an overstay and target them for enforcement action. I should note that this includes increasing the Department's ability to take administrative action against confirmed overstays that are not public safety or National security risks. These enhancements will also result in greater efficiencies to our Visa Security Program and they will provide the core components of an enhanced entry-exit system. They will also, Madam Chairwoman, ensure that we can more accurately track overstay rates by country. Specifically, through these efforts DHS will be better able to validate documents presented during the visa application process or prior to an individual traveling to the United States, increasing our capacity to detect and prevent the use of fraudulent passports and other travel documents. We will also be able to ensure that fingerprints and other biometric data captured prior to travel to the United States is accurately matched with biographic records, improving our ability to accurately identify those traveling to the United States and further identify those biometrics with multiple identities in our systems. We are vetting visa applicants and those traveling from visa waiver countries against a broader array of law enforcement and National security information, enhancing our current capacity to ensure that those who pose a risk to the United States are identified prior to their travel to the United States. We are automating database queries that today require time-consuming manual database checks, thereby improving operational efficiencies and ensuring that we never again have a backlog of unvetted potential overstay records. Through the use of name-matching algorithms we are ensuring that departure data collected at U.S. air and sea ports more accurately match data collected upon a person's entry to the United States. As Secretary Napolitano has communicated to Congress, the technology and process enhancements that are currently underway will provide the foundation for a biometric air exit program. They will also immediately improve the ability of DHS operational components to identify and take action against those who have overstayed their lawful status. For this reason, it is critical that the Department continue to fully implement these improvements described to the subcommittee when I appeared before you last September, and with your support we will continue to do so. Thank you, and I will be happy to answer any questions. [The joint statement of Mr. Cohen and Mr. Edge follows:] Prepared Statement of John Cohen and Peter T. Edge March 6, 2012 introduction Chairman Miller, Ranking Member Cuellar, and distinguished Members of the subcommittee: On behalf of Secretary Napolitano and Director Morton, thank you for the opportunity to discuss the efforts of the Department of Homeland Security (DHS) to prevent the exploitation of our visa system by terrorists and criminals. Visa overstays and other forms of immigration status violation bring together critical areas of DHS's mission--National security and immigration enforcement, and the determination of whom to allow entry into the United States. Joint Anti-Fraud Strategy We recognize that those who pose National security threats may seek to commit immigration benefit fraud in order to enter or remain in the United States. For that reason, we work hard to detect and deter immigration fraud and to continually enhance our anti-fraud efforts. ICE exercises criminal authority in the detection and deterrence of immigration fraud, while USCIS exercises administrative authority. This strategy allows ICE to concentrate its efforts on major fraud conspiracies and other cases of National security or public safety interest, while allowing USCIS to address the bulk of immigration benefit fraud cases administratively. Through ICE Document and Benefit Fraud Task Forces (DBFTFs), we focus our efforts on detecting, deterring, and disrupting document and benefit fraud. DBFTFs bring together the joint expertise of Federal, State, and local law enforcement partners to formulate a comprehensive approach in targeting the criminal organizations and the beneficiaries committing immigration fraud. The Visa Security Program The Homeland Security Act of 2002 directs the Department of Homeland Security (DHS) to assist in the identification of visa applicants who seek to enter the United States for illegitimate purposes, including criminal offenses and terrorism-related activities. The visa adjudication process often presents the first opportunity to assess whether a potential non-immigrant visitor or immigrant poses a threat to the United States. The Visa Security Program (VSP) is one of several ICE programs focused on minimizing global risks. Through the Visa Security Program (VSP), ICE deploys trained special agents overseas to high-risk visa activity posts in order to identify potential terrorist and criminal threats before they reach the United States. ICE special agents conduct targeted, in-depth reviews of individual visa applications and applicants prior to issuance, and recommend to consular officers refusal or revocation of applications when warranted. DHS actions complement the consular officers' initial screenings, applicant interviews, and reviews of applications and supporting documentation. ICE now conducts visa security investigations at 19 high-risk visa adjudication posts in 15 countries. In fiscal year 2012 to date, VSP has screened 452,352 visa applicants and, in collaboration with DOS colleagues, determined that 121,139 required further review. Following the review of these 121,139 applications, ICE identified derogatory information on more than 4,777 applicants. In March 2010, the National Targeting Center (NTC) within U.S. Customs and Border Protection (CBP) implemented a program to conduct continuous vetting of U.S. non-immigrant visas that have been recently issued. Recurrent vetting ensures that changes in a traveler's visa status are identified in near-real-time, allowing CBP to immediately determine whether to provide a ``no board recommendation'' to a carrier, to recommend revocation of the visa to DOS, or to notify ICE regarding individuals determined to be within the United States. Since the program's inception, DOS has revoked more than 900 visas based on requests from CBP on information uncovered after a visa was issued. ICE, CBP, and DOS have partnered to modernize DHS visa screening efforts. These efforts automate the flow of on-line visa information to DHS systems and provide the ability to send information back to DOS using an automated interface. ICE personnel currently deployed to the NTC will partner with CBP officers to expand current VSP efforts to enhance screening of visa applicants against DHS data world-wide. This screening will be conducted prior to the visa interview and complements DHS efforts to streamline the Security Advisory Opinion process of third agency checks on the highest-risk visa applicants world-wide, which has resulted in significant delays in visa issuance for some individuals. The Counterterrorism and Criminal Exploitation Unit The Counterterrorism and Criminal Exploitation Unit (CTCEU) is the first National program dedicated to the enforcement of non-immigrant visa violations. Today, through the CTCEU, ICE proactively develops cases for investigation in cooperation with the Student and Exchange Visitor Program (SEVP) and the United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Program. These programs enable ICE to access information about the millions of students, tourists, and temporary workers present in the United States at any given time, and to identify those who have overstayed or otherwise violated the terms and conditions of their admission. Each year, the CTCEU analyzes records of hundreds of thousands of potential status violators after preliminary analysis of data from the Student and Exchange Visitor Information System (SEVIS) and US-VISIT, along with other information. After this analysis, CTCEU determines potential violations that warrant field investigations and/or establishes compliance or departure dates from the United States. Between 15,000 and 20,000 of these records are analyzed in-house each month. Since the creation of the CTCEU in 2003, nearly 2 million such records using automated and manual review techniques have been analyzed. On average, ICE initiates approximately 6,000 investigative cases annually and assigns them to our special agents in the field for further investigation, resulting in over 1,800 administrative arrests per year. ICE special agents and analysts monitor the latest threat reports and proactively address emergent issues. This practice has contributed to ICE's counterterrorism mission by initiating or supporting high- priority National security initiatives based on specific intelligence. The practice is designed to detect and identify individuals exhibiting specific risk factors based on intelligence reporting, including travel patterns, and in-depth criminal research and analysis. In order to ensure that the potential violators who pose the greatest threats to National security are given priority, ICE uses intelligence-based criteria, developed in close consultation with the intelligence and law enforcement communities. ICE assembles the Compliance Enforcement Advisory Panel (CEAP), which is comprised of subject matter experts from other law enforcement agencies and members of the intelligence community, who assist the CTCEU in keeping targeting methods in-line with the most current threat information. The CEAP is convened on a tri-annual basis to discuss recent intelligence developments and update the CTCEU's targeting framework, in order to ensure that the non-immigrant overstays and status violators who pose the gravest threats to National security are targeted. A recent ICE investigation in Los Angeles, California exemplifies how the CTCEU operates. In March 2011, the CTCEU received an INTERPOL blue notice concerning a person who traveled to the United States as a tourist. The person had an arrest warrant in connection to child pornography charges in Colombia. A week later, ICE special agents arrested the person who was admitted as a visitor and violated their terms of admission by working in the adult film industry. A similar example occurred in July 2011, when the CTCEU received an INTERPOL red notice for an El Salvadorian national wanted for