
S. Hrg. 109-61
CURRENT AND PROJECTED NATIONAL SECURITY THREATS TO THE UNITED STATES
=======================================================================
HEARING
BEFORE THE
SELECT COMMITTEE ON INTELLIGENCE
UNITED STATES SENATE
ONE HUNDRED NINTH CONGRESS
FIRST SESSION
__________
FEBRUARY 16, 2005
__________
Printed for the use of the Select Committee on Intelligence
Available via the World Wide Web: http://www.access.gpo.gov/congress/
senate
______
U.S. GOVERNMENT PRINTING OFFICE
22-379 WASHINGTON : 2005
_____________________________________________________________________________
For Sale by the Superintendent of Documents, U.S. Government Printing Office
Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; (202) 512�091800
Fax: (202) 512�092250 Mail: Stop SSOP, Washington, DC 20402�090001
SELECT COMMITTEE ON INTELLIGENCE
[Established by S. Res. 400, 94th Cong., 2d Sess.]
PAT ROBERTS, Kansas, Chairman
JOHN D. ROCKEFELLER IV, West Virginia, Vice Chairman
ORRIN G. HATCH, Utah CARL LEVIN, Michigan
MIKE DeWINE, Ohio DIANNE FEINSTEIN, California
CHRISTOPHER S. BOND, Missouri RON WYDEN, Oregon
TRENT LOTT, Mississippi EVAN BAYH, Indiana
OLYMPIA J. SNOWE, Maine BARBARA A. MIKULSKI, Maryland
CHUCK HAGEL, Nebraska JON S. CORZINE, New Jersey
SAXBY CHAMBLISS, Georgia
BILL FRIST, Tennessee, Ex Officio
HARRY REID, Nevada, Ex Officio
JOHN WARNER, Virginia, Ex Officio
----------
Bill Duhnke, Staff Director and Chief Counsel
Andrew W. Johnson, Minority Staff Director
Kathleen P. McGhee, Chief Clerk
CONTENTS
----------
Page
Hearing held in Washington, DC:
February 16, 2005............................................ 1
Witness Statements:
Goss, Hon. Porter J., Director of Central Intelligence....... 7
Prepared statement....................................... 14
Jacoby, Vice Admiral Lowell, USN, Director, Defense
Intelligence Agency........................................ 45
Prepared statement....................................... 46
Loy, Admiral James, Deputy Secretary, Department of Homeland
Security................................................... 36
Prepared statement....................................... 39
Mueller, Hon. Robert S. III, Director, Federal Bureau of
Investigation.............................................. 18
Prepared statement....................................... 23
Rodley, Carol, Principal Deputy Assistant Secretary of State
for
Intelligence and Research.................................. 59
Supplemental Materials:
Prepared Statement for the Record from Hon. Thomas Fingar,
Assistant Secretary of State for Intelligence and Research. 59
Prepared Statement for the Record from Senator Olympia J.
Snowe...................................................... 69
CURRENT AND PROJECTED NATIONAL SECURITY THREATS TO THE UNITED STATES
----------
WEDNESDAY, FEBRUARY 16, 2005
United States Senate,
Senate Select Committee on Intelligence,
Washington, DC.
The Committee met, pursuant to notice, at 10:03 a.m., in
room SH-216, Hart Senate Office Building, the Honorable Pat
Roberts, Chairman of the Committee, presiding.
Committee Members Present: Senators Roberts, Hatch, Bond,
Lot, Snowe, Chambliss, Warner, Rockefeller, Levin, Feinstein,
Wyden, Bayh, and Mikulski.
OPENING STATEMENT OF THE HONORABLE PAT ROBERTS,
CHAIRMAN
Chairman Roberts. The hearing will come to order.
Today, the Senate Committee on Intelligence meets in open
session to conduct its annual worldwide threat hearing. I would
like to inform Members that traditionally we have a closed
hearing in the afternoon, but Secretary of State Rice is coming
to the Senate to brief all Members this afternoon.
We will follow up with individuals at our weekly
intelligence hearings, and then, obviously, a hearing or
briefing at any Member's request. So we will see all of these
people back again in a classified session at another time.
The Committee traditionally begins its annual oversight of
the U.S. intelligence community with an open hearing, so that
the public will have the benefit of the intelligence
community's best assessment of the current and projected
national security threats to the United States.
Our witnesses today are Mr. Porter Goss, the Director of
Central Intelligence. Welcome back, Mr. Director.
Director Goss. Thank you, Mr. Chairman.
Chairman Roberts. Mr. Robert Mueller, the Director of the
Federal Bureau of Investigation; Admiral James Loy, the Deputy
Secretary of the Department of Homeland Security; Vice Admiral
Lowell Jacoby, the Director of the Defense Intelligence Agency;
and Ms. Carol Rodley, the Principal Deputy Assistant Secretary
of State for Intelligence and Research. The acronym for that,
by the way, is INR.
The Committee thanks all of our distinguished witnesses for
being here today. We thank you for your commitment, for your
perseverance on your job, and for helping to keep America safe.
Before we begin the testimony, I would like to take this
opportunity to discuss an issue that has concerned and
frustrated me since I joined this Committee over 8 year ago,
and all Members of this Committee from time to time.
While we meet today in open session, the Members of this
Committee and our witnesses will be limited in what they can
say because the vast majority of the information with which
this Committee and our witnesses deal is classified. The issues
which we cover are not necessarily secret, but the details that
surround them generally are.
Our goal today is to have as open a discussion as possible,
recognizing that there are simply some things that we cannot
and must not discuss publicly. The dynamics surrounding what we
can and cannot say represents one of the most frustrating
aspects of membership on this Committee, especially when secret
intelligence activities find their way into public discourse.
How do we as a Committee assure the American people that we
are even aware of something when we cannot discuss it publicly?
How, without confirming or denying a particular story, do we
explain that concerns are misplaced, on point or off point?
Where do we draw the line between the public's right to know
and our Nation's security interests in keeping something
secret? These remain very difficult questions.
In 1976, the U.S. Senate established this Committee to
conduct vigorous oversight of the intelligence activities of
the United States government. And that is exactly what we do,
day in and day out--with, I might add--what the Vice Chairman
and I consider to be an outstanding and most capable staff.
Unfortunately, but necessarily, the Members of this
Committee are rarely at liberty to respond to public stories or
to inquiries. This does not mean, however, that we are not
aware of or deeply involved in the issue that is being
discussed.
Much of this Committee's work gets done behind closed doors
with little fanfare. And open public discussion about all of
the issues on which our Committee works is just not possible.
If we were to discuss some of the ingenious ways this Nation
does collect intelligence and protects our citizens, our
adversaries would and could develop simple countermeasures that
would eliminate these advantages, which were developed at great
cost or high risk. This secrecy does protect lives and helps us
to keep safe.
The Vice Chairman and I will, however, continue to work
together to keep the American people as informed as possible.
And when we can, we will do our best to clarify any
misconceptions that may exist. With that in mind, I will now
briefly discuss some of our plans for this Committee's
oversight in the coming months.
First, we look forward to the naming of a Director of
National Intelligence. As soon as the President nominates this
individual, we will schedule a confirmation hearing as soon as
practicable.
Second, we will monitor closely the implementation of the
Intelligence reform bill. We will focus a great deal of
attention on how this Committee can support the new DNI in the
exercise of his or her authorities. And, because no legislation
is perfect, we will also look at whether any legislative fixes
are necessary.
Third, in the area of oversight, we will focus on the
intelligence community's collection and analytical
capabilities, especially in regard to our capabilities. Do we
have the adequate collection? Do we have the adequate analysis?
Do we have the information access to make a consensus threat
analysis that is both credible and helpful to the policymakers
and the Congress?
This Committee learned from our Iraq WMD inquiry that we
cannot and should not always take the intelligence community's
assessments at face value. The Vice Chairman and I have
therefore decided to change the way the Senate Intelligence
Committee does our work.
We haven't launched anything. We haven't really begun an
investigation or an inquiry. Nor have we ruled them out. We
have simply adjusted our approach based on the lessons we
learned while reviewing the assessment by the community on
Iraq's WMD programs.
Applying the methodologies that we used in that review, we
will now look deeper into the intelligence community's work on
the very critical threats that face our Nation. Instead of
examining these issues after the fact, as we did on the Iraq
WMD question and many other matters in the past, we are going
to be more proactive, to try to identify our strengths and our
weaknesses ahead of time. We have already begun to examine our
intelligence capabilities with respect to nuclear terrorism and
also the country of Iran.
In closing, I want to say something about the limitations
of intelligence. Even the best intelligence will not be
absolutely precise and tell us what to do. However,
intelligence is a necessary and crucial tool used by
policymakers to make very difficult decisions that do directly
affect those who defend our freedoms and our national security.
With that said, I look forward to the testimony of our
witnesses, and also the questions by our Members. I now turn to
the distinguished Vice Chairman for any comment he may wish to
make.
Senator Rockefeller.
STATEMENT OF THE HONORABLE JOHN D. ROCKEFELLER IV,
VICE CHAIRMAN
Vice Chairman Rockefeller. Thank you, Mr. Chairman.
It's customary at the beginning of our hearings to welcome
everybody, and I certainly do so, and very much look forward to
your testimony. I have to say, though, I think there is a
significant absence or an empty spot at the table, at the
witness table. And I want to talk about that.
There should be another chair before us. And the little
sign in front of it should read Director of National
Intelligence, DNI. Last summer, the Congress made reforming the
intelligence community its top legislative priority. We worked
through our August recess. We came back in a lame duck session
after the election.
And we eventually passed landmark legislation fundamentally
reforming the intelligence community for the first time in 50
years. The Congress made this extraordinary effort because it
believed that our Nation was at risk, and we take that
seriously.
More specifically, the Congress--eventually joined by the
President--understood that without one individual in charge of
the 15-agency intelligence community, America's war on
terrorism would continue to be hampered by bureaucratic
infighting and by budgetary tug-of-wars, that in turn inhibit
the sharing of information--or, as we like to say, the access
to information--and limit our ability to bring all of our
resources to bear on what is a fairly ghastly threat on a
worldwide basis.
When the President signed the intelligence reform bill in
December, I really expected that when this hearing came the new
Director of National Intelligence would be here to talk about
threats.
It took 3 months for the Senate and the House to pass
separate intelligence bills--that's not really very much time--
and then resolve a multitude of differences in conference and
all kinds of back-and-forth in a way which was agreeable to the
Administration.
Two months have now passed since the bill-signing ceremony.
And the position of Director of National Intelligence remains
vacant--not even a person nominated. To me, this is
unacceptable. It's unacceptable that the Administration has not
shown the same urgency in dealing with that question that the
Congress took the trouble to create. Some agree, some don't
agree with the decision, but it was not a particularly close
vote in either house.
With absolutely no disrespect--and, in fact, a great deal
of respect to Director Goss--or any of our other witnesses, it
is unacceptable that we cannot hear from and question the one
person under the new law that is supposed to be responsible for
the overall management of how the intelligence community is
responding to the national security threats that we will be
discussing this morning.
There are other troubling consequences to the
Administration's lack of action. In recent weeks, I visited
most of the principal agencies that comprise our intelligence
community. The message I heard over and over, through words or
body language, was that the senior leadership at these agencies
was--that action on how best to carry out some key provisions
on the intelligence reform bill was being held up pending the
arrival of the new Director of National Intelligence. The delay
in appointing a DNI has kept implementation of the reform bill,
therefore, in my judgment, in idle.
So, what are the practical consequences of this delay, in
the context of today's threat hearing? I'll highlight three.
The first and most obvious is that delaying the appointment
of the DNI places that individual at a growing disadvantage in
establishing his or her team--the new directorate--and
selecting his or her supporting team of deputies within the 6
months prescribed by law, 2 months already having gone by, or
more. It's prescribed by law, has to have it done.
The second consequence of delay pertains to the
intelligence community's counterterrorism program. In addition
to establishing the position of DNI, the intelligence reform
bill mandated the creation of the National Counterterrorism
Center, or NCTC. Initially created by Executive Order, the NCTC
is chartered to be the primary organization in the U.S.
Government responsible for analyzing and integrating all
intelligence pertaining to terrorism and counterterrorism.
As is the case with the DNI, the head of the NCTC is a
Senate-confirmed position and the Administration has yet to
nominate a person to carry out those crucial tasks. One could
say one has to do the DNI before the NCTC, but let's get going.
One of the primary missions of the NCTC--and I'm reading
the law now--is to conduct strategic operational planning for
counterterrorism activities, integrating all instruments of
national power, including diplomatic, financial, military,
intelligence activities, as well as homeland security and law
enforcement activities, and to assign roles and
responsibilities as part of its strategic operational planning.
My understanding is that the operational planning mission
at NCTC is not being undertaken, pending confirmation of the
new DNI. We can discuss that. So when we talk about going after
terrorists, after their organizations, where they plot and
where they train and where they keep their money, the question
is, who is carrying out this strategic operational planning
mission on this day?
In the wake of our war against the al-Qa'ida terrorist
network and its operational bases in Afghanistan and Pakistan,
the fundamentalist Islamic terrorist threat has splintered and
decentralized its operations. We need a person in charge, we
need an organization in place, that can coordinate
counterterrorist operations across agencies against this
multiplying terrorist threat.
The third immediate consequence of not having a DNI in
place is the area of proliferation of weapons of mass
destruction. The proliferation activity of North Korea and
Iran, along with the damage done by Pakistani scientist A.Q.
Khan, has reduced any confidence that the nuclear genie is
contained.
The combination of these two threats--a decentralized, but
determined terrorist threat and growing proliferation
activity--present the intelligence community with a sobering
challenge, now and for the foreseeable future.
The Congress recognized the importance of this challenge in
crafting the intelligence reform bill, by authorizing the
establishment of a National Counterproliferation Center. The
new intelligence center would generally follow the blueprint of
the National Counterterrorism Center. Again, I am told and
troubled by the fact that the decision on whether or not to
establish the National Counterproliferation Center and, if so,
in what form, is being held up pending the DNI's appointment.
The proliferation activities of North Korea are a threat to
our security and the security of our allies today, as well as
down the road. And the same, of course, is true with Iran, and
we discover others as we go along. Iran, as a nuclear aspirant
and supporter of terrorism, is also center stage and very much
needs to be pursued in this manner.
Policymakers and, most importantly, the President, but also
the Congress, need the best intelligence possible on North
Korea, Iran and other hotspots around the world--Africa being
one which I may ask a question about.
The faulty intelligence used by the Administration to
invade Iraq has harmed our credibility with our allies and has
given Islamic jihadists a powerful recruiting tool around the
world that is not to anybody's advantage. We must learn from
these mistakes, as the Chairman has indicated, and get better
in how we produce timely, objective and accurate intelligence
for U.S. policymakers.
The Chairman and I have directed that the Intelligence
Committee undertake review of how intelligence on Iran is
collected, analyzed and produced. The review will be similar to
what we did before with weapons of mass destruction in Iraq.
But it's going to be very proactive. The same sort of rigorous
oversight ought to apply to North Korea also, and there are
some other countries that come to mind.
I am hopeful that the Committee can also focus the efforts
of its very talented staff on the growing controversy
surrounding the collection of intelligence through the
interrogation and rendition of detainees. We need to probe the
fundamental legal, jurisdictional and operational questions,
both retrospectively and prospectively, in my mind, at the
heart of how the intelligence community collects such
intelligence.
It's undeniable that the intelligence community has made
enormous strides in the past 3 years and that some reform has
occurred. The tireless efforts of hardworking men and women at
the CIA, FBI and other intelligence agencies, like the work of
those in uniform, have been a linchpin in the effort to protect
every American against the murderous intentions of terrorists.
But there is an acknowledgement among the people I have
spoken with that we can do better and that we must get better.
The intelligence reform bill addressed that issue of
authorities, resources and organization. But the promise of
reform will not be realized without strong leadership and
management acumen--the sort of skills the DNI must bring to the
table.
Challenges abound, as the Chairman knows, for the current
and future leadership of the intelligence community. There's a
lot of work to be done on how we collect intelligence,
particularly in the arena of human intelligence, analytical
workforce problems, language problems. Our intelligence
community needs to establish a global presence that is not only
capable, but lithe, for our adversaries are increasingly mobile
and use much more sophisticated technology as they do their
work.
I know we're limited as to what we can discuss in an open
hearing, but I hope to the extent possible that our witnesses
will address some of the questions that I have raised.
I thank the witnesses and I thank you, Mr. Chairman.
Chairman Roberts. Before I recognize Director Goss, I would
like to speak to the Vice Chairman's comments in regard to the
appointment of a DNI. I think this is what we used to hear on
``Perry Mason,'' with extenuating circumstances.
The intelligence reform bill was passed on December 17. The
bill says that a DNI will be appointed no later than 6 months--
that is, June 17. I think, or at least it is my opinion, that
the Administration is also awaiting the report of the
independent WMD commission, part of whose job or task is to
take a look at the intelligence reform bill and make some
recommendations.
In addition, while I share the Vice Chairman's frustration
that we wish we had here the Director of National Intelligence
and that he or she was well down the road to implementing the
reform bill, it is, I think, crucially important, not only in
terms of timing, but to get the right person. And that person
should have managerial experience, obviously, expertise in
intelligence, obviously, expertise and experience perhaps in
the military. As the Vice Chairman has pointed out, we have
certainly people in the Washington area or, for that matter,
within the United States, that certainly fit that description.
So, I hope that the Administration will move in an
expeditious fashion, but in a fashion that gets the right
person for the job.
Director Goss, you may proceed, sir.
STATEMENT OF THE HONORABLE PORTER J. GOSS,
DIRECTOR OF CENTRAL INTELLIGENCE
Director Goss. Thank you very much, Mr. Chairman. Good
morning, Mr. Vice Chairman and Members of the Committee, and
thank you for the hospitable welcome here.
The challenges that you've mentioned in your opening
remarks that face the United States of America and its citizens
and our interests literally do span the globe. My intention
today is to tell you what I believe are those challenges in
terms of the most threatening and identify briefly where we
think our service as intelligence professionals is needed most
on behalf of the United States taxpayers.
We need to make some tough decisions about which haystacks
deserve to be scrutinized for the needles that can hurt us
most. And we know in this information age that there are
literally endless haystacks everywhere. There's an awful lot of
material out there.
I do want to make several things clear. Our officers are
taking risks, and I will be asking them to take more risks--
justifiable risks--because I would be much happier here
explaining why we did something than why we did nothing.
I'm asking for more competitive analysis, more co-location
of analysts and collectors--in fact, that's underway--and
deeper collaboration with agencies throughout the intelligence
community.
Above all, our analysts must be objective. Our credibility
rests there, as you pointed out well in this Committee's report
to the community issued on the WMD.
We do not make policy. We do not wage war. I am emphatic
about that. I testified to that during my confirmation, and it
is still true and it will always be. We do collect and analyze
information. With respect to the CIA, I want to tell you that
my first few months as Director have served only to confirm
what I and, I think, Members of Congress have known about CIA
for years. It is a special place. It's an organization of
dedicated, patriotic people who are doing their best.
In addition to taking a thorough, hard look at our own
capabilities, we're working to define CIA's place in the
restructured intelligence community--a community that will be
led by a new DNI, as we've heard--to make the maximum possible
contribution to American security at home and abroad that
uniquely the CIA can make.
The CIA is and will remain the flagship agency, in my view,
and each of the other 14 elements of the community will
continue to make their unique contributions, as well. I say
that as the DCI, not as the Director of Central Intelligence
Agency.
I turn to threats. I will not attempt, obviously, to cover
everything that could go wrong in the year ahead. We must and
do concentrate our efforts, experience and expertise on the
challenges that are most pressing. And they are, of course,
defeating terrorism, protecting the homeland, stopping
proliferation of weapons of mass destruction and drugs,
fostering stability, freedom and peace in the most troubled
regions of the world.
My comments today will focus on these duties. I know well
from my 30 years in public service that you and your colleagues
have an important responsibility with these open sessions to
get information to the American people, as the Chairman has
stated.
I also know too well, as the Chairman has stated, that as
we are broadcasting to America, enemies are also tuning in. In
open session, I feel that I will and must be very prudent in my
remarks as DCI.
Mr. Chairman, on the subject of terrorism, defeating
terrorism must remain one of our intelligence community's core
objectives, and it will, as widely dispersed terrorist networks
will present one of the most serious challenges to the U.S.
national security interests at home and abroad in the coming
year. That's not startling news, but it's important.
