[House Hearing, 112 Congress]
[From the U.S. Government Publishing Office]



 
 FROM THE 9/11 HIJACKERS TO AMINE EL-KHALIFI: TERRORISTS AND THE VISA 
                            OVERSTAY PROBLEM

=======================================================================


                                HEARING

                               before the

                       SUBCOMMITTEE ON BORDER AND

                           MARITIME SECURITY

                                 of the

                     COMMITTEE ON HOMELAND SECURITY

                        HOUSE OF REPRESENTATIVES

                      ONE HUNDRED TWELFTH CONGRESS

                             SECOND SESSION

                               __________

                             MARCH 6, 2012

                               __________

                           Serial No. 112-73

                               __________

       Printed for the use of the Committee on Homeland Security
                                     

[GRAPHIC] [TIFF OMITTED] CONGRESS.#13

                                     

      Available via the World Wide Web: http://www.gpo.gov/fdsys/

                               __________




                  U.S. GOVERNMENT PRINTING OFFICE
76-600                    WASHINGTON : 2013
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing 
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC 
area (202) 512-1800 Fax: (202) 512-2104  Mail: Stop IDCC, Washington, DC 
20402-0001




                     COMMITTEE ON HOMELAND SECURITY

                   Peter T. King, New York, Chairman
Lamar Smith, Texas                   Bennie G. Thompson, Mississippi
Daniel E. Lungren, California        Loretta Sanchez, California
Mike Rogers, Alabama                 Sheila Jackson Lee, Texas
Michael T. McCaul, Texas             Henry Cuellar, Texas
Gus M. Bilirakis, Florida            Yvette D. Clarke, New York
Paul C. Broun, Georgia               Laura Richardson, California
Candice S. Miller, Michigan          Danny K. Davis, Illinois
Tim Walberg, Michigan                Brian Higgins, New York
Chip Cravaack, Minnesota             Cedric L. Richmond, Louisiana
Joe Walsh, Illinois                  Hansen Clarke, Michigan
Patrick Meehan, Pennsylvania         William R. Keating, Massachusetts
Ben Quayle, Arizona                  Kathleen C. Hochul, New York
Scott Rigell, Virginia               Janice Hahn, California
Billy Long, Missouri                 Vacancy
Jeff Duncan, South Carolina
Tom Marino, Pennsylvania
Blake Farenthold, Texas
Robert L. Turner, New York
            Michael J. Russell, Staff Director/Chief Counsel
               Kerry Ann Watkins, Senior Policy Director
                    Michael S. Twinchek, Chief Clerk
                I. Lanier Avant, Minority Staff Director
                                 ------                                

              SUBCOMMITTEE ON BORDER AND MARITIME SECURITY

                Candice S. Miller, Michigan, Chairwoman
Mike Rogers, Alabama                 Henry Cuellar, Texas
Michael T. McCaul, Texas             Loretta Sanchez, California
Paul C. Broun, Georgia               Sheila Jackson Lee, Texas
Ben Quayle, Arizona, Vice Chair      Brian Higgins, New York
Scott Rigell, Virginia               Hansen Clarke, Michigan
Jeff Duncan, South Carolina          Bennie G. Thompson, Mississippi 
Peter T. King, New York (Ex              (Ex Officio)
    Officio)

                      Paul Anstine, Staff Director
                   Diana Bergwin, Subcommittee Clerk
            Alison Northrop, Minority Subcommittee Director



                            C O N T E N T S

                              ----------                              
                                                                   Page

                               Statements

The Honorable Candice S. Miller, a Representative in Congress 
  From the State of Michigan, and Chairwoman, Subcommittee on 
  Border and Maritime Security:
  Oral Statement.................................................     1
  Prepared Statement.............................................     3
The Honorable Henry Cuellar, a Representative in Congress From 
  the State of Texas, and Ranking Member, Subcommittee on Border 
  and Maritime Security..........................................     5
The Honorable Bennie G. Thompson, a Representative in Congress 
  From the State of Mississippi, and Ranking Member, Committee on 
  Homeland Security:
  Prepared Statement.............................................     7

                               Witnesses

Mr. John Cohen, Deputy Counter-Terrorism Coordinator, U.S. 
  Department of Homeland Security:
  Oral Statement.................................................     8
  Joint Prepared Statement.......................................    10
Mr. Peter T. Edge, Deputy Associate Director, Homeland Security 
  Investigations, Immigration and Customs Enforcement, U.S. 
  Department of Homeland Security:
  Oral Statement.................................................    15
  Joint Prepared Statement.......................................    10
Mr. David T. Donahue, Deputy Assistant Secretary of State for 
  Consular Affairs, U.S. Department of State:
  Oral Statement.................................................    16
  Prepared Statement.............................................    18


 FROM THE 9/11 HIJACKERS TO AMINE EL-KHALIFI: TERRORISTS AND THE VISA 

                            OVERSTAY PROBLEM

                              ----------                              


                         Tuesday, March 6, 2012

             U.S. House of Representatives,
                    Committee on Homeland Security,
              Subcommittee on Border and Maritime Security,
                                                    Washington, DC.
    The subcommittee met, pursuant to call, at 10:01 a.m., in 
Room 311, Cannon House Office Building, Hon. Candice S. Miller 
[Chairwoman of the subcommittee] presiding.
    Present: Representatives Miller, Rogers, Duncan, Cuellar, 
and Clarke of Michigan.
    Mrs. Miller. The Committee on Homeland Security, our 
Subcommittee on Border and Maritime Security will come to 
order. The subcommittee is meeting today to hear testimony from 
John Cohen, deputy counter terrorism coordinator, the 
Department of Homeland Security; Peter Edge, deputy executive 
associate director for homeland security investigations within 
U.S. Immigration and Customs Enforcement; and David Donahue, 
the deputy assistant secretary of state for consular affairs, 
on the vitally important topic of visa security. I would 
recognize myself for an opening statement.
    Since 9/11 our border security efforts have been very 
focused on stopping illegal immigrants and illicit drugs from 
entering our country, and we have really principally focused 
much of our efforts on our Southwest Border. However, 
estimates--some estimates as high as in the 40 percentile of 
all illegal aliens that are in our country just don't sneak 
across the border; they don't come in through the desert. They 
actually come in through the front door, so to speak, by 
obtaining a legitimate visa, and then they are here, they have 
a visa overstay, and they just simply never leave.
    To secure our Southwest Border we have spent literally 
billions of dollars on agents, on fencing, on cameras, and 
there is no question, of course, that many of these investments 
have brought tangible security gains to the border and have 
helped stem the tide of illegal aliens trying to cross the 
border on the southern part of our Nation. There is an 
important distinction to be made, I think, however, between 
those who are crossing the border largely in search of a better 
life and terrorists who abuse the visa process with the 
ultimate goal of actually destroying our way of life.
    To that end, I think that recent events should solidify in 
our minds the need to take really a holistic approach of border 
security and not view it as simply one-dimensional with all of 
the emphasis on one region of the country or only about 
security at the physical borders, whether that be the Southern 
Border, the Northern Border, our coastal borders. Entering a 
country and overstaying a visa has been the preferred method 
for terrorists actually to enter our country. The recent case 
of Amine el-Khalifi, who was a 29-year-old Moroccan citizen who 
allegedly attempted to conduct a suicide attack on the U.S. 
Capitol--that is not the first time that terrorists have 
exploited our visa process.
    In fact, el-Khalifi follows a long line of terrorists going 
back to the first World Trade Center attack in 1993 and, as 
this committee has noted many times, also includes several of 
the 9/11 hijackers, these terrorists who overstayed their visas 
and then went on to conduct or plan terrorist attacks. In fact, 
more than 36 visa overstayers have been convicted of terrorism-
related charges since 2001.
    I was going to have the staff put up a slide, if they can 
get it up here. I think it is interesting to take a look at 
these faces on this slide and think about the visa violations 
of these high-profile figures and what has happened here.
    Clearly, more needs to be done to ensure the integrity of 
the visa system, including enhancements to Immigration and 
Customs Enforcement's ability to identify and promptly remove 
those who are overstaying their visas. Pushing out the border 
and conducting more rigorous vetting of visa applicants 
overseas through the Visa Security Program, which stations ICE 
officers and agents overseas, as well as the inclusion of 
fingerprints into the visa application process have made the 
visa process more secure than it was, certainly, before 9/11. 
However, I think we are all concerned with our ability to track 
and to promptly remove overstays who remain in our country.
    It is especially troubling that el-Khalifi lived illegally 
in the United States for more than 13 years before being 
identified by law enforcement. During that time he had several 
run-ins with the law, but ICE really only identified him as an 
overstay once a current terrorism investigation was underway by 
the FBI agents who el-Khalifi thought, of course, were al-
Qaeda, actually.
    How many more visa overstayers are there out there who 
might pose a serious threat to the security of our homeland? We 
are all very concerned that ICE does not have a way to identify 
and track down overstays who entered the country prior to 2003, 
before our US-VISIT program was created, and we are concerned 
that we do not have a good enough handle on the number of 
overstayers that are in the country right now.
    ICE arrests and puts into removal proceedings only a small 
fraction of those who overstay their visa who, for the most 
part, are caught because they commit an additional crime and 
are identified through Secure Communities, which is a fantastic 
program. This committee has had a number of hearings about 
Secure Communities. It is an excellent, excellent program with 
tangible benefits.
    However, the administration's insistence on administrative 
amnesty through prosecutorial discretion, which el-Khalifi may 
have been eligible for before the start of this investigation 
due to his long presence in this country, certainly gives us 
pause, and it is clear that administrative amnesty could result 
in deferring action for some illegals who go on to commit more 
serious crimes and perhaps even those who would go on to try to 
commit a terrorist attack.
    So I look forward to hearing from our witnesses today on 
progress made since the creation of US-VISIT in 2003 on 
overstaying--identifying overstays, especially those who pose 
National security and public safety threats, and how the 
Department of Homeland Security plans to implement a 
comprehensive visa exit system that will prevent terrorists 
from successfully exploiting our visa system--a requirement, I 
might add, that was first mandated by Congress in 1996.
    Last September this committee held a hearing on the topic 
of visa security, and so this is sort of a follow-on hearing to 
that. Actually, it was during that hearing that we heard that 
the Department was rolling out an enhanced biographic program 
which would add an additional layer of security to the visa 
process, and so we are interested today to hear about the 
progress that we have made on that program as well as what the 
plans are to develop an exit system.
    More than 10 years ago on that day in September we learned 
a very hard lesson, and as the 9/11 Commission has noted--this 
is something they actually said in their recommendation in 
their report--the 9/11 Commission said, ``For terrorists, 
travel documents are as important as weapons.'' That, I think, 
is an important statement for all of us to reflect upon. Four 
of the 9/11 hijackers, as I mentioned, had overstayed visas--a 
missed opportunity to prevent the attacks which caused the 
deaths of nearly 3,000 people.
    Without the hard work of the FBI and the bravery of their 
undercover agents Amine el-Khalifi may have been successful in 
carrying out his planned attack on the Nation's Capitol, so 
obviously we would all like to offer our sincere thanks and 
congratulations to the brave men and women--the agents who were 
involved in that investigation. Great job on that.
    You know, if we are serious about controlling who comes 
into the Nation and preventing another attack we need to get 
serious about an exit program. It has been more than 2 years 
since the exit pilot program was in both Detroit and Atlanta, 
and we are still waiting for the Department to really 
articulate a plan to move forward with a comprehensive exit 
plan in the air environment or elsewhere, for that matter. So 
it is long overdue for a plan to move the Nation toward a 
viable and cost-effective exit solution and we will be very 
interested in the testimony of the witnesses today and we 
appreciate them all coming.
    But at this time, Chairwoman now recognizes the Ranking 
Member of the subcommittee, the gentleman from Texas, Mr. 
Cuellar, for his opening statement.
    [The statement of Chairwoman Miller follows:]
               Statement of Chairwoman Candice S. Miller
                             March 6, 2012
    Since 9/11 our border security efforts have been focused on 
stopping illegal immigrants and illicit drugs from entering the 
country; chiefly our Southwest Border.
    However, some estimates are that 40 percent of all illegal aliens 
do not sneak across the border; they come in through the front door by 
obtaining a legitimate visa and simply never leave.
    To secure our Southwest Border, we have spent billions of dollars 
on agents, fencing, and cameras--there is no question that many of 
these investments have brought tangible security gains to the border 
and have helped stem the tide of illegal aliens attempting to cross the 
border.
    There is an important distinction to be made between those who 
cross the border, largely in search of a better life, and terrorists 
who abuse the visa process with the ultimate goal of destroying our way 
of life.
    To that end, I think recent events should solidify in our minds the 
need to take a holistic view of border security and not view it as one-
dimensional with all of the emphasis on one region of the country, or 
only about security at the physical borders.
    Entering the country and overstaying a visa has been the preferred 
method for terrorists to enter the country. The recent case of Amine 
el-Khalifi, a Moroccan citizen, who allegedly attempted to conduct a 
suicide attack at the U.S. Capitol, is not the first time terrorists 
have exploited the visa process.
    In fact, el-Khalifi, follows a long line of terrorists, going back 
to the first World Trade Center attack in 1993 and includes several of 
the 9/11 hijackers who overstayed their visas and went on to conduct or 
plan terrorist attacks. In fact, more than 36 visa overstayers have 
been convicted of terrorism-related charges since 2001.
    Clearly, more must be done to ensure the integrity of the visa 
system, including enhancements to Immigration and Customs Enforcement's 
ability to identify and promptly remove those who overstay their visa.
    Pushing out the border and conducting more rigorous vetting of visa 
applicants overseas through the Visa Security Program which stations 
ICE agents overseas, as well as the inclusion of fingerprints into the 
visa application process have made the visa process more secure than it 
was before September 11.
    But I am also concerned with our ability to track and promptly 
remove overstays who remain in the country.
    It is especially troubling that el-Khalifi lived illegally in the 
United States for more than 13 years before being identified by law 
enforcement. During that time, he had several run-ins with the law, but 
ICE only identified him as an overstay once the current terrorism 
investigation was underway by the FBI.
    How many more visa overstayers are out there who pose a serious 
threat to the security of the homeland?
    I remain concerned that ICE does not have a way to identify and 
track down overstays who entered the country prior to 2003, before US-
VISIT was created and am concerned we do not even have a good handle on 
the total number of overstayers in the country right now.
    ICE arrests and puts into removal proceedings only a small fraction 
of those who overstay their visa, who for the most part are caught 
because they commit an additional crime and are identified through 
Secure Communities--which I think is a fantastic program that helps 
identify criminal aliens.
    However, this administration's insistence on administrative amnesty 
through prosecutorial discretion--which el-Khalifi may have been 
eligible for before the start of this investigation, due to his long 
presence in the country, gives me great pause and it is clear that 
administrative amnesty will result in deferring action for some 
illegals who go on to commit more serious crimes--and perhaps even 
those who will go on to commit a terrorist attack.
    I look forward to hearing from our witnesses today on progress made 
since the creation of US Visitor and Immigrant Status Indicator 
Technology (US-VISIT) in 2003 in indentifying overstays, especially 
those that pose National security and public safety threats, and how 
the Department of Homeland Security plans to implement a comprehensive 
visa exit system that will prevent terrorists from successfully 
exploiting the visa system--a requirement, I might add, that was first 
mandated in 1996.
    Last September this committee held a hearing on the topic of visa 
security--and during that hearing we heard that the Department was 
rolling out an enhanced biographic program to add a layer of security 
to the visa process; I am very interested to hear about the progress 
made on that program as well as what plans are in place to develop an 
exit system.
    More than 10 years ago on that day in September, we learned a hard 
lesson--as the 9/11 Commission noted, ``For terrorists, travel 
documents are as important as weapons.''
    Four of the 9/11 hijackers had overstayed visas--a missed 
opportunity to prevent the attacks which caused the death of nearly 
3,000 people.
    Without the hard work of the Federal Bureau of Investigation, and 
the bravery of their undercover agents Amine el-Khalifi might have been 
successful in carrying out an attack on the Nation's Capitol, so I 
would like to offer my sincere thanks to those agents involved in this 
investigation.
    If we are serious about controlling who comes into the Nation and 
preventing another attack, we need to get serious about an exit 
program.
    It has been more than 2 years since the exit pilot in Detroit and 
Atlanta and the Department has yet to articulate a plan to move forward 
with a comprehensive exit plan in the air environment or elsewhere.
    It's long overdue for a plan to move this Nation toward a viable 
and cost-effective exit solution. With that I'd like to recognize the 
gentlemen from Texas.