murder. As a result of CTCEU data analysis and field investigation, ICE special agents arrested the subject in Baltimore, Maryland. More recently in January 2012, ICE Special Agents from the Washington, DC office arrested a Saudi Arabian national who was admitted as an F-1 nonimmigrant student and violated the terms and conditions of his admission. The individual was referred for investigation after his status was terminated in SEVIS for failure to maintain student status, as well as for possessing several indicators of National security concerns, including threatening to blow up the White House and the Saudi Arabian Cultural Mission to the United States. Likewise, in May 2010, ICE's Counterterrorism and Criminal Exploitation Group in San Francisco, initiated an investigation into Tri-Valley University (TVU) in Pleasanton, California. The criminal investigation led to the indictment and arrest of the organization's owner and four workers for visa fraud violations. The owner and employees were issuing immigration documents containing false statements and forged signatures, which falsely certified that the school's students were attending a full course of study. ICE Special Agents effected five criminal arrests and over 300 student violators were administratively arrested, consisting mostly of Indian nationals. In addition, ICE Special Agents seized one vehicle, filed lis pendens on five properties valued at approximately $3.2 million, and seized numerous bank accounts totaling almost $2 million that represented proceeds derived related to the illicit scheme. Similarly, in November 2011, the CTCEU Group in Los Angeles arrested Karena Chuang of Wright Aviation Academy (formerly Blue Diamond aviation) for encouraging the illegal entry of aliens for private financial gain. Wright Aviation Academy/Blue Diamond Aviation (BDA), a non-SEVP accredited flight school, was suspected by ICE's Visa Security Program of fraudulently recruiting and training foreign flight students from Egypt. The investigation revealed that Chuang applied to SEVP accredited schools, often without the student's knowledge, for the sole purpose of obtaining valid Forms I-20 (student visas). The students, in turn, used the Forms I-20 to get M-1 (vocational) visas to enter the United States to attend BDA. This investigation successfully upheld the integrity of the SEVP program through ICE's layered enforcement approach--identifying and disrupting visa fraud overseas, dismantling the transnational organization, and prosecuting the perpetrators in the United States. Coordination with US-VISIT and Other DHS Components CTCEU also works in close collaboration with US-VISIT. US-VISIT supports DHS's mission to protect our Nation by providing biometric identification services to Federal, State, and local government decision makers to help them accurately identify the people they encounter, and determine whether those people pose a risk to the United States. DHS's use of biometrics under the US-VISIT program is a powerful tool in preventing identity fraud and ensuring that DHS is able to rapidly identify criminals and immigration violators who apply for visas, try to enter the United States, or apply for immigration benefits. Biometric information sharing between the Federal Bureau of Investigation's Criminal Justice Information Services (FBI-CJIS) and US-VISIT is the foundation of Secure Communities' use of Automated Biometric Identification System (IDENT)/Integrated Automated Fingerprint Identification System (IAFIS) interoperability. Through Secure Communities' use of IDENT/IAFIS interoperability, aliens--including those who have overstayed or otherwise violated their immigration status--who are encountered by law enforcement may be identified as immigration violators when fingerprints are submitted to the FBI-CJIS's biometric database, IAFIS, and then to DHS/US-VISIT's biometric database, IDENT. Once individuals are identified, ICE officials determine what enforcement action is appropriate, consistent with ICE's enforcement priorities. Currently, Secure Communities' use of this technology is deployed in over 2,300 jurisdictions in 46 States and territories. US-VISIT also analyzes biographical entry and exit records stored in its Arrival and Departure Information System to further support DHS's ability to identify international travelers who have remained in the United States beyond their periods of admission. ICE receives or coordinates non-immigrant overstay and status violation referrals from US-VISIT Mission Support Services from three unique sources, which include: the typical overstay violation; a biometric watch list notification; and a CTCEU Visa Waiver Enforcement Program (VWEP) nomination. The first type, Non-immigrant Overstay Leads, is used by the CTCEU to generate field investigations by identifying foreign visitors who violate the terms of their admission by remaining in the United States past the date of their required departure. A second type of lead is generated from biometric data collected by US-VISIT. US-VISIT routinely receives fingerprint records from a variety of Governmental sources and adds them to a biometric watch list of individuals of National security concern. These new watch list records are checked against all fingerprints in IDENT to determine if DHS has previously encountered the individual. If US-VISIT identifies a prior encounter, such as admission to the United States, the information is forwarded to ICE for review and possible field assignment. Similarly, US-VISIT monitors records for individuals who, at the time of admission to the United States, were the subject of watch list records that did not render the individuals inadmissible to the United States. Therefore, if such individuals overstay their terms of admission, information on the subjects is forwarded to ICE for review and possible referral to investigative field offices for follow- up. The third type of lead pertains to the CTCEU's Visa Waiver Enforcement Program (VWEP). The VWP currently allows eligible nationals of 36 countries to travel to the United States without a visa and, if admitted, to remain in our country for a maximum of 90 days for tourist or business purposes. The Visa Waiver Program (VWP) is the primary source of non-immigrant visitors from countries other than Canada and Mexico. Visa-free travel to the United States builds on our close bilateral relationships and fosters commercial and personal ties among tourist and business travelers in the United States and abroad. Although the overstay rate from this population is less than 1 percent, ICE created a program dedicated to overstays arising from this VWP population, given the large number of individuals in this category. Prior to the implementation of the VWEP in 2008, there was no National program dedicated to addressing overstays within this population. CTCEU provides a refined weekly list of individuals to US-VISIT for additional scrutiny, who have been identified as potential overstays who entered the United States under the VWP. In accord with its intelligence-based criteria, a relevant portion of this report is then imported into the CTCEU's internal lead tracking system for review and possible field assignment. One of the goals of this program is to identify those subjects that attempt to circumvent the U.S. immigration system by obtaining travel documents from Visa Waiver Countries. Enhanced Biographic Exit In May 2011, at the direction of Secretary Napolitano, DHS's CT Coordinator organized an effort to ensure that all overstays, regardless of priority, receive enhanced National security and public safety vetting by the National Counterterrorism Center (NCTC) and CBP. As part of Phase 1 of this effort, Department components reviewed a backlog of 1.6 million unvetted potential overstay records based on National security and public safety priorities. As of last summer, DHS had a backlog of ``unreviewed overstays,'' comprised of system-identified overstay leads that did not meet criteria set by ICE for expedited high-priority review. Before this summer, these records would not have been examined, except in instances when the workload allowed it. The DHS ``overstay initiative'', begun over the summer of 2011 at the direction of the Secretary, reformed this effort. By leveraging capabilities within Customs and Border Protection's Automated Targeting System (ATS-P), as well as DHS's relationship with NCTC, DHS was able to conduct richer, more thorough vetting for National security and public safety concerns. This generated new leads for ICE, which previously would not have been uncovered. A beneficial by-product of this effort was the identification of efficiencies and cost savings gained through automation. Through this new automated approach, we can match and integrate relevant information from multiple systems in order to quickly and accurately identify overstays. Today, DHS has integrated these enhancements to its process for reviewing system-identified overstay leads and prioritizing them for review and targeted enforcement. Now, ALL overstay records are reviewed for National security and public safety concerns, and DHS is also leveraging existing automated capabilities to conduct automated reviews of all overstays (both normal priority and high-priority). All of this is done on a recurrent basis. Overall, what I have described constitutes the first phase of DHS's enhanced biographic exit capability. This ``enhanced exit'' plan improves DHS's ability to calculate overstays and reduce their occurrence in the future. It uses resources from a variety of DHS components and will provide benefits to several of these components, as well the DOS, as adjudicators of visa applications. When fully implemented, this enhanced exit program will eliminate any future backlog of unreviewed overstays, and allow DHS to prioritize and take action on overstays, focusing on National security and public safety. We have identified carry-over funding, and allocated it toward Phase II of this effort, which includes automating connections between data sources, and refining ICE's ability to more effectively target and prioritize overstay leads of concern. We expect to see these enhancements come on-line this summer. DHS has also identified its top priorities within Phase III of the enhanced biographic exit plan. This includes database modernization, further investments in targeting and