In the past year, aggressive measures by our intelligence,
law enforcement, defense and homeland security communities,
along with our key international partners, have, in fact, dealt
serious blows to al-Qa'ida and other terrorist organizations
and individuals.
Despite these successes, however, the terrorist threat to
the U.S. in the homeland and abroad endures. I'd make four
points.
Al-Qa'ida is intent on finding ways to circumvent U.S.
security enhancements to strike Americans in the homeland, one.
Number two, it may be only a matter of time before al-
Qa'ida or another group attempts to use chemical, biological,
radiological or nuclear weapons. We must focus on that.
Three, al-Qa'ida is only one facet of the threat from a
broader Sunni jihadist movement.
And four, the Iraq conflict, while not a cause of
extremism, has become a cause for extremists.
We know from experience that al-Qa'ida is a patient,
persistent, imaginative, adaptive and dangerous opponent. But
it is vulnerable and displaced. We and other allies have hit it
hard. Jihadist religious leaders preach millennial,
aberrational visions of some kind of a fight for Islam's
survival. Sometimes they argue that the struggle justifies the
indiscriminate killing of civilians, even with chemical,
biological, radiological and nuclear weapons. And, fortunately,
they have a small audience.
Our pursuit of al-Qa'ida and its most senior leaders,
including bin Laden and his deputy, Ayman al-Zawahiri, is
intense. However, their capture alone would not be enough to
eliminate the terrorist threat to the U.S. homeland or
interests overseas. Often influenced by al-Qa'ida's ideology,
members of a broader movement have an ability to plan and
conduct operations. We saw this last March in the railway
attacks in Madrid, conducted by local Sunni extremists.
Other regional groups connected to al-Qa'ida or acting on
their own also continue to pose a significant threat. In
Pakistan, terrorist elements remain committed to attacking U.S.
targets. In Saudi Arabia, remnants of the Saudi al-Qa'ida
network continue to attack U.S. interests in the region.
In Central Asia, the Islamic Jihad Group, a splinter group
of the Islamic Movement of Uzbekistan, has become a more
virulent threat to U.S. interests and local governments there.
Last spring, the group used female operatives in a series of
bombings in Uzbekistan, as you know.
In Southeast Asia, the Jemaah Islamiyah continues to pose a
threat to U.S. and Western interests in Indonesia and the
Philippines, where JI is colluding with the Abu Sayyaf Group
and possibly the MILF group, as well.
In Europe, Islamic extremists continue to plan and cause
attacks against U.S. and local interests. Some of them may
cause significant casualties. In 2004, British authorities
dismantled an al-Qa'ida cell--much reported. And in the
Netherlands, an extremist brutally killed a prominent Dutch
citizen--not as widely reported.
Islamic extremists are exploiting the Iraqi conflict to
recruit new, anti-U.S. jihadists. Those jihadists who survive
will leave Iraq experienced and focused on acts of urban
terrorism. They represent a potential pool of contacts to build
transnational terrorist cells, groups and networks in Saudi
Arabia, Jordan and other countries.
Zarqawi has sought to bring about the final victory of
Islam over the West, in his version of it. And he hopes to
establish a safe haven in Iraq from which his group could
operate against the ``infidel Western nations, the apostate
Muslim governments.''
Other groups spanning the globe also pose persistent and
serious threats to U.S. and Western interests. Hizbollah's main
focus remains Israel. But it could conduct lethal attacks
against U.S. interests quickly upon a decision to do so. It has
that capability, we estimate.
Palestinian terrorist organizations have apparently
refrained from directly targeting U.S. or Western interests in
their opposition to Middle East peace initiatives, but they do
pose an ongoing risk to U.S. citizens that could be killed or
wounded in attacks intended to strike Israeli interests.
Extremist groups in Latin America are still concerned with
the FARC--the Revolutionary Armed Forces of Colombia--
possessing capability and clear intent to threaten U.S.
interests in that region.
The Horn of Africa, the Sahel, the Mahgreb, the Levant and
the Gulf States are all areas where pop-up terrorist activity
can be expected and needs to be monitored and dealt with.
Afghanistan, Mr. Chairman, once the safe haven for Usama
bin Ladin, has started on the road to recovery after decades of
instability and civil war. Hamid Karzai's election to the
presidency was a major milestone. Elections for a new national
assembly and local district councils, tentatively scheduled for
this spring--though that's an ambitious schedule--will complete
the process of electing representatives this year, hopefully.
President Karzai still faces a low-level insurgency, aimed at
destabilizing his country and raising the cost of
reconstruction, and ultimately forcing coalition forces to
leave before the job is done. The development of the Afghan
national army and the national police force is going well,
although neither can yet stand on its own.
In Iraq, low voter turnout in some Sunni areas and the
post-election resumption of insurgent attacks--most against
Iraqi civilian and security forces--indicate that the
insurgency achieved at least some of its election day goals and
remains a serious threat to creating a stable, representative
government in Iraq.
Self-determination for the Iraqi people will largely depend
on the ability of the Iraq forces to provide their own
security. Iraq's most capable security units have become more
effective in recent months, contributing to several major
operations, and helping to put an Iraqi face on security
operations. Insurgents are determined and still trying to
discourage new recruits and undermine the effectiveness of
existing Iraqi security forces by grotesque intimidation
tactics.
The prolonged lack of security would hurt Iraq's
reconstruction efforts and economic development, causing
overall economic growth to proceed at a slower pace than many
analysts expected and, certainly that the Iraqi people deserve.
Alternatively, the larger, uncommitted moderate Sunni
population and the Sunni political elite may seize the post-
electoral moment to take part in creating Iraq's new political
institutions, if victorious Shia and Kurdish parties include
Sunnis in the new government and the drafting of the
constitution. That is a hopeful opportunity.
On the subject of proliferation, Mr. Chairman, I will now
turn to the worldwide challenge. Last year started with
promise, as Libya had just renounced its WMD programs, North
Korea was engaged in negotiations with regional states on its
nuclear weapons program, and Iran was showing greater signs of
openness regarding its nuclear program after concealing
activity for nearly a decade.
Let me start with Libya, which is a bit of a good news
story and one that reflects the patient perseverance with which
the intelligence community--writ large--can tackle a tough
intelligence problem.
In 2004, Tripoli followed through with a range of steps to
disarm itself of WMD and ballistic missiles. Libya gave up key
elements of its nuclear weapons program and opened itself to
the IAEA. Libya gave up some key CW assets, and opened its
former CW program to international scrutiny.
After disclosing its Scud stockpile and extensive ballistic
and cruise missile R&D efforts in 2003, Libya took the
important step to abide by its commitment to limit its missiles
to the 300-kilometer range threshold of the Missile Technology
Control Regime.
Today, the U.S. continues to work with Libya to make sure
that any discrepancies in the declarations they have made are
clarified.
In North Korea, on the other hand, on 10 February 2005--not
long ago--Pyongyang announced it was suspending participation
in 6-party talks under way since 2003, declared it had nuclear
weapons and affirmed it would seek to increase its nuclear
arsenal. The North had been pushing for a freeze on its
plutonium program in exchange for significant benefits rather
than committing to the full dismantlement that we and our
partners seek.
In 2003, the North claimed it had reprocessed the 8,000
fuel rods from the Yongbyon reactor, originally stored under
the agreed framework, with the IAEA monitoring in 1994. The
North claims to have made new weapons from its reprocessing
effort.
We believe North Korea continues to pursue a uranium
enrichment capability, drawing on the assistance it received
from A.Q. Khan before his network was shut down.
North Korea continues to develop, produce, deploy and sell
ballistic missiles of increasing range and sophistication,
augmenting Pyongyang's large operational force of Scud and
Nodong-class missiles. North Korea could resume flight testing
at any time, including longer range missiles, such as the Taepo
Dong-2 system. We assess the TD-2 is capable of reaching the
United States with a nuclear weapon-size payload.
North Korea continues to market its ballistic missile
technology, trying to find new clients now that some
traditional customers--read Libya--have halted such trade.
We believe North Korea has active CW and BW programs, and
probably has chemical and possibly biological weapons ready for
use.
Iran. In early February, the spokesman of Iran's Supreme
Council for National Security publicly announced that Iran
would never scrap its nuclear program. This came in the midst
of negotiations with EU-3 members--that would be Britain,
Germany and France--seeking objective guarantees from Tehran
that it would not use nuclear technology for nuclear weapons.
Previous comments by Iranian officials, including Iran's
supreme leader and its foreign minister, indicated that Iran
would not give up its ability to enrich uranium. Certainly, it
would be right for Iran to have the capability to produce fuel
for power reactors. But, we're more concerned about the dual-
use nature of the technology that could also be used to achieve
a nuclear weapon. We do not have transparency.
In parallel, Iran continues its pursuit of long-range
ballistic missiles, such as an improved version of a 1,300-
kilometer range Shahab-3 MRBM, to add to the hundreds of short-
range Scud missiles it already has.
Even since 9/11, Tehran continues to support terrorist
groups in the region, such as Hizbollah--it is a state
sponsor--and could encourage increased attacks in Israel and
the Palestinian territories to derail progress toward peace
there. Iran reportedly is supporting some anti-coalition
activities in Iraq and seeking to influence the future
character of the Iraqi state.
Conservatives are likely to consolidate their power in
Iran's June 2005 presidential elections, further marginalizing
the reform movement of last year. Iran continues to retain, in
secret, important members of al-Qa'ida, causing further
uncertainty about Iran's commitment to bring them to justice
one way or another.
Moving to China, Beijing's military modernization and
military buildup could tilt the balance of power in the Taiwan
Strait. Improved Chinese capabilities threaten U.S. forces in
the region. In 2004, China increased its ballistic missile
forces deployed across from Taiwan and rolled out several new
submarines. China continues to develop more robust, survivable,
nuclear-armed missiles, as well as conventional capability for
use in regional conflict.
Taiwan continues to promote constitutional reform and other
attempts to strengthen local identity. Beijing judges these
moves to be a ``timeline for independence.'' If Beijing decides
that Taiwan is taking steps toward permanent separation that
exceed Beijing's tolerance, we assess China is prepared to
respond with varying levels of force.
China is increasingly confident and active on the
international stage, trying to ensure it has a voice on major
international issues, to secure access to natural resources,
and to counter what it sees as United States efforts to contain
or encircle it.
New leadership, under President Hu Jintao, is facing an
array of domestic challenges in 2005, including the potential
for a resurgence in inflation, increased dependence on exports,
growing economic inequalities in the country, increased
awareness of individual rights, and popular expectations for
his new leadership.
In Russia, the attitudes and actions of the so-called
``siloviki''--the ex-KGB men that Putin has placed in positions
of authority throughout the Russian government--may be critical
determinates of the course Putin will pursue in the year ahead.
Perceived setbacks in Ukraine are likely to lead Putin to
redouble his efforts to defend Russian interests abroad, while
balancing cooperation with the West.
Russia's most immediate security threat is terrorism. And
counterterrorism cooperation undoubtedly will continue.
Putin publicly acknowledges a role for outside powers to
play in the confederate states, but we believe he is
nevertheless concerned about further encroachment by the U.S.
and NATO into that region.
Moscow worries that separatism inside Russia and radical
Islamic movements beyond their borders might threaten stability
in southern Russia. Chechen extremists have increasingly turned
to terrorist operations in response to Moscow's successes in
Chechnya, and it's reasonable to predict they will carry out
attacks against civilian or military targets elsewhere in
Russia in 2005.
Budget increases will help Russia create a professional
military by replacing conscript with volunteer servicemen and
focus on maintaining, modernizing and extending the operational
life of strategic weapons systems, including the nuclear
missile force.
Russia remains an important source of weapons technology,
material and components for other nations. The vulnerability of
Russian WMD materials and technology to theft or diversion is a
continuing concern.
On other areas of potential instability, Mr. Chairman, I
would briefly go to the Middle East.
The election of the Palestinian President, Mahmoud Abbas,
marks an important step, and Abbas has made it clear that
negotiating a peace deal with Israel is a very high priority.
That's extraordinarily good news. Nevertheless, there are
hurdles ahead.
Redlines must be resolved while the Palestinian leaders try
to rebuild damaged PA infrastructure and governing
institutions, especially the security forces, the legislature
and the judiciary--those things that will help stability.
Terrorist groups, some of whom benefit from funding from
outside sources, could step up attacks to derail peace and
progress and need close monitoring.
In Africa, chronic instability will continue to hamper
counterterrorism efforts and impose heavy humanitarian and
peacekeeping burdens on us.
In Nigeria, the military is struggling to contain militia
groups in the oil-producing south and ethnic violence that
frequently erupts throughout the country. Extremist groups are
emerging from the country's Muslim population of about 65
million. Nigeria is a big oil producer for us.
In Sudan, the peace deal signed in January will result in
de facto southern autonomy and may inspire rebels in provinces
such as Darfur to press harder for a greater share of resource
and power. Opportunities exist for Islamic extremists to
reassert themselves in the north, unless the central government
stays unified.
Unresolved disputes in the Horn of Africa--Africa's gateway
to the Middle East--create vulnerability to foreign terrorists
and extremist groups. Ethiopia and Eritrea still have a
contested border. And armed factions in Somalia indicate they
will fight the authority of a new transitional government.
In Latin America, the region is entering a major electoral
cycle in 2006. Brazil, Colombia, Costa Rica, Ecuador, Mexico,
Nicaragua, Peru and Venezuela hold presidential elections.
Several key countries in the hemisphere are potential
flashpoints in 2005. In Venezuela, Chavez is consolidating his
power by using technically legal tactics to target his
opponents and meddling in the region, supported by Castro.
In Colombia, progress against counternarcotics and
terrorism under President Uribe's successful leadership may be
affected by an election.
The outlook is very cloudy for legitimate, timely elections
in November 2005 in Haiti, even with substantial international
support.
Campaigning for the 2006 presidential election in Mexico is
likely to stall progress on fiscal, labor and energy reform.
And in Cuba, Castro's hold on power remains firm. But a bad
fall last October has rekindled speculation about his declining
health and the succession scenarios.
In Southeast Asia, three countries bear close watching. In
Indonesia, President Yudhoyono has moved swiftly to crack down
on corruption. But reinvigorating the economy, burned by the
cost of recovery in the tsunami-damaged area, will likely be
affected by continuing, deep-seated ethnic and political
turmoil exploitable by terrorists.
In the Philippines, Manila is struggling with prolonged
Islamic and Communist rebellion. The presence of Jemaah
Islamiyah, terrorists seeking safe haven and training bases in
the south, adds volatility and capability to terrorist groups
already in place.
And finally, Mr. Chairman, Thailand is plagued with an
increasingly volatile Muslim separatist threat in the
southeastern provinces and the risk of escalation remains very
high.
I thank you very much for that opportunity to give a brief
overview.
[The prepared statement of Director Goss follows:]
Prepared Statement of Hon. Porter Goss,
Director of Central Intelligence
Good morning, Mr. Chairman, Mr. Vice Chairman, Members of the
Committee.
It is my honor to meet with you today to discuss the challenges I
see facing America and its interests in the months ahead. These
challenges literally span the globe. My intention is to tell you what I
believe are the greatest challenges we face today and those where our
service as intelligence professionals is needed most on behalf of the
U.S. taxpayer.
We need to make tough decisions about which haystacks deserve to be
scrutinized for the needles that can hurt us most. And we know in this
information age that there are endless haystacks everywhere. I do want
to make several things clear:
Our officers are taking risks, and I will be asking them
to take more risks--justifiable risks--because I would much rather
explain why we did something than why we did nothing,
I am asking for more competitive analysis, more
collocation of analysts and collectors, and deeper collaboration with
agencies throughout the Intelligence Community. Above all, our analysis
must be objective. Our credibility rests there.
We do not make policy. We do not wage war. I am emphatic
about that and always have been. We do collect and analyze information.
With respect to the CIA, I want to tell you that my first few
months as Director have served only to confirm what I and Members of
Congress have known about CIA for years. It is a special place--an
organization of dedicated, patriotic people. In addition to taking a
thorough, hard look at our own capabilities, we are working to define
CIA's place in the restructured Intelligence Community--a community
that will be led by a new Director of National Intelligence--to make
the maximum possible contribution to American security at home and
abroad. The CIA is and will remain the flagship agency, in my view. And
each of the other 14 elements in the community will continue to make
their unique contributions as well.
Now, I turn to threats. I will not attempt to cover everything that
could go wrong in the year ahead. We must, and do, concentrate our
efforts, experience and expertise on the challenges that are most
pressing: defeating terrorism; protecting the homeland; stopping
proliferation of weapons of mass destruction and drugs; and fostering
stability, freedom and peace in the most troubled regions of the world.
Accordingly, my comments today will focus on these duties. I know well
from my 30 years in public service that you and your colleagues have an
important responsibility with these open sessions to get information to
the American people. But I also know all too well that as we are
broadcasting to America, enemies are also tuning in. In open session I
feel I must be very prudent in my remarks as DCI.
TERRORISM
Mr. Chairman, defeating terrorism must remain one of our
intelligence community's core objectives, as widely dispersed terrorist
networks will present one of the most serious challenges to U.S.
national security interests at home and abroad in the coming year. In
the past year, aggressive measures by our intelligence, law
enforcement, defense and homeland security communities, along with our
key international partners have dealt serious blows to al-Qa'ida and
others. Despite these successes, however, the terrorist threat to the
U.S. in the Homeland and abroad endures.
Al-Qa'ida is intent on finding ways to circumvent U.S.
security enhancements to strike Americans and the Homeland.
It may be only a matter of time before al-Qa'ida or
another group attempts to use chemical, biological, radiological, and
nuclear weapons (CBRN).
Al-Qa'ida is only one facet of the threat from a broader
Sunni jihadist movement.
The Iraq conflict, while not a cause of extremism, has
become a cause for extremists.
We know from experience that al-Qa'ida is a patient, persistent,
imaginative, adaptive and dangerous opponent. But it is vulnerable and
we and other allies have hit it hard.
Jihadist religious leaders preach millennial aberrational
visions of a fight for Islam's survival. Sometimes they argue that the
struggle justifies the indiscriminate killing of civilians, even with
chemical, biological, radiological, or nuclear weapons.
Our pursuit of Al-Qa'ida and its most senior leaders, including Bin
Ladin and his deputy, Ayman al-Zawahiri is intense. However, their
capture alone would not be enough to eliminate the terrorist threat to
the U.S. Homeland or U.S. interests overseas. Often influenced by al-
Qa'ida's ideology, members of a broader movement have an ability to
plan and conduct operations. We saw this last March in the railway
attacks in Madrid conducted by local Sunni extremists. Other regional
groups--connected to al-Qa'ida or acting on their own--also continue to
pose a significant threat.
In Pakistan, terrorist elements remain committed to
attacking U.S. targets. In Saudi Arabia, remnants of the Saudi al-
Qa'ida network continue to attack U.S. interests in the region.
In Central Asia, the Islamic Jihad Group (IJG), a splinter
group of the Islamic Movement of Uzbekistan, has become a more virulent
threat to U.S. interests and local governments. Last spring the group
used female operatives in a series of bombings in Uzbekistan.
In Southeast Asia, the Jemaah Islamiyah (JI) continues to
pose a threat to U.S. and Western interests in Indonesia and the
Philippines, where JI is colluding with the Abu Sayyaf Group and
possibly the Mff.F.
In Europe, Islamic extremists continue to plan and cause
attacks against U.S. and local interests, some that may cause
significant casualties. In 2004 British authorities dismantled an al-
Qa'ida cell and an extremist brutally killed a prominent Dutch citizen
in the Netherlands.
Islamic extremists are exploiting the Iraqi conflict to recruit new
anti-U.S. jihadists.
These jihadists who survive will leave Iraq experienced in
and focused on acts of urban terrorism. They represent a potential pool
of contacts to build transnational terrorist cells, groups, and
networks in Saudi Arabia, Jordan and other countries.
Zarqawi has sought to bring about the final victory of
Islam over the West, and he hopes to establish a safe haven in Iraq
from which his group could operate against ``infidel'' Western nations
and ``apostate'' Muslim governments.
Other terrorist groups spanning the globe also pose persistent and
serious threats to U.S. and Western interests.
Hizballah's main focus remains Israel, but it could
conduct lethal attacks against U.S. interests quickly upon a decision
to do so.