    Mr. Cuellar. Thank you, Madam Chairwoman. I am pleased that 
this subcommittee is meeting today to examine the issue of 
immigration overstay.
    Cases such as the 9/11 hijackers and more recently the 
Capitol Hill bomber have underscored the potential homeland 
security threat posed by individuals who enter this country on 
visas but overstay the authorized--or should I say the 
authorized period of time in the United States. Of the 
approximate 11.5 million to 12 million unauthorized resident 
alien population that was mentioned a few minutes ago, an 
estimated 33 to 48 percent are overstayed. Not everybody 
crossed the river; not everybody swam across the Rio Grande, as 
some people think. But there are actually 33 to 48 percent of 
them are--got here through a legal method.
    Of course, the overwhelming majority of individuals who 
enter this country do so for legitimate purposes. Even of those 
who enter the United States illegally or enter legally but 
overstay, the majority pose no threat. However, a small handful 
of people seek to enter this country for evil purposes.
    Since 2001 the Department of Homeland and the Department of 
State, with the direction from Congress, have taken important 
steps to identify, locate, and address overstays, particularly 
those that may pose a security or a safety risk to our 
communities. Within the Immigration and Customs Enforcement, 
ICE, and the Counterterrorism and Criminal Exploitation Unit 
they are primarily responsible for overstay enforcement.
    However, the CTCEU is not the only entity within ICE that 
removes overstay. Indeed, the primary responsibility for 
apprehending and removing overstays and other aliens who do not 
have lawful immigration status rests with ICE Enforcement and 
Removal Operation--Removal Operations--the ERO.
    Various programs, from the Secure Communities to the 
Criminal Alien Programs--Program, identify and remove overstays 
from this country every day. However, more remains to be done.
    I was encouraged to hear that at our last hearing that we 
had DHS had reduced the backlog of overstay cases by half, and 
I hope to hear on that, and congratulations on that effort that 
you are doing. I look forward to hearing where DHS has 
continued to make strides in this particular area and what else 
can we do to try to help you continue those strides. I also 
hope to hear about how the administration's plan to move U.S. 
visas functions to ICE and CBP will help those agencies fulfill 
their respective missions more effectively.
    At the subcommittee's September 2011 hearing on visa 
security I also expressed my concern about the so-called 
recalcitrant countries. These countries refuse to accept the 
return of their nationals or use of lengthy delay tactics to 
avoid taking these nationals back that are unlawfully in the 
United States.
    Again, just as an illustration, the--this is only an 
example of this recalcitrant countries: Pakistan has an average 
travel document issuance time of 149 days; China has a time of 
148 days; India has a time of 267 days; Bangladesh has a time 
of 434 days; Cambodia has 277 days; Vietnam has a time of 285 
days; Iraq has 594 days. When you look at--and I emphasize to 
my friends, since I live on the border--everybody thinks that 
everything is coming from Mexico and South America, but for my 
friends, let me give you some days. The average time for 
documents from those countries: Guatemala, Honduras, El 
Salvador, Dominican Republic, Columbia, Mexico, and Ecuador 
takes an average of--going down that order--9 days, 5 days, 23 
days, 22 days, 13 days, 36 days, 34 days, respectfully. You 
compare it to 594 days, 285 days, 277 days, 434 days, 267 days, 
148 days, 149 days, that shows you why I think we need to put 
an emphasis to make sure that we use our resources in a better 
way.
    I know I have talked to John Morton about this several 
times. I will see him again tomorrow.
    Again, Mr. Edge, Mr. Cohen, I ask you to continue working, 
and Mr. Donahue, with the State Department. I understand 
diplomatic relations; I understand all that. But I think we 
need to put a little bit more pressure on those countries to 
get them to do that, because it is costing the taxpayers a lot 
of money, and I have the costs as to how much it costs for some 
of those countries.
    So I would like to hear more details from our witnesses 
today about why visas continue to be issued to individuals from 
those countries, and at what rate, and as well as recommended 
steps for improving actions. Again, so again, if we are still 
giving those visas out to those countries, we understand they 
are very difficult in taking those folks back when they need to 
take them back. I think we need to rechange our--and--and look 
at the steps in addressing that.
    So, Madam Chairwoman, I thank you for holding this hearing 
and I thank all the witnesses for being here today.
    Mrs. Miller. Thank the gentleman for his comments.
    Other Members of the committee are reminded that their 
opening statements could be submitted for the record.
    [The statement of Ranking Member Thompson follows:]
             Statement of Ranking Member Bennie G. Thompson
                             March 6, 2011
    Some in Congress seem to believe that securing America's Southwest 
Border is the answer to our Nation's illegal immigration concerns.
    But an estimated 40 percent of individuals unlawfully present in 
the United States actually entered this country legally and have simply 
overstayed.
    Among those millions of people may be a handful who seek to do us 
harm.
    Addressing this so-called ``overstay'' issue is essential not only 
to immigration control, but also to homeland security.
    Certainly, the 9/11 attacks focused the Federal Government on the 
importance of securing the visa process and addressing the potential 
threat posed by certain individuals who remain in the United States 
after their visas expire.
    Under Democratic leadership in the 110th and 111th Congresses, this 
committee held hearings on the issue of visa overstays.
    I am pleased the subcommittee is also examining the issue today.
    I would like to hear from our DHS witnesses about what tools they 
need to be more successful at locating and addressing individuals who 
have overstayed their visas in the United States--particularly those 
who may pose a safety or security threat to this country.
    I also hope to hear from our State Department witness about what 
they are doing to prevent individuals who are likely to overstay from 
receiving visas in the first place.
    As part of the effort to address the overstay issue and in 
accordance with a 
9/11 Commission recommendation, Congress has repeatedly required the 
Department of Homeland Security to deploy a biometric entry-exit system 
under US-VISIT.
    Such a system would help DHS determine whether an individual has 
departed the United States or has remained in this country.
    Yet more than a decade after September 11, 2001, DHS is still 
without a biometric exit system.
    The lack of significant progress toward this mandate has been 
troubling to those of us who believe a biometric entry-exit system is 
essential to border security.
    However, last year DHS made significant strides by eliminating 
about half of the 1.6 million record backlog in US-VISIT.
    Much more remains to be done, however.
    I hope to hear from our DHS witnesses today about how they are 
working to resolve the remaining backlog cases, as well as how the 
Department is moving forward to identify cost-effective technology for 
implementing biometric exit at ports of entry.
    Finally, I would note that I was pleased to see the 
administration's proposal in the fiscal year 2013 budget request to 
transfer US-VISIT's functions to CBP and ICE.
    US-VISIT in its current configuration has so far failed to meet its 
mandate.
    By moving the program's functions to CBP and ICE, it will be more 
closely aligned with the operational components that work with and rely 
on the program on a day-to-day basis.
    The transfer should bring efficiencies, and hopefully more progress 
toward implementing the mandated biometric exit system.
    I look forward to discussion about that transfer here today.
    In closing, I would note that while the issue before the 
subcommittee today is of great importance, I was dismayed to learn that 
``Part II'' of last month's hearing on maritime cargo security hearing 
would not being held today as planned.
    It is my hope that the subcommittee will complete its work on that 
hearing in the near future.
    I thank the witnesses for being here today and I yield back the 
balance of my time.