prioritization capabilities, increased functionality between biometric and biographic repositories, as well as document validation. As investments in the future phases of this capability come on line, DHS will have increased its ability to ``close out'' overstay records using automated means. The Department will have also increased its data quality and expanded its data sources, both of which will increase its ability to ``close'' records before they are referred to an investigator. Finally, these upgrades will have enhanced DHS's ability to draw on capabilities across the Department for further manual review and targeting for enforcement action. DHS also remains committed to introducing a biometric component to the exit process. The enhanced exit plan also incorporates biometric elements, allowing DHS personnel to more efficiently connect biometric identifiers (fingerprints and photographs) with biographic information residing within intelligence community and law enforcement databases. DHS has directed the Science and Technology Directorate to establish criteria and promote research for emerging technologies that would provide the ability to capture biometrics at a significantly lower operational cost. In the mean time, the Department is taking action to secure our borders today, by making strategic security investment decisions that prioritize those capabilities needed for the implementation of a future biometric exit system while providing security value now. This entire process has illustrated something fundamental, which is that dealing with the overstay population is a challenge that confronts all of DHS, not just any one component. US-VISIT tracks the overstay population through ADIS. CBP, as the custodian of our borders, taps into information about traveler movements, and is increasingly at the center of DHS's vetting and targeting activities. ICE bears the burden of taking enforcement action. Left up to any one component, DHS action would be incomplete, but by harmonizing efforts across the Department and by taking advantage of unique skills and capabilities, we are able to put together a plan that enhances the integrity of our immigration system. ICE's Presence Overseas and Coordination with DOS Stopping a threat before it reaches our shores is an important priority that ICE supports internationally. Through our Office of International Affairs, we have personnel in 70 offices in 47 countries. ICE personnel in these offices collaborate with our foreign counterparts and Federal partner agencies in joint efforts to disrupt and dismantle transnational criminal organizations engaged in money laundering, non-drug contraband smuggling, weapons proliferation, forced child labor, human rights violations, intellectual property rights violations, child exploitation, human smuggling and trafficking, and many other violations. Additionally, ICE facilitates the repatriation of individuals with final orders of removal, returning violators to their home countries. Effective border security requires broad information sharing and cooperation among U.S. agencies. On January 11, 2011, ICE signed a memorandum of understanding (MOU) outlining roles, responsibilities, and collaboration between ICE and the DOS Bureaus of Consular Affairs and Diplomatic Security. The MOU governs the day-to-day operations of ICE agents conducting visa security operations at U.S. embassies and consulates abroad. To facilitate information sharing and reduce duplication of efforts, ICE and DOS conduct collaborative training and orientation prior to overseas deployments. Once they are deployed to overseas posts, ICE and DOS personnel work closely together in working groups, meetings, training, and briefings, and engage in regular and timely information sharing. The VSP's presence at U.S. embassies and consulates brings an important law enforcement element to the visa review process. Additionally, this relationship serves as an avenue for VSP personnel to assist Consular Officers and other U.S. Government personnel in recognizing potential security threats in the visa process. We are engaged with our counterparts at DOS in determining a common strategic approach to the broader question of how best to collectively secure the visa issuance process. We look forward to continuing to report back to you with updates on this process. conclusion DHS has made significant progress in preventing terrorists from exploiting the visa process. We will continue to work closely with our international, Federal, State, local, and Tribal partners to combat visa fraud and protect the integrity of our visa security system. Thank you again for the opportunity to testify today and for your continued support of DHS and its law enforcement mission. We would be pleased to answer any questions at this time. Mrs. Miller. Thank you very much. The Chairwoman now recognizes Mr. Edge for his testimony. STATEMENT OF PETER T. EDGE, DEPUTY ASSOCIATE DIRECTOR, HOMELAND SECURITY INVESTIGATIONS, IMMIGRATION AND CUSTOMS ENFORCEMENT, U.S. DEPARTMENT OF HOMELAND SECURITY Mr. Edge. Good morning, Chairman Miller, Ranking Member Cuellar, and other distinguished Members of the subcommittee. Thank you for inviting me to appear before you today along with my counterparts, Mr. Cohen and Mr. Donahue, to discuss our collective efforts to prevent the exploitation of our visa system by terrorists and criminals. I would also ask that my complete testimony be accepted into the record. Mrs. Miller. Without objection. Mr. Edge. Visa overstays and other forms of immigration status violations bring together critical areas of my agency's mission, National security, and immigration enforcement. We recognize that those who pose National security threats may seek to commit immigration benefit fraud to enter or remain in the United States. For that reason, we work hard to detect and deter immigration fraud and to continually enhance our anti- fraud efforts. ICE exercises criminal authority in the detection and deterrence of immigration fraud while our partner agency, USCIS, exercises administrative authority. This strategy essentially allows us to concentrate our efforts on major fraud conspiracies and other cases of National security or public safety interest, which allows USCIS to address the majority of immigration benefit fraud cases administratively. As you know, DHS is charged with assisting in the identification of visa applicants who seek to enter the United States for illegitimate purposes, including criminal offenses and terrorism-related activities. The visa adjudication process often presents the first opportunity to assess whether a potential nonimmigrant visitor or immigrant poses a threat to our Nation. ICE's Visa Security Program is one of--program focused on minimizing these global risks. Through the Visa Security Program ICE employs trained special agents overseas to high- risk visa activity posts to identify potential terrorists and criminal threats before they reach the United States. These agents conduct targeted, in-depth interviews of individual visa applications and applicants prior to issuance and recommend refusal or revocation of applications, when warranted, to consular officers. ICE now conducts Visa Security investigations at 19 high- risk visa adjudication posts in 15 countries. In fiscal year 2012 to date, the Visa Security Program has screened over 452,000 visa applicants and, in collaboration with our State Department colleagues, determined that over 121,000 required further review. After reviewing these applications ICE identified derogatory information on more than 4,700 applicants. Another program at ICE dedicated to enforcing non-immigrant visa violations is the Counterterrorism and Criminal Exploitation Unit, or CTCEU. Through the CTCEU, ICE proactively develops cases for investigation in cooperation with the Student and Exchange Visitor Program and the US-VISIT Program. Both programs enable ICE to access information about the millions of students, tourists, and temporary workers present in this country at any given time and to identify those who have overstayed or otherwise violated the terms and conditions of their admission. Each year the CTCEU analyzes records of hundreds of thousands of potential status violators after preliminary analysis of data from the Student and Exchange Visitor Information System, also known as SEVIS, as well as from US- VISIT. After this analysis, the CTCEU determines potential violations that warranted field investigations and/or establishes compliance or departure dates from the United States. Since the unit's creation in 2003, nearly 2 million such records using automated and manual review techniques have been analyzed. On average, ICE initiated approximately 6,000 investigative cases annually and assigns them to our special agents in the field for further investigation. This has resulted in over 1,800 administrative arrests per year. In January 2012, for example, ICE special agents from our Washington, DC office arrested a Saudi Arabian national who was admitted as an F-1 nonimmigrant student and violated the term and condition of his admission. The individual was referred for investigation after his status was terminated in SEVIS for failure to maintain student status as well as for possessing indicators of National security concerns, including threatening to blow up the White House and the Saudi Arabian Cultural Mission to the United States. ICE has made significant progress in preventing terrorists from exploiting the visa process. We will continue to work closely with our law enforcement partners to combat visa fraud and protect the integrity of our visa security system. Thank you again for the opportunity to testify today, and I would be pleased to answer any questions that you may have. Mrs. Miller. Thank the gentleman. The Chairwoman now recognizes Mr. Donahue for his testimony. STATEMENT OF DAVID T. DONAHUE, DEPUTY ASSISTANT SECRETARY OF STATE FOR CONSULAR AFFAIRS, U.S. DEPARTMENT OF STATE Mr. Donahue. Good morning, Madam Chairwoman, Ranking Member Cuellar, and distinguished Members of the subcommittee. I have been involved as a--with visas for the majority of my 29-year career with the State Department and I appreciate this chance to testify here today, and I have submitted written comments for the record. The Department of State is dedicated to the protection of our borders through a layered approach to