Palestinian terrorist organizations have apparently
refrained from directly targeting U.S. or Western interests in their
opposition to Middle East peace initiatives, but pose an ongoing risk
to U.S. citizens that could be killed or wounded in attacks intended to
strike Israeli interests.
Extremist groups in Latin America are still a concern,
with the FARC--the Revolutionary Armed Forces of Colombia--possessing
the greatest capability and the clearest intent to threaten U.S.
interests in the region.
Horn of Africa, the Sahel, the Mahgreb, the Levant, and
the Gulf States are all areas where ``pop up'' terrorist activity can
be expected.
AFGHANISTAN
Mr. Chairman, Afghanistan, once the safe haven for Usama bin Ladin,
has started on the road to recovery after decades of instability and
civil war. Hamid Karzai's election to the presidency was a major
milestone. Elections for a new National Assembly and local district
councils--tentatively scheduled for this spring--will complete the
process of electing representatives.
President Karzai still faces a low-level insurgency aimed at
destabilizing the country, raising the cost of reconstruction and
ultimately forcing Coalition forces to leave.
The development of the Afghan National Army and a national
police force is going well, although neither can yet stand on its own.
IRAQ
Low voter turnout in some Sunni areas and the post-election
resumption of insurgent attacks--most against Iraqi civilian and
security forces--indicate that the insurgency achieved at least some of
its election-day goals and remains a serious threat to creating a
stable representative government in Iraq.
Self-determination for the Iraqi people will largely depend on the
ability of Iraqi forces to provide security. Iraq's most capable
security units have become more effective in recent months,
contributing to several major operations and helping to put an Iraqi
face on security operations. Insurgents are determined to discourage
new recruits and undermine the effectiveness of existing Iraqi security
forces.
The lack of security is hurting Iraq's reconstruction efforts and
economic development, causing overall economic growth to proceed at a
much slower pace than many analysts expected a year ago.
Alternatively, the larger uncommitted moderate Sunni
population and the Sunni political elite may seize the post electoral
moment to take part in creating Iraq's new political institutions if
victorious Shia and Kurdish parties include Sunnis in the new
government and the drafting of the constitution.
PROLIFERATION
Mr. Chairman, I will now turn to the worldwide challenge of
proliferation. Last year started with promise as Libya had just
renounced its WMD programs, North Korea was engaged in negotiations
with regional states on its nuclear weapons program, and Iran was
showing greater signs of openness regarding its nuclear program after
concealing activity for nearly a decade. Let me start with Libya, a
good news story, and one that reflects the patient perseverance with
which the Intelligence Community can tackle a tough intelligence
problem.
LIBYA
In 2004, Tripoli followed through with a range of steps to disarm
itself of WMD and ballistic missiles.
Libya gave up key elements of its nuclear weapons program,
opened itself to the IAEA.
Libya gave up some key CW assets and opened its former CW
program to international scrutiny.
After disclosing its SCUD stockpile and extensive
ballistic and cruise missile R&D efforts in 2003, Libya took important
steps to abide by its commitment to limit its missiles to the 300-km
range threshold of the Missile Technology Control Regime (MTCR).
The U.S. continues to work with Libya to clarify some discrepancies
in the declaration.
NORTH KOREA
On 10 February 2005, Pyongyang announced it was suspending
participation in the six-party talks underway since 2003, declared it
had nuclear weapons, and affirmed it would seek to increase its nuclear
arsenal. The North had been pushing for a freeze on its plutonium
program in exchange for significant benefits, rather than committing to
the full dismantlement that we and are our partners sought.
In 2003, the North claimed it had reprocessed the 8,000
fuel rods from the Yongbyong reactor, originally stored under the
Agreed Framework, with IAEA monitoring in 1994. The North claims to
have made new weapons from its reprocessing effort.
We believe North Korea continues to pursue a uranium
enrichment capability drawing on the assistance it received from A.Q.
Khan before his network was shutdown.
North Korea continues to develop, produce, deploy, and sell
ballistic missiles of increasing range and sophistication, augmenting
Pyongyang's large operational force of Scud and No Dong class missiles.
North Korea could resume flight-testing at any time, including of
longer-range missiles, such as the Taepo Dong-2 system. We assess the
TD 2 is capable of reaching the United States with a nuclear-weapon-
sized payload.
North Korea continues to market its ballistic missile
technology, trying to find new clients now that some traditional
customers, such as Libya, have halted such trade.
We believe North Korea has active CW and BW programs and probably
has chemical and possibly biological weapons ready for use.
IRAN
In early February, the spokesman of Iran's Supreme Council for
National Security publicly announced that Iran would never scrap its
nuclear program. This came in the midst of negotiations with EU-3
members (Britain, Germany and France) seeking objective guarantees from
Tehran that it will not use nuclear technology for nuclear weapons.
Previous comments by Iranian officials, including Iran's
Supreme Leader and its Foreign Minister, indicated that Iran would not
give up its ability to enrich uranium. Certainly they can use it to
produce fuel for power reactors. We are more concerned about the dual-
use nature of the technology that could also be used to achieve a
nuclear weapon.
In parallel, Iran continues its pursuit of long-range ballistic
missiles, such as an improved version of its 1,300 km range Shahab-3
MRBM, to add to the hundreds of short-range SCUD missiles it already
has.
Even since 9/11, Tehran continues to support terrorist groups in
the region, such as Hizballah, and could encourage increased attacks in
Israel and the Palestinian Territories to derail progress toward peace.
Iran reportedly is supporting some anti-Coalition
activities in Iraq and seeking to influence the future character of the
Iraqi state.
Conservatives are likely to consolidate their power in
Iran's June 2005 presidential elections, further marginalizing the
reform movement last year.
Iran continues to retain in secret important members of
Al-Qai'ida--the Management Council--causing further uncertainty about
Iran's commitment to bring them to justice.
CHINA
Beijing's military modernization and military buildup is tilting
the balance of power in the Taiwan Strait. Improved Chinese
capabilities to threaten U.S. forces in the region.
In 2004, China increased its ballistic missile forces
deployed across from Taiwan and rolled out several new submarines.
China continues to develop more robust, survivable
nuclear-armed missiles as well as conventional capabilities for use in
a regional conflict.
Taiwan continues to promote constitutional reform and other
attempts to strengthen local identity. Beijing judges these moves to be
a ``timeline for independence''. If Beijing decides that Taiwan is
taking steps toward permanent separation that exceed Beijing's
tolerance, we believe China is prepared to respond with various levels
of force.
China is increasingly confident and active on the international
stage, trying to ensure it has a voice on major international issues,
secure access to natural resources, and counter what it sees as U.S.
efforts to contain or encircle China.
New leadership under President Hu Jintao is facing an array of
domestic challenges in 2005, such as the potential for a resurgence in
inflation, increased dependence on exports, growing economic
inequalities, increased awareness of individual rights, and popular
expectations for the new leadership.
RUSSIA
The attitudes and actions of the so-called ``siloviki''--the ex-KGB
men that Putin has placed in positions of authority throughout the
Russian government may be critical determinants of the course Putin
will pursue in the year ahead.
Perceived setbacks in Ukraine are likely to lead Putin to
redouble his efforts to defend Russian interests abroad while balancing
cooperation with the West. Russia's most immediate security threat is
terrorism, and counterterrorism cooperation undoubtedly will continue.
Putin publicly acknowledges a role for outside powers to
play in the CIS, for example, but we believe he is nevertheless
concerned about further encroachment by the U.S. and NATO into the
region.
Moscow worries that separatism inside Russia and radical
Islamic movements beyond their borders might threaten stability in
Southern Russia. Chechen extremists have increasingly turned to
terrorist operations in response to Moscow's successes in Chechnya, and
it is reasonable to predict that they will carry out attacks against
civilian or military targets elsewhere in Russia in 2005.
Budget increases will help Russia create a professional military by
replacing conscripts with volunteer servicemen and focus on
maintaining, modernizing and extending the operational life of its
strategic weapons systems, including its nuclear missile force.
Russia remains an important source of weapons technology,
materials and components for other nations. The vulnerability of
Russian WMD materials and technology to theft or diversion is a
continuing concern.
POTENTIAL AREAS FOR INSTABILITY
Mr. Chairman, in the Middle East, the election of Palestinian
President Mahmud Abbas, nevertheless, marks an important step and Abbas
has made it clear that negotiating a peace deal with Israel is a high
priority. There nevertheless are hurdles ahead.
Redlines must be resolved while Palestinian leaders try to
rebuild damaged PA infrastructure and governing institutions,
especially the security forces, the legislature, and the judiciary.
Terrorist groups, some of who benefit from funding from
outside sources, could step up attacks to derail peace and progress.
AFRICA
In Africa, chronic instability will continue to hamper counter-
terrorism efforts and pose heavy humanitarian and peacekeeping burdens.
In Nigeria, the military is struggling to contain militia
groups in the oil-producing south and ethnic violence that frequently
erupts throughout the country. Extremist groups are emerging from the
country's Muslim population of about 65 million.
In Sudan, the peace deal signed in January will result in
de facto southern autonomy and may inspire rebels in provinces such as
Darfur to press harder for a greater share of resources and power.
Opportunities exist for Islamic extremists to reassert themselves in
the North unless the central government stays unified.
Unresolved disputes in the Horn of Africa--Africa's
gateway to the Middle East--create vulnerability to foreign terrorist
and extremist groups. Ethiopia and Eritrea still have a contested
border, and armed factions in Somalia indicate they will fight the
authority of a new transitional government.
LATIN AMERICA
In Latin America, the region is entering a major electoral cycle in
2006, when Brazil, Colombia, Costa Rica, Ecuador, Mexico, Nicaragua,
Peru, and Venezuela hold presidential elections. Several key countries
in the hemisphere are potential flashpoints in 2005.
In Venezuela, Chavez is consolidating his power by using
technically legal tactics to target his opponents and meddling in the
region supported by Castro.
In Colombia, progress against counternarcotics and
terrorism under President Uribe's successful leadership, may be
affected by the election.
The outlook is very cloudy for legitimate, timely
elections in November 2005 in Haiti--even with substantial
international support.
Campaigning for the 2006 presidential election in Mexico
is likely to stall progress on fiscal, labor, and energy reforms.
In Cuba, Castro's hold on power remains firm, but a bad fall last
October has rekindled speculation about his declining health and
succession scenarios.
SOUTHEAST ASIA
In Southeast Asia, three countries bear close watching.
In Indonesia, President Yudhoyono has moved swiftly to
crackdown on corruption. Reinvigorating the economy, burdened by the
costs of recovery in tsunami-damaged areas, will likely be affected by
continuing deep-seated ethnic and political turmoil exploitable by
terrorists.
In the Philippines, Manila is struggling with prolonged
Islamic and Communist rebellions. The presence of Jemaah Islamiyah (JI)
terrorists seeking safe haven and training basses adds volatility and
capability to terrorist groups already in place.
Thailand is plagued with an increasingly volatile Muslim.
separatist threat in its southeastern provinces, and the risk of
escalation remains high.
Chairman Roberts. We thank you, Mr. Director, for a very
comprehensive statement.
Director Mueller.
STATEMENT OF THE HONORABLE ROBERT MUELLER,
DIRECTOR, FEDERAL BUREAU OF INVESTIGATION
Director Mueller. Good morning, Mr. Chairman. Thank you.
Thank you, Mr. Chairman and Senator Rockefeller and the Members
of the Committee. I appreciate this opportunity to discuss our
current view of threats to the United States and the FBI's
efforts to address these threats.
Mr. Chairman, over the past year, through unprecedented
cooperation, particularly with our other Federal agencies, but
most particularly with State and local law enforcement, and
with enhanced intelligence capabilities, we have achieved
considerable victories against national security and criminal
threats facing the United States.
However, at the same time, I must also report that these
threats continue to evolve and to pose new challenges to the
FBI and to our partners. It remains the FBI's overriding
priority to detect and prevent terrorist attacks. And the
threat posed by international terrorism, and in particular from
al-Qa'ida and from related groups, continues to be the gravest
threat that we face.
In 2004, we learned that terrorist cell members had
conducted detailed surveillance of financial targets in New
York, Washington, DC and New Jersey. In response to this threat
and in coordination with the Department of Homeland Security,
the threat level was raised. And we mobilized a substantial
contingent of agents and analysts to review the massive amount
of information connected with the attack planning and to
uncover any additional information that would give us insight
into that plot.
Later in the year, we received information suggesting that
there would be an attack. There was an attack being planned,
possibly timed to coincide with the period before the 2004
Presidential election.
To counter that threat, the FBI created a task force in May
2004, and with thousands of FBI personnel working together with
hundreds of individuals from other agencies--Federal, State and
local--we brought to bear every possible resource in an effort
to identify the operatives and to disrupt the attack plan.
As part of the initiatives of this task force, field
offices conducted a thorough canvas of all of our
counterterrorism investigations, as well as all of our
sources--not only counterterrorism sources, but other sources--
in an effort to develop any further information that could help
us find these individuals.
During the 7 months that the task force was up and running,
we also checked every substantive lead provided in the threat
intelligence. It was indeed an extraordinary effort, and while
we may never know if an operation was indeed being planned, I
am certain that our response to the threat played an integral
role in disrupting any operational plans that may have been
under way.
Mr. Chairman, since we last spoke, the FBI has identified
various extremists located throughout the United States and is
monitoring their activities. My prepared statement sets forth a
number of instances in which we have taken legal action against
individuals engaged in terrorism-related activities in
Virginia, Minneapolis and New York. Although these efforts have
made us safer, they are also a sobering reminder of the threat
we continue to face.
There are three areas that cause us the greatest concern.
First is the threat from covert al-Qa'ida operatives inside the
United States who have the intention to facilitate or to
conduct an attack. Finding them is the top priority for the
FBI, but it is also one of our most difficult challenges. The
very nature of a covert operative, trained not to raise
suspicion and to appear benign, is what makes their detection
so difficult.
Whether we are talking about a true sleeper operative who
has been in place for years, waiting to be activated to conduct
an attack, or a recently deployed operative who has entered the
United States to facilitate or to conduct an attack, we are
continuously adapting our methods to reflect newly received
intelligence and to ensure we are as proactive and as targeted
as we can be in detecting their presence.
Second, we are also extremely concerned with the growing
body of sensitive reporting that continues to show al-Qa'ida's
clear intention to obtain, and to ultimately use, some form of
chemical, biological, radiological or nuclear material in its
attacks against the United States.
While we still assess that a mass casualty attack using
relatively low-tech methods will be their most likely approach,
we are concerned that they are seeking weapons of mass
destruction, including chemical weapons, so-called dirty bombs
or some form of biological agent such as anthrax.
Third, we remain concerned about the potential for al-
Qa'ida to leverage extremist groups with peripheral or
historical connections to al-Qa'ida, and particularly its
ability to exploit radical American converts and other
indigenous extremists. While we still believe that the most
serious threat to the homeland originates from al-Qa'ida
members located overseas, the bombings in Madrid last March
have heightened our concern regarding the possible role that
indigenous Islamic extremists already in the United States may
play in future terrorist plots.
We are also concerned about the possible role that
peripheral groups with a significant presence in the United
States may play, if called upon by members of al-Qa'ida to
assist them with attack planning or logistical support. The
potential recruitment of radicalized American Muslim converts
continues to be a concern and poses an increasingly challenging
issue. The process of recruitment can be subtle, and many times
self-initiated. And radicalization tends to occur over a long
period of time and under very many different circumstances.
Efforts by extremists to obtain training inside the United
States is also an ongoing concern. Although there are multiple
reports and ongoing investigations associated with paramilitary
training activities, I would suspect that extremists
nationwide, the majority of these cases involve small groups of
like-minded individuals who are inspired by the jihadist
rhetoric found in radical mosques or in prison proselytizing or
on the Internet.
Fortunately, the recent amendment to Title 18 adding a
provision prohibiting individuals from receiving military-type
training from a designated foreign terrorist organization makes
it possible now to prosecute individuals who participate or
assist individuals in receiving this type of training.
Mr. Chairman, al-Qa'ida and the groups that support it are
still the most lethal threat we face today. However, other
terrorist groups that have a presence in the United States
require careful monitoring.
It is the FBI's assessment at this time that there is a
limited threat of a coordinated terrorist attack in the United
States from Palestinian terrorist organizations such as Hamas
and the Palestine Islamic Jihad, and the al-Aqsa Martyrs
Brigade. These groups have maintained a longstanding policy of
focusing their attacks on Israeli targets in Israel and the
Palestinian territories. We believe that the primary interest
of Palestinian terrorist groups in the United States remains
the raising of funds to support their regional goals.
We are committed to cutting off the flow of these funds
from the United States to Palestinian terrorist organizations.
As an example of this effort, the former leadership of the Holy
Land for Relief and Development, a Hamas front organization,
was indicted this past year. And in another case, the Elashi
brothers, who owned and ran InfoCom, another Hamas front
organization, were prosecuted and convicted.
Of all the Palestinian groups, Hamas has the largest
presence in the United States, with a strong infrastructure
primarily focused on fundraising, propaganda for the
Palestinian cause and proselytizing. Although it would be a
major strategic shift for Hamas, its United States network is
theoretically capable of facilitating acts of terrorism in the
United States.
And like Hamas, but on a much smaller scale, the United
States-based Palestine Islamic Jihad members and supporters are
primarily engaged in fundraising, propaganda and proselytizing
activities. In 2003, the Palestine Islamic Jihad, or PIJ,
activities and capabilities in the United States were severely
undercut by the arrests of the PIJ leader Sami al-Arian and his
lieutenants. And there have been two additional arrests of
suspected PIJ activists on charges unrelated to terrorism,
which I believe are set forth in my accompanying statement.
Currently, the most likely threat of a terrorist attack
from Palestinian groups in the United States--in the United
States homeland--is from a lone-wolf scenario. In this
scenario, a terrorist attack would be perpetrated by one or
more individuals who may embrace the ideology of a Palestinian
terrorist group, but act without assistance or approval of any
established group.
And then, the Lebanese Hizbollah retains the capability to
strike in the United States, although we have no credible
information to indicate that United States-based Hizbollah
members have plans to attack American interests within the
United States or, for that matter, abroad.
I might add in 2004 we had successes in uncovering
individuals providing material support to Hizbollah, many of
those individuals involved in various criminal schemes to
provide the monies that could be sent to Lebanon, to the
coffers of Hizbollah.
Mr. Chairman, while the national attention is focused on
the substantial threat posed by international terrorists to the
homeland, the FBI must also dedicate resources to defeating a
number of other threats, as detailed in my prepared statement--
for example, domestic terrorists, motivated by a number of
political or social agendas, including white supremacists,
black separatists, animal rights/environmental terrorists,
anarchists, anti-abortion extremists and self-styled militia
groups; foreign intelligence activity, often using non-
traditional collectors such as students and business visitors,
targeting WMD information and technology, penetration of the
United States government and compromise of critical, national
assets.
There is the cyber threat from foreign governments, from
terrorist groups and from hackers with the ability and the
desire to utilize computers for illegal and harmful purposes.
And finally, there are the continuing threats posed to the
fabric of our society by organized crime, human smuggling and
trafficking, violent gangs, public corruption, civil rights
violations, crimes against children and corporate fraud.
Mr. Chairman, in combating all these threats, from
international terrorists to child predators, the FBI must
effectively collect, analyze and share intelligence. As a
result, over the past year we have continued to strengthen the
FBI's enterprise-wide intelligence program. It began in 2001,
with a dedicated analysis section in the Counterterrorism
Division.
In 2002, we created the Office of Intelligence in the
Counterterrorism Division. That structure has enhanced our
capability significantly for purposes of our counterterrorism
operations as well as the counterterrorism operations of our
partners.
In 2003, we extended this concept across all FBI programs--
criminal, cyber, counterterrorism and counterintelligence--and
unified intelligence authorities under a new FBI Office of
Intelligence, led by an Executive Assistant Director. The
Office of Intelligence has adopted the intelligence community's
best practices to direct all of our FBI intelligence
activities. Congress and the 9/11 Commission reviewed these
efforts, and provided recommendations to strengthen our
capabilities.
In the last years, in intelligence reform legislation,
alluded to by Senator Rockefeller, Congress directed us to
create the Directorate of Intelligence--a dedicated national
intelligence workforce within the FBI--and we are doing so.
This workforce consists of intelligence analysts, language
analysts, physical surveillance specialists and special agents
who can pursue an entire career in intelligence.