    Mrs. Miller. I will just introduce, now, all three of our 
witnesses at the same time, and then we will start with Mr. 
Cohen.
    John Cohen serves as the principal deputy coordinator for 
counterterrorism at the United States Department of Homeland 
Security and as a senior advisor on counterterrorism, law 
enforcement, and information sharing. He has also served as the 
senior advisor to the program manager for the information 
sharing environment in the Office of the Director of National 
Intelligence.
    Peter Edge began his law enforcement career in 1986 with 
the Essex County, New Jersey prosecutor's office before his 
selection as a special agent with the U.S. Customs Service in 
Newark, New Jersey. In 2005 Mr. Edge was promoted to the 
position of assistant special agent in charge in the New York 
office where he led high-profile investigative components, such 
as the New York High Intensity Financial Crime Area, JFK 
International Airport, and the Immigration Division. Today he 
serves as the deputy executive associate director for homeland 
security investigations within the U.S. Immigration and Customs 
Enforcement.
    David Donahue is the deputy assistant secretary for visa 
services, Bureau of Consular Affairs. He has previously served 
as minister counselor for consular affairs in Mexico City and 
was the consul general in both Manila and Islamabad.
    So we certainly appreciate all of the witnesses coming. We 
have an excellent panel here today. We look forward to your 
testimony.
    The Chairwoman now recognizes Mr. Cohen.