border security. This approach enables us and our partners in DHS to track and review the visa eligibility and status of foreign visitors from their visa applications throughout their travel to, sojourn in, and departure from the United States. We are constantly refining and updating the technology that supports the adjudication and production of U.S. visas. The Department has developed and implemented an intensive visa application and screening process requiring personal interviews in most cases, employing analytic interview techniques, and incorporating multiple biographic and biometric checks. This is all supported by a sophisticated global information technology network that shares data among the Department and Federal law enforcement and intelligence agencies. Security remains our primary mission. Every visa decision is a National security decision. Our new on-line visa application forms provide consular officers and fraud prevention officers, and soon our intelligence and law enforcement partners, the opportunity to analyze data in advance of the visa interview, including the detection of potential non-biographical links to derogatory information. We have ambitious plans to screen more of this data with our partners in the law enforcement and intelligence communities to make the visa system even more secure. In addition to biographic checks the Department performs checks on two biometric identifiers. Most visa applicants' fingerprints are screened against DHS and FBI databases. We also use facial recognition technology to screen visa applicants against a watch list of photos obtained from the Terrorist Screening Center as well as visa applicant photos contained in the Consular Consolidated Database. Our vast database of visa information is fully available to other agencies. It is specifically designed to facilitate fast, accurate, and comprehensive sharing to meet the needs of a 24/7 global screening environment. In return, we have unprecedented levels of cooperation with law enforcement and intelligence agencies and benefit from their capabilities and resources in ways that were not possible at the time of 9/11. Let me turn to our coordination with DHS to address the overstay issue. Consular officers at posts abroad use arrival and departure data from--for non-U.S. citizen travelers contained in the DHS Arrival and Departure Information System, ADIS, to help determine whether an applicant who visited the United States previously departed by the end of his or her authorized period of stay and whether the applicant qualifies for a visa. The consular officer also use their knowledge of the local language, culture, and conditions as part of their evaluation of an applicant's eligibility for a U.S. visa. ADIS overstay information is also included in the revocation recommendations the Department receives daily from CBP's National Targeting Center and our consular sections abroad. Whether the overstay information exists in isolation or as one of multiple factors, the Department considers the information as part of our visa revocation process. If a subject whose visa has been revoked is in the United States our colleagues from DHS are responsible for removal. As Mr. Cuellar mentioned, we are working very closely with the--with ICE and Director Morton to do everything we can to help with those removal processes. Consular officers have detailed instructions on visa revocation procedures and reinforce standing guidance on their discretionary authority to deny visas under 214-B of the Immigration and Nationality Act with specific reference to cases that raise security and other serious concerns. We have created a dedicated revocations unit in Washington that focuses exclusively on ensuring that any derogatory information on a U.S. visa holder is rapidly evaluated and acted on. Distinguished Members of the committee, our current layered approach to security screening, in which each agency applies its particular strengths and expertise, best serves our border security agenda while furthering traditional U.S. interests in legitimate travel, trade promotion, and the exchange of ideas. The United States must meet both goals to guarantee our long- term security. Thank you, and I am ready to answer your questions. [The statement of Mr. Donahue follows:] Prepared Statement of David T. Donahue March 6, 2012 Good afternoon Madam Chairwoman Miller, Ranking Member Cuellar, and distinguished Members of the subcommittee. I thank you for this opportunity to update you on the steps we have taken to increase the security of the visa process. The Department of State (the Department) is dedicated to the protection of our borders, and has no higher priority than the safety of our fellow citizens. We are the first line of defense in border security because the Department is often the first Government agency to have contact with foreign nationals wishing to visit the United States. We are committed, along with our partner agencies, to a layered approach to border security that will enable the U.S. Government to track and review the visa eligibility and status of foreign visitors from their visa applications throughout their travel to, sojourn in, and departure from, the United States. We are equally committed to facilitating legitimate travel, and providing efficient and courteous visa adjudication. The Bureau of Consular Affairs is successfully meeting the challenge of increasing world-wide demand for U.S. visas without compromising the security of our Nation's borders. At 222 visa-adjudicating embassies and consulates around the world, a highly-trained corps of consular officers and support staff processes millions of visa applications each year, facilitating legitimate travel while protecting our borders. Consular officers adjudicated 8.8 million applications and issued more than 7.5 million visas in fiscal year 2011, up 16 percent from the 6.4 million visas issued in fiscal year 2010. We have experienced tremendous increases in demand for visas in some of the world's fastest-growing economies. We are issuing as many visas as we did in 2000, even though nine more countries have joined the Visa Waiver Program since then. data sharing leads to a more secure visa adjudication process The Department has developed and implemented an intensive visa application and screening process, requiring personal interviews in most cases; employing analytic interview techniques; and incorporating multiple biographic and biometric checks, all supported by a sophisticated global information technology network that shares data among the Department and Federal law enforcement and intelligence agencies. Security remains our primary mission--every visa decision is a National security decision. We constantly refine and update the technology that supports the adjudication and production of U.S. visas. The world-wide rollout of our on-line non-immigrant visa application form is complete, and we are currently piloting the on-line immigrant visa application form. These new on-line forms provide consular officers, as well as intelligence and law enforcement agencies, the opportunity to analyze data before applicants appear for their interviews. While the forms offer foreign language support, applicants are required to answer in English, to facilitate data searches and information sharing between the Department and other Government agencies. The new application forms are ``smart,'' meaning that certain answers to questions will trigger subsequent questions. The system will not accept applications if the security- related questions have not been answered completely, and inappropriate or unacceptable answers are flagged to ensure that consular officers address them in the interview. The Immigration and Nationality Act (INA) requires our consular officers to interview first-time visa applicants aged 14 through 79 in person. We may waive the interview requirement for diplomatic and official staff of foreign governments, as well as for certain other applicants in very limited circumstances. In addition, we employ strong, sophisticated name-searching algorithms to ensure matches between names of visa applicants and any derogatory information contained in the 42.5 million records found in the Consular Lookout and Support System (CLASS), our on-line database of visa lookout records. CLASS has grown more than 400 percent since 2001. Almost 70 percent of CLASS records come from other agencies, including DHS, the FBI, and the DEA. CLASS also includes unclassified records regarding known or suspected terrorists (KSTs) from the Terrorist Screening Database (TSDB), which is maintained by the FBI's Terrorist Screening Center (TSC) and contains data on KSTs nominated by all U.S. Government sources. We also screen visa applicants' names against the historical visa records in our Consular Consolidated Database (CCD). A system-specific version of the automated CLASS search algorithm runs the names of all visa applicants against the CCD to check for any prior visa applications, refusals, or issuances. DHS and other Federal agencies have broad access to the CCD, which contains more than 151 million immigrant and non-immigrant visa records covering the last 13 years. We make our visa information available to other U.S. Government agencies for law enforcement and counterterrorism purposes, we specifically designed our systems to facilitate comprehensive data sharing with these entities, and they use this access extensively. For example, in January 2012, more than 20,000 officers from DHS, the FBI, and the Departments of Defense, Justice, and Commerce submitted more than 2 million visa record queries in the course of conducting law enforcement and/or counterterrorism investigations. In addition to biographic checks, the Department also performs checks on two biometric identifiers. Visa applicants' fingerprints are screened against DHS and FBI systems, which between them contain the available fingerprint records of terrorists, wanted persons, immigration law violators, and criminals. In 2011, consular posts transmitted more than 8.6 million fingerprint submissions to these systems, and received from them more than 221,000 derogatory and criminal history records. We transmit the fingerprints taken during the visa interview process to U.S. Customs and Border Protection (CBP) officers at ports of entry, to enable them to match the fingerprints of persons entering