This integrated intelligence service leverages the core
strengths of the law enforcement community, such as reliability
of sources and fact-based analysis, while ensuring that no
walls exist between collectors, analysts and those who must act
upon the intelligence information.
The Directorate also benefits from the strong FBI history
of joint operations by unifying FBI intelligence professionals
and integrating all partners, but most particularly, State,
local and tribal law enforcement into our intelligence
structures.
Mr. Chairman, my prepared statement provides additional
information about the Directorate of Intelligence and the many
steps that the Bureau has taken to expand and to strengthen its
intelligence capabilities.
We continue to make progress, but there is still much work
to do. We do not underestimate the challenges we face, but we
are confident in our strategy and in our plans to protect the
American people.
I again would like to thank you and the Committee for your
support, and I look forward to working with you and the staff
in the months--and hopefully the years--ahead. And I'm happy to
answer any questions that you might have.
Thank you, sir.
[The prepared statement of Director Mueller follows:]
Prepared Statement of Hon. Robert S. Mueller, III, Director,
Federal Bureau of Investigation
Good afternoon, Mr. Chairman, Senator Rockefeller, and Members of
the Committee. I appreciate this opportunity to discuss our current
view of threats to the United States and the FBI's efforts to address
them.
Before I begin, I would like to take a moment to thank all of our
partners in the Law Enforcement and Intelligence Communities. They have
shared their information and expertise, and in many cases worked side-
by-side with us, and together we made great progress over the past year
to protect our Nation and our communities from terrorism and crime.
I would also like to thank the men and women of the FBI for
continuing to embrace our changing mission, for working to enhance our
intelligence capabilities, for adapting to new technologies and new
ways of doing things, and for doing all of this without ever pausing in
our forward push to protect this country from active threats.
Mr. Chairman, over the past year, through unprecedented
cooperation, enhanced intelligence capabilities, and continued
unwavering commitment to protect the American people, we have achieved
considerable victories against national security and criminal threats
facing the U.S. However, I must also report that these threats continue
to evolve and to pose new challenges to the FBI and our partners.
It remains the FBI's overriding priority to predict and prevent
terrorist attacks. The threat posed by international terrorism, and in
particular from al Qa'ida and related groups, continues to be the
gravest we face.
AL-QA'IDA AND RELATED TERRORIST GROUPS
In 2004, our efforts in the War on Terrorism grew more
intelligence-driven, more coordinated, and produced many tangible
results.
In 2004 we learned that operatives had conducted detailed
surveillance of financial targets in New York, Washington DC, and New
Jersey. In response to this threat, in coordination with DHS, the
threat level was raised from yellow to orange for the cities referenced
in the threat and we mobilized a large contingent of analysts and
agents to review the massive amount of information connected with the
attack planning, and to uncover any additional information that would
give us insight into the plot.
Previously, in the Spring of 2004, our allies in the United Kingdom
arrested a group of terrorists who were plotting an imminent attack
inside the UK. In response, we immediately formed a task force of
analysts and agents to determine if there was a U.S. nexus to the plot
or if any of the UK subjects had links to individuals in the U.S.
Later in the year, we received information suggesting that there
was an attack being planned--possibly timed to coincide with the 2004
Presidential Election. To counter the threat, the FBI created the 2004
Threat Task Force in May 2004. With thousands of FBI personnel,
supported by individuals from outside agencies, it was the largest task
force created since 9/11, and it brought to bear every possible
resource in an effort to identify the operatives and disrupt the attack
plan.
As part of the Task Force's initiatives, field offices conducted a
thorough canvass of all counterterrorism investigations and FBI sources
to develop any further information that could help us find these
individuals. During the 7 months the task force was up and running, we
also checked every tangible lead provided in the threat intelligence.
It was an extraordinary effort and while we may never know if an
operation was indeed being planned, I am certain that the FBI's
tremendous response to the threat played an integral role in disrupting
any operational plans that may have been underway.
Mr. Chairman, since we last spoke, the FBI has identified various
extremists located throughout the U.S. and is monitoring their
activities. Although these efforts have made us safer, they are also a
sobering reminder of the threat we continue to face.
In Virginia, Mohammed Ali al-Timimi, the spiritual leader
of the Virginia Jihad training group disrupted last year, was indicted
for his involvement in the recruitment of U.S. citizens for extremist
training and jihad preparation. Al-Timimi, the primary lecturer at a
northern Virginia Islamic center, preached jihad to a small core group
of followers, provided them paramilitary training and facilitated their
travel to Pakistan in the days after September 11th to attend Lashkar-
e-Taiba training camp in preparation to fight the United States in
Afghanistan.
In Minneapolis, we arrested Mohamad Kamal El-Zahabi, a
Lebanese citizen who admitted to serving in Afghanistan and Chechnya as
a sniper and to providing sniper training at Khalden camp in
Afghanistan and in Lebanon in the 1990s. We first learned of El-Zahabi
during our investigation of Boston-based Sunni extremists Ra'ed Hijazi,
convicted for his role in the Millennium plot in Jordan, and Bassain
Kanj, who was killed in a plot to overthrow the Lebanese government in
2000.
In New York, Yassin Muhiddin Aref was arrested on money
laundering charges connected to a possible terrorist plot to kill a
Pakistani diplomat.
Unfortunately, in spite of these accomplishments, al-Qa'ida
continues to adapt and move forward with its desire to attack the
United States using any means at its disposal. Their intent to attack
us at home remains--and their resolve to destroy America has never
faltered.
Al-Qa'ida's overall attack methodology has adapted and evolved to
address the changes to their operating environment. While we still
assess that a mass casualty attack using relatively low-tech methods
will be their most likely approach, we are concerned that they are
seeking weapons of mass destruction including chemical weapons, so-
called ``dirty bombs'' or some type of biological agent such as
anthrax.
Every day, personnel in our Counterterrorism Division and in 100
Joint Terrorism Task Forces around the country, work to determine
where, when, and how the next attack will occur. The fact remains--
America is awash in desirable targets--those that are symbolic like the
U.S. Capitol and the White House--as well as the many infrastructure
targets, like nuclear power plants, mass transit systems, bridges and
tunnels, shipping and port facilities, financial centers, and
airports--that if successfully hit, would cause both mass casualties
and a crippling effect on our economy.
We continue to be concerned that U.S. transportation systems remain
a key target. The attacks in Madrid last March show the devastation
that a simple, low-tech operation can achieve and the resulting impact
to the government and economy, which makes this type of attack in the
U.S. particularly attractive to al-Qa'ida.
Another area we consider vulnerable and target rich is the energy
sector, particularly nuclear power plants. Al-Qa'ida planner Khalid
Sheikh Mohammed had nuclear power plants as part of his target set and
we have no reason to believe that al-Qa'ida has reconsidered.
Looking ahead, there are three areas that cause us the greatest
concern.
First is the threat from covert operatives who may be inside the
U.S. who have the intention to facilitate or conduct an attack. Finding
them is a top priority for the FBI, but it is also one of the most
difficult challenges. The very nature of a covert operative--trained to
not raise suspicion and to appear benign--is what makes their detection
so difficult.
Mr. Chairman, while we are proud of our accomplishments this year
and the additional insight we have gained into al-Qa'ida's activity, I
remain very concerned about what we are not seeing.
Whether we are talking about a true sleeper operative who has been
in place for years, waiting to be activated to conduct an attack or a
recently deployed operative that has entered the U.S. to facilitate or
conduct an attack, we are continuously adapting our methods to reflect
newly-received intelligence and to ensure we are as proactive and as
targeted as we can be in detecting their presence.
Second, because of al-Qa'ida's directed efforts this year to
infiltrate covert operatives into the U.S., I am also very concerned
with the growing body of sensitive reporting that continues to show al-
Qa'ida's clear intention to obtain and ultimately use some form of
chemical, biological, radiological, nuclear or high-energy explosives
(CBRNE) material in its attacks against America.
Third, we remain concerned about the potential for al-Qa'ida to
leverage extremist groups with peripheral or historical connections to
al-Qa'ida, particularly its ability to exploit radical American
converts and other indigenous extremists. While we still believe the
most serious threat to the Homeland originates from al-Qa'ida members
located overseas, the bombings in Madrid last March have heightened our
concern regarding the possible role that indigenous Islamic extremists,
already in the U.S., may play in future terrorist plots. Also of
concern is the possible role that peripheral groups with a significant
presence in the U.S. may play if called upon by members of al-Qa'ida to
assist them with attack planning or logistical support.
The potential recruitment of radicalized American Muslim converts
continues to be a concern and poses an increasingly challenging issue
for the FBI because the process of recruitment is subtle and many
times, self initiated and radicalization tends to occur over a long
period of time and under many different circumstances.
As part of our continued efforts to identify populations that may
be a target for extremist recruitment, the FBI has been involved in a
coordinated effort between law enforcement and corrections personnel to
combat the recruitment and radicalization of prison inmates. Prisons
continue to be fertile ground for extremists who exploit both a
prisoner's conversion to Islam while still in prison, as well as their
socio-economic status and placement in the community upon their
release.
Extremist recruitment at schools and universities inside the United
States also poses a particularly difficult problem. Because the
environment on campuses is so open and isolated, schools provide a
particularly impressionable and captive audience for extremists to
target.
Additionally, keeping in mind al-Qa'ida recruitment efforts occur
primarily overseas, we are closely monitoring any possible methods for
moving individuals to extremist-linked institutions overseas,
specifically religious schools and mosques that have overt ties to al-
Qa'ida or other terrorist organizations.
We are also concerned about the possibility that individuals who
are members of groups previously considered to be peripheral to the
current threat, could be convinced by more radical, external influences
to take on a facilitation or even worse--an operational role--with
little or no warning. Individual members of legitimate organizations,
such Jama'at Tabligh, may be targeted by al-Qa'ida in an effort to
exploit their networks and contacts here in the United States.
Efforts by extremists to obtain training inside the U.S. is also an
ongoing concern. Although there are multiple reports and ongoing
investigations associated with the paramilitary training activities of
suspected extremists nationwide, the majority of these cases involve
small groups of like-minded individuals who are inspired by the
jihadist rhetoric experienced in radical mosques or prison
proselytizing.
Fortunately, the recent amendment to Title 18 adding a provision
whereby an individual knowingly receiving military-type training from a
designated foreign terrorist organization is committing an offense,
makes it possible to now prosecute individuals who participate or
assist individuals in receiving this type of training.
Another area of concern is the recent merging of Iraqi jihadist
leader Abu Mu'sab alZargawi with al-Qa'ida. Zarqawi has a demonstrated
capability of directing external operations while maintaining his focus
on Iraq as noted with the disrupted Jordan plot in April.
Another aspect of extremist activity in the U.S. is the extensive
fundraising efforts by various terrorist groups. We continue to
identify and block funding conduits, freeze assets of terrorists and
those who support them, protect legitimate charities, and disrupt the
movement of money through peripheral financial systems such as Hawalas.
As part of this effort, the FBI has engaged in extensive
coordination with authorities of numerous foreign governments in
terrorist financing matters, leading to joint investigative efforts
throughout the world. The FBI's participation in a U.S.-Saudi Arabia
Joint Terrorism Task Force, the U.S.-Swiss Terrorism Financing Task
Force and the International Working Group on Terrorist Financing has
enhanced cooperation between these agencies and the U.S. and allowed
the FBI unprecedented access that has increased our understanding of
these complex financing networks. Since 2002, we have provided
terrorism financing training and technical assistance to liaison
partners in almost 50 countries.
THE THREAT FROM OTHER INTERNATIONAL TERRORIST GROUPS
Mr. Chairman, al-Qa'ida and the groups that support it are still
the most lethal threat we face today. However, other terrorist groups
that have a presence in the U.S. require careful monitoring.
It is the FBI's assessment, at this time, that there is a limited
threat of a coordinated terrorist attack in the U.S. from Palestinian
terrorist organizations, such as HAMAS, the Palestine Islamic Jihad,
and the al-Agsa Martyr's Brigade. These groups have maintained a
longstanding policy of focusing their attacks on Israeli targets in
Israel and the Palestinian territories. We believe that the primary
interest of Palestinian terrorist groups in the U.S. remains the
raising of funds to support their regional goals.
The FBI is committed to staunching the flow of funds from the U.S.
to Palestinian terrorist organizations. As an example of this effort,
the former leadership of the Holy Land for Relief and Development, a
HAMAS front organization, was indicted this past year and convictions
were won against the Elashi brothers who owned and ran Infocom, another
HAMAS front organization.
Of all the Palestinian groups, HAMAS has the largest presence in
the U.S. with a robust infrastructure, primarily focused on
fundraising, propaganda for the Palestinian cause, and proselytizing.
Although it would be a major strategic shift for HAMAS, its U.S.
network is theoretically capable of facilitating acts of terrorism in
the U.S.
Like HAMAS, but on a much smaller scale, U.S.-based Palestine
Islamic Jihad members and supporters are primarily engaged in
fundraising, propaganda and proselytizing activities. In 2003, the
Palestine Islamic Jihad, or PIJ, activities and capabilities in the
U.S. were severely undercut by the arrests of the U.S. PIJ leader, Sami
al-Arian, and three of his top lieutenants. There have also been two
additional arrests of suspected PIJ activists on charges unrelated to
terrorism. There has been no indication of a new U.S. PIJ leadership
since the arrest of al-Axian.
Currently, the most likely threat of terrorist attacks from
Palestinian groups to the U.S. homeland is from a ``lone wolf
'scenario. In this scenario, a terrorist attack would be perpetrated by
one or more individuals who may embrace the ideology of a Palestinian
terrorist group, but act without assistance or approval of any
established group.
Lebanese Hizballah retains the capability to strike in the U.S.,
although we have no credible information to indicate that US-based
Hizballah members have plans to attack American interests within the
U.S. or abroad. In 2004, we had some success in uncovering individuals
providing material support to Hizballah.
In Detroit, Mahmoud Youssef Kourani was indicted in the
Eastern District of Michigan on one count of Conspiracy to Provide
Material Support to Hizballah. Kourani was already in custody for
entering the country illegally through Mexico and was involved in
fundraising activities on behalf of Hizballah.
Also in Detroit, Fawzi Assi was arrested in May of 2004
and was charged under the 1996 Antiterrorism and Effective Death
Penalty Act for providing material support to Hizballah. Assi was
initially arrested in 1998 after an outbound U.S. Customs search at the
Detroit Metro Airport discovered night vision goggles, one thermal
imaging scope and two Boeing Global Positioning System devices. Assi
later fled the country after being released by the court on bail, but
was later turned over to us in Lebanon to face U.S. criminal charges.
THE THREAT FROM DOMESTIC TERRORISM
While national attention is focused on the substantial threat posed
by international terrorists to the homeland, law enforcement officials
must also contend with an ongoing threat posed by domestic terrorists
based and operating strictly within the U.S. Domestic terrorists
motivated by a number of political or social agendas--including white
supremacists, black separatists, animal rights/environmental
terrorists, anarchists, anti-abortion extremists, and self-styled
militia--continue to employ violence and criminal activity in
furtherance of these agendas.
Animal rights and environmental extremists, operating under the
umbrella of the Animal Liberation Front (ALF) and Earth Liberation
Front (ELF) utilize a variety of tactics against their targets,
including arson, sabotage/vandalism, theft of research animals, and the
occasional use of explosive devices.
Serious incidents of animal rights/eco-terrorism decreased in 2004,
a fact we attribute to a series of law enforcement successes that are
likely deterring large-scale arsons and property destruction. Following
a rash of serious incidents of animal rights/eco-terrorism, including a
$50 million arson in San Diego and two bombing incidents in the San
Francisco area, law enforcement authorities achieved several
significant successes which have likely deterred additional terrorist
activity. Despite these successes, we anticipate that animal rights
extremism and eco-terrorism will continue to threaten certain segments
of government and private industry, specifically in the areas of animal
research and residential/commercial development.
The potential for violence by anarchists and other emerging
revolutionary groups, such as the Anarchist Black Cross Federation
(ABCF), will continue to be an issue for law enforcement. The stated
goals of the ABCF are ``the abolishment of prisons, the system of laws,
and the Capitalist state.'' The ABCF believes in armed resistance to
achieve a stateless and classless society. ABCF has continued to
organize, recruit, and train anarchists in the tactical use of
firearms.
U.S.-based black separatist groups follow radical variants of
Islam, and in some cases express solidarity with al-Qa'ida and other
international terrorist groups.
Incidents of organized white supremacist group violence decreased
in 2004. This is due to several high profile law enforcement arrests
over the last several years, as well as the continued fragmentation of
white supremacist groups because of the deaths or the arrests of
leaders. We judge that violence on the part of white supremacists
remains an ongoing threat to government targets, Jewish individuals and
establishments, and non-white ethnic groups.
However, the right-wing Patriot movement--consisting of militias,
common law courts, tax protesters, and other anti-government
extremists--remains a continuing threat in America today. Sporadic
incidents resulting in direct clashes with law enforcement are possible
and will most likely involve State and local law enforcement personnel,
such as highway patrol officers and sheriff's deputies.
Potential violent anti-abortion extremists linked to terrorism
ideologies or groups pose a current threat. The admiration of violent
high-profile offenders by extremists highlight continued concerns
relating to potential or similar anti-abortion threat activity.
WMD PROLIFERATION AND OTHER FOREIGN INTELLIGENCE THREATS
Although the impact of terrorism is more immediate and highly
visible, espionage and foreign intelligence activity are no less a
threat to the U.S. national security. Many countries consider the U.S.
to be their primary intelligence target; so long as the U.S. maintains
its position in world affairs, it will continue to be targeted. As part
of its reinvigorated and refocused foreign counterintelligence (FCI)
program, the FBI has applied a more rigorous methodology to its efforts
to assess and articulate the current threat environment.
One of the key elements of the FBI's National Strategy for
Counterintelligence (adopted in August 2002) is the threat assessment.
Over the past 2 years, the FBI has produced comprehensive threat
assessments on several countries deemed to be of particular CI concern.
The National Strategy for Counterintelligence identified five
categories of foreign intelligence activity as being especially harmful
to the U.S. national security. These five categories of activity are
weighted in terms of importance, the in the following order:
Proliferation of chemical, biological, radiological,
nuclear, and high-energy explosives (CBRNE) information and technology:
Penetration of the U.S. Intelligence Community (USIC)
Penetration of U.S. Government entities and contractors
Compromise of Critical National Assets (CNAs), defined as
any information, policies, plans, technologies, or industries that, if
stolen, modified, or manipulated by an adversary would seriously
threaten U.S. national or economic security; and
Conduct of clandestine foreign intelligence activities in
the U.S.
Several countries have traditionally considered the U.S. to be
their primary intelligence target, as well as an adversary or threat.
This prioritization is manifested through their continued large and
active intelligence presence in the U.S. and their aggressive targeting
of U.S. persons, information and technology. Other countries, while not
necessarily viewing the U.S. as an adversary or threat, seek
information to help them compete economically, militarily, and
politically in world affairs. As the current leader in all three areas,
the U.S. becomes their primary target. For still other countries,
rather than being an intelligence target, the U.S. represents an
operating environment in which to conduct intelligence-related
activities focused on their domestic security.
Some foreign countries are becoming increasingly sophisticated in
their CI awareness, training and capabilities. Also of growing concern
is the asymmetrical threat posed by certain intelligence services that
supplement their collection capabilities in the U.S. by using non-
traditional collectors. These collectors include students, delegations,
business visitors, emigres, and retired intelligence officers who are
collecting against targets of opportunity or responding to ad hoc
requests from the intelligence services. Such non-traditional
collectors pose a potential threat across the US, requiring a
coordinated response by all FBI field offices.
The FBI does not foresee any significant changes in the official
foreign intelligence presence in the U.S. over the next two to 3 years.
However, in addition to using non-traditional collectors, several
countries appear to be exploiting their military liaison officers, who
are in the U.S. on overt, legitimate intelligence-sharing missions, to
target and collect sensitive defense information that is outside the
scope of their official access. Most difficult to identify and assess
is the intelligence collection activity being directed and/or conducted
by non-intelligence organizations, such as other foreign government
agencies and/or foreign companies. The FBI sees this type of activity
most frequently in the targeting and collection of CBRNE information
and technology.
Another challenge the FBI will face is the tendency of some foreign
intelligence services to leverage liaison relationships for
intelligence collection purposes. U.S. Government representatives
participating in international conferences and exchanges, or whose
duties include routine liaison with foreign intelligence
representatives, frequently report that their contacts engage in
elicitation, sometimes to a surprisingly aggressive level.