STATEMENT OF JOHN COHEN, DEPUTY COUNTER-TERRORISM COORDINATOR, 
              U.S. DEPARTMENT OF HOMELAND SECURITY

    Mr. Cohen. Thank you, Chairman Miller, Ranking Member 
Cuellar, and distinguished Members of the committee--the 
subcommittee. Thank you for the opportunity to participate in 
this very, very important hearing.
    Madam Chairwoman, I have submitted written testimony and 
request that it be included as part of the record.
    Mrs. Miller. Without objection.
    Mr. Cohen. In your opening statements you and the Ranking 
Member both expressed concerns that terrorists and others who 
pose a risk to the National security of the United States seek 
to exploit the visa and visa waiver programs and travel to and 
remain illegally in the United States. The Department of 
Homeland Security certainly shares your concern, which is why, 
as you pointed out, over this past summer, at the direction of 
Secretary Napolitano, we began an intensive effort to address 
gaps to these programs by integrating and interlinking key law 
enforcement and National security information repositories with 
our immigration and travel systems.
    This effort began, as I described when I last met with you, 
as a very tactical effort intended to vet approximately 1.6 
million records that were commonly referred to as the 
overstayed backlog. I would note that these records, under past 
regimes, would not have been vetted from a National security 
and public safety perspective. But for very obvious reasons 
that you have pointed out the Secretary instructed that they be 
so vetted.
    But through this effort, which included the efforts of ICE, 
CBP, US-VISIT, the National Counterterrorism Center, and others 
in the Federal Government, it led the Department to a better 
understanding and the development of a way forward for a more 
expansive overstay vetting system and a path forward for 
establishing an enhanced entry-exit capability. We continue to 
implement this effort, allocating $4.1 million from fiscal year 
2011 funds and identifying an additional $10.9 million in 
fiscal year 2012 funds to pay for a series of system and 
operational enhancements.
    The result, today, leveraging the technical and operational 
capabilities of US-VISIT, ICE, and CBP, and our strong 
relationship with other Federal entities like the Department of 
State and NCTC, we recurrently vet all visa applicants, all 
visa holders, and potential overstays from a National security 
and public safety perspective. This recurrent vetting ensures 
that as new intelligence and new derogatory information is 
acquired by the Federal Government we can quickly and 
effectively target those individuals for enforcement actions, 
whether it be an FBI investigation or whether it be for some 
other type of immigration enforcement.
    These enhancements make it harder for individuals to 
overstay their visas and avoid detection, and conversely, make 
it easier for the Department to confirm when someone is an 
overstay and target them for enforcement action. I should note 
that this includes increasing the Department's ability to take 
administrative action against confirmed overstays that are not 
public safety or National security risks.
    These enhancements will also result in greater efficiencies 
to our Visa Security Program and they will provide the core 
components of an enhanced entry-exit system. They will also, 
Madam Chairwoman, ensure that we can more accurately track 
overstay rates by country.
    Specifically, through these efforts DHS will be better able 
to validate documents presented during the visa application 
process or prior to an individual traveling to the United 
States, increasing our capacity to detect and prevent the use 
of fraudulent passports and other travel documents. We will 
also be able to ensure that fingerprints and other biometric 
data captured prior to travel to the United States is 
accurately matched with biographic records, improving our 
ability to accurately identify those traveling to the United 
States and further identify those biometrics with multiple 
identities in our systems.
    We are vetting visa applicants and those traveling from 
visa waiver countries against a broader array of law 
enforcement and National security information, enhancing our 
current capacity to ensure that those who pose a risk to the 
United States are identified prior to their travel to the 
United States. We are automating database queries that today 
require time-consuming manual database checks, thereby 
improving operational efficiencies and ensuring that we never 
again have a backlog of unvetted potential overstay records.
    Through the use of name-matching algorithms we are ensuring 
that departure data collected at U.S. air and sea ports more 
accurately match data collected upon a person's entry to the 
United States. As Secretary Napolitano has communicated to 
Congress, the technology and process enhancements that are 
currently underway will provide the foundation for a biometric 
air exit program. They will also immediately improve the 
ability of DHS operational components to identify and take 
action against those who have overstayed their lawful status.
    For this reason, it is critical that the Department 
continue to fully implement these improvements described to the 
subcommittee when I appeared before you last September, and 
with your support we will continue to do so. Thank you, and I 
will be happy to answer any questions.
    [The joint statement of Mr. Cohen and Mr. Edge follows:]
           Prepared Statement of John Cohen and Peter T. Edge
                             March 6, 2012
                              introduction
    Chairman Miller, Ranking Member Cuellar, and distinguished Members 
of the subcommittee: On behalf of Secretary Napolitano and Director 
Morton, thank you for the opportunity to discuss the efforts of the 
Department of Homeland Security (DHS) to prevent the exploitation of 
our visa system by terrorists and criminals. Visa overstays and other 
forms of immigration status violation bring together critical areas of 
DHS's mission--National security and immigration enforcement, and the 
determination of whom to allow entry into the United States.
Joint Anti-Fraud Strategy
    We recognize that those who pose National security threats may seek 
to commit immigration benefit fraud in order to enter or remain in the 
United States. For that reason, we work hard to detect and deter 
immigration fraud and to continually enhance our anti-fraud efforts. 
ICE exercises criminal authority in the detection and deterrence of 
immigration fraud, while USCIS exercises administrative authority. This 
strategy allows ICE to concentrate its efforts on major fraud 
conspiracies and other cases of National security or public safety 
interest, while allowing USCIS to address the bulk of immigration 
benefit fraud cases administratively.
    Through ICE Document and Benefit Fraud Task Forces (DBFTFs), we 
focus our efforts on detecting, deterring, and disrupting document and 
benefit fraud. DBFTFs bring together the joint expertise of Federal, 
State, and local law enforcement partners to formulate a comprehensive 
approach in targeting the criminal organizations and the beneficiaries 
committing immigration fraud.
The Visa Security Program
    The Homeland Security Act of 2002 directs the Department of 
Homeland Security (DHS) to assist in the identification of visa 
applicants who seek to enter the United States for illegitimate 
purposes, including criminal offenses and terrorism-related activities. 
The visa adjudication process often presents the first opportunity to 
assess whether a potential non-immigrant visitor or immigrant poses a 
threat to the United States. The Visa Security Program (VSP) is one of 
several ICE programs focused on minimizing global risks.
    Through the Visa Security Program (VSP), ICE deploys trained 
special agents overseas to high-risk visa activity posts in order to 
identify potential terrorist and criminal threats before they reach the 
United States. ICE special agents conduct targeted, in-depth reviews of 
individual visa applications and applicants prior to issuance, and 
recommend to consular officers refusal or revocation of applications 
when warranted. DHS actions complement the consular officers' initial 
screenings, applicant interviews, and reviews of applications and 
supporting documentation.
    ICE now conducts visa security investigations at 19 high-risk visa 
adjudication posts in 15 countries. In fiscal year 2012 to date, VSP 
has screened 452,352 visa applicants and, in collaboration with DOS 
colleagues, determined that 121,139 required further review. Following 
the review of these 121,139 applications, ICE identified derogatory 
information on more than 4,777 applicants.
    In March 2010, the National Targeting Center (NTC) within U.S. 
Customs and Border Protection (CBP) implemented a program to conduct 
continuous vetting of U.S. non-immigrant visas that have been recently 
issued. Recurrent vetting ensures that changes in a traveler's visa 
status are identified in near-real-time, allowing CBP to immediately 
determine whether to provide a ``no board recommendation'' to a 
carrier, to recommend revocation of the visa to DOS, or to notify ICE 
regarding individuals determined to be within the United States. Since 
the program's inception, DOS has revoked more than 900 visas based on 
requests from CBP on information uncovered after a visa was issued.
    ICE, CBP, and DOS have partnered to modernize DHS visa screening 
efforts. These efforts automate the flow of on-line visa information to 
DHS systems and provide the ability to send information back to DOS 
using an automated interface. ICE personnel currently deployed to the 
NTC will partner with CBP officers to expand current VSP efforts to 
enhance screening of visa applicants against DHS data world-wide. This 
screening will be conducted prior to the visa interview and complements 
DHS efforts to streamline the Security Advisory Opinion process of 
third agency checks on the highest-risk visa applicants world-wide, 
which has resulted in significant delays in visa issuance for some 
individuals.
The Counterterrorism and Criminal Exploitation Unit
    The Counterterrorism and Criminal Exploitation Unit (CTCEU) is the 
first National program dedicated to the enforcement of non-immigrant 
visa violations. Today, through the CTCEU, ICE proactively develops 
cases for investigation in cooperation with the Student and Exchange 
Visitor Program (SEVP) and the United States Visitor and Immigrant 
Status Indicator Technology (US-VISIT) Program. These programs enable 
ICE to access information about the millions of students, tourists, and 
temporary workers present in the United States at any given time, and 
to identify those who have overstayed or otherwise violated the terms 
and conditions of their admission.
    Each year, the CTCEU analyzes records of hundreds of thousands of 
potential status violators after preliminary analysis of data from the 
Student and Exchange Visitor Information System (SEVIS) and US-VISIT, 
along with other information. After this analysis, CTCEU determines 
potential violations that warrant field investigations and/or 
establishes compliance or departure dates from the United States. 
Between 15,000 and 20,000 of these records are analyzed in-house each 
month. Since the creation of the CTCEU in 2003, nearly 2 million such 
records using automated and manual review techniques have been 
analyzed. On average, ICE initiates approximately 6,000 investigative 
cases annually and assigns them to our special agents in the field for 
further investigation, resulting in over 1,800 administrative arrests 
per year.
    ICE special agents and analysts monitor the latest threat reports 
and proactively address emergent issues. This practice has contributed 
to ICE's counterterrorism mission by initiating or supporting high-
priority National security initiatives based on specific intelligence. 
The practice is designed to detect and identify individuals exhibiting 
specific risk factors based on intelligence reporting, including travel 
patterns, and in-depth criminal research and analysis.
    In order to ensure that the potential violators who pose the 
greatest threats to National security are given priority, ICE uses 
intelligence-based criteria, developed in close consultation with the 
intelligence and law enforcement communities. ICE assembles the 
Compliance Enforcement Advisory Panel (CEAP), which is comprised of 
subject matter experts from other law enforcement agencies and members 
of the intelligence community, who assist the CTCEU in keeping 
targeting methods in-line with the most current threat information. The 
CEAP is convened on a tri-annual basis to discuss recent intelligence 
developments and update the CTCEU's targeting framework, in order to 
ensure that the non-immigrant overstays and status violators who pose 
the gravest threats to National security are targeted.
    A recent ICE investigation in Los Angeles, California exemplifies 
how the CTCEU operates. In March 2011, the CTCEU received an INTERPOL 
blue notice concerning a person who traveled to the United States as a 
tourist. The person had an arrest warrant in connection to child 
pornography charges in Colombia. A week later, ICE special agents 
arrested the person who was admitted as a visitor and violated their 
terms of admission by working in the adult film industry. A similar 
example occurred in July 2011, when the CTCEU received an INTERPOL red 
notice for an El Salvadorian national wanted for murder. As a result of 
CTCEU data analysis and field investigation, ICE special agents 
arrested the subject in Baltimore, Maryland.
    More recently in January 2012, ICE Special Agents from the 
Washington, DC office arrested a Saudi Arabian national who was 
admitted as an F-1 nonimmigrant student and violated the terms and 
conditions of his admission. The individual was referred for 
investigation after his status was terminated in SEVIS for failure to 
maintain student status, as well as for possessing several indicators 
of National security concerns, including threatening to blow up the 
White House and the Saudi Arabian Cultural Mission to the United 
States.
    Likewise, in May 2010, ICE's Counterterrorism and Criminal 
Exploitation Group in San Francisco, initiated an investigation into 
Tri-Valley University (TVU) in Pleasanton, California. The criminal 
investigation led to the indictment and arrest of the organization's 
owner and four workers for visa fraud violations. The owner and 
employees were issuing immigration documents containing false 
statements and forged signatures, which falsely certified that the 
school's students were attending a full course of study. ICE Special 
Agents effected five criminal arrests and over 300 student violators 
were administratively arrested, consisting mostly of Indian nationals. 
In addition, ICE Special Agents seized one vehicle, filed lis pendens 
on five properties valued at approximately $3.2 million, and seized 
numerous bank accounts totaling almost $2 million that represented 
proceeds derived related to the illicit scheme.
    Similarly, in November 2011, the CTCEU Group in Los Angeles 
arrested Karena Chuang of Wright Aviation Academy (formerly Blue 
Diamond aviation) for encouraging the illegal entry of aliens for 
private financial gain. Wright Aviation Academy/Blue Diamond Aviation 
(BDA), a non-SEVP accredited flight school, was suspected by ICE's Visa 
Security Program of fraudulently recruiting and training foreign flight 
students from Egypt. The investigation revealed that Chuang applied to 
SEVP accredited schools, often without the student's knowledge, for the 
sole purpose of obtaining valid Forms I-20 (student visas). The 
students, in turn, used the Forms I-20 to get M-1 (vocational) visas to 
enter the United States to attend BDA. This investigation successfully 
upheld the integrity of the SEVP program through ICE's layered 
enforcement approach--identifying and disrupting visa fraud overseas, 
dismantling the transnational organization, and prosecuting the 
perpetrators in the United States.
Coordination with US-VISIT and Other DHS Components
    CTCEU also works in close collaboration with US-VISIT. US-VISIT 
supports DHS's mission to protect our Nation by providing biometric 
identification services to Federal, State, and local government 
decision makers to help them accurately identify the people they 
encounter, and determine whether those people pose a risk to the United 
States. DHS's use of biometrics under the US-VISIT program is a 
powerful tool in preventing identity fraud and ensuring that DHS is 
able to rapidly identify criminals and immigration violators who apply 
for visas, try to enter the United States, or apply for immigration 
benefits.
    Biometric information sharing between the Federal Bureau of 
Investigation's Criminal Justice Information Services (FBI-CJIS) and 
US-VISIT is the foundation of Secure Communities' use of Automated 
Biometric Identification System (IDENT)/Integrated Automated 
Fingerprint Identification System (IAFIS) interoperability.
    Through Secure Communities' use of IDENT/IAFIS interoperability, 
aliens--including those who have overstayed or otherwise violated their 
immigration status--who are encountered by law enforcement may be 
identified as immigration violators when fingerprints are submitted to 
the FBI-CJIS's biometric database, IAFIS, and then to DHS/US-VISIT's 
biometric database, IDENT. Once individuals are identified, ICE 
officials determine what enforcement action is appropriate, consistent 
with ICE's enforcement priorities. Currently, Secure Communities' use 
of this technology is deployed in over 2,300 jurisdictions in 46 States 
and territories.
    US-VISIT also analyzes biographical entry and exit records stored 
in its Arrival and Departure Information System to further support 
DHS's ability to identify international travelers who have remained in 
the United States beyond their periods of admission.
    ICE receives or coordinates non-immigrant overstay and status 
violation referrals from US-VISIT Mission Support Services from three 
unique sources, which include: the typical overstay violation; a 
biometric watch list notification; and a CTCEU Visa Waiver Enforcement 
Program (VWEP) nomination. The first type, Non-immigrant Overstay 
Leads, is used by the CTCEU to generate field investigations by 
identifying foreign visitors who violate the terms of their admission 
by remaining in the United States past the date of their required 
departure.
    A second type of lead is generated from biometric data collected by 
US-VISIT. US-VISIT routinely receives fingerprint records from a 
variety of Governmental sources and adds them to a biometric watch list 
of individuals of National security concern. These new watch list 
records are checked against all fingerprints in IDENT to determine if 
DHS has previously encountered the individual. If US-VISIT identifies a 
prior encounter, such as admission to the United States, the 
information is forwarded to ICE for review and possible field 
assignment. Similarly, US-VISIT monitors records for individuals who, 
at the time of admission to the United States, were the subject of 
watch list records that did not render the individuals inadmissible to 
the United States. Therefore, if such individuals overstay their terms 
of admission, information on the subjects is forwarded to ICE for 
review and possible referral to investigative field offices for follow-
up.
    The third type of lead pertains to the CTCEU's Visa Waiver 
Enforcement Program (VWEP). The VWP currently allows eligible nationals 
of 36 countries to travel to the United States without a visa and, if 
admitted, to remain in our country for a maximum of 90 days for tourist 
or business purposes. The Visa Waiver Program (VWP) is the primary 
source of non-immigrant visitors from countries other than Canada and 
Mexico. Visa-free travel to the United States builds on our close 
bilateral relationships and fosters commercial and personal ties among 
tourist and business travelers in the United States and abroad.
    Although the overstay rate from this population is less than 1 
percent, ICE created a program dedicated to overstays arising from this 
VWP population, given the large number of individuals in this category. 
Prior to the implementation of the VWEP in 2008, there was no National 
program dedicated to addressing overstays within this population. CTCEU 
provides a refined weekly list of individuals to US-VISIT for 
additional scrutiny, who have been identified as potential overstays 
who entered the United States under the VWP. In accord with its 
intelligence-based criteria, a relevant portion of this report is then 
imported into the CTCEU's internal lead tracking system for review and 
possible field assignment. One of the goals of this program is to 
identify those subjects that attempt to circumvent the U.S. immigration 
system by obtaining travel documents from Visa Waiver Countries.
Enhanced Biographic Exit
    In May 2011, at the direction of Secretary Napolitano, DHS's CT 
Coordinator organized an effort to ensure that all overstays, 
regardless of priority, receive enhanced National security and public 
safety vetting by the National Counterterrorism Center (NCTC) and CBP. 
As part of Phase 1 of this effort, Department components reviewed a 
backlog of 1.6 million unvetted potential overstay records based on 
National security and public safety priorities.
    As of last summer, DHS had a backlog of ``unreviewed overstays,'' 
comprised of system-identified overstay leads that did not meet 
criteria set by ICE for expedited high-priority review. Before this 
summer, these records would not have been examined, except in instances 
when the workload allowed it.
    The DHS ``overstay initiative'', begun over the summer of 2011 at 
the direction of the Secretary, reformed this effort. By leveraging 
capabilities within Customs and Border Protection's Automated Targeting 
System (ATS-P), as well as DHS's relationship with NCTC, DHS was able 
to conduct richer, more thorough vetting for National security and 
public safety concerns. This generated new leads for ICE, which 
previously would not have been uncovered.
    A beneficial by-product of this effort was the identification of 
efficiencies and cost savings gained through automation. Through this 
new automated approach, we can match and integrate relevant information 
from multiple systems in order to quickly and accurately identify 
overstays.
    Today, DHS has integrated these enhancements to its process for 
reviewing system-identified overstay leads and prioritizing them for 
review and targeted enforcement. Now, ALL overstay records are reviewed 
for National security and public safety concerns, and DHS is also 
leveraging existing automated capabilities to conduct automated reviews 
of all overstays (both normal priority and high-priority). All of this 
is done on a recurrent basis.
    Overall, what I have described constitutes the first phase of DHS's 
enhanced biographic exit capability. This ``enhanced exit'' plan 
improves DHS's ability to calculate overstays and reduce their 
occurrence in the future. It uses resources from a variety of DHS 
components and will provide benefits to several of these components, as 
well the DOS, as adjudicators of visa applications. When fully 
implemented, this enhanced exit program will eliminate any future 
backlog of unreviewed overstays, and allow DHS to prioritize and take 
action on overstays, focusing on National security and public safety.
    We have identified carry-over funding, and allocated it toward 
Phase II of this effort, which includes automating connections between 
data sources, and refining ICE's ability to more effectively target and 
prioritize overstay leads of concern. We expect to see these 
enhancements come on-line this summer.
    DHS has also identified its top priorities within Phase III of the 
enhanced biographic exit plan. This includes database modernization, 
further investments in targeting and prioritization capabilities, 
increased functionality between biometric and biographic repositories, 
as well as document validation. As investments in the future phases of 
this capability come on line, DHS will have increased its ability to 
``close out'' overstay records using automated means.
    The Department will have also increased its data quality and 
expanded its data sources, both of which will increase its ability to 
``close'' records before they are referred to an investigator.
    Finally, these upgrades will have enhanced DHS's ability to draw on 
capabilities across the Department for further manual review and 
targeting for enforcement action.
    DHS also remains committed to introducing a biometric component to 
the exit process. The enhanced exit plan also incorporates biometric 
elements, allowing DHS personnel to more efficiently connect biometric 
identifiers (fingerprints and photographs) with biographic information 
residing within intelligence community and law enforcement databases. 
DHS has directed the Science and Technology Directorate to establish 
criteria and promote research for emerging technologies that would 
provide the ability to capture biometrics at a significantly lower 
operational cost.
    In the mean time, the Department is taking action to secure our 
borders today, by making strategic security investment decisions that 
prioritize those capabilities needed for the implementation of a future 
biometric exit system while providing security value now.
    This entire process has illustrated something fundamental, which is 
that dealing with the overstay population is a challenge that confronts 
all of DHS, not just any one component. US-VISIT tracks the overstay 
population through ADIS. CBP, as the custodian of our borders, taps 
into information about traveler movements, and is increasingly at the 
center of DHS's vetting and targeting activities. ICE bears the burden 
of taking enforcement action.
    Left up to any one component, DHS action would be incomplete, but 
by harmonizing efforts across the Department and by taking advantage of 
unique skills and capabilities, we are able to put together a plan that 
enhances the integrity of our immigration system.
ICE's Presence Overseas and Coordination with DOS
    Stopping a threat before it reaches our shores is an important 
priority that ICE supports internationally. Through our Office of 
International Affairs, we have personnel in 70 offices in 47 countries. 
ICE personnel in these offices collaborate with our foreign 
counterparts and Federal partner agencies in joint efforts to disrupt 
and dismantle transnational criminal organizations engaged in money 
laundering, non-drug contraband smuggling, weapons proliferation, 
forced child labor, human rights violations, intellectual property 
rights violations, child exploitation, human smuggling and trafficking, 
and many other violations. Additionally, ICE facilitates the 
repatriation of individuals with final orders of removal, returning 
violators to their home countries.
    Effective border security requires broad information sharing and 
cooperation among U.S. agencies. On January 11, 2011, ICE signed a 
memorandum of understanding (MOU) outlining roles, responsibilities, 
and collaboration between ICE and the DOS Bureaus of Consular Affairs 
and Diplomatic Security. The MOU governs the day-to-day operations of 
ICE agents conducting visa security operations at U.S. embassies and 
consulates abroad. To facilitate information sharing and reduce 
duplication of efforts, ICE and DOS conduct collaborative training and 
orientation prior to overseas deployments. Once they are deployed to 
overseas posts, ICE and DOS personnel work closely together in working 
groups, meetings, training, and briefings, and engage in regular and 
timely information sharing. The VSP's presence at U.S. embassies and 
consulates brings an important law enforcement element to the visa 
review process. Additionally, this relationship serves as an avenue for 
VSP personnel to assist Consular Officers and other U.S. Government 
personnel in recognizing potential security threats in the visa 
process.
    We are engaged with our counterparts at DOS in determining a common 
strategic approach to the broader question of how best to collectively 
secure the visa issuance process. We look forward to continuing to 
report back to you with updates on this process.
                               conclusion
    DHS has made significant progress in preventing terrorists from 
exploiting the visa process. We will continue to work closely with our 
international, Federal, State, local, and Tribal partners to combat 
visa fraud and protect the integrity of our visa security system.
    Thank you again for the opportunity to testify today and for your 
continued support of DHS and its law enforcement mission.
    We would be pleased to answer any questions at this time.