the United States and confirm their identity. We use facial recognition technology to screen visa applicants against a watch list of photos of known and suspected terrorists obtained from the TSC, as well as the entire gallery of visa applicant photos contained in our CCD. Facial recognition screening has proven to be another effective way to combat identity fraud. Data sharing requires intense, on-going cooperation from other agencies. We have successfully forged and continue to foster partnerships that recognize the need to supply accurate and speedy screening in a 24/7 global environment. As we implement process and policy changes, we are always striving to add value in both border security and operational results. Both dimensions are important in supporting the visa process. overstay information In April 2008, consular officers at posts abroad obtained access to arrival and departure data for non-U.S. citizen travelers contained in the DHS Arrival Departure Information System (ADIS). We began running automated ADIS checks for every visa applicant in June 2011. Officers in the field use ADIS data to help determine whether an applicant who visited the United States previously departed by the end of his or her authorized period of stay. If ADIS indicates a traveler departed after this period, or there is no departure shown at all, the officer works to confirm whether the individual overstayed his or her previous period of admission. Since land border departures are not usually recorded in ADIS, and airlines have not always provided departure manifests, ADIS information alone does not confirm or refute an overstay. If a consular officer confirms a prior overstay of any duration, the applicant may be unable to overcome the presumption of immigrant intent. Overstays of 181 to 364 days may make an applicant ineligible to reenter the United States for 3 years. Overstays of 365 days or more may make an applicant ineligible to reenter the United States for 10 years. security advisory opinions and the visa security program In coordination with Federal law enforcement and intelligence agencies, the Department has instituted particular measures to process higher-risk visa applications. Our Security Advisory Opinion (SAO) mechanism provides consular officers input from Washington on security- related issues relating to pending visa applications. Department guidance explains when a consular officer must request an SAO. Most are triggered by a CLASS watch list hit; others are required as a matter of policy or submitted by the consular officer per his or her discretion. Consular officers receive extensive training on the SAO process, which requires them to suspend visa processing pending interagency review of the case and additional guidance. SAO requests are routed electronically to relevant Federal intelligence and law enforcement agencies. Consular officers submitted more than 366,000 SAO requests in fiscal year 2011. The Visa Security Program (VSP), under which DHS deploys U.S. Immigration and Customs Enforcement (ICE) special agents to conduct visa security screening and investigations at certain overseas consular posts, is a valuable component of the U.S. Government's overall policy of protecting our borders. We have a close and productive partnership with DHS, which has authority for visa policy under section 428 of the Homeland Security Act, and are fully supportive of the mission and future of the VSP. ICE/VSP is present at 19 visa-issuing posts in 15 countries. visa revocation DHS is responsible for removing subjects of visa revocations who are present in the United States, whether or not they have overstayed the period of legal presence. The Department has broad and flexible authority to revoke visas and we use that authority widely to protect our borders. Since 2001, the Department has revoked approximately 60,000 visas for a variety of reasons, including nearly 5,000 for suspected links to terrorism. Cases for revocation consideration are forwarded to the Department by our consular offices overseas, NTC, and other entities. As soon as information is established to support a revocation (i.e., information that could lead to an inadmissibility determination), a ``VRVK'' entry code showing the visa revocation is added to CLASS, as well as to biometric identity systems, and then shared in near-real time (within about 15 minutes) with the DHS lookout systems used for border screening. As part of its enhanced ``Pre- Departure'' initiative, CBP uses these VRVK records, among other lookout codes, to recommend that airlines should not board certain passengers on flights bound for the United States. Almost every day, we receive requests to review and, if warranted, revoke any outstanding visas for aliens for whom new derogatory information has been discovered since the visa was issued. Our Operations Center is staffed 24 hours a day, 7 days a week, to address urgent requests, such as when a potentially dangerous person is about to board a plane. In those circumstances, the State Department can and does use its authority to revoke the visa, and thus prevent boarding. ADIS overstay information is also included in the visa revocation recommendations the Department receives daily from the NTC and our consular sections abroad. Whether the overstay information exists in isolation or as one among multiple factors, the Department considers the information as part of our visa revocation process. Most revocations are based on new information that has come to light after visa issuance. Because individuals' circumstances change over time, and people who once posed no threat to the United States can become threats, revocation is an important tool. We use our authority to revoke a visa immediately in circumstances where we believe there is an immediate threat. At the same time, we believe it is important not to act unilaterally, but to coordinate expeditiously with our National security partners in order to avoid possibly disrupting important investigations. conclusion We believe that U.S. interests in legitimate travel, trade promotion, and educational exchange are not in conflict with our border security agenda and, in fact, further that agenda in the long term. Our long-term interests are served by continuing the flow of commerce and ideas that are the foundations of prosperity and security. Acquainting people with American culture and perspectives remains the surest way to reduce misperceptions about the United States. Fostering academic and professional exchanges keeps our universities and research institutions at the forefront of scientific and technological change. We believe the United States must meet both goals to guarantee our long-term security. Our global presence, foreign policy mission, and personnel structure give us singular advantages in executing the visa function throughout the world. Our authorities and responsibilities enable us to provide a global perspective to the visa process and its impact on U.S. National interests. The issuance and refusal of visas has a direct impact on our foreign relations. Visa policy quickly can become a significant bilateral problem that harms broader U.S. interests if handled without consideration for foreign policy equities. The conduct of U.S. visa policy has a direct and significant impact on the treatment of U.S. citizens abroad. The Department of State is in a position to anticipate and weigh all those factors, while ensuring border security as our first priority. The Department has developed and implemented an intensive visa application and screening process supported by a sophisticated global information technology network. We have visa offices in virtually every country of the world, staffed by consular officers drawn from the Department's professional, mobile, and multilingual cadre of Foreign Service Officers. These officials are dedicated to a career of worldwide service, and provide the cultural awareness, knowledge, and objectivity to ensure that the visa function remains the front line of border security. Each officer's experience and individual skill set are enhanced by an overall understanding of the political, legal, economic, and cultural development of foreign countries in a way that gives the Department of State a special expertise over matters directly relevant to the full range of visa ineligibilities. This concludes my testimony today. I will be pleased to take your questions. Mrs. Miller. Thank the gentleman. I thank all of the witnesses for your testimony today. I guess I would start with Mr. Edge. As we were talking about Khalifi, this individual that apparently had some run-ins with law enforcement, I think in 2005--we were looking through some of the various information before we had our hearing here--and as we mentioned during the testimony, what a great program Secure Communities is. Do you think if Secure Communities was in place that it would have flagged this individual, you know, if he was to be picked up by just--in a regular line of law enforcement during the course of everyday duties? Do you think that the Secure Communities would have picked this individual up, and are you finding that Secure Communities is really having a fantastic impact now on your ability to do so? Mr. Edge. Well, I think when---- Mrs. Miller. Just press the button there. Mr. Edge. Yes. When Mr. Khalifi was arrested in the early part of 2000 we did not have a mechanism in place to be able to communicate once somebody's fingerprints were rolled when someone was arrested, but we are working towards that these days with US-VISIT and our ability to run fingerprints and get information from those who are arrested at the State and local level. This isn't something that would have risen to the Federal level at the time of his first arrest. I believe they were even misdemeanor charges in a State system in Virginia. So I think that as we move forward the level of communication between our State and local counterparts, whether it is through Secure Communities or just by the various programs we have and our databases that are connected, we will be able to at least identify those people who are connected into the immigration system. Mrs. Miller. No. That is really something that, again, referencing the 9/11 Commission, one of their recommendations-- excuse me--that we keep in mind all the time is when they talk about how--we need to move from the need to know to