The FBI expects to see a continued increase in the use of
technology as an enabler for intelligence operations, such as
contacting, tasking; and debriefing sources and agents in the US.
Over the near term, the priority collection targets for these
countries will be:
The effects of the recent 2004 U.S. elections on U.S.
foreign and domestic policies;
U.S. military actions in Iraq and Afghanistan;
U.S. counterterrorism policy;
U.S. dual use technologies; and
U.S. policy vis-a-vis particular countries or regions of
the world.
The FBI expects to see continued lobbying, political influence,
and/or perception management activities by countries hoping to affect
U.S. policy.
Many foreign intelligence services will also continue to exploit
their presence in the U.S. to target and collect against third
countries. Most will also engage in defensive intelligence activities,
targeting their own expatriate and ethnic communities in the US,
especially those groups deemed to be a threat to the current regime.
The FBI's National Strategy for Counterintelligence sets forth
national priorities and strategic objectives as well as changes in
management and organizational culture intended to redirect and
significantly enhance the overall performance of the FBI's FCI program.
Program objectives and outcomes include:
Identify intelligence service objectives, officers,
assets, and operations;
Disrupt the operations of intelligence services; and
Change the behavior of exploited institutions and
individuals.
To that end, the FBI has identified five program strategies: Know
the Domain; Understand the Threat; Engage in Strategic Partnerships;
Conduct Sophisticated Operations; and Inform Policymakers.
During fiscal year 2004, the FBI FCI program accomplished the
following:
Six foreign intelligence officers and/or agents were
arrested;
67 requests for persona non grata actions and visa denials
were issued;
1,667 Intelligence Information Reports were disseminated.
In addition, the Asset Validation Review process was implemented in
July 2002, and the FBI began providing mandatory asset validation
training for Asset Coordinators in the field regarding procedures and
policies. The FBI also implemented the Agents in Laboratories
Initiative (AILI) in February 2003, through which FBI agents have been
placed in Department of Energy nuclear weapons and science
laboratories.
The FBI has also developed several strategic partnerships, to
include the Regional CI Working Group (RCIWG) Initiative, which was
established in October 2003 to implement the National Strategy for
Counterintelligence, leverage the RCIWGs in tasking our USIC partners,
address intelligence gaps, identify CI trends and priorities in the
operational arena among USIC agencies at the field level, and ensure
that all CI operational initiatives and projects across agencies are
coordinated through the FBI.
Similarly, the National CI Working Group (NCIWG) was established
and is led by the FBI and consists of other CI agency head-level
representatives. The mission is to establish ongoing interagency
planning discussions to better coordinate CI operations USIC-wide.
Domain Task Forces are CI project level task forces led by the FBI, in
vulnerabilities associated with at-risk national security projects,
i.e., sensitive technologies, information, and research and
development.
FBI field offices are developing ``business alliances'' to build
executive-level relationships and foster threat and vulnerability
information sharing, with private industries and academic institutions
located within their territories having at-risk and sensitive national
security and economic technologies, research and development projects.
Finally, the FBI has reinvigorated its CI training process. For
example, field agents are trained in the key components of basic CI
operations through an intensive 4-week Basic CI Operations course.
Other advanced, highly specialized CI courses and seminars provide
training to agents and analysts through a variety of innovative
instructional methods and include inservices and conferences, the
Interactive Multimedia Instruction and Simulation (IMIS) computer-based
training program, and the FBI Intranet.
CYBER THREATS
The cyber-threat to the U.S. is serious and continues to expand
rapidly the number of actors with both the ability and the desire to
utilize computers for illegal and harmful purposes rises.
Cyber threats stems from both State actors, including foreign
governments that use their vast resources to develop cyber technologies
with which to attack our networks, and non-state actors such as
terrorist groups and hackers that act independently of foreign
governments. The increasing number of foreign governments and non-state
actors exploiting U.S. computer networks is a major concern to the FBI
and the Intelligence Community as a whole.
State actors continue to be a threat to both our national security
as well as our economic security because they have the technical and
financial resources to support advanced network exploitation and
attack. The greatest cyber threat is posed by countries that continue
to openly conduct computer network attacks and exploitations on
American systems.
Terrorists show a growing understanding of the critical role that
information technology plays in the day-to-day operations of our
economy and national security. Their recruitment efforts have expanded
to include young people studying mathematics, computer science and
engineering in an effort to move from the limited physical attacks to
attacks against our technical systems.
Fortunately, the large majority of hackers do not have the
resources or motivation to attack the U.S. critical information
infrastructures. Most targets of the hacker are viewed as
``challenges'' to break into a system. These individuals do not
introduce malicious code to the system, but usually leave their ``cyber
signature.'' Although a nuisance, the single hacker does not pose a
great threat; however, the increasing volume of hacking activity
worldwide does inadvertently disrupt networks, including that of the
U.S. information infrastructures. Hackers that plant malicious code or
upload bots that are designed to steal information are the main threats
in this group. These individuals have the ability to take down a system
or steal trade secrets, either of which can be devastating to a company
or agency.
The growing number of hackers motivated by money is a cause for
concern. If this pool of talent is utilized by terrorists, foreign
governments or criminal organizations, the potential for a successful
cyber attack on our critical infrastructures is greatly increased.
To combat these and other cyber threats, the FBI established a
national cyber program with a Cyber Division at FBI Headquarters and
dedicated cyber squads in the field offices. The program enables us to
coordinate and facilitate investigations of those Federal criminal
violations using the Internet, computer systems, or networks. It also
helps us to build and maintain public/private alliances to maximize
counterterrorism, counterintelligence, and law enforcement cyber
response capabilities. We are also working to aggregate the
technological and investigative expertise necessary to meet the
challenges that lie ahead. We are recruiting and hiring individuals who
possess degrees and experience in computer sciences, information
systems, or related disciplines. We are looking for specialists who
possess a bedrock of experience and a profound understanding of the
cyber world.
CONVERGING CRIMINAL THREATS
It is increasingly the case that counterterrorism,
counterintelligence, cyber, and criminal investigations are
interrelated. There are rarely clear dividing lines that distinguish
terrorist, counterintelligence, and criminal activity. Recognizing this
trend toward convergence, the first priority of the FBI's Criminal
Investigative Program is to leverage criminal investigative resources
to enhance the FBI's Counterterrorism, Counterintelligence and Cyber
programs.
Terrorists use criminal enterprises and criminal activities to
support and fund terrorist organizations. The FBI's criminal
investigations of these crimes and criminal enterprises, often in task
forces in conjunction with other Federal, state, and local law
enforcement, continue to develop invaluable intelligence, as well as to
initiate investigations, which further identify the United States'
vulnerability to attack and directly support the FBI's and the
Intelligence Community's counterterrorism, counterintelligence, and
cyber crime efforts.
One of the FBI's first investigations to utilize the material
support of a terrorist organization statute evolved from a criminal
investigation of Hizballah operators utilizing credit card scams,
cigarette smuggling and loan fraud to support the purchase of dual use
equipment for Hizballah procurement leaders in Lebanon. The FBI used
the criminal RICO statute to fully neutralize this terrorist cell.
In combatting converging threats, the FBI's Criminal Program is
placing greater emphasis on the collection, analysis, dissemination and
effective use of intelligence, including intelligence derived from
criminal investigations, including intelligence derived from human
sources and the use of sophisticated investigative techniques. We are
using intelligence to identify crime problems and trends, to conduct
threat assessments, and to drive investigative efforts. Currently, we
are aggressively pursuing intelligence collection and threat
assessments on Organized Crime, Human Smuggling and Trafficking,
Violent Gangs, Public Corruption, Civil Rights, and Middle Eastern
Criminal Enterprises.
After CT, CI, and Cyber, the Criminal Investigative Program's other
priorities in descending order are Criminal Intelligence, Public
Corruption, Civil Rights, Violent Gangs, Criminal Enterprises,
Corporate and Securities Fraud, Health Care Fraud, Mortgage Fraud,
Major Financial Institution Fraud, and Crimes Against Children and
other Violent Crimes.
Public Corruption
Public Corruption continues to pose the greatest threat to the
integrity of all levels of government. Recent investigative efforts
have been intensified to identify and convict Immigration, Department
of State, and DMV officials illegally selling visas or other
citizenship documents and drivers licenses to anyone with enough money.
Their illegal activities potentially conceal the identity and purpose
of terrorists and other criminals, facilitating their entry, travel,
and operation without detection in the U.S. Other investigations have
convicted numerous law enforcement officers, including those who formed
criminal organizations involved in drug trafficking. Many major
metropolitan areas in the U.S. have witnessed the indictment and
conviction of corrupt public officials who betrayed the public trust
for profit or personal gain. Over the last 2 years alone, the FBI has
convicted more than 1050 corrupt government employees, including 177
Federal officials, 158 State officials, 360 local officials, and more
than 365 police officers. In addition to pursuing criminal
investigations against corrupt law enforcement officers, the FBI has
initiated awareness and training efforts to deter corruption, such as
``Project Integrity.''
Civil Rights
During fiscal year 2004, the FBI initiated 1,744 civil rights
investigations and obtained 154 convictions, focusing its efforts on
Hate Crimes, Color of Law, and Involuntary Servitude and Slavery
matters. The FBI and the United States depend on the support,
cooperation and assistance of the Arab, Muslim and Sikh Communities in
the United States to fight terrorism and to fight crime. These
communities are entitled to the same civil rights of every citizen and
person in the United States. The FBI has worked with these communities
to ease their fears concerning the FBI's interest in securing their
help in the fight against terrorism and to address the backlash of hate
crimes directed against them following 9/11 and the war in Iraq. Since
9/11, more than 500 hate crime investigations have been initiated,
where the victims were Arab, Muslim, Sikh, or perceived to be as such,
resulting in more than 150 Federal and local prosecutions. During 2004,
the FBI initiated 53 hate crime investigations where the victims were
of Arab, Muslim, or Sikh descent or were perceived to be such. Thirteen
of those cases resulted in criminal charges being filed by either State
or Federal law enforcement authorities. Other groups also continue to
be the victims of Hate Crimes, including African American and Jewish
communities.
Human trafficking and modern day slavery are a worldwide crime and
human rights problem, due to global, economic, and political factors.
Approximately 17,000 victims each year are lured to the United States
with false promises of good jobs and better lives and then forced to
work under brutal and inhumane conditions. Many trafficking victims,
including women and children, are forced to work in the sex industry,
prison like factories, and migrant agricultural work.
Violent Gangs
Violent gangs are more organized, larger, more violent, and more
widespread than ever before, and they pose a growing threat to the
safety and security of Americans. The Department of Justice estimates
there are approximately 30,000 gangs with more than 800,000 members in
the U.S.
Our communities continue to experience devastating incidences of
murder, drive-by shootings, and assaults by gangs mainly involved in
the sale and distribution of illicit drugs. However, gang activity
extends far beyond protection of turf. It impacts innocent citizens who
have no connection or involvement with gangs, and it increasingly
transcends municipal boundaries. Gang members travel from city to city,
between states and, on occasion, between countries to commit their
crimes.
In response, the FBI is implementing a coordinated, intelligence-
driven National Gang Strategy to disrupt and dismantle gangs that pose
the greatest threats to America's communities. In the past year, we
have increased the number of Safe Street Task Forces from 78 to 107 and
we are seeking to increase the number by an additional 10 to 20 percent
in the coming year. We are also centralizing gang investigations at FBI
Headquarters with a new $10 million National Gang Intelligence Center
(NGIC). The NGIC will collect intelligence on gangs from across the
U.S., analyze this intelligence, and disseminate it to help law
enforcement authorities throughout the country plan and execute
strategies to prevent further gang activity and violence.
The FBI has reclassified gang matters from ``violent criminal
offenders'' to ``criminal organizations and enterprises''--a higher
priority area. The new classification also allows the U.S. Department
of Justice to charge gang members under Federal racketeering statues
which can result in stiffer prison sentences for convicted subjects.
This approach is similar to the successful strategy used by the FBI to
dismantle traditional organized crime groups.
Under the National Gang Strategy, priority is given to efforts to
disrupt and dismantle gangs that are national in their scope and
exhibit significant connectivity and internal alliances. Among the
first to be targeted is Mara Salvatrucha (MS-13), a violent gang which
originated in Los Angeles comprised primarily of Central American
immigrants. We have created a National Gang Task Force specifically to
address MS-13.
Criminal Enterprises
Organized criminal enterprises operating in the U.S. and throughout
the world pose increasing concerns for the international law
enforcement and intelligence communities. Their skill in using
international monetary systems to conduct and conceal their criminal
activity, their use of State of the art communications encryption to
further safeguard their illegal activity, and their transnational
mobility increases the likelihood they will escape detection or
otherwise cover their illegal activities with a cloak of legitimacy.
Although the FBI prioritizes its efforts on criminal enterprises with
possible connections to terrorist and counterintelligence activities,
public corruption, human smuggling of Special Interest Aliens and women
and children, or violent and pervasive racketeering activity, the
impact from just one criminal activity alone, theft, is staggering.
Annual property losses from cargo/high tech/retail theft is estimated
at $30 billion, from vehicle theft $8 billion, from art/cultural
heritage artifact theft $500 million, and from jewelry and gem theft
$135 million. However, theft by criminal enterprises often represents a
multifaceted threat. For example, Middle Eastern Criminal Enterprises
involved in the organized theft and resale of infant formula pose not
only an economic threat, but a public health threat to infants, and a
potential source of material support to a terrorist organization.
The FBI is increasing its intelligence collection and assessment
efforts on criminal enterprises, as well as its joint efforts with the
intelligence and law enforcement services of other nations, to combat
the criminal activities of the La Cosa Nostra, Italian, Russian,
Balkan, Albanian, Asian, African, Middle Eastern, Colombian/South
American and other criminal enterprises. The FBI/Hungarian National
Bureau of Investigation Organized Crime Task Force in Budapest,
Hungary, which is investigating a Russian Criminal Enterprise engaged
in murder, extortion, prostitution, and other significant racketeering
activity, represents an unprecedented cooperative effort between the
FBI and the Hungarians.
Although new criminal enterprises continue to emerge, the LCN
remains a formidable and ever changing criminal threat. This year, in
just one criminal scheme, identified by the Federal Trade Commission as
the largest consumer fraud investigated in the history of the United
States, members of the Gambino LCN family were convicted for using
pornographic websites and adult entertainment 1 800 numbers to defraud
thousands of individuals of $750,000,000. Asian Criminal Enterprises
also pose a continued threat, as exemplified by one which was
dismantled earlier this year during a coordinated arrest operation with
Canada, which resulted in the arrest of 36 subjects in Canada and 102
subjects in the U.S. for drug trafficking and money laundering.
Millions of dollars and 21 firearms, including an AK 47 assault rifle
and a sawed off shotgun were seized during the operation.
Corporate/Securities Fraud
Corporate fraud can cost Americans their jobs and rob them of hard-
earned savings. It shakes the public's confidence in corporate America
to its foundation. Since the initiation of the FBI Corporate Fraud Task
Force in December 2001, there have been 480 indictments and 305
convictions of corporate executives and their associates. The FBI's
efforts have also resulted in over $2 billion in restitutions,
recoveries and fines, in addition to over $30 million in seizures and
forfeitures. In the Enron, HealthSouth, Cendant Corporation, Credit
Suisse First Boston, Computer Associates International, Worldcom,
Imclone, Royal Ahold, Perigrine Systems, and America Online cases the
FBI obtained 119 indictments/informations and 79 convictions. The
former Chief Executive Officer (CEO) of Worldcom is on trial in New
York and the former CEO of HealthSouth is on trial in Alabama. Several
additional high profile trials are anticipated in the near future, to
include the trial of Enron's former CEOs and Chief Accounting Officer
anticipated to be scheduled for August or September 2005.
The FBI is currently pursuing 334 Corporate Fraud cases throughout
the U.S. This is more than a 100 percent increase from fiscal year
2003. Eighteen of the pending cases involve losses to public investors
which each exceed $1 billion. Unfortunately, the volume of cases has
yet to reach a plateau, and the FBI continues to open three to six new
cases each month, each case averaging a loss exceeding $100 million.
Health Care Fraud
Americans' health care expenditures continue to climb at rates
higher than inflation and will soon consume more than 17 percent of the
Gross Domestic Product. It is estimated that health care fraud costs
consumers, Medicare, Medicaid, and private insurers tens of billions of
dollars each year in blatant fraud schemes in every sector of the
industry. The FBI recently instituted the Out Patient Surgery and
Pharmaceutical Fraud Initiatives to combat blatant fraud identified in
those health care programs. During fiscal year 2004, the FBI had 2,468
pending health care fraud investigations, obtained 693 indictments and
informations, 564 convictions or pre trial diversions, $1.05 billion in
restitution, $543 million in fines, $28.8 million in seizures, $19.05
million in forfeitures and disrupted 186 and dismantled 105 criminal
organizations.
Mortgage Fraud
The number of FBI mortgage fraud investigations, including major
undercover operations, rose from 102 in fiscal year 2001 to
approximately 550 in fiscal year 2004. This rise is expected to
continue. During FYs 2001-2004 the FBI received over 17,000 mortgage
fraud related Suspicious Activity Reports from federally insured
financial institutions alone. The FBI worked with the Mortgage Bankers'
Association (MBA), the National Notary Association (NNA), as well as
FINCEN, the Department of Housing and Urban Development, and major
mortgage lending institutions, to improve the reporting and detection
of potential mortgage fraud.
Crimes Against Children/Violent Incident Crime
Of all violent crime, crimes against children and child
prostitution are of particular concern. Over 300,000 children per year
are forced into prostitution. The FBI's Lost Innocence, Child
Prostitution Initiative, has opened 13 cases in 11 field offices,
emphasizing the use of sophisticated investigative techniques, to
obtain 135 arrests/locates, 3 complaints, 13 indictments/informations,
11 convictions/pre trial diversions, and 4 child locates. Major violent
crime incidents, such as sniper murders, serial killings and child
abductions can paralyze whole communities and require the cooperative
efforts of the FBI and local, State and other Federal law enforcement
agencies. The FBI also continues to address the 6,218 bank robberies,
resulting in 153 injuries, and 15 deaths, that occurred within the
first 10 months of 2004, albeit with a greater reliance on other
agencies and a lesser use of its own resources where possible.
ENHANCING THE FBI'S CAPABILITIES
Mr. Chairman, you will notice that our accomplishments over the
past year consistently have two things in common, the effective
collection and use of intelligence and inter-agency cooperation. The
improvements that made these accomplishments possible result from the
continued efforts of the men and women of the FBI to implement a plan
that fundamentally transforms our agency and enhances our ability to
predict and prevent terrorism.
Intelligence
As set forth above, threat information crosses both internal and
external organizational boundaries. Counterterrorism efforts must draw
from, and contribute to, counterintelligence, cyber and criminal
programs. In order to most effectively address all threats, we are
continuing to strengthen the FBI's enterprise-wide intelligence
program.
We began in 2001 with a dedicated analysis section in the
Counterterrorism Division and, in 2002, we created an Office of
Intelligence in the Counterterrorism Division. The structure and
capability significantly enhanced our CT operations and those of our
partners. In 2003, we extended this concept across all FBI programs--
Criminal Cyber, Counterterrorism and Counterintelligence--and unified
intelligence authorities under a new FBI Office of Intelligence led by
an Executive Assistant Director. The Office of Intelligence adopted
Intelligence Community best practices to direct all FBI intelligence
activities. Congress and the 9/11 Commission reviewed these efforts and
provided recommendations to further strengthen the FBI's intelligence
capability.
The newly established Directorate of Intelligence is the dedicated
national security workforce that the Congress established within the
FBI. It comprises a dedicated Headquarters element and embedded
intelligence entities in each FBI field office called Field
Intelligence Groups (FIGs). The FIGs are central to the integration of
the intelligence cycle into field operations. The FIGS include Special
Agents, Intelligence Analysts, Language Specialists, and Surveillance
Specialists, as well as officers and analysts from other intelligence
and law enforcement agencies. They are responsible for coordinating,
managing, and executing all of the functions of the intelligence cycle
and have significantly improved the FBI's intelligence capability. This
integrated intelligence service leverages the core strengths of the law
enforcement culture--such as reliability of sources and fact-based
analysis--while ensuring that no walls exist between collectors,
analysts and those who must act upon intelligence information. The
Directorate also benefits from the strong FBI history of joint
operations by unifying FBI intelligence professional and integrating
all partners, particularly state, local, and tribal law enforcement,
into our intelligence structures.