    Mrs. Miller. Thank you very much.
    The Chairwoman now recognizes Mr. Edge for his testimony.

STATEMENT OF PETER T. EDGE, DEPUTY ASSOCIATE DIRECTOR, HOMELAND 
 SECURITY INVESTIGATIONS, IMMIGRATION AND CUSTOMS ENFORCEMENT, 
              U.S. DEPARTMENT OF HOMELAND SECURITY

    Mr. Edge. Good morning, Chairman Miller, Ranking Member 
Cuellar, and other distinguished Members of the subcommittee. 
Thank you for inviting me to appear before you today along with 
my counterparts, Mr. Cohen and Mr. Donahue, to discuss our 
collective efforts to prevent the exploitation of our visa 
system by terrorists and criminals.
    I would also ask that my complete testimony be accepted 
into the record.
    Mrs. Miller. Without objection.
    Mr. Edge. Visa overstays and other forms of immigration 
status violations bring together critical areas of my agency's 
mission, National security, and immigration enforcement. We 
recognize that those who pose National security threats may 
seek to commit immigration benefit fraud to enter or remain in 
the United States. For that reason, we work hard to detect and 
deter immigration fraud and to continually enhance our anti-
fraud efforts.
    ICE exercises criminal authority in the detection and 
deterrence of immigration fraud while our partner agency, 
USCIS, exercises administrative authority. This strategy 
essentially allows us to concentrate our efforts on major fraud 
conspiracies and other cases of National security or public 
safety interest, which allows USCIS to address the majority of 
immigration benefit fraud cases administratively.
    As you know, DHS is charged with assisting in the 
identification of visa applicants who seek to enter the United 
States for illegitimate purposes, including criminal offenses 
and terrorism-related activities. The visa adjudication process 
often presents the first opportunity to assess whether a 
potential nonimmigrant visitor or immigrant poses a threat to 
our Nation.
    ICE's Visa Security Program is one of--program focused on 
minimizing these global risks. Through the Visa Security 
Program ICE employs trained special agents overseas to high-
risk visa activity posts to identify potential terrorists and 
criminal threats before they reach the United States. These 
agents conduct targeted, in-depth interviews of individual visa 
applications and applicants prior to issuance and recommend 
refusal or revocation of applications, when warranted, to 
consular officers.
    ICE now conducts Visa Security investigations at 19 high-
risk visa adjudication posts in 15 countries. In fiscal year 
2012 to date, the Visa Security Program has screened over 
452,000 visa applicants and, in collaboration with our State 
Department colleagues, determined that over 121,000 required 
further review. After reviewing these applications ICE 
identified derogatory information on more than 4,700 
applicants.
    Another program at ICE dedicated to enforcing non-immigrant 
visa violations is the Counterterrorism and Criminal 
Exploitation Unit, or CTCEU. Through the CTCEU, ICE proactively 
develops cases for investigation in cooperation with the 
Student and Exchange Visitor Program and the US-VISIT Program. 
Both programs enable ICE to access information about the 
millions of students, tourists, and temporary workers present 
in this country at any given time and to identify those who 
have overstayed or otherwise violated the terms and conditions 
of their admission.
    Each year the CTCEU analyzes records of hundreds of 
thousands of potential status violators after preliminary 
analysis of data from the Student and Exchange Visitor 
Information System, also known as SEVIS, as well as from US-
VISIT. After this analysis, the CTCEU determines potential 
violations that warranted field investigations and/or 
establishes compliance or departure dates from the United 
States.
    Since the unit's creation in 2003, nearly 2 million such 
records using automated and manual review techniques have been 
analyzed. On average, ICE initiated approximately 6,000 
investigative cases annually and assigns them to our special 
agents in the field for further investigation. This has 
resulted in over 1,800 administrative arrests per year.
    In January 2012, for example, ICE special agents from our 
Washington, DC office arrested a Saudi Arabian national who was 
admitted as an F-1 nonimmigrant student and violated the term 
and condition of his admission. The individual was referred for 
investigation after his status was terminated in SEVIS for 
failure to maintain student status as well as for possessing 
indicators of National security concerns, including threatening 
to blow up the White House and the Saudi Arabian Cultural 
Mission to the United States.
    ICE has made significant progress in preventing terrorists 
from exploiting the visa process. We will continue to work 
closely with our law enforcement partners to combat visa fraud 
and protect the integrity of our visa security system.
    Thank you again for the opportunity to testify today, and I 
would be pleased to answer any questions that you may have.
    Mrs. Miller. Thank the gentleman.
    The Chairwoman now recognizes Mr. Donahue for his 
testimony.