the need to share information with the various agencies, and at every level of government, whether it is the Federal level, the State level, the county level, the local level, et cetera, with all of these kinds of things. But one of the things that we are focusing on, obviously, in this subcommittee hearing is how we try to bring more attention to the fact that, as I mentioned, over 40 percent of all of the illegals that are in the country are here on visa overstays, and as we have talked about, didn't come across the desert and the southern edge of our border, which is where everybody seems to think that all of the illegals came from. So you have all of these visa overstays and it really is for the Congress, I think, to try to prioritize our funding and focus the funding that we have, understanding the constrictions that we have with the financial crisis that is facing our Nation, but we are looking through your budget, for instance, with ICE, and I am not sure if this is true--maybe you can tell me what percentage of your--of the budget that ICE has that you are focusing on visa, for instance. You probably don't have those exact numbers, but we were sort of trying to figure it out and it looks like it is a small percentage--maybe 3 to 5 percent of the budget that is even focused on visa overstays. So I guess I would ask you to try to answer that the best if you could, or how do you identify overstays that have been in the country for over 13 years, like this particular individual? Do you consider the country of origin? What is your matrix, actually, for looking at these things? Mr. Edge. Well, Madam Chairwoman, that is a complicated question in that our investigative responsibilities are very vast. We have a lot of disciplines that we are empowered to investigate, from human trafficking, document and benefit fraud, narcotics smuggling, a wide variety of different investigative areas that we are responsible for. Through conducting those investigations we do and we are able to identify visa overstays. If it is someone who is not in contact with our investigative process and homeland security investigations it is certainly possible that we would not come in contact with them if they had been in the country for a very long time. But certainly, given the communication that we have and the various databases that we are working with today, and through our CTCEU process, as Ranking Member Cuellar mentioned earlier, we are certainly in a better position to identify these overstays in the normal course of business. Mrs. Miller. Mr. Cohen, I took some notes when you were talking there. You were saying that your new system that you have that you now have the ability to track by countries, and as you are vetting sort of the backlog that you testified to the committee--subcommittee for previously back in September, how many overstays do you think you have from special interest countries, or how are you doing with identifying from particular countries? As you also mentioned, the Secretary, when she was testifying here earlier, said that the system that they--that you are operating under right now is a good bridge to what ultimately all of our mutual goal is, to have a really robust biometric system. So I guess I am just, again, trying to get a feel for what your matrix is for what you are looking at with the various special countries. As my colleague was mentioning, all of the various countries and the days it is rather startling to look at some of those kind of things, and obviously that is an indicator that we all need to be looking at. Mr. Cohen. Thank you, Madam Chairwoman. So it is a work in progress still, so we are continuing to implement these improvements that I referenced in my opening statement. I will get back to the subcommittee with regard to specific numbers on the special interest countries, but your previous question to Mr. Edge and your question to me raises sort of the key issue here, which is up until this effort there was no systematic effort by the Department to integrate all of these various repositories of information, in which information vital to determining whether someone had actually departed the country, had changed their status, was in custody for another crime, or was actually an overstay, and they weren't linked together so it made it very difficult. So in the case of Mr. Khalifi, the information--and others that went into overstay status in the late 1990s and early 2000, prior to the development of US-VISIT--the information repository which reflected that they were potentially overstay was TECS--Treasury Enforcement Communication System. TECS system was a system that part of the data it collected were border crossings, so we could tell when somebody came into the country and we could also tell if they left the country; that was in TECS. However, most local police departments during that time didn't have access to TECS, and unless they had some reason to believe that an individual detained for some other offense was, in fact, an immigration violator, it would be rare that they would call INS and ask them to do a--what we would call a TECS check. Through the system enhancements that I described earlier we are automating that process, so today if someone is arrested for any type of offense part of the query that will take place through both the Secure Communities program and through the enhancements that I have been describing will be an automatic check of immigration systems, will be a check of TECS, as well. So the chances are greatly enhanced that today if somebody were to be booked in for a minor drug offense--or a serious traffic violation, even, the person's immigration status would come to our attention. Mrs. Miller. Thank you. Chairwoman recognizes the Ranking Member. Mr. Cuellar. Thank you, Madam Chairwoman. Without going over the numbers over those countries that are a little bit less cooperative in working with us, you know, you have--I believe the last time your managing director of visa services was back here with us, and I think it was in November 2011, he said that there are some countries like Brazil and China that there is increase--there is an increase in demand for visas--travel visas. Let's talk about China, since it is one of those countries that has not been very--what incentives--or does it make sense that if a country is not taking back those folks that they are supposed to be taking back and they are delaying, why are we going to be increasing their visas? I understand travel, and business, and--I understand all that. But just specifically in this issue, why are we increasing the number of visas but at the same time, at the back end, for the folks that they are supposed to be taking back, they are still delaying them by large numbers itself. I guess--and I can understand--I can already guess what you are going to say and I understand all that, but what suggestions do you have? Because I am specifically looking at-- to be quite honest, we brought this up--I mean, there have been some steps--we are looking at putting some appropriation language, and hopefully that will direct you all to those particular countries. Do you have any suggestions as to what we can look at to specifically help you do that? I know the State Department might be in a difficult position to work with those countries, but what can we do? What sort of language would be appropriate, understanding it is going up but understand at the back end those countries--why have we provided that incentive to them? Mr. Donahue. Well, first of all, let me say that we agree with you entirely that the wait times for these documents are unacceptable and we have been working very closely with Director Morton, at ICE. Our assistant secretary--they have formed a group; they go out and meet with the ambassadors. Also, in our capitals overseas we are meeting with these senior officials there. Our ambassador in China, and we have a new ambassador going out to India, hopefully, if confirmed. These are all opportunities to make it clear to those governments how important this is to our bilateral relationship and to their obligations to do this. We do have authority, as you know, under the INA, to address this, also, and we feel like that is the last step we want to exhaust, as we have discussed in your office, all the diplomatic ways to get countries to cooperate with us on this. On the countries that are sending large numbers of travelers to the United States we--it is a delicate balance. I don't have any answer. These are real jobs that they are creating in the United States when they come here. They stay in the hotels. Chinese, they say, spend $6,000 a day in the United States while they are here. They buy our goods and services. So it is very difficult to do things--and for China it is very hard to put any more--make it more difficult because they only receive 1- year visas. Their country doesn't care whether their citizens come here; it is more that we care that they come here and visit our great places, attend our universities paying full tuition, they buy our goods and services, our tractors, all those things. So they have very little incentive to change their ways and we have all good reasons for our economy to attract them here. Mr. Cuellar. Yes. I understand, and I--you know, I appreciate the visits that we had and I understand all of that. But there has got to be something we can do. I mean, we just can't--and I--again, I appreciate--I am complimenting all three of you all and your--the men and women that work for all of you all. You are all doing a good job. I am not criticizing you. Is there anything we can try to help you? Really, the only way I am looking at this, because I don't know about reauthorization or any bill that is moving, but the appropriation bill, one way or the other, is going to pass. Mr. Donahue. Right. Mr. Cuellar. So we can talk about it later, but I am asking all three of you all if you all want to talk later, or, you know, with the Chairwoman or myself. We have got to put some language there, but I don't want to put some language that will be counterproductive. But I just--you know, I just don't see why we keep feeding what they have biting on the other hand on that. But I understand international education; I understand and I appreciate all that. I know it is very, very difficult, but there has got to be something. You know, China might be a special situation. What