The central mission of the Directorate is to optimally position the
FBI to meet current and emerging national security and criminal threats
by: (1) assuring that the FBI proactively targets threats to the US,
inhibiting them and dissuading them before they become crimes; (2)
providing useful, appropriate and timely information and analysis to
the national security, homeland security, and law enforcement
communities; and (3) building and-sustaining FBI-wide intelligence
policies and capabilities.
In 2004, we made substantial progress to expand and strengthen our
intelligence workforce. For the first time, the FBI offered recruitment
bonuses for Intelligence Analysts. As a result of these and other
efforts, the FBI received over 80,000 applications and hired over 650
Intelligence Analysts.
We built on the College of Analytic Studies, created in October
2001, with the addition of two new courses based on intelligence
community best practices: ACES 1.0, a new basis intelligence analytic
course, and ACES 1.5, a course for experienced, on-board analysts that
provides information on the latest analytic resources and techniques.
To ensure a consistent level of knowledge across the workforce on
intelligence concepts and processes, ACES Training is now mandatory for
all FBI Intelligence Analysts. We have increased our training expertise
and capacity and are on track to deliver basic training to 1,000
Intelligence Analysts by December 2005. In addition, we have
incorporated intelligence training into New Agents class, including a
joint exercise with Intelligence Analysts and joint evening seminars.
The Intelligence Analyst career path, with multiple work roles and
cross-training requirements not only provides career development
opportunities, it also creates a workforce with the agility and
flexibility needed to respond to the changing threat environment.
In addition, we implemented several initiatives to enhance the
analyst career path and improve retention. We extended the promotion
potential for analysts in the field from GS-12 to GS-14. We created an
Intelligence Analyst Advisory Board, leveraging the strong FBI culture
of creating advisory groups to provide advocacy for specific career
fields. At the same time we worked with Congress and were granted pay
flexibilities, such that FBI intelligence professionals now can be
compensated at a rate equal to that of their Intelligence Community
peers. These and other initiatives have helped us to stabilize our
attrition rate between 8 percent and 9 percent and FY05 statistics to
date look promising.
We have also taken steps to strengthen the Special Agent component
of our intelligence workforce. In March 2004 we established a new
career path for Special Agents with three objectives. First, the career
path gives all Agents experience in intelligence collection, analysis
and dissemination. Second, the career path will give Agents an
opportunity to develop specialized skills, experience and aptitudes in
one of four areas: 1) Intelligence, 2) Counterterrorism/
Counterintelligence, 3) Cyber or 4) Criminal. Third, it makes
Intelligence Officer Certification a prerequisite for advancement to
senior supervisory ranks. The Special Agent career path will produce a
cadre of Agents who are proficient in both intelligence and law
enforcement operations. This is key to achieving the full integration
of law enforcement and intelligence operations.
To improve our foreign language capabilities, we have recruited and
processed more than 50,000 translator applicants. These efforts have
resulted in the addition of 778 new Contract Linguists (net gain of 493
after attrition) and 109 new Language Analysts (net gain of 34 after
attrition). The FBI has increased its overall number of linguists by 67
percent, with the number of linguists in certain high priority
languages increasing by 200 percent or more.
We have integrated management of the FBI's Foreign Language Program
(FLP) into the Directorate of Intelligence. This integration fully
aligns F13I foreign language and intelligence management activities and
delivers a cross-cutting platform for future improvements across all
program areas, including translation quality controls.
We also established the Language Services Translation Center
(LSTC), a command and control structure at FBI Headquarters to ensure
that our finite translator resource base of over 1,300 translators,
distributed across 52 field offices, is strategically aligned with
priorities set by our operational divisions on a national level.
We have built a secure network that allows us to efficiently route
FISA audio collection to any FBI field office. This technology allows
us to more effectively utilize our national translator base.
We now possess sufficient translation capability to promptly
address all of our highest priority counterterrorism intelligence,
often within 12 hours. Of the several hundred thousand hours of audio
materials and several million pages of text collected in connection
with counterterrorism investigations over the last 2 years, a nominal
level of backlog exists only because of obscure languages or dialects.
We have instituted a national translation quality assurance
program. Countervailing operational pressures, however, limit our
ability to fully comply with instituted translation review procedures
in those languages for which demand continues to outpace supply. In
those languages for which we have already achieved excess translation
capacity, e.g., Farsi, Pashto, and Vietnamese, 100 percent quality
assurance compliance is expected by April 2005.
Translation backlogs continue to exist within our
counterintelligence program. To target these deficiencies, we have
implemented a highly successful workforce planning model which links
field-wide workload measurements, trend analysis, and geo-political
indicators to our recruitment and applicant processing efforts.
In 2005, we plan to strengthen the integration of the entire
intelligence cycle (requirements management; planning and direction;
collection; processing and exploitation of collected information;
analysis and production; and dissemination) into field office
operations.
We will incorporate the recently developed new critical element
entitled, ``Intelligence,'' into the performance plans of all Special
Agents and Supervisory Special Agents; this new element emphasizes
participation in intelligence cycle functions, in particular human
source development and contributions to intelligence production.
We will also establish ``fly teams'' of Agents with intelligence
experience, Intelligence Analysts, Language Specialists, and
Surveillance Specialists to travel to five field offices and provide
hands-on guidance and training for the full integration of the
intelligence cycle within the office.
Partnerships
Our ability to coordinate and communicate with other members of the
Intelligence Community has never been better. Our face-to-face
interaction with the National Counterterrorism Center and members of
the CIA and DHS has positively impacted our ability to come together on
a common problem and the results of the cooperation are evident. Case
in point--during the election threat, analysts were able to meet daily
to discuss assessments and develop theories that were fundamental to
understanding the threat, and from those meetings, online forums were
created to facilitate continued sharing of ideas and new intelligence
finds--all from the desktop.
The FBI's Information Sharing Policy Group, chaired by the FBI's
EAD--Intelligence, brings together the FBI entities that generate and
disseminate law enforcement information and intelligence to implement
the FBI's goal of sharing as much as possible consistent with security
and privacy protections.
Within the Intelligence Community, the FBI has a two-level
approach:
1. For those agencies that operate at the Top Secret-SCI level, we
are investing in secure facilities for an FBI network (SCI On-Line, or
SCION) that is linked to the DoD-based JWICS network used by CIA, NSA,
and other national agencies.
2. For those agencies that operate at the Secret level, we have
connected the FBI's internal electronic communications system to the
DoD-based SIPRNET network that serves. As a result, all FBI Agents or
analysts who need to communicate at the Secret-level with other
agencies can do so from their desktop.
Within the law enforcement community, the FBI's National
Information Sharing Strategy (HISS) is part of the DOJ Law Enforcement
Information Sharing Program and builds upon the FBI Criminal Justice
Information (CJIS) Services program.
1. The Law Enforcement National Data Exchange (N-DEx) will provide
a nationwide capability to exchange data derived from incident and
event reports. Data from incident and arrest reports--name, address,
and non-specific crime characteristics--will be entered into a central
repository to be queried against by future data submissions. The
national scale of N-DEx will enable rapid coordination among all strata
of law enforcement.
2. The Law Enforcement Regional Data Exchange (R-DEx) will enable
the FBI to join participating Federal, state, tribal, and local law
enforcement agencies in regional fulltext information sharing systems
under standard technical procedures and policy agreements.
3. The FBI makes national intelligence more readily available to
state, tribal, and local law enforcement agencies through the Law
Enforcement Online (LEO) network.
4. The Terrorist Screening Center (TSC) also leverages the CJIS
backbone to provide realtime actionable intelligence to State and local
law enforcement.
Information Technology
Recognizing that the ability to assemble, analyze and disseminate
information both internally and with other intelligence and law
enforcement agencies is essential to our success in the war on
terrorism, the FBI has made modernization of its information technology
(IT) a priority.
Under the centralized leadership of the Chief Information Officer
(CIO), the FBI is now taking a coordinated, strategic approach to IT.
We have a Strategic IT Plan, a baseline Enterprise Architecture, and a
system for managing IT projects at each stage of their ``life cycle''
from planning and investment, through development and deployment,
operation and maintenance, and disposal. This involves regular
technical reviews to see if milestones are met.
The first two phases of the Trilogy IT modernization program have
been completed. The FBI is now modernized with:
1. Deployment of a high-speed, secure network that enables
personnel in FBI offices around the country to share data, including
audio, video and image files.
2. More than 30,000 new desktop computers with modern software
applications 3,700 printers, 1600 scanners, 465 servers and 1400
routers.
3. An IT infrastructure that provides for secure communication with
our Intelligence Community partners.
The third phase of Trilogy, which includes the Virtual Case File
(VCF) has not yet been completed. Plans for VCF have changed both in
response to identified technical problems and because the FBI's
refocused mission created requirements that did not exist when VCF was
originally envisioned, such as requirements related to information
sharing. Last June, after we determined that the product delivered did
not meet our needs, we decided to move forward with a two-track action
plan for VCF.
1. In accordance with this plan, we asked a new contractor to
examine the latest working version of the VCF as well as available off-
the-shelf software applications and those designed for other agencies,
to determine the best combination to meet the FBI's needs. In many
ways, the pace of technological innovation has overtaken our original
vision for VCF, and there are now existing products to suit our
purposes that did not exist when Trilogy began.
2. As we move forward, we will apply all that we have learned and
leverage what we have already developed, including a critical interface
to our existing data systems that will be a key component of our final
solution.
Separate from the Trilogy Program, we have successfully developed
and deployed a number of new investigative and information sharing
capabilities.
The Investigative Data Warehouse (IDW) offers Agents and analysts
alike the technology to perform link analysis, while also providing
enhanced search and analytical tools. IDW provides FBI users with a
single access point to more than 47 sources of counterterrorism data,
including information from FBI files, other government agency data, and
open source news feeds, that were previously available only through
separate, stove-piped systems. Most of these users are with the
Directorate of Intelligence, Counterterrorism or Counterintelligence
Divisions. These users provide search and analysis services using the
IDW for personnel throughout the Bureau.
The FBI Automated Messaging System (FAMS) began operations in
December and now provides more than 300 users with the capability to
send and receive critical organizational message traffic to any of the
40,000+ addresses on the Defense Messaging System (DMS). The FBI is the
first civilian agency to operate a classified DMS.
The FBI Intelligence Information Reports Dissemination System
(FIDS) is a web-based software application that allows all FBI
personnel with access to the FBI's Intranet to create and disseminate
standardized Intelligence Information Reports (IIRs) quickly and
efficiently. FIDS allows the Directorate of Intelligence to automate
and standardize IIR creation and dissemination functions.
CONCLUSION
Looking forward, we expect certain trends to continue. Our
adversaries will keep evolving, national security and criminal threats
will further converge, and old jurisdictional boundaries will become
less and less relevant. If we are to address these trends successfully,
we must be willing and able to evolve ourselves. The FBI must continue
to build our intelligence capabilities, including a strong intelligence
workforce. We must continue hiring and training personnel with
technical expertise and foreign language skills. We must continue to
seek new ways to share information and collaborate with partners in the
Intelligence and Law Enforcement Communities. Above all, we must be
agile, and encourage creativity, innovation, and strategic thinking. If
we do all of these things, I am confident that we will out-network,
out-think, and ultimately defeat our adversaries.
Mr. Chairman, I thank you again for this opportunity. I look
forward to working with this Committee as we continue our efforts to
address threats to the U.S. I would be happy to take any questions you
might have.
Chairman Roberts. Mr. Mueller, we thank you for your
statement as well and thank you for the job you're doing, in a
very difficult challenge in changing the mission of the FBI and
still keeping the mission in regards to crime and in regards to
law enforcement.
I would say to all Members that Ms. Rodley and Admiral
Jacoby are here to answer questions. And so, Admiral Loy will
give the last prepared statement.
And I neglected to tell all of you that each and every word
of your testimony will be in the record and preserved for all
time. And so, feel free to summarize your statements.
I apologize. That's not an admonition, that's just a
statement.
Admiral Loy. And I'm not trying to pick on you.
STATEMENT OF ADMIRAL JAMES LOY, U.S. COAST GUARD, RET., DEPUTY
SECRETARY, DEPARTMENT OF HOMELAND SECURITY
Admiral Loy. Thank you, Mr. Chairman. Good morning,
Chairman Roberts and Vice Chairman Rockefeller and
distinguished Members of the Committee. I'm pleased to have the
chance to appear before you today to discuss the threats
against the U.S. homeland, as well as some of the capabilities
we've developed and must continue to develop to confront these
threats.
That important link between the intelligence we process and
the systems we develop in response cannot be understated. For
every possible action we uncover, there must be an
intentionally focused reaction designed to secure our homeland
against that threat.
In so many areas of greatest concern, vulnerabilities we've
identified, such as our transportation systems, particularly
air travel, our border functions and our critical
infrastructure, such as ports and energy facilities, we've made
very real, measurable progress that has made our Nation more
secure.
The topic of our hearing is very straightforward. What is
the nature of the worldwide threat? And from the DHS
perspective, I would make simply five, basic points.
First, the threat is unclear and complex, but enduring. The
condition is not expected to change. We continue to note
attempted entry into the U.S. by aliens who, according to
intelligence, pose a threat to our homeland.
Second, we assess that al-Qa'ida continues to be the
primary transnational threat group, although we are seeing the
emergence of other threatening groups and gangs, like MS-13,
that will also be destabilizing influences.
Third, we think we are most likely to be attacked with a
vehicle-borne improvised explosive device, because that's the
weapon of choice around the world. However, it remains very
clear that our primary adversaries continue to seek weapons of
mass effects with which they intend to strike us if they
acquire them.
Fourth, at DHS we continue to make progress in acquiring
analysts and improving our capabilities, just 2 years into our
existence. However, we have not yet fully achieved the
capability in people, facilities and technical capability we
think is necessary to protect our homeland. We can, and we are
doing the job, through extraordinary effort on the part of our
intelligence professionals and through the collegial efforts of
all of those at this table and many other agencies in the
Federal sector.
And last, the intelligence community interaction with DHS
has markedly improved over this past year and we continue to
work toward full integration and interoperability. The
aftermath of the Intelligence Reform Act is being treated as an
opportunity to complete that work, to earn the respect of our
colleagues as a full and deserving player in the intelligence
community, and to allow that respect to serve as the foundation
DHS needs to fulfill its responsibilities to secure our
homeland.
Thankfully, we have not experienced another attack on our
soil since September 11, 2001. But the rest of the world has
not been so fortunate. If you ask the residents of Madrid or
Beslan or Bali or Jakarta or many others, they will assure you
that not only the threat, but also the harsh daily reality of
terrorism is alive and well around the world.
We realize that an attack here could come in any form at
any place on any timetable. Terrorist groups--even ones whose
capabilities may have been weakened by arrests and
interdictions worldwide--are patient, strategic and methodical
in their operational planning. At home, we must prepare
ourselves for any attack, from IEDs to weapons of mass
destruction, from soft targets like malls to national icons.
Intelligence suggests that al-Qa'ida may have specific
tendencies or certain intentions, both small- and large-scale.
And our efforts must stay directed to this full range of
threats. We must assume that they are assembling, or
reassembling, the capabilities they don't currently have or
those that have been taken from them. So our plan of action,
like theirs, must be even more deliberate and even more
enduring, and it is.
We have built new tools to help in each of the five
strategic areas of operational emphasis in our department. Our
charter runs from maximum domain awareness, if you will,
through prevention and protection efforts to response and
recovery planning. We have published an all-hazards, all-
threats National Response Plan and its sister document, the
National Incident Management System.
We have dramatically improved our technical ability to
share information. Tools such as the Homeland Security
Operations Center, the Homeland Security Information Network
and the Homeland Security Advisory System are steps toward full
capacity and capability. We know the end state we want to reach
and we are methodically designing the path to get there.
We have greatly improved systems to keep track of persons
who cross the border and we have begun to apply technology to
monitor the border where there is no human presence. We're
operating the US-VISIT Program to verify the identity of
travelers and stop criminals and terrorists before they can
enter our society.
We have signed Smart Border accords with our neighbors to
the north and south, Canada and Mexico, to help the highly
trained customs officers, border agents, Coast Guardsmen and
many others who monitor and patrol our Nation's nearly 7,500
miles of land border and 95,000 miles of coastline and
waterways.
We now require unprecedented scrutiny of high-risk
travelers and flights landing in or flying over the United
States, including requiring volumetric information on visas and
passports and agreeing to share passenger data with our
European allies. These are important strides to keep the doors
of our country open to legitimate visitors, but firmly shut to
terrorists.
We know that al-Qa'ida would like to impact our economy
with attacks on our financial systems, our cyber networks and
the vital elements of our global supply chain. So we've taken
measures to secure cargo and protect the infrastructure that
supports the free and safe movement of goods and people and
money around the world.
We launched the Container Security Initiative to target and
screen high-risk cargo before it reaches our shores. And today
we operate that program alongside our allies in 34 ports around
the world in 22 different countries with a growth posture
scheduled for 2005 and on into 2006. We are in the process of
finalizing, with the input from private sector stakeholders as
well as many others, a national cargo security strategy.
We included a special section on cyber security in the
newly released National Response Plan to enhance governmentwide
collaboration and coordination to prevent an attack on the
backbone of our electronic economy.
And most important, we've been careful to consider the
economic impacts and the privacy implications of any additional
security efforts, and worked to ensure that added protections
do not detract from our competitiveness or from our way of
life.
In ways large and small, seen and unseen, with advanced
technologies and additional vigilance, with the help of
countless agencies and allies at every level of government, in
the private sector and throughout the world, we have made it
harder for terrorists to attack our country, more difficult for
them to defeat our systems and reduce large gaps they once saw
in our security posture.
As the President has said, we are safer than ever before,
but we are still not safe enough. This experiment called DHS is
astonishingly complex and some dimensions of the challenge are
further along than others. That's the nature of culture and
transformational change. I'm proud to hand over a 2-year-old
department with a solid foundation and a solid sense of
direction to our incoming leadership team.
I'm deeply appreciative of the support, constructive
criticism and the resources that have come our way over the
past 2 years from the Congress. This Committee's continued
focus and review must remain our Nation's conscience until we
get this work accomplished.
Last night, I spoke to a group of 400 young people--high
school people--in a program geared to encouraging public
service. I promised them that we would do all we could to
lighten their burden when it's their turn on watch. And we can
only meet that promise when our national intelligence
capability is sound, inclusive, whole. Anything short of that
is simply unsatisfactory.
Thank you, Mr. Chairman. I'll happily answer your
questions.
[The prepared statement of Admiral Loy follows:]
Prepared Statement of Admiral James Loy, Deputy Secretary,
U.S. Department of Homeland Security
Good morning Chairman Roberts, Vice Chairman Rockefeller, and
distinguished Members of the Committee. I am privileged to appear
before you today to discuss the primary threats currently facing the
United States homeland, as well as their probability, immediacy, and
severity.
Most current threats to the homeland continue to be directed by al-
Qaida and its affiliated elements within the broader Sunni extremist
movement. Despite the successes the United States and our coalition
partners have had against al-Qaida and other extremists, al-Qaida
leaders and operational planners continue to think about--if not
actively plot--the next dramatic attack in the United States. We
believe that attacking the homeland remains at the top of al-Qaida's
operational priority list, despite the fact that more than 3 years have
passed since September 11, 2001. We judge that al-Qaida continues to
view the homeland as an attractive target for a variety reasons, and
that the next dramatic attack will attempt to replicate the 9/11
``model'' of multiple attacks against geographically distant and
symbolic targets that cause unprecedented economic damage, mass
casualties, and physical destruction. While al-Qaida and its affiliated
elements currently appear more capable of attacking United States
interests outside of the homeland, we believe that their intent remains
strong for attempting another major operation here.