 STATEMENT OF DAVID T. DONAHUE, DEPUTY ASSISTANT SECRETARY OF 
      STATE FOR CONSULAR AFFAIRS, U.S. DEPARTMENT OF STATE

    Mr. Donahue. Good morning, Madam Chairwoman, Ranking Member 
Cuellar, and distinguished Members of the subcommittee. I have 
been involved as a--with visas for the majority of my 29-year 
career with the State Department and I appreciate this chance 
to testify here today, and I have submitted written comments 
for the record.
    The Department of State is dedicated to the protection of 
our borders through a layered approach to border security. This 
approach enables us and our partners in DHS to track and review 
the visa eligibility and status of foreign visitors from their 
visa applications throughout their travel to, sojourn in, and 
departure from the United States.
    We are constantly refining and updating the technology that 
supports the adjudication and production of U.S. visas. The 
Department has developed and implemented an intensive visa 
application and screening process requiring personal interviews 
in most cases, employing analytic interview techniques, and 
incorporating multiple biographic and biometric checks. This is 
all supported by a sophisticated global information technology 
network that shares data among the Department and Federal law 
enforcement and intelligence agencies.
    Security remains our primary mission. Every visa decision 
is a National security decision.
    Our new on-line visa application forms provide consular 
officers and fraud prevention officers, and soon our 
intelligence and law enforcement partners, the opportunity to 
analyze data in advance of the visa interview, including the 
detection of potential non-biographical links to derogatory 
information. We have ambitious plans to screen more of this 
data with our partners in the law enforcement and intelligence 
communities to make the visa system even more secure.
    In addition to biographic checks the Department performs 
checks on two biometric identifiers. Most visa applicants' 
fingerprints are screened against DHS and FBI databases. We 
also use facial recognition technology to screen visa 
applicants against a watch list of photos obtained from the 
Terrorist Screening Center as well as visa applicant photos 
contained in the Consular Consolidated Database.
    Our vast database of visa information is fully available to 
other agencies. It is specifically designed to facilitate fast, 
accurate, and comprehensive sharing to meet the needs of a 24/7 
global screening environment. In return, we have unprecedented 
levels of cooperation with law enforcement and intelligence 
agencies and benefit from their capabilities and resources in 
ways that were not possible at the time of 9/11.
    Let me turn to our coordination with DHS to address the 
overstay issue. Consular officers at posts abroad use arrival 
and departure data from--for non-U.S. citizen travelers 
contained in the DHS Arrival and Departure Information System, 
ADIS, to help determine whether an applicant who visited the 
United States previously departed by the end of his or her 
authorized period of stay and whether the applicant qualifies 
for a visa. The consular officer also use their knowledge of 
the local language, culture, and conditions as part of their 
evaluation of an applicant's eligibility for a U.S. visa.
    ADIS overstay information is also included in the 
revocation recommendations the Department receives daily from 
CBP's National Targeting Center and our consular sections 
abroad. Whether the overstay information exists in isolation or 
as one of multiple factors, the Department considers the 
information as part of our visa revocation process. If a 
subject whose visa has been revoked is in the United States our 
colleagues from DHS are responsible for removal. As Mr. Cuellar 
mentioned, we are working very closely with the--with ICE and 
Director Morton to do everything we can to help with those 
removal processes.
    Consular officers have detailed instructions on visa 
revocation procedures and reinforce standing guidance on their 
discretionary authority to deny visas under 214-B of the 
Immigration and Nationality Act with specific reference to 
cases that raise security and other serious concerns. We have 
created a dedicated revocations unit in Washington that focuses 
exclusively on ensuring that any derogatory information on a 
U.S. visa holder is rapidly evaluated and acted on.
    Distinguished Members of the committee, our current layered 
approach to security screening, in which each agency applies 
its particular strengths and expertise, best serves our border 
security agenda while furthering traditional U.S. interests in 
legitimate travel, trade promotion, and the exchange of ideas. 
The United States must meet both goals to guarantee our long-
term security.
    Thank you, and I am ready to answer your questions.
    [The statement of Mr. Donahue follows:]
                 Prepared Statement of David T. Donahue
                             March 6, 2012
    Good afternoon Madam Chairwoman Miller, Ranking Member Cuellar, and 
distinguished Members of the subcommittee. I thank you for this 
opportunity to update you on the steps we have taken to increase the 
security of the visa process.
    The Department of State (the Department) is dedicated to the 
protection of our borders, and has no higher priority than the safety 
of our fellow citizens. We are the first line of defense in border 
security because the Department is often the first Government agency to 
have contact with foreign nationals wishing to visit the United States. 
We are committed, along with our partner agencies, to a layered 
approach to border security that will enable the U.S. Government to 
track and review the visa eligibility and status of foreign visitors 
from their visa applications throughout their travel to, sojourn in, 
and departure from, the United States. We are equally committed to 
facilitating legitimate travel, and providing efficient and courteous 
visa adjudication. The Bureau of Consular Affairs is successfully 
meeting the challenge of increasing world-wide demand for U.S. visas 
without compromising the security of our Nation's borders.
    At 222 visa-adjudicating embassies and consulates around the world, 
a highly-trained corps of consular officers and support staff processes 
millions of visa applications each year, facilitating legitimate travel 
while protecting our borders. Consular officers adjudicated 8.8 million 
applications and issued more than 7.5 million visas in fiscal year 
2011, up 16 percent from the 6.4 million visas issued in fiscal year 
2010. We have experienced tremendous increases in demand for visas in 
some of the world's fastest-growing economies. We are issuing as many 
visas as we did in 2000, even though nine more countries have joined 
the Visa Waiver Program since then.
     data sharing leads to a more secure visa adjudication process
    The Department has developed and implemented an intensive visa 
application and screening process, requiring personal interviews in 
most cases; employing analytic interview techniques; and incorporating 
multiple biographic and biometric checks, all supported by a 
sophisticated global information technology network that shares data 
among the Department and Federal law enforcement and intelligence 
agencies. Security remains our primary mission--every visa decision is 
a National security decision.
    We constantly refine and update the technology that supports the 
adjudication and production of U.S. visas. The world-wide rollout of 
our on-line non-immigrant visa application form is complete, and we are 
currently piloting the on-line immigrant visa application form. These 
new on-line forms provide consular officers, as well as intelligence 
and law enforcement agencies, the opportunity to analyze data before 
applicants appear for their interviews. While the forms offer foreign 
language support, applicants are required to answer in English, to 
facilitate data searches and information sharing between the Department 
and other Government agencies. The new application forms are ``smart,'' 
meaning that certain answers to questions will trigger subsequent 
questions. The system will not accept applications if the security-
related questions have not been answered completely, and inappropriate 
or unacceptable answers are flagged to ensure that consular officers 
address them in the interview.
    The Immigration and Nationality Act (INA) requires our consular 
officers to interview first-time visa applicants aged 14 through 79 in 
person. We may waive the interview requirement for diplomatic and 
official staff of foreign governments, as well as for certain other 
applicants in very limited circumstances. In addition, we employ 
strong, sophisticated name-searching algorithms to ensure matches 
between names of visa applicants and any derogatory information 
contained in the 42.5 million records found in the Consular Lookout and 
Support System (CLASS), our on-line database of visa lookout records.
    CLASS has grown more than 400 percent since 2001. Almost 70 percent 
of CLASS records come from other agencies, including DHS, the FBI, and 
the DEA. CLASS also includes unclassified records regarding known or 
suspected terrorists (KSTs) from the Terrorist Screening Database 
(TSDB), which is maintained by the FBI's Terrorist Screening Center 
(TSC) and contains data on KSTs nominated by all U.S. Government 
sources.
    We also screen visa applicants' names against the historical visa 
records in our Consular Consolidated Database (CCD). A system-specific 
version of the automated CLASS search algorithm runs the names of all 
visa applicants against the CCD to check for any prior visa 
applications, refusals, or issuances. DHS and other Federal agencies 
have broad access to the CCD, which contains more than 151 million 
immigrant and non-immigrant visa records covering the last 13 years. We 
make our visa information available to other U.S. Government agencies 
for law enforcement and counterterrorism purposes, we specifically 
designed our systems to facilitate comprehensive data sharing with 
these entities, and they use this access extensively. For example, in 
January 2012, more than 20,000 officers from DHS, the FBI, and the 
Departments of Defense, Justice, and Commerce submitted more than 2 
million visa record queries in the course of conducting law enforcement 
and/or counterterrorism investigations.
    In addition to biographic checks, the Department also performs 
checks on two biometric identifiers. Visa applicants' fingerprints are 
screened against DHS and FBI systems, which between them contain the 
available fingerprint records of terrorists, wanted persons, 
immigration law violators, and criminals. In 2011, consular posts 
transmitted more than 8.6 million fingerprint submissions to these 
systems, and received from them more than 221,000 derogatory and 
criminal history records. We transmit the fingerprints taken during the 
visa interview process to U.S. Customs and Border Protection (CBP) 
officers at ports of entry, to enable them to match the fingerprints of 
persons entering the United States and confirm their identity.
    We use facial recognition technology to screen visa applicants 
against a watch list of photos of known and suspected terrorists 
obtained from the TSC, as well as the entire gallery of visa applicant 
photos contained in our CCD. Facial recognition screening has proven to 
be another effective way to combat identity fraud.
    Data sharing requires intense, on-going cooperation from other 
agencies. We have successfully forged and continue to foster 
partnerships that recognize the need to supply accurate and speedy 
screening in a 24/7 global environment. As we implement process and 
policy changes, we are always striving to add value in both border 
security and operational results. Both dimensions are important in 
supporting the visa process.
                          overstay information
    In April 2008, consular officers at posts abroad obtained access to 
arrival and departure data for non-U.S. citizen travelers contained in 
the DHS Arrival Departure Information System (ADIS). We began running 
automated ADIS checks for every visa applicant in June 2011. Officers 
in the field use ADIS data to help determine whether an applicant who 
visited the United States previously departed by the end of his or her 
authorized period of stay. If ADIS indicates a traveler departed after 
this period, or there is no departure shown at all, the officer works 
to confirm whether the individual overstayed his or her previous period 
of admission. Since land border departures are not usually recorded in 
ADIS, and airlines have not always provided departure manifests, ADIS 
information alone does not confirm or refute an overstay.
    If a consular officer confirms a prior overstay of any duration, 
the applicant may be unable to overcome the presumption of immigrant 
intent. Overstays of 181 to 364 days may make an applicant ineligible 
to reenter the United States for 3 years. Overstays of 365 days or more 
may make an applicant ineligible to reenter the United States for 10 
years.
        security advisory opinions and the visa security program
    In coordination with Federal law enforcement and intelligence 
agencies, the Department has instituted particular measures to process 
higher-risk visa applications. Our Security Advisory Opinion (SAO) 
mechanism provides consular officers input from Washington on security-
related issues relating to pending visa applications. Department 
guidance explains when a consular officer must request an SAO. Most are 
triggered by a CLASS watch list hit; others are required as a matter of 
policy or submitted by the consular officer per his or her discretion. 
Consular officers receive extensive training on the SAO process, which 
requires them to suspend visa processing pending interagency review of 
the case and additional guidance. SAO requests are routed 
electronically to relevant Federal intelligence and law enforcement 
agencies. Consular officers submitted more than 366,000 SAO requests in 
fiscal year 2011.
    The Visa Security Program (VSP), under which DHS deploys U.S. 
Immigration and Customs Enforcement (ICE) special agents to conduct 
visa security screening and investigations at certain overseas consular 
posts, is a valuable component of the U.S. Government's overall policy 
of protecting our borders. We have a close and productive partnership 
with DHS, which has authority for visa policy under section 428 of the 
Homeland Security Act, and are fully supportive of the mission and 
future of the VSP. ICE/VSP is present at 19 visa-issuing posts in 15 
countries.
                            visa revocation
    DHS is responsible for removing subjects of visa revocations who 
are present in the United States, whether or not they have overstayed 
the period of legal presence. The Department has broad and flexible 
authority to revoke visas and we use that authority widely to protect 
our borders. Since 2001, the Department has revoked approximately 
60,000 visas for a variety of reasons, including nearly 5,000 for 
suspected links to terrorism. Cases for revocation consideration are 
forwarded to the Department by our consular offices overseas, NTC, and 
other entities. As soon as information is established to support a 
revocation (i.e., information that could lead to an inadmissibility 
determination), a ``VRVK'' entry code showing the visa revocation is 
added to CLASS, as well as to biometric identity systems, and then 
shared in near-real time (within about 15 minutes) with the DHS lookout 
systems used for border screening. As part of its enhanced ``Pre-
Departure'' initiative, CBP uses these VRVK records, among other 
lookout codes, to recommend that airlines should not board certain 
passengers on flights bound for the United States. Almost every day, we 
receive requests to review and, if warranted, revoke any outstanding 
visas for aliens for whom new derogatory information has been 
discovered since the visa was issued. Our Operations Center is staffed 
24 hours a day, 7 days a week, to address urgent requests, such as when 
a potentially dangerous person is about to board a plane. In those 
circumstances, the State Department can and does use its authority to 
revoke the visa, and thus prevent boarding. ADIS overstay information 
is also included in the visa revocation recommendations the Department 
receives daily from the NTC and our consular sections abroad. Whether 
the overstay information exists in isolation or as one among multiple 
factors, the Department considers the information as part of our visa 
revocation process.
    Most revocations are based on new information that has come to 
light after visa issuance. Because individuals' circumstances change 
over time, and people who once posed no threat to the United States can 
become threats, revocation is an important tool. We use our authority 
to revoke a visa immediately in circumstances where we believe there is 
an immediate threat. At the same time, we believe it is important not 
to act unilaterally, but to coordinate expeditiously with our National 
security partners in order to avoid possibly disrupting important 
investigations.
                               conclusion
    We believe that U.S. interests in legitimate travel, trade 
promotion, and educational exchange are not in conflict with our border 
security agenda and, in fact, further that agenda in the long term. Our 
long-term interests are served by continuing the flow of commerce and 
ideas that are the foundations of prosperity and security. Acquainting 
people with American culture and perspectives remains the surest way to 
reduce misperceptions about the United States. Fostering academic and 
professional exchanges keeps our universities and research institutions 
at the forefront of scientific and technological change. We believe the 
United States must meet both goals to guarantee our long-term security.
    Our global presence, foreign policy mission, and personnel 
structure give us singular advantages in executing the visa function 
throughout the world. Our authorities and responsibilities enable us to 
provide a global perspective to the visa process and its impact on U.S. 
National interests. The issuance and refusal of visas has a direct 
impact on our foreign relations. Visa policy quickly can become a 
significant bilateral problem that harms broader U.S. interests if 
handled without consideration for foreign policy equities. The conduct 
of U.S. visa policy has a direct and significant impact on the 
treatment of U.S. citizens abroad. The Department of State is in a 
position to anticipate and weigh all those factors, while ensuring 
border security as our first priority.
    The Department has developed and implemented an intensive visa 
application and screening process supported by a sophisticated global 
information technology network. We have visa offices in virtually every 
country of the world, staffed by consular officers drawn from the 
Department's professional, mobile, and multilingual cadre of Foreign 
Service Officers. These officials are dedicated to a career of 
worldwide service, and provide the cultural awareness, knowledge, and 
objectivity to ensure that the visa function remains the front line of 
border security. Each officer's experience and individual skill set are 
enhanced by an overall understanding of the political, legal, economic, 
and cultural development of foreign countries in a way that gives the 
Department of State a special expertise over matters directly relevant 
to the full range of visa ineligibilities.
    This concludes my testimony today. I will be pleased to take your 
questions.