about Bangladesh? What about the other countries? I mean, not everybody is on the same level as China. But anyway, I would look forward to working with you on some language, and again, I am not being critical. I really appreciate the prioritization work that both the State Department and Homeland is doing. But I am asking you to give me some suggestions. Mr. Donahue. All right. We will see what we can suggest to you and we will continue working on this. This is a top priority for Assistant Secretary Jacobs. Mr. Cuellar. Okay. Thank you to all three of you. I appreciate the work that you all are doing. Thank you, Madam Chairwoman. Mrs. Miller. Thank the gentleman. The Chairwoman now recognizes the gentleman from South Carolina, Mr. Duncan. Mr. Duncan. Thank you, Madam Chairwoman. Appreciate the work you guys are doing and I thank the Chairwoman for having this very valuable hearing today. Mr. Edge, what does ICE stand for? Mr. Edge. Immigration and Customs Enforcement. Mr. Duncan. Okay. I am going to leave customs out of this because we are talking about immigration. Immigration enforcement. Immigration enforcement. At what point is someone unlawfully present in the United States? Mr. Edge. When they enter the country illegally, sir. Mr. Duncan. So if they overstayed their visa that is not unlawful? Mr. Edge. That is unlawful. Mr. Duncan. Okay. So if you cross the Southern Border without coming through a natural port of entry you illegally enter into the country, you are unlawfully in the country. If you overstay your visa you are unlawfully in the country, based on what you just said. So Chairwoman asked a question or maybe made a statement-- how many visa overstays do we have present in the country at any given time? Mr. Edge. I don't have an exact number on how many are presently in the country at this time. Mr. Duncan. Is there a percentage of the illegal aliens, would you say--50 percent, 30 percent, 10 percent? Mr. Edge. I will be able to give you a number of--between 2009 and 2011 37,000 both criminal and non-criminal aliens have been removed and those were overstays. Mr. Duncan. How many have been removed. Okay. It would seem to me that if you were going to think about committing a terrorist act in this country that--and you were a foreign national you would apply for a visa, and if you kept your nose clean and you didn't have a criminal record in the country, you weren't a person of interest that would pop up on some sort of prescreening that you would be able to get a visa to come to this country and then you could just overstay it and work on the terrorist act, like we saw recently with the D.C. bomber. So I want to commend the State Department, Mr. Donahue, for your process of prescreening applicants for visas. That is really where your testimony stayed. But in 1996 Congress said, ``You know, we are going to create a biometric screening for exit and entry into this country so we will know when folks enter and we will know when they leave.'' I have traveled around the world in a lot of different countries where you have to give biometric data-- fingerprints, whether it is just one finger or a complete hand. So 1996, that has been about 16 years that we have had this focus. The 9/11 Commission Report revisited that. So you all do a good job prescreening applicants for visas if that person is a person of interest or may have a background in that country that raises suspicions, or whatever, they would be denied a visa. But if they haven't had that background they would probably be given a visa. So the problem, I think, is us having a reliable system in place for knowing when foreign nationals exit this country that have come on visas. So, after 16 years and this instance from Congress, I ask the State Department, when are we going to complete this process of an entry and exit biometric screening? Mr. Donahue. The---- Mr. Duncan. Which I think begins with the State Department. Mr. Donahue. It begins with the State Department and we collect biometrics on almost all applicants who are coming to the United States. Those are immediately transmitted to the Department of Homeland Security and are used for each and every person who enters the United States--not each and every, but almost all people who enter the United States then submit, as you have seen and as you have done overseas, people coming into the United States, including those legal residents, including other travelers--visitors. Mr. Duncan. How is that information used? You are gathering that information from them as they come to the United States-- -- Mr. Donahue. That is right. Mr. Duncan [continuing]. But we are not gathering that information as they exit. Mr. Donahue. That is correct. I would defer to Department of Homeland Security on that because that is a Department of Homeland Security program--departure. Mr. Duncan. I will refer to them. Mr. Cohen. Mr. Cohen. Mr. Duncan, thank you. As you pointed out, there are three elements of an effective entry-exit system: It is the collection of information and biometrics upon application and entry, it is the feeding those biometrics into a information lair that connects not only that data with other immigration data but that data with other law enforcement data and intelligence data, and then there is the collection of information upon departure. The Department is finalizing its plan for a comprehensive biometric exit system. We expect to have it to Congress shortly. As required by our recent appropriations bill, it will lay out not only the details of how we will link those three levels of activity together but how we will also achieve immediate benefit to your other point, which is making sure that we are better able to identify those visa overstays who are actually visa overstays and still in this country who aren't National security or public safety threats. Mr. Duncan. Okay. You determine that someone has overstayed their visa; they haven't left on the date they were supposed to. A little period of time goes through, you check your records. At what point in time do you all start implementing the process of finding the address where they said they were going to be, researching where that person may be, and trying to enforce removing them from the country? At what time does that kick in? Mr. Cohen. I believe it is 30 days after the point of overstay. But if I may point out, because the process today requires so many manual database checks and is so resource- intensive ICE prioritizes for enforcement actions those visa overstays that are National security or public safety risks. When we implement the enhancements that I described earlier we will be better able to identify those other visa overstays, provide that information into law enforcement systems so upon next encounter their overstay status will be identified, ensure that information gets to State Department so if they have departed the country and they seek to come back from a visa waiver country or through a visa process again State Department can take appropriate actions. So we are going in the direction that you are suggesting. The problem is all of these systems that we need to make these determinations are disconnected and they use different language. Mr. Duncan. I am out of time and I will look for a second round of questions, but I would just make a point--they are disconnected. The 9/11 Commission Report pointed to the fact that the disconnect of agencies talking to one another wasn't there. You had walls of separation. That is the problem, and I am afraid that we have got to correct that if we are going forward. I will yield back. Mrs. Miller. We probably aren't going to have a second round of questions, so if you would like to ask one more question, please, I will yield to you. Mr. Duncan. Okay. Thank you. I want to continue going down this path because--we see, based on the--number of visa overstays that were involved in terrorist activity, at what point of time is someone that is stopped for a traffic violation or misdemeanor, as we saw with the gentleman on Capitol Hill, at what point in time do you say, ``Well, they are a visa overstay; they are unlawfully present in the United States of America,'' and they are returned to their country? Americans are scratching their head looking at the data that is provided--and this is real data, actual cases. They are scratching their head going, ``Why isn't America--these are the low-hanging fruit. Why isn't America dealing with this?'' Because I am--they are scratching their head. Answer that for me, someone, please. Mr. Cohen. So I would answer your question, Congressman, by saying we are dealing with it and we have finally begun the process of linking those disparate systems that you identified earlier together so that when a police officer arrests somebody and books that individual into jail they are quickly identified as being in violation of their immigration status so that ICE can be notified and appropriate enforcement actions can take place. That is the very capability that we are beginning--we have begun the process of putting into place. Again, we expect to have the detailed plan to Congress shortly that will lay out what we are doing, but it has already begun, as I testified earlier, and we have already seen dramatic improvements in our ability to identify those visa overstays that represent National security or public safety threats. Again, this is from a pool of individuals that would not have been vetted before. So progress is being achieved. To your very point, we absolutely agree with you. These systems have to be linked together and they have to be linked together to support the operational activities of ICE and CBP and the other enforcement agencies that are responsible for enforcing our immigration laws. Mr. Duncan. You shouldn't have to keep coming back to Congress because the law is the law of the land right now. Immigration and Customs Enforcement--immigration enforcement means that you enforce the immigration laws of the United States of America, and if you do that then folks that are caught on misdemeanors that have been here for 13 years over their visa deadline are picked up and they are deported from this country. That is what America expects from you, to enforce immigration laws that are on the books today and not keep having to come back to Congress for more and more and more. Integration--I get that. But customs enforcement and immigration enforcement is your responsibility. I charge you guys with doing your job. With that, Madam Chairwoman, I yield back. Mrs. Miller. Chairwoman now recognizes the gentleman from the great State of Michigan, Mr. Clarke. Mr. Clarke of Michigan. Thank you, Madam Chairwoman. While we realize it is very important to track those individuals who are overstaying their visas, especially those who are likely to be terrorists, I also think it is important for this Congress and Department of Homeland Security to focus on preventing terrorists from entering our country in the first place. So to that end, I want to thank the advocacy of our Chairwoman who has been focusing on how we can get more resources to better secure our Northern Border to prevent these criminals, terrorists, and drug traffickers from coming across the border into our country, especially securing our border between Canada and Michigan. We do need the resources to better monitor that border and apprehend these folks in case they do come over. To that same end, my question is this: How can we better secure the visa process to prevent terrorists from coming into our country in the first place--better secure that process but yet tailor it in such a way that we don't discourage but even encourage the immigration that we do need in this country? You know, I represent the city of Detroit, a metropolitan area that needs more economic investment. Capital is global. We want to encourage more international investors and entrepreneurs to come to this country to get a green card, especially when then invest in distressed areas like Detroit, or Pontiac, or Flint, in Michigan. How can we have a process that balances the security that we need to prevent these folks that want to do us harm from even getting into this country but encouraging investors, entrepreneurs, encouraging those international graduates, especially in science and engineering and mathematics to actually stay in the United States to promote more innovation that will create more jobs for our country? Mr. Edge. Thank you very much for your question, Mr. Clarke. As far as ICE is concerned, we have our Visa Security Program, and what we are trying to do to encourage the expedited process of--and vetting of visa applicants is to do a lot of that on the domestic side through technology. We have many offices overseas--approximately 71 in 47 countries, and what we would like to do and what we have begun to do is to use our technological capabilities to vet these applicants in conjunction with our friends at the Department of State to enhance the process, to encourage people to want to come to this country, and they will know that the process will be a little faster than it has been in the past. So that is one of the things that, through the Visa Security Program, we are doing. This will also allow our people who are in those other countries working and representing the United States in homeland security investigations to focus more on investigative work. But we are actively working on those technological enhancements right now. Mr. Cohen. If I may add, Congressman, I think you raised an excellent point, and part of the answer includes extensively pre-vetting to the greatest degree possible either those individuals or those corporate entries seeking to cross the border. So the auto industry in Michigan and Detroit area rely on just-in-time deliveries. If those deliveries of parts and goods do not make it to those factories cars are not going to be produced. People travel from Windsor to Detroit every day to enjoy restaurants and enjoy other elements. So what we are moving towards is an environment where to the greatest degree possible we can validate those people who have a legal--who legally can enter this country, whether they are doing it for business or for pleasure, and vet those people against the broadest array of intelligence and law enforcement systems so we can weed out initially, before they come to this country, those people who represent a danger to this country, thereby enabling those who don't represent a danger who can help our economy grow can travel more effectively and efficiently to this country. Mr. Clarke of Michigan. Thank you, Mr. Cohen. Thank you, Mr. Edge. Mr. Donahue. Let me just mention that the prevention of issuance to these--of visas to persons like the overstay is one of our key goals in all of our visa adjudications. We do a lot of training but we also do a lot of what we call validation studies. We will take a group of people, using information from--the ADIS records from the Departure and Information Service, and we will look to see if a person--if this group of persons--it could be a group of elderly people coming for vacations or to see their family members--are they likely to overstay in the United States, or students? We will do this by groups, and we do it from a number of--from all countries around the world and check to see how our officers are doing. We also make sure that they understand what the culture is, what is the likelihood that people will return? We refuse about a million visas a year, and yet we find in our validation studies more and more that we are getting very close to finding that almost everyone--we would like it to be everyone--uses their visa appropriately and comes back in many of the countries where we have been doing these validation studies. Mr. Clarke of Michigan. Thank you, Mr. Donahue. I yield back my time. Mrs. Miller. Chairwoman recognizes the Ranking Member. Mr. Cuellar. Thank you, Madam Chairwoman. Couple questions. It is concurrent--that is, Mr. Cohen, two questions real quickly--in its current configuration the U.S. visa program has failed to fulfill its statutory requirement regarding deploying a biometric exit system to track visitors to the United States and better identify overstays. The administration's fiscal year 2013 budget request proposes that we transfer the US-VISIT's functions from NPPD to CBP and ICE. Some have expressed concerns that this transfer will be detrimental to the U.S. visa mission but others argue that aligning this mission with the relevant components makes more sense. Can you please explain how aligning US-VISIT with CBP and ICE would strengthen the program and help DHS get an exit system done? Mr. Cohen. Thank you, Congressman. You know, the Secretary isn't a big fan of moving boxes around and it is--it--she has rarely come to Congress and sought an organizational change such as this, but the rationale behind the change is much if not all of what US-VISIT does ties directly to the enforcement and operational activities of either ICE or CBP. So from an efficiency perspective and from a financial perspective, in order to avoid duplicative efforts, it just made sense to place those functions of US-VISIT that most support ICE's operational mission into ICE and those parts of the US-VISIT mission that best support CBP's operational issues or operational functions into CBP. The only other thing I would add is that as we learned through this initiative from the beginning, that the effective management and enforcement of our visa and immigration laws, of our counterterrorism responsibilities occurs best when the different elements of the Department are working closely together. So the movement of US-VISIT into CBP and ICE should not be viewed as a taking a step back, that the Department is going to continue to enhance its operational coordination across all of its components. Mr. Cuellar. Okay. Thank you, Mr. Cohen. Finally, you say that DHS will soon transmit to Congress your plan for deploying the biometric exit. How soon is soon? Mr. Cohen. Without giving a specific date, it is going to be within weeks, not months, not years. We are putting the finishing touches on the report as we speak. Mr. Cuellar. Weeks, so that is within the next 30 days? Mr. Cohen. That would be our intention. Mr. Cuellar. Okay. All right. Thank you to all three of you all. Thank you, Madam Chairwoman, for having this meeting today. Mrs. Miller. Thank you very much. I certainly want to thank all the witnesses, as well. Mr. Cohen, I was going to ask that question so I am glad my colleague did, as well. We are certainly interested to see what you described as a work in progress. I think it is hopefully clear from all of the Members here that this issue is something that this subcommittee is very, very focused on--and I really don't think that enough attention has been paid in the past, as I say, because--we seem to be so focused on what is going on with securing--our Southern Border, in particular. Believe me, I am not minimizing the challenges that we have down there, certainly with the drug cartels, and the violence, and the spillover, et cetera, and illegals that are coming across. I think this Nation certainly wants this Congress and all the agencies that are under our umbrella to exercise the political will that we need to to secure our borders--all of our borders. But I think this visa overstay issue, again, is something that we have just not paid enough attention to. Certainly we want to work with all of your agencies on making sure that Congress is, through the appropriations process, et cetera, is assisting where we need to to prioritize our spending. Again, I always thank our Chairman of this--of the full committee for putting those posters--will you--turn around you see the posters on the back of the wall there, which are of the burning towers on 9/11 and why the Department of Homeland Security was even put together. Again, four of those cowards-- those terrorists that attacked innocent--and murdered innocents that day were here on visa overstays. So we don't want to be in any way an adversarial position with any of your agencies. We do commend you for all of the work that you have done and are doing on this issue and we certainly want to be a conduit--to be a success in making sure that we do have a very comprehensive--not just the entry but the exit system, really a robust biometric system. So again, we thank the witnesses for all of your testimony and look forward to working with you shoulder-to-shoulder to solve this problem. With that, I would mention that if any Members of the subcommittee have any other additional questions the hearing record will remain open for 10 days. With that, the subcommittee will be adjourned. Thank you. [Whereupon, at 11:05 a.m., the subcommittee was adjourned.]