While there are other transnational terrorist groups that possess
noteworthy capabilities to conduct attacks against United States
interests, we currently do not believe these groups are ready for or
oriented toward conducting attacks inside the homeland. However, there
is a legitimate threat posed by groups and persons who are present in
the country today (not necessarily connected to transnational terrorist
groups), including multi-national gangs and domestic groups that engage
in violence to achieve political and economic goals. These groups range
from single-issue groups such as the Earth Liberation Front to violent
criminal gangs like MS-13 to right-wing or neo-Nazi groups to ``lone-
wolf' threats. Additionally, the threat from criminal groups and
persons who engage in criminal enterprise that supports or contributes
to terrorism and which has homeland security implications remains of
concern. Examples of such activity include narcotics trafficking, money
laundering, people smuggling, contraband smuggling, illegal arms
transfers, illegal technology transfers, currency counterfeiting,
document forgery, and false identity provision. However, none of these
threats currently rises to the level of threat posed by al-Qaida and
its affiliates.
While there is no single ``crystal ball'' that allows intelligence
analysts to perfectly determine which terrorist threats are the most
probable, we believe the al-Qaida and affiliated extremist threat
remains the most likely in the near term. The strategic intent of al-
Qaida's remaining leaders and planners to attempt another dramatic
homeland attack is clear. What is less clear are al-Qaida's current
operational capabilities to execute such an attack. Though al-Qaida's
current capabilities for dramatic attacks inside the United States
might seem reduced, we also assess, based on past activity, that a1-
Qaida is patient, deliberate, and methodical in operational planning
for major attacks. Al-Qaida operates on a very long timeline.
Thus, the probability of an attack in the United States is assessed
to be high, but very much conditional and circumstantial. We believe
that while several attacks may have been considered inside the U.S.
since 9/11, and some moved forward beyond initial planning, none of
these plots was ever successfully executed due to the attackers'
operational limitations and the heightened intelligence and security
measures employed since that time.
The cyber risk from various types of malicious actors is more
significant than previously understood, and could be used to increase
the impact of a physical attack by disrupting emergency communications.
The National Intelligence Council released last year its first
National Intelligence Estimate (NIE) for worldwide cyber security since
9/11, and the DHS/National Cyber Security Division's law enforcement
and intelligence branch participated in that assessment. It assessed
the cyber threat, and the result showed a significant capability and
threat from various actors.
Adding to our concern over the possibility of the next al-Qaida
attack is the potential threat of individuals inspired by al-Qaida and
its affiliates who are not in any way directly connected to the al-
Qaida core. In early 2004, several individuals in the United Kingdom
attempted to conduct attacks there, but none of these individuals was
considered an active al-Qaida member. This and other examples of
similar activity in Europe demonstrate how individuals or small groups,
who previously had provided only financial or logistical support to
Islamic extremist activities, themselves attempted to transition into
active operational roles.
The key locales that we currently judge as being at risk for attack
by al-Qaida and affiliated terrorist organizations include key person
and large group assemblages, major events as judged by the Department
of Homeland Security (DHS) and the United States Intelligence
Community, ports, depots, stations, and related infrastructure, and
stadiums, auditoriums, and large buildings. Additionally, critical
infrastructure of primary importance includes nuclear, chemical,
biological, and other hazardous material facilities, bridges, tunnels,
dams, and power generation/transfer stations, energy facilities
including petroleum refining and related industries, and iconic cities
and facilities, large buildings, and complex high-density
infrastructure.
The possible means of attacking such national interests are far
ranging. We know from operational activity around the world that al-
Qaida can execute mass-casualty attacks using improvised explosive
devices (IEDs) combined with suicide operatives. The capture of
operatives overseas this past summer led to the identification of
detailed casing reports prepared prior to 9/11. The specific tactics
recommended in these reports highlights al-Qaida's ongoing interest and
preference for using vehicle-borne improvised explosive devices
(VBIEDs) to attack high-profile or symbolic targets.
Al-Qaida has demonstrated operational proficiency in using aircraft
as weapons, in particular hijacking operations, and has explored the
idea of bringing down aircraft in flight through the use of several
different IED configurations. Al-Qaida has also demonstrated a
capability to use man-portable air-defense systems (MANPADs) in
operations against aircraft overseas, although there are no indications
that it plans to use this capability for attacks inside the United
States. .
Al-Qaida and its affiliated groups have demonstrated an operational
capability to conduct dramatic, mass-casualty attacks against both hard
and soft targets inside the United States and abroad. Within this broad
operational spectrum, the most severe threats revolve around al-Qaida
and its affiliates' long-standing intent to develop, procure, or
acquire chemical, biological, radiological, and even nuclear, weapons
for mass-casualty attacks. Al-Qaida and affiliated elements currently
have the capability to produce small amounts of crude biological toxins
and toxic chemical materials, and may have acquired small amounts of
radioactive materials. However, we currently assess that al-Qaida has
not been able to acquire or develop a functioning nuclear weapon (i.e.,
one that generates a nuclear yield).
Despite al-Qaida's intent to strike us with Weapons of Mass Effect
(WME), we assess that the United States is a ``harder target'' for the
terrorist and for the illegal migrant than it was in the past because
of improvements in information sharing and security measures since 9/
11. There remain, of course, difficulties in securing the over 95,000
miles of coastline and 7,000 miles of border shared with Canada and
Mexico. Indeed, the efforts of DHS have been successful, and the
determination of the 180,000 plus Department personnel working around
the country and around the world day in and day out is strong and
completely dedicated to securing our homeland.
There is much evidence to convince us that interdiction measures
have improved; intelligence is working, technology has helped, and far
fewer illegal immigrants are now able to enter our ports of entry or
cross our borders than in the past. However, we still see persons using
fraudulent documentation; many are already on our watch lists,
attempting to enter the United States at the borders and at ports of
entry. Thus, we assess that the threat of illegal and even covert entry
is still present and likely will be for the foreseeable future.
On land, we now have greatly improved systems to keep track of
persons who cross the border and we have begun to apply technology to
monitor the border where there is no direct border patrol presence. We
also believe that fraudulent documentation is far more likely to be
discovered than in the past--owing in part to improved technology,
better training, more comprehensive data bases, the increased use of
biometrics, and better coordination among agencies.
However, entrenched human smuggling networks and corruption in
areas beyond our borders can be exploited by terrorist organizations.
Recent information from ongoing investigations, detentions, and
emerging threat streams strongly suggests that al-Qaida has considered
using the Southwest Border to infiltrate the United States. Several al-
Qaida leaders believe operatives can pay their way into the country
through Mexico and also believe illegal entry is more advantageous than
legal entry for operational security reasons. However, there is
currently no conclusive evidence that indicates al-Qaida operatives
have made successful penetrations into the United States via this
method.
In addition to the problems posed by the southwestern border, the
long United States-Canada border, often rugged and remote, includes a
variety of terrain and waterways, some suitable for illicit border
crossings. A host of unofficial border crossings can be utilized when
employing the services of alien smugglers, especially those winding
through mountain ranges and across the vast western prairie.
In addition to the threats posed at the extensive United States
land border, we believe al-Qaida remains focused on targeting civil
aviation. Since the creation of the Department in March 2003, DHS has
led Federal Government effort to harden and protect the aviation
infrastructure. The barriers and checks put in place since 9/11 at
airports and the system of baggage and cargo checks for air transported
materials have proven very effective in identification and interdiction
of unauthorized items and in the identification of persons engaged in
air travel. However, al-Qaida operatives have received flight training,
and we believe al-Qaida continues to consider new and novel methods for
planning and conducting attacks against civil aviation in the United
States. Al-Qaida still views the hijacking of commercial passenger
aircraft inside the United States as a primary objective.
Other aviation threats include the possible use of ultra-light
aircraft or remotely piloted vehicles (RPVs), although we have no
specific or credible information suggesting that terrorists have
considered these platforms for attacks in the Homeland. Additionally,
while al-Qaida has considered conducting an attack against United
States interests overseas using helicopters packed with explosives,
there is no specific or credible evidence supporting the use of
helicopters in aerial attacks within the United States. There have been
recent media reports about lasers being visible to pilots in commercial
aircraft in the United States. Although no specific or credible
information suggests terrorists plan to use high-powered lasers in the
United States, groups overseas have expressed interest in using these
devices against human sight.
At sea, we see positive changes and advances in the control system
similar to those made in land border crossing and aviation. These
advancements include improving vessel registration documentation and
identification capabilities and better search technologies and
procedures. While the complex problem with sea-transported cargo and
the checking especially of containers and container vessels remains,
significant improvements have been made since 9/11.
Al-Qaida remains the preeminent organization with both intent and
capabilities to targets United States maritime assets. A variation of
the familiar VBIED, the small, explosiveladen boat usually piloted by a
suicide operative, remains al-Qaida's weapon of choice in the maritime
environment. In addition to threats posed by terrorist attack, the
smuggling of illegal migrants via maritime means continues to be a
major concern for homeland security. This threat is expected to grow as
organized criminal groups continue to expand their operations
throughout the world. The huge profit potential in this trade will
ensure that it will remain a lucrative venture for the foreseeable
future. The inability of Central American nations to control their
borders is also an important factor favoring the smugglers.
Additionally, a small but increasing threat to homeland security is
represented by stowaways on merchant vessels and by crewmen jumping
ship. Most of these individuals are economic migrants and account for a
small fraction of illegal migration. However, their illegal activity
highlights persistent border security vulnerabilities that may be
exploited by contraband smugglers and terrorist organizations, as well
as concerns for merchant vessel and crew safety. When acting alone,
stowaways take advantage of poor security in foreign ports to simply
walk on board vessels and attempt to stay hidden for the duration of
the voyage. However, many stowaway incidents are part of criminally
organized attempts to traffic people and require the complicity of
merchant ship crewmembers. The threat posed by merchant seamen
illegally entering the United States includes deserters who depart the
ship legally, but do not return and absconders who illegally depart the
ship once in port. The use of these methods by criminals or terrorists
to enter the United States is probable.
The bottom line is that the best efforts of the DHS, of the United
States Intelligence Community, and of the entire Federal Government are
allied against terrorist efforts to stage attacks in the homeland.
However, despite these efforts and innumerable advances in information
sharing, technology, communication, and organization, any attack of any
kind could occur at any time. While we have not seen a trend by any
terrorist group to tie an act of terrorism to a particular date or
time, or even place, beyond the obvious goal of striking a locale or
transportation mode when a larger number of people might be present, we
do not believe we can predict timing unless we are somehow inside the
decisionmaking mechanism used by the terrorists.
An attack against the homeland with the most severe ramifications
would include the use of a WME, especially nuclear. We also give due
respect to the potential for some forms of biological attack to
generate high casualty numbers. Beyond that, most attacks would be
locally severe and would have larger implications psychologically,
culturally, and economically even if their immediate destructive impact
was very limited. While we have not seen such methods employed in the
homeland to date, we do worry about the possibility of small attacks--
the grenade into the outdoor restaurant, the small bomb in the public
place, the random shooting on the street--that would ostensibly be
carried out to influence U.S. authorities to react strongly in the
context of preventing such acts from occurring.
There is a risk of cyber or combined physical-cyber attacks from
various malicious actors, though it is difficult to quantify that risk.
However, the Intelligence Community believes there is sufficient risk,
and while there is no known information that anyone is preparing a
significant cyber attack, there appears to be circumstantial evidence
that terrorists are using a variety of illegal Internet behaviors to
finance their activities.
Given the anecdotal and imprecise nature of information in this
regard, it is important to focus on the whole risk picture, including
threat, vulnerabilities, and potential consequences. Accordingly, the
government is enhancing its interagency coordination through the
National Cyber Response Coordination Group (NCRCG) formalized by the
Cyber Annex to the National Response Plan to prepare for and respond to
national level cyber attacks from any sources and in the Interagency
Security Plan (ISP) to reduce our vulnerability to attacks that might
cause a major Internet disruption.
Which is the largest of the potential threats to the homeland?
Which is the most severe? Which is the most probable? These are
questions that cannot realistically be answered beyond the information
provided here. We are hesitant to make an attempt to answer these
questions beyond stating that, conditionally and circumstantially, any
event and any terrorist action is worthy of, and will continue to
receive, our full attention and interest.
Chairman Roberts, Senator Rockefeller, and Members of the
Committee, this concludes my prepared statement. I would be happy to
answer any questions you may have at this time.
Chairman Roberts. Well, we thank you, Admiral, for a very
comprehensive statement.
I would tell the witnesses that we're having a closed
hearing on the threat of nuclear terrorism as of tomorrow. It's
my personal belief that if al-Qa'ida could obtain a nuclear
weapon or any material and could get it into the U.S., that
they would use it. The question is not whether al-Qa'ida would
use a nuclear weapon, but can they get one?
Pakistani scientist A.Q. Khan passed secrets and equipment
to a host of rogue nations. The Pakistani government has
cooperated in our efforts to stop this activity and Mr. Khan is
under house arrest in Pakistan.
This is for Director Goss, Admiral Loy. What is your
assessment of the current status of the Khan network? Does the
fact that he is in custody mean the network is shut down? Are
there any other non-state actors that are potential Khans?
And especially for Admiral Loy, what is the Department of
Homeland Security's assessment of that threat? You have touched
on it in your statement. And more particularly, if you could be
very succinct, what steps has your department taken to prevent
or to mitigate a terrorist attack utilizing any nuclear weapon?
Director Goss.
Director Goss. Mr. Chairman, thank you.
Actually, it's timely that you ask that question, because
we are further exploring our opportunities to learn about Mr.
Khan and what he has done. I am unable to give you the details
of that. They would be suitable for a closed hearing. But I can
assure you that, virtually as we speak, efforts--active,
appropriate direct efforts--are underway on that matter.
We have found, from a variety of sources, following the
leads of what we've known already, that we've uncovered many
new things. And we have found that in uncovering those things
we have not got to the end of the trail. Getting to the end of
that trail is extremely important for us.
It is a serious proliferation question. I'm pleased you're
having a closed hearing. I'd be very happy to make available
those experts in our business who can contribute to your wisdom
in a closed session.
Chairman Roberts. What about the non-state actors that are
potential Khans?
Director Goss. The potential Khans are a very nervous worry
for us, obviously. If there were a way--and that's the big
question, how would they go about getting it--would we know and
could we stop it?
In some cases, the regimes we have are good enough to
understand most of the issue and most of the stocks and where
things are supposed to be and how they're supposed to work. But
most isn't good enough. You need 100 percent to get to the
guarantee that you want.
So, the answer for non-state actors being able to get these
kinds of materials, either nuclear, chem or bio, is a reality.
Chairman Roberts. Admiral Loy, your assessment of the
nuclear terrorism threat? You touched on it in your statement.
Admiral Loy. Briefly, sir, certainly there are three or
four that we would categorize as those concerns that keep us
awake nights the most. They certainly would include nuclear,
chemical, bio and cyber. With respect directly to nuclear,
Director Goss has the inside track. I would offer--to offering
the most insight to the worldwide nature, with respect to
proliferation--our concerns at DHS go more directly to the
ability to detect those materials as they might be coming in
our direction.
In the President's budget for 2006, there is an initiative
that we're referring to as the National Nuclear Detection
Office, to be established inside the Department of Homeland
Security--not a DHS initiative, but literally a national
initiative--wherein the offices and the good capabilities of
DoD and DOJ and DOE and all others with equities in the issue
can be pooled, such that we can make some kind of an effort
that does two things--one, optimizes the deployment of current
capability in the areas of detection and, second, fences a
significant amount of money--almost a mini-Manhattan Project,
if you will--to offer us a chance to break through toward next-
generation capability of detection.
Those are the efforts that we have underway, Mr. Chairman.
And, again, if there is a closed hearing, we'd be happy to
participate.
Chairman Roberts. I'm going to change the subject. In the
last few years we've had the Joint Inquiry, the 9/11
Commission, this Committee's review in regards to WMD in Iraq--
all of which highlighted the failure to share intelligence
information across the intelligence community.
For every intelligence failure, you hear another
recommendation for more information sharing. That's the
buzzword. For too many times, when we hear about a consensus
threat, we find out there's not a consensus. I believe,
however, that information sharing is a rather limited idea that
falsely implies that the intelligence collectors own the
information that they collect.
The Vice Chairman and I also think that information sharing
means that the collectors push information to the analysts they
believe have a need to know.
I think we need to change our thinking on this issue. It's
time to be working toward a more powerful concept. We call it
information access. No one agency of the U.S. Government owns
intelligence information and any cleared analyst with a need to
know should be able to access it.
While sensitive information must still be managed--I know
that--cleared analysts should be able to pull that information
by searching all intelligence databases without having to wait
for any one agency to push the information to them, as we do it
today.
What do you think--and I'm addressing, basically, Director
Goss here--about this idea of information access, as well as
Director Mueller. Do we need to take the classification
authority away from the collection agencies and put it in the
hands of an authority, i.e., the DNI, who is neither a
collector or an analyst, who can more honestly balance the need
to know with the need to protect the sources and methods?
Director Goss. Thank you, Mr. Chairman.
The sources and methods question I am clear on. We do need
to protect our sources and methods. The degree that some of our
sources and methods are revealed in the media from time to
time, through leaks and other matters, does not necessarily
mean we shouldn't continue to protect them. Just because it's
reported in the paper doesn't mean we're going to confirm it.
Sometimes we are able to still get further utility out of
sources and methods, even though they have been discussed,
because not everybody may read that particular paper.
But it is harmful to us, in our efforts to broaden the
product in the community, that not everybody is playing by
exactly the same rules. We find that different people treat
classifications different ways and have different reactions to
it. So I do believe you would be right in focusing some
attention on the classification and declassification process.
It is clearly an area that needs attention, something we've
talked about in the past. And it is still somewhat of a
neglected stepchild.
In the area of getting the information to who needs to
know, that's exactly on target. The trick is, who needs to
know? It was always a question of sharing with who needs to
know. The question of who makes that decision of who needs to
know has always been the problem.
We find that the audience of who needs to know is, in fact,
larger as we bring our community and its many, many elements
together that are being asked to do things--more things--not
only overseas, but particularly now at home.
Our domestic agencies--as Admiral Loy has just testified,
and as Director Mueller has testified--clearly are doing things
in the war on terrorism that require sharing of information.
Well, the foreign intelligence program, which is where the
intelligence program has always operated, is doing new business
with domestic agencies to deal with terrorism in a domestic
way, because, as you know, the foreign intelligence program is
prohibited from spying on Americans.
So, getting that piece just right has been part of the
effort, as we have gone along since 9/11. And I am pleased to
report we are doing exceedingly well, in my view, on that. And
I would hope that my colleagues would agree. There's still room
to go, but I believe we are sharing much better. I certainly
agree analysts should be driving collection and not the other
way around.
Chairman Roberts. I ask for the patience of my colleagues.
My time is up, but I would like for Director Mueller to address
this, and also Admiral Jacoby.
If you can be short and succinct, sir.
Director Mueller. I certainly agree with the premise that
those responsible for acting should have access to the
information in whatever database it resides, in whatever
agency.
I think TTIC, the Terrorist Threat Integration Center, and
the National Counterterrorism Center, when it comes to
terrorism information, has taken us well along that way to give
us access to the information, regardless of in which database
it resides. Co-location, as we've co-located out in Tyson, has
helped immeasurably to break down some of those barriers.
So, I agree with the premise. I also agree with, I think,
the second premise. And that is the importance of the analysts
having access to at least information relating to the
motivations of underlying sources, the access that the
underlying source may have to the information. Having more
clarity as to what moves the person to provide the information,
to whether it be the FBI, CIA or elsewhere. And that, I think,
is something we have to work on.
Last, in terms of moving the authority from the agency to
the DNI, I do think the agency, at the outset, needs the
authority to protect its sources and methods, but it should be
reviewed by the DNI. I don't think that moving it up to the DNI
would work all that well. But I do believe that the DNI ought
to review how we classify, how we describe our sources and
methods.
Chairman Roberts. Admiral Jacoby.
STATEMENT OF VICE ADMIRAL LOWELL JACOBY, USN,
DIRECTOR, DEFENSE INTELLIGENCE AGENCY
Admiral Jacoby. Sir, your ownership of information
statement is just right on the mark, sir. I think that's a
desperately important area for this Committee and for our
community to continue to work hard on.
Part of it that comes along with the need to know is, the
way we do business today, the collector decides who needs to
know in many cases. We need to swap that and have the analysts
who are charged with discovering information and generating
knowledge be the driver in the process.
The other part that's desperately important to this is
putting in place the Smart Network that is talked about so
concisely in the 9/11 Commission report, because applying
modern commercial information management kinds of tools will
help us to separate the content from neglected information
while still protecting the sourcing of the information. That's
a desperately important part of this whole discussion and needs
to be pursued very aggressively.