    Mrs. Miller. Thank the gentleman.
    I thank all of the witnesses for your testimony today.
    I guess I would start with Mr. Edge. As we were talking 
about Khalifi, this individual that apparently had some run-ins 
with law enforcement, I think in 2005--we were looking through 
some of the various information before we had our hearing 
here--and as we mentioned during the testimony, what a great 
program Secure Communities is. Do you think if Secure 
Communities was in place that it would have flagged this 
individual, you know, if he was to be picked up by just--in a 
regular line of law enforcement during the course of everyday 
duties? Do you think that the Secure Communities would have 
picked this individual up, and are you finding that Secure 
Communities is really having a fantastic impact now on your 
ability to do so?
    Mr. Edge. Well, I think when----
    Mrs. Miller. Just press the button there.
    Mr. Edge. Yes. When Mr. Khalifi was arrested in the early 
part of 2000 we did not have a mechanism in place to be able to 
communicate once somebody's fingerprints were rolled when 
someone was arrested, but we are working towards that these 
days with US-VISIT and our ability to run fingerprints and get 
information from those who are arrested at the State and local 
level. This isn't something that would have risen to the 
Federal level at the time of his first arrest. I believe they 
were even misdemeanor charges in a State system in Virginia.
    So I think that as we move forward the level of 
communication between our State and local counterparts, whether 
it is through Secure Communities or just by the various 
programs we have and our databases that are connected, we will 
be able to at least identify those people who are connected 
into the immigration system.
    Mrs. Miller. No. That is really something that, again, 
referencing the 9/11 Commission, one of their recommendations--
excuse me--that we keep in mind all the time is when they talk 
about how--we need to move from the need to know to the need to 
share information with the various agencies, and at every level 
of government, whether it is the Federal level, the State 
level, the county level, the local level, et cetera, with all 
of these kinds of things.
    But one of the things that we are focusing on, obviously, 
in this subcommittee hearing is how we try to bring more 
attention to the fact that, as I mentioned, over 40 percent of 
all of the illegals that are in the country are here on visa 
overstays, and as we have talked about, didn't come across the 
desert and the southern edge of our border, which is where 
everybody seems to think that all of the illegals came from.
    So you have all of these visa overstays and it really is 
for the Congress, I think, to try to prioritize our funding and 
focus the funding that we have, understanding the constrictions 
that we have with the financial crisis that is facing our 
Nation, but we are looking through your budget, for instance, 
with ICE, and I am not sure if this is true--maybe you can tell 
me what percentage of your--of the budget that ICE has that you 
are focusing on visa, for instance. You probably don't have 
those exact numbers, but we were sort of trying to figure it 
out and it looks like it is a small percentage--maybe 3 to 5 
percent of the budget that is even focused on visa overstays.
    So I guess I would ask you to try to answer that the best 
if you could, or how do you identify overstays that have been 
in the country for over 13 years, like this particular 
individual? Do you consider the country of origin? What is your 
matrix, actually, for looking at these things?
    Mr. Edge. Well, Madam Chairwoman, that is a complicated 
question in that our investigative responsibilities are very 
vast. We have a lot of disciplines that we are empowered to 
investigate, from human trafficking, document and benefit 
fraud, narcotics smuggling, a wide variety of different 
investigative areas that we are responsible for. Through 
conducting those investigations we do and we are able to 
identify visa overstays.
    If it is someone who is not in contact with our 
investigative process and homeland security investigations it 
is certainly possible that we would not come in contact with 
them if they had been in the country for a very long time. But 
certainly, given the communication that we have and the various 
databases that we are working with today, and through our CTCEU 
process, as Ranking Member Cuellar mentioned earlier, we are 
certainly in a better position to identify these overstays in 
the normal course of business.
    Mrs. Miller. Mr. Cohen, I took some notes when you were 
talking there. You were saying that your new system that you 
have that you now have the ability to track by countries, and 
as you are vetting sort of the backlog that you testified to 
the committee--subcommittee for previously back in September, 
how many overstays do you think you have from special interest 
countries, or how are you doing with identifying from 
particular countries?
    As you also mentioned, the Secretary, when she was 
testifying here earlier, said that the system that they--that 
you are operating under right now is a good bridge to what 
ultimately all of our mutual goal is, to have a really robust 
biometric system. So I guess I am just, again, trying to get a 
feel for what your matrix is for what you are looking at with 
the various special countries. As my colleague was mentioning, 
all of the various countries and the days it is rather 
startling to look at some of those kind of things, and 
obviously that is an indicator that we all need to be looking 
at.
    Mr. Cohen. Thank you, Madam Chairwoman.
    So it is a work in progress still, so we are continuing to 
implement these improvements that I referenced in my opening 
statement. I will get back to the subcommittee with regard to 
specific numbers on the special interest countries, but your 
previous question to Mr. Edge and your question to me raises 
sort of the key issue here, which is up until this effort there 
was no systematic effort by the Department to integrate all of 
these various repositories of information, in which information 
vital to determining whether someone had actually departed the 
country, had changed their status, was in custody for another 
crime, or was actually an overstay, and they weren't linked 
together so it made it very difficult.
    So in the case of Mr. Khalifi, the information--and others 
that went into overstay status in the late 1990s and early 
2000, prior to the development of US-VISIT--the information 
repository which reflected that they were potentially overstay 
was TECS--Treasury Enforcement Communication System. TECS 
system was a system that part of the data it collected were 
border crossings, so we could tell when somebody came into the 
country and we could also tell if they left the country; that 
was in TECS. However, most local police departments during that 
time didn't have access to TECS, and unless they had some 
reason to believe that an individual detained for some other 
offense was, in fact, an immigration violator, it would be rare 
that they would call INS and ask them to do a--what we would 
call a TECS check.
    Through the system enhancements that I described earlier we 
are automating that process, so today if someone is arrested 
for any type of offense part of the query that will take place 
through both the Secure Communities program and through the 
enhancements that I have been describing will be an automatic 
check of immigration systems, will be a check of TECS, as well. 
So the chances are greatly enhanced that today if somebody were 
to be booked in for a minor drug offense--or a serious traffic 
violation, even, the person's immigration status would come to 
our attention.
    Mrs. Miller. Thank you.
    Chairwoman recognizes the Ranking Member.
    Mr. Cuellar. Thank you, Madam Chairwoman.
    Without going over the numbers over those countries that 
are a little bit less cooperative in working with us, you know, 
you have--I believe the last time your managing director of 
visa services was back here with us, and I think it was in 
November 2011, he said that there are some countries like 
Brazil and China that there is increase--there is an increase 
in demand for visas--travel visas.
    Let's talk about China, since it is one of those countries 
that has not been very--what incentives--or does it make sense 
that if a country is not taking back those folks that they are 
supposed to be taking back and they are delaying, why are we 
going to be increasing their visas? I understand travel, and 
business, and--I understand all that. But just specifically in 
this issue, why are we increasing the number of visas but at 
the same time, at the back end, for the folks that they are 
supposed to be taking back, they are still delaying them by 
large numbers itself.
    I guess--and I can understand--I can already guess what you 
are going to say and I understand all that, but what 
suggestions do you have? Because I am specifically looking at--
to be quite honest, we brought this up--I mean, there have been 
some steps--we are looking at putting some appropriation 
language, and hopefully that will direct you all to those 
particular countries.
    Do you have any suggestions as to what we can look at to 
specifically help you do that? I know the State Department 
might be in a difficult position to work with those countries, 
but what can we do? What sort of language would be appropriate, 
understanding it is going up but understand at the back end 
those countries--why have we provided that incentive to them?
    Mr. Donahue. Well, first of all, let me say that we agree 
with you entirely that the wait times for these documents are 
unacceptable and we have been working very closely with 
Director Morton, at ICE. Our assistant secretary--they have 
formed a group; they go out and meet with the ambassadors. 
Also, in our capitals overseas we are meeting with these senior 
officials there. Our ambassador in China, and we have a new 
ambassador going out to India, hopefully, if confirmed. These 
are all opportunities to make it clear to those governments how 
important this is to our bilateral relationship and to their 
obligations to do this.
    We do have authority, as you know, under the INA, to 
address this, also, and we feel like that is the last step we 
want to exhaust, as we have discussed in your office, all the 
diplomatic ways to get countries to cooperate with us on this. 
On the countries that are sending large numbers of travelers to 
the United States we--it is a delicate balance. I don't have 
any answer.
    These are real jobs that they are creating in the United 
States when they come here. They stay in the hotels. Chinese, 
they say, spend $6,000 a day in the United States while they 
are here. They buy our goods and services. So it is very 
difficult to do things--and for China it is very hard to put 
any more--make it more difficult because they only receive 1-
year visas. Their country doesn't care whether their citizens 
come here; it is more that we care that they come here and 
visit our great places, attend our universities paying full 
tuition, they buy our goods and services, our tractors, all 
those things. So they have very little incentive to change 
their ways and we have all good reasons for our economy to 
attract them here.
    Mr. Cuellar. Yes. I understand, and I--you know, I 
appreciate the visits that we had and I understand all of that. 
But there has got to be something we can do. I mean, we just 
can't--and I--again, I appreciate--I am complimenting all three 
of you all and your--the men and women that work for all of you 
all. You are all doing a good job. I am not criticizing you.
    Is there anything we can try to help you? Really, the only 
way I am looking at this, because I don't know about 
reauthorization or any bill that is moving, but the 
appropriation bill, one way or the other, is going to pass.
    Mr. Donahue. Right.
    Mr. Cuellar. So we can talk about it later, but I am asking 
all three of you all if you all want to talk later, or, you 
know, with the Chairwoman or myself. We have got to put some 
language there, but I don't want to put some language that will 
be counterproductive. But I just--you know, I just don't see 
why we keep feeding what they have biting on the other hand on 
that.
    But I understand international education; I understand and 
I appreciate all that. I know it is very, very difficult, but 
there has got to be something. You know, China might be a 
special situation. What about Bangladesh? What about the other 
countries? I mean, not everybody is on the same level as China.
    But anyway, I would look forward to working with you on 
some language, and again, I am not being critical. I really 
appreciate the prioritization work that both the State 
Department and Homeland is doing. But I am asking you to give 
me some suggestions.
    Mr. Donahue. All right. We will see what we can suggest to 
you and we will continue working on this. This is a top 
priority for Assistant Secretary Jacobs.
    Mr. Cuellar. Okay.
    Thank you to all three of you. I appreciate the work that 
you all are doing.
    Thank you, Madam Chairwoman.
    Mrs. Miller. Thank the gentleman.
    The Chairwoman now recognizes the gentleman from South 
Carolina, Mr. Duncan.
    Mr. Duncan. Thank you, Madam Chairwoman.
    Appreciate the work you guys are doing and I thank the 
Chairwoman for having this very valuable hearing today.
    Mr. Edge, what does ICE stand for?
    Mr. Edge. Immigration and Customs Enforcement.
    Mr. Duncan. Okay. I am going to leave customs out of this 
because we are talking about immigration. Immigration 
enforcement. Immigration enforcement.
    At what point is someone unlawfully present in the United 
States?
    Mr. Edge. When they enter the country illegally, sir.
    Mr. Duncan. So if they overstayed their visa that is not 
unlawful?
    Mr. Edge. That is unlawful.
    Mr. Duncan. Okay. So if you cross the Southern Border 
without coming through a natural port of entry you illegally 
enter into the country, you are unlawfully in the country. If 
you overstay your visa you are unlawfully in the country, based 
on what you just said.
    So Chairwoman asked a question or maybe made a statement--
how many visa overstays do we have present in the country at 
any given time?
    Mr. Edge. I don't have an exact number on how many are 
presently in the country at this time.
    Mr. Duncan. Is there a percentage of the illegal aliens, 
would you say--50 percent, 30 percent, 10 percent?
    Mr. Edge. I will be able to give you a number of--between 
2009 and 2011 37,000 both criminal and non-criminal aliens have 
been removed and those were overstays.
    Mr. Duncan. How many have been removed. Okay.
    It would seem to me that if you were going to think about 
committing a terrorist act in this country that--and you were a 
foreign national you would apply for a visa, and if you kept 
your nose clean and you didn't have a criminal record in the 
country, you weren't a person of interest that would pop up on 
some sort of prescreening that you would be able to get a visa 
to come to this country and then you could just overstay it and 
work on the terrorist act, like we saw recently with the D.C. 
bomber.
    So I want to commend the State Department, Mr. Donahue, for 
your process of prescreening applicants for visas. That is 
really where your testimony stayed.
    But in 1996 Congress said, ``You know, we are going to 
create a biometric screening for exit and entry into this 
country so we will know when folks enter and we will know when 
they leave.'' I have traveled around the world in a lot of 
different countries where you have to give biometric data--
fingerprints, whether it is just one finger or a complete hand.
    So 1996, that has been about 16 years that we have had this 
focus. The 9/11 Commission Report revisited that.
    So you all do a good job prescreening applicants for visas 
if that person is a person of interest or may have a background 
in that country that raises suspicions, or whatever, they would 
be denied a visa. But if they haven't had that background they 
would probably be given a visa.
    So the problem, I think, is us having a reliable system in 
place for knowing when foreign nationals exit this country that 
have come on visas. So, after 16 years and this instance from 
Congress, I ask the State Department, when are we going to 
complete this process of an entry and exit biometric screening?
    Mr. Donahue. The----
    Mr. Duncan. Which I think begins with the State Department.
    Mr. Donahue. It begins with the State Department and we 
collect biometrics on almost all applicants who are coming to 
the United States. Those are immediately transmitted to the 
Department of Homeland Security and are used for each and every 
person who enters the United States--not each and every, but 
almost all people who enter the United States then submit, as 
you have seen and as you have done overseas, people coming into 
the United States, including those legal residents, including 
other travelers--visitors.
    Mr. Duncan. How is that information used? You are gathering 
that information from them as they come to the United States--
--
    Mr. Donahue. That is right.
    Mr. Duncan [continuing]. But we are not gathering that 
information as they exit.
    Mr. Donahue. That is correct. I would defer to Department 
of Homeland Security on that because that is a Department of 
Homeland Security program--departure.
    Mr. Duncan. I will refer to them.
    Mr. Cohen.
    Mr. Cohen. Mr. Duncan, thank you. As you pointed out, there 
are three elements of an effective entry-exit system: It is the 
collection of information and biometrics upon application and 
entry, it is the feeding those biometrics into a information 
lair that connects not only that data with other immigration 
data but that data with other law enforcement data and 
intelligence data, and then there is the collection of 
information upon departure.
    The Department is finalizing its plan for a comprehensive 
biometric exit system. We expect to have it to Congress 
shortly. As required by our recent appropriations bill, it will 
lay out not only the details of how we will link those three 
levels of activity together but how we will also achieve 
immediate benefit to your other point, which is making sure 
that we are better able to identify those visa overstays who 
are actually visa overstays and still in this country who 
aren't National security or public safety threats.
    Mr. Duncan. Okay. You determine that someone has overstayed 
their visa; they haven't left on the date they were supposed 
to. A little period of time goes through, you check your 
records.
    At what point in time do you all start implementing the 
process of finding the address where they said they were going 
to be, researching where that person may be, and trying to 
enforce removing them from the country? At what time does that 
kick in?
    Mr. Cohen. I believe it is 30 days after the point of 
overstay. But if I may point out, because the process today 
requires so many manual database checks and is so resource-
intensive ICE prioritizes for enforcement actions those visa 
overstays that are National security or public safety risks.
    When we implement the enhancements that I described earlier 
we will be better able to identify those other visa overstays, 
provide that information into law enforcement systems so upon 
next encounter their overstay status will be identified, ensure 
that information gets to State Department so if they have 
departed the country and they seek to come back from a visa 
waiver country or through a visa process again State Department 
can take appropriate actions.
    So we are going in the direction that you are suggesting. 
The problem is all of these systems that we need to make these 
determinations are disconnected and they use different 
language.
    Mr. Duncan. I am out of time and I will look for a second 
round of questions, but I would just make a point--they are 
disconnected. The 9/11 Commission Report pointed to the fact 
that the disconnect of agencies talking to one another wasn't 
there. You had walls of separation. That is the problem, and I 
am afraid that we have got to correct that if we are going 
forward.
    I will yield back.
    Mrs. Miller. We probably aren't going to have a second 
round of questions, so if you would like to ask one more 
question, please, I will yield to you.
    Mr. Duncan. Okay. Thank you.
    I want to continue going down this path because--we see, 
based on the--number of visa overstays that were involved in 
terrorist activity, at what point of time is someone that is 
stopped for a traffic violation or misdemeanor, as we saw with 
the gentleman on Capitol Hill, at what point in time do you 
say, ``Well, they are a visa overstay; they are unlawfully 
present in the United States of America,'' and they are 
returned to their country?
    Americans are scratching their head looking at the data 
that is provided--and this is real data, actual cases. They are 
scratching their head going, ``Why isn't America--these are the 
low-hanging fruit. Why isn't America dealing with this?'' 
Because I am--they are scratching their head. Answer that for 
me, someone, please.
    Mr. Cohen. So I would answer your question, Congressman, by 
saying we are dealing with it and we have finally begun the 
process of linking those disparate systems that you identified 
earlier together so that when a police officer arrests somebody 
and books that individual into jail they are quickly identified 
as being in violation of their immigration status so that ICE 
can be notified and appropriate enforcement actions can take 
place. That is the very capability that we are beginning--we 
have begun the process of putting into place.
    Again, we expect to have the detailed plan to Congress 
shortly that will lay out what we are doing, but it has already 
begun, as I testified earlier, and we have already seen 
dramatic improvements in our ability to identify those visa 
overstays that represent National security or public safety 
threats. Again, this is from a pool of individuals that would 
not have been vetted before.
    So progress is being achieved. To your very point, we 
absolutely agree with you. These systems have to be linked 
together and they have to be linked together to support the 
operational activities of ICE and CBP and the other enforcement 
agencies that are responsible for enforcing our immigration 
laws.
    Mr. Duncan. You shouldn't have to keep coming back to 
Congress because the law is the law of the land right now. 
Immigration and Customs Enforcement--immigration enforcement 
means that you enforce the immigration laws of the United 
States of America, and if you do that then folks that are 
caught on misdemeanors that have been here for 13 years over 
their visa deadline are picked up and they are deported from 
this country. That is what America expects from you, to enforce 
immigration laws that are on the books today and not keep 
having to come back to Congress for more and more and more.
    Integration--I get that. But customs enforcement and 
immigration enforcement is your responsibility. I charge you 
guys with doing your job.
    With that, Madam Chairwoman, I yield back.
    Mrs. Miller. Chairwoman now recognizes the gentleman from 
the great State of Michigan, Mr. Clarke.
    Mr. Clarke of Michigan. Thank you, Madam Chairwoman.
    While we realize it is very important to track those 
individuals who are overstaying their visas, especially those 
who are likely to be terrorists, I also think it is important 
for this Congress and Department of Homeland Security to focus 
on preventing terrorists from entering our country in the first 
place. So to that end, I want to thank the advocacy of our 
Chairwoman who has been focusing on how we can get more 
resources to better secure our Northern Border to prevent these 
criminals, terrorists, and drug traffickers from coming across 
the border into our country, especially securing our border 
between Canada and Michigan. We do need the resources to better 
monitor that border and apprehend these folks in case they do 
come over.
    To that same end, my question is this: How can we better 
secure the visa process to prevent terrorists from coming into 
our country in the first place--better secure that process but 
yet tailor it in such a way that we don't discourage but even 
encourage the immigration that we do need in this country? You 
know, I represent the city of Detroit, a metropolitan area that 
needs more economic investment. Capital is global. We want to 
encourage more international investors and entrepreneurs to 
come to this country to get a green card, especially when then 
invest in distressed areas like Detroit, or Pontiac, or Flint, 
in Michigan.
    How can we have a process that balances the security that 
we need to prevent these folks that want to do us harm from 
even getting into this country but encouraging investors, 
entrepreneurs, encouraging those international graduates, 
especially in science and engineering and mathematics to 
actually stay in the United States to promote more innovation 
that will create more jobs for our country?
    Mr. Edge. Thank you very much for your question, Mr. 
Clarke. As far as ICE is concerned, we have our Visa Security 
Program, and what we are trying to do to encourage the 
expedited process of--and vetting of visa applicants is to do a 
lot of that on the domestic side through technology. We have 
many offices overseas--approximately 71 in 47 countries, and 
what we would like to do and what we have begun to do is to use 
our technological capabilities to vet these applicants in 
conjunction with our friends at the Department of State to 
enhance the process, to encourage people to want to come to 
this country, and they will know that the process will be a 
little faster than it has been in the past.
    So that is one of the things that, through the Visa 
Security Program, we are doing. This will also allow our people 
who are in those other countries working and representing the 
United States in homeland security investigations to focus more 
on investigative work. But we are actively working on those 
technological enhancements right now.
    Mr. Cohen. If I may add, Congressman, I think you raised an 
excellent point, and part of the answer includes extensively 
pre-vetting to the greatest degree possible either those 
individuals or those corporate entries seeking to cross the 
border. So the auto industry in Michigan and Detroit area rely 
on just-in-time deliveries. If those deliveries of parts and 
goods do not make it to those factories cars are not going to 
be produced.
    People travel from Windsor to Detroit every day to enjoy 
restaurants and enjoy other elements. So what we are moving 
towards is an environment where to the greatest degree possible 
we can validate those people who have a legal--who legally can 
enter this country, whether they are doing it for business or 
for pleasure, and vet those people against the broadest array 
of intelligence and law enforcement systems so we can weed out 
initially, before they come to this country, those people who 
represent a danger to this country, thereby enabling those who 
don't represent a danger who can help our economy grow can 
travel more effectively and efficiently to this country.
    Mr. Clarke of Michigan. Thank you, Mr. Cohen.
    Thank you, Mr. Edge.
    Mr. Donahue. Let me just mention that the prevention of 
issuance to these--of visas to persons like the overstay is one 
of our key goals in all of our visa adjudications. We do a lot 
of training but we also do a lot of what we call validation 
studies. We will take a group of people, using information 
from--the ADIS records from the Departure and Information 
Service, and we will look to see if a person--if this group of 
persons--it could be a group of elderly people coming for 
vacations or to see their family members--are they likely to 
overstay in the United States, or students? We will do this by 
groups, and we do it from a number of--from all countries 
around the world and check to see how our officers are doing.
    We also make sure that they understand what the culture is, 
what is the likelihood that people will return? We refuse about 
a million visas a year, and yet we find in our validation 
studies more and more that we are getting very close to finding 
that almost everyone--we would like it to be everyone--uses 
their visa appropriately and comes back in many of the 
countries where we have been doing these validation studies.
    Mr. Clarke of Michigan. Thank you, Mr. Donahue.
    I yield back my time.
    Mrs. Miller. Chairwoman recognizes the Ranking Member.
    Mr. Cuellar. Thank you, Madam Chairwoman.
    Couple questions. It is concurrent--that is, Mr. Cohen, two 
questions real quickly--in its current configuration the U.S. 
visa program has failed to fulfill its statutory requirement 
regarding deploying a biometric exit system to track visitors 
to the United States and better identify overstays. The 
administration's fiscal year 2013 budget request proposes that 
we transfer the US-VISIT's functions from NPPD to CBP and ICE. 
Some have expressed concerns that this transfer will be 
detrimental to the U.S. visa mission but others argue that 
aligning this mission with the relevant components makes more 
sense.
    Can you please explain how aligning US-VISIT with CBP and 
ICE would strengthen the program and help DHS get an exit 
system done?
    Mr. Cohen. Thank you, Congressman. You know, the Secretary 
isn't a big fan of moving boxes around and it is--it--she has 
rarely come to Congress and sought an organizational change 
such as this, but the rationale behind the change is much if 
not all of what US-VISIT does ties directly to the enforcement 
and operational activities of either ICE or CBP.
    So from an efficiency perspective and from a financial 
perspective, in order to avoid duplicative efforts, it just 
made sense to place those functions of US-VISIT that most 
support ICE's operational mission into ICE and those parts of 
the US-VISIT mission that best support CBP's operational issues 
or operational functions into CBP.
    The only other thing I would add is that as we learned 
through this initiative from the beginning, that the effective 
management and enforcement of our visa and immigration laws, of 
our counterterrorism responsibilities occurs best when the 
different elements of the Department are working closely 
together. So the movement of US-VISIT into CBP and ICE should 
not be viewed as a taking a step back, that the Department is 
going to continue to enhance its operational coordination 
across all of its components.
    Mr. Cuellar. Okay. Thank you, Mr. Cohen.
    Finally, you say that DHS will soon transmit to Congress 
your plan for deploying the biometric exit. How soon is soon?
    Mr. Cohen. Without giving a specific date, it is going to 
be within weeks, not months, not years. We are putting the 
finishing touches on the report as we speak.
    Mr. Cuellar. Weeks, so that is within the next 30 days?
    Mr. Cohen. That would be our intention.
    Mr. Cuellar. Okay. All right.
    Thank you to all three of you all.
    Thank you, Madam Chairwoman, for having this meeting today.
    Mrs. Miller. Thank you very much.
    I certainly want to thank all the witnesses, as well.
    Mr. Cohen, I was going to ask that question so I am glad my 
colleague did, as well. We are certainly interested to see what 
you described as a work in progress. I think it is hopefully 
clear from all of the Members here that this issue is something 
that this subcommittee is very, very focused on--and I really 
don't think that enough attention has been paid in the past, as 
I say, because--we seem to be so focused on what is going on 
with securing--our Southern Border, in particular. Believe me, 
I am not minimizing the challenges that we have down there, 
certainly with the drug cartels, and the violence, and the 
spillover, et cetera, and illegals that are coming across. I 
think this Nation certainly wants this Congress and all the 
agencies that are under our umbrella to exercise the political 
will that we need to to secure our borders--all of our borders.
    But I think this visa overstay issue, again, is something 
that we have just not paid enough attention to. Certainly we 
want to work with all of your agencies on making sure that 
Congress is, through the appropriations process, et cetera, is 
assisting where we need to to prioritize our spending.
    Again, I always thank our Chairman of this--of the full 
committee for putting those posters--will you--turn around you 
see the posters on the back of the wall there, which are of the 
burning towers on 9/11 and why the Department of Homeland 
Security was even put together. Again, four of those cowards--
those terrorists that attacked innocent--and murdered innocents 
that day were here on visa overstays.
    So we don't want to be in any way an adversarial position 
with any of your agencies. We do commend you for all of the 
work that you have done and are doing on this issue and we 
certainly want to be a conduit--to be a success in making sure 
that we do have a very comprehensive--not just the entry but 
the exit system, really a robust biometric system.
    So again, we thank the witnesses for all of your testimony 
and look forward to working with you shoulder-to-shoulder to 
solve this problem.
    With that, I would mention that if any Members of the 
subcommittee have any other additional questions the hearing 
record will remain open for 10 days. With that, the 
subcommittee will be adjourned. Thank you.
    [Whereupon, at 11:05 a.m., the subcommittee was adjourned.]