[The prepared statement of Admiral Jacoby follows:]
Prepared Statement of Vice Admiral Lowell E. Jacoby,
U.S. Navy Director, Defense Intelligence Agency
Good morning Mr. Chairman, Mr. Vice Chairman and Members of the
Committee. It is my honor and privilege to represent Defense
Intelligence and present what we know and believe to be the principal
threats and issues in today's world. The dedicated men and women of
Defense Intelligence work around the clock and around the world to
protect our country. Many of these active duty, reserve and civilian
intelligence professionals are working in remote and dangerous
conditions. Our mission is simple, but rarely easy. It is to discover
information and create knowledge to provide warning, identify
opportunities and deliver overwhelming advantage to our warfighters,
defense planners and national security policymakers.
This is the third time I report to you that Defense Intelligence is
engaged in a war on a global scale. Most of the forces and issues
involved in this war were addressed in my testimony last year. Several
increased in severity or changed in composition. Few, unfortunately,
decreased.
The traditional Defense Intelligence focus on military capabilities
is insufficient to identify and gauge the breadth of these threats. We
are working hard to access ``all'' information to better understand and
counter these threats. Defense Intelligence is engaged with foreign and
domestic counterparts to better integrate our capabilities. We remained
focused on information sharing and creating the ``smart networks''
described in the 9/11 Commission report. I am anxious to work with the
new Director of National Intelligence, my fellow intelligence agency
heads and others to forge a more cohesive and comprehensive
Intelligence Community.
GLOBAL WAR ON TERRORISM
We continue to face a variety of threats from terrorist
organizations.
Al-Qaida and Sunni Extremist Groups. The primary threat for the
foreseeable future is a network of Islamic extremists hostile to the
United States and our interests. The network is transnational and has a
broad range of capabilities, to include mass-casualty attacks. The most
dangerous and immediate threat is Sunni Islamic terrorists that form
the ``al-Qaida associated movement.''
Usama bin Ladin and his senior leadership no longer exercise
centralized control and direction. We now face an ``al-Qaida associated
movement'' of like-minded groups who interact, share resources and work
to achieve shared goals. Some of the groups comprising this movement
include Jemaah Islamiyya, responsible for the 9 September bombing of
the Australian Embassy in Jakarta and Hezb-e-Islami-Gulbuddin. Some of
the groups in the movement provide safe haven and logistical support to
al-Qaida members, others operate directly with al-Qaida and still
others fight with al-Qaida in the Afghanistan/Pakistan region.
Remnants of the senior leadership still present a threat. As is
clear in their public statements, Bin Ladin and al-Zawahiri remain
focused on their strategic objectives, including another major
casualty-producing attack against the Homeland.
CBRN Terrorism. We judge terrorist groups, particularly al-Qaida,
remain interested in Chemical, Biological, Radiological and Nuclear
(CBRN) weapons. Al Qaida's stated intention to conduct an attack
exceeding the destruction of 9/11 raises the possibility that planned
attacks may involve unconventional weapons. There is little doubt it
has contemplated using radiological or nuclear material. The question
is whether al-Qaida has the capability. Because they are easier to
employ, we believe terrorists are more likely to use biological agents
such as ricin or botulinum toxin or toxic industrial chemicals to cause
casualties and attack the psyche of the targeted populations.
Pressures in the Islamic World. Various factors coalesce to
sustain, and even magnify the terrorist threat.
Islam is the world's second largest religion with over 1 billion
adherents, representing 22 percent of the world's population. Due to
high birth rates, it is also the world's fastest growing religion. Only
twenty percent of Muslims are ethnic Arabs. The top four nations in
terms of Muslim population, Indonesia, Pakistan, Bangladesh and India,
are non-Arab. While the vast majority of Muslims do not advocate
violence, there are deeply felt sentiments that cross Muslims sects and
ethnic and racial groups.
Our policies in the Middle East fuel Islamic resentment. Multiple
polls show favorable ratings for the United States in the Muslim world
at all-time lows. A large majority of Jordanians oppose the War on
Terrorism, and believe Iraqis will be ``worse off' in the long term. In
Pakistan, a majority of the population holds a ``favorable'' view of
Usama bin Ladin. Across the Middle East, surveys report suspicion over
U.S. motivation for the War on Terrorism. Overwhelming majorities in
Morocco, Jordan, and Saudi Arabia believe the U.S. has a negative
policy toward the Arab world.
Usama bin Ladin has relied on Muslim resentment toward U.S.
policies in his call for a defensive jihad to oppose an American
assault on the Islamic faith and culture. He contends that all faithful
Muslims are obliged to fight, or support the jihad financially if not
physically capable of fighting. Another goal is the overthrow of
``apostate'' Muslim governments, defined as governments which do not
promote Islamic values or support or are friendly to the U.S. and other
Western countries. The goals also call for withdrawal of U.S. and other
Coalition forces from Muslim countries, the destruction of Israel and
restoration of a Palestinian State and recreation of the caliphate, a
State based on Islamic fundamental tenets.
Underlying the rise of extremism are political and socio-economic
conditions that leave many, mostly young male adults, alienated. There
is a demographic explosion or youth bubble in many Muslim countries.
The portion of the population under age 15 is 40 percent in Iraq, 49
percent in the Gaza Strip and 38 percent in Saudi Arabia. Unemployment
rates in these countries are as high as 30 percent in Saudi Arabia and
about 50 percent in the Gaza Strip.
Educational systems in many nations contribute to the appeal of
Islamic extremism. Some schools, particularly the private ``madrasas,''
actively promote Islamic extremism. School textbooks in several Middle
East states reflect a narrow interpretation of the Koran and contain
anti-Western and anti-Israeli views. Many schools concentrate on
Islamic studies focused on? memorization and recitation of the Koran
and fail to prepare students for jobs in the global economy.
Groups like al-Qaida capitalize on the economic and political
disenfranchisement to attract new recruits. Even historically local
conflicts involving Muslim minorities or fundamentalist groups such as
those in Indonesia, the Philippines and Thailand are generating new
support for al-Qaida and present new al-Qaida-like threats.
Saudi-Arabia. Al Saud rule is under significant pressure. In 2004,
15 significant attacks occurred against the regime, U.S. and other
Western targets in the Kingdom, an increase from 7 in 2003. Attacks in
2004 included the 6 December 2004 attack on the U.S. Consulate in
Jeddah.
Attacks since May 2003 against housing compounds, an Interior
Ministry facility, a petroleum facility and individual assassinations
caused Riyadh to attempt to aggressively counter the threat. We expect
continued assassinations, infrastructure attacks and operations
directed at Westerners in the Kingdom to discredit the regime and
discourage individuals and businesses, especially those affiliated with
the Saudi military, from remaining in the Kingdom.
Last year Saudi security forces killed or captured many of their 26
most wanted militant extremists and discovered numerous arms caches.
However, we believe there may be hundreds, if not thousands of
extremists and extremist sympathizers in the Kingdom.
Pakistan. President Musharraf continues to be a key ally in the War
on Terrorism and provides critical support against Al-Qaida and Taliban
operating in Pakistan. The economy has displayed strong growth over the
past 2 years. Indigenous and international terrorist groups have
pledged to assassinate Musharraf and other senior Pakistan government
officials and remain a significant threat. Unless Musharraf is
assassinated, Pakistan will remain stable through the year; however,
further political and economic reform is needed to continue positive
trends beyond that time.
Pakistan significantly increased its military operations and
pacification efforts in tribal areas along the Afghanistan border in
2004. These operations affected al-Qaida, Taliban, and other threat
groups by disrupting safe-havens and, in some cases, forcing them back
into Afghanistan where they are vulnerable to Coalition operations.
Pakistan also secured agreements with several tribes by successfully
balancing military action with negotiations and rewards to encourage
cooperation and limit domestic backlash. Pakistan must maintain and
expand these operations in order to permanently disrupt insurgent and
terrorist activity.
We believe international and indigenous terrorist groups continue
to pose a high threat to senior Pakistani government officials,
military officers and U.S. interests. The Prime Minister and a corps
commander have been the targets of assassination attempts since last
summer. President Musharraf remains at high risk of assassination,
although no known attempts on his life have occurred since December
2003. Investigations into the two December 2003 attempts revealed
complicity among junior officers and enlisted personnel in the
Pakistani Army and Air Force.
Our assessment remains unchanged from last year. If Musharraf were
assassinated or otherwise replaced, Pakistan's new leader would be less
pro-US. We are concerned that extremist Islamic politicians would gain
greater influence.
CONFLICT IN IRAQ
The insurgency in Iraq has grown in size and complexity over the
past year. Attacks numbered approximately 25 per day 1 year ago. Today,
they average in the 60s. Insurgents have demonstrated their ability to
increase attacks around key events such as the Iraqi Interim Government
(IIG) transfer of power, Ramadan and the recent election. Attacks on
Iraq's election day reached approximately 300, double the previous 1
day high of approximately 150 reached during last year's Ramadan.
The pattern of attacks remains the same as last year. Approximately
80 percent of all attacks occur in Sunni-dominated central Iraq. The
Kurdish north and Shia south remain relatively calm. Coalition Forces
continue to be the primary targets. Iraqi Security Forces and Iraqi
Interim Government (IIG) officials are attacked to intimidate the Iraqi
people and undermine control and legitimacy. Attacks against foreign
nationals are intended to intimidate non-government organizations and
contractors and inhibit reconstruction and economic recovery. Attacks
against the country's infrastructure, especially electricity and the
oil industry, are intended to stall economic recovery, increase popular
discontent and further undermine support for the IIG and Coalition.
Recent polls show confidence in the Iraqi Interim Government
remains high in Shia and Kurdish communities and low in Sunni areas.
Large majorities across all groups opposed attacks on Iraqi Security
Forces and Iraqi and foreign civilians. Majorities of all groups placed
great importance in the election. Sunni concern over election security
likely explains the relatively poor showing by the Sunni electorate in
comparison with the Shia and Kurdish groups. Confidence in Coalition
Forces is low. Most Iraqis see them as occupiers and a major cause of
the insurgency.
We believe Sunni Arabs, dominated by Ba'athist and Former Regime
Elements (FRE), comprise the core of the insurgency. Ba'athist/FRE and
Sunni Arab networks are likely collaborating, providing funds and
guidance across family, tribal, religious and peer group lines. Some
coordination between Sunni and Shia groups is also likely.
Militant Shia elements, including those associated with Muqtada al
Sadr, have periodically fought the Coalition. Following the latest
round of fighting last August and September, we judge Sadr's forces are
re-arming, re-organizing and training. Sadr is keeping his options open
to either participate in the political process or employ his forces.
Shia militants will remain a significant threat to the political
process and fractures within the Shia community are a concern.
Jihadists, such as al-Qaida operative Abu Musab al Zarqawi, are
responsible for many high-profile attacks. While Jihadist activity
accounts for only a fraction of the overall violence, the strategic and
symbolic nature of their attacks, combined with effective Information
Operations, has a disproportionate impact.
Foreign fighters are a small component of the insurgency and
comprise a very small percentage of all detainees. Syrian, Saudi,
Egyptian, Jordanian and Iranian nationals make up the majority of
foreign fighters. Fighters, arms and other supplies continue to enter
Iraq from virtually all of its neighbors despite increased border
security.
Insurgent groups will continue to use violence to attempt to
protect Sunni Arab interests and regain dominance. Subversion and
infiltration of emerging government institutions, security and
intelligence services will be a major problem for the new government.
Jihadists will continue to attack in Iraq in pursuit of their long-term
goals. Challenges to reconstruction, economic development and
employment will continue. Keys to success remain improving security
with an Iraqi lead, rebuilding the civil infrastructure and economy and
creating a political process that all major ethnic and sectarian groups
see as legitimate.
CONFLICT IN AFGHANISTAN
The people of Afghanistan achieved a major milestone by electing
Hamid Karzai president in October 2004 election. Approximately 70
percent or just over 8 million registered Afghans disregarded scattered
attacks by the Taliban and al-Qaida and voted. Karzai garnered 55
percent of the vote in a field of 18 candidates. The election dealt a
blow to insurgents and provides new momentum for reform, such as the
demobilization of private militias and increased government
accountability.
President Karzai has since assembled a cabinet of reform minded and
competent ministers who are ethnically and politically diverse. Most
significantly, he removed Afghanistan's most powerful warlord, Marshal
Fahim Khan, as Defense Minister.
Despite the overwhelming voter turn-out, the election's results
highlighted ethnic divisions. Karzai received a majority of the Pashtun
vote, but failed to do so within any of the other ethnic groups.
Continued ethnic divisions remain a challenge to political stability.
National Assembly elections, scheduled for later this year, will
provide the opportunity for non-Pashtuns to increase their
participation in the government.
The security situation improved over the past year. Insurgent
attacks precipitously dropped after Afghanistan's presidential
election. The primary targets remain Coalition Forces and facilities in
the southern and eastern provinces. Voter registration teams and
polling sites were attacked in these areas, reflecting the Taliban's
concern over legitimate elections. Similar attacks in the same
geographic areas are expected for elections later this year, but are
unlikely to have a significant impact.
We believe many Taliban leaders and fighters were demoralized by
their inability to derail the election and have seen their base of
support among Pashtun tribes decrease. Loss of support, plus continued
Coalition and Pakistani military operations, have prompted some to
express an interest in abandoning the insurgency and pursuing political
alternatives. Nevertheless some factions will likely remain committed
to the insurgency and seek funding to continue operations.
WEAPONS OF MASS DESTRUCTION AND MISSILE PROLIFERATION
Nuclear Weapons. Immediately behind terrorism, nuclear
proliferation remains the most significant threats to our Nation and
international stability. We anticipate increases in the nuclear weapons
inventories of a variety of countries to include China, India, Pakistan
and North Korea.
Iran is likely continuing nuclear weapon-related endeavors in an
effort to become the dominant regional power and deter what it
perceives as the potential for U.S. or Israeli attacks. We judge Iran
is devoting significant resources to its weapons of mass destruction
and ballistic missile programs. Unless constrained by a nuclear non-
proliferation agreement, Tehran probably will have the ability to
produce nuclear weapons early in the next decade.
With declining or stagnant conventional military capabilities, we
believe North Korea considers nuclear weapons critical to deterring the
U.S. and ROK. After expelling IAEA personnel in 2002, North Korea
reactivated facilities at Yongbyon and claims it extracted and
weaponized plutonium from the 8,000 spent fuel rods. Only last week,
Pyongyang publicly claimed it had manufactured nuclear weapons. Kim
Chong-il may eventually agree to negotiate away parts of his nuclear
weapon stockpile and program and agree to some type of inspection
regime, but we judge Kim is not likely to surrender all of his nuclear
weapon capabilities. We do not know under what conditions North Korea
would sell nuclear weapons or technology.
India and Pakistan continue to expand and modernize their nuclear
weapon stockpiles. We remain concerned over the potential for
extremists to gain control of Pakistani nuclear weapons. Both nations
may develop boosted nuclear weapons, with increased yield.
Chemical and Biological Weapons. Chemical and biological weapons
pose a significant threat to our deployed forces, international
interests and homeland. Numerous states have chemical and biological
warfare programs. Some have produced and weaponized agents. While we
have no intelligence suggesting these states are planning to transfer
weapons to terrorist groups, we remain concerned and alert to the
possibility.
We anticipate the threat posed by biological and chemical agents
will become more diverse and sophisticated over the next 10 years.
Major advances in the biological sciences and information technology
will enable BW agent--both anti-human and anti-agricultural--
development. The proliferation of dual use technology compounds the
problem. Many states will remain focused on ``traditional'' BW or CW
agent programs. Others are likely to develop non-traditional chemical
agents or use advanced biotechnology to create agents that are more
difficult to detect, easier to produce, and resistant to medical
countermeasures.
Ballistic Missiles. Moscow likely views its strategic forces,
especially its nuclear armed missiles, as a symbol of great power
status and a key deterrent. Nevertheless, Russia's ballistic missile
force will continue to decline in numbers. Russia is fielding the silo-
variant of the SS-27 Intercontinental Ballistic Missile (ICBM) and is
developing a road-mobile variant and may be developing another new ICBM
and new Submarine Launched Ballistic Missile (SLBM). It recently
developed and is marketing anew Short Range Ballistic Missile (SRBM).
Russia also is trying to preserve and extend the lives of Soviet-era
missile systems.
China is modernizing and expanding its ballistic missile forces to
improve their survivability and war-fighting capabilities, enhance
their coercion and deterrence value and overcome ballistic missile
defense systems. This effort is commensurate with its growing power and
more assertive policies, especially with respect to Taiwan. It
continues to develop three new solid-propellant strategic missile
systems--the DF-31 and DF-31A road-mobile ICBMs and the JL-2 SLBM. By
2015, the number of warheads capable of targeting the continental
United States will increase several fold.
China also is developing new SRBMs, Medium Range Ballistic Missile
(MRBMs), and Intermediate Range Ballistic Missile (ICBMs). They are a
key component of Beijing's military modernization program. Many of
these systems will be fielded in military regions nearTaiwan. In 2004,
it added numerous SRBMs to those already existing in brigades near
Taiwan. In addition to key Taiwanese military and civilian facilities,
Chinese missiles will be capable of targeting U.S. and allied military
installations in the region to either deter outside intervention in a
Taiwan crisis or attack those installations if deterrent efforts fail.
We judge Iran will have the technical capability to develop an ICBM
by 2015. It is not clear whether Iran has decided to field such a
missile. Iran continues to field 1300-km range Shahab III MRBMs capable
of reaching Tel Aviv. Iranian officials have publicly claimed they are
developing a new 2000-km-range variant of the Shahab III. Iranian
engineers are also likely working to improve the accuracy of the
country's SRBMs.
North Korea continues to invest in ballistic missiles to defend
itself against attack, achieve diplomatic advantage and provide hard
currency through foreign sales. Its Taepo Dong 2 intercontinental
ballistic missile may be ready for testing. This missile could deliver
a nuclear warhead to parts of the United States in a two stage variant
and target all of North America with a three stage variant. North
Korean also is developing new SRBM and IRBM missiles that will put U.S.
and allied forces in the region at further risk.
Pakistan and India continue to develop new ballistic missiles,
reflecting tension between those two countries and New Delhi's desire
to become a greater regional power. Pakistan flighttested its new
solid-propellant MRBM for the first time in 2004. The Indian military
is preparing to field several new or updated SRBMs and an MRBM. India
is developing a new IRBM, the Agni III.
Syria continues to improve its missile capabilities, which it
likely considers essential compensation for conventional military
weakness. Syria is fielding updated SRBMs to replace older and shorter-
range variants.
Several nations are developing technologies to penetrate ballistic
missile defenses.
Cruise Missiles. Land-Attack Cruise Missiles (LACMs) and Lethal
Unmanned Aerodynamic Vehicles (LUAVs) are expected to pose an increased
threat to deployed U.S. and allied forces in various regions. These
capabilities are already emerging in Asia.
The numbers and capabilities of cruise missiles will increase,
fueled by maturation of land-attack and Anti-Ship Cruise Missile (ASCM)
programs in Europe, Russia, and China, sales of complete systems, and
the spread of advanced dual-use technologies and materials. Countering
today's ASCMs is a challenging problem and the difficulty in countering
these systems will increase with the introduction of more advanced
guidance and propulsion technologies. Several ASCMs will have a
secondary land-attack role.
China continues developing LACMs. We judge by 2015, it will have
hundreds of highly accurate air- and ground-launched LACMs. China is
developing and purchasing ASCMs capable of being launched from
aircraft, surface ships, submarines, and land that will be more capable
of penetrating shipboard defenses. These systems will present
significant challenges in the event of a U.S. naval force response to a
Taiwan crisis.
In the next 10 years, we expect other countries to join Russia,
China, and France as major exporters of cruise missiles. Iran and
Pakistan, for instance, are expected to develop or import LACMs. India,
in partnership with Russia, will begin production of the PJ-10, an
advanced anti-ship and land attack cruise missile, this year.
Major Exporters. Russia, China and North Korea continue to sell WMD
and missile technologies for revenue and diplomatic influence. The
Russian government, or entities within Russia, continues to support
missile programs and civil nuclear projects in China, Iran, India and
Syria. Some of the civil nuclear projects can have weapons
applications. Chinese entities continue to supply key technologies to
countries with WMD and missile programs, especially Pakistan, North
Korea and Iran, although China appears to be living up to its 1997
pledge to limit nuclear cooperation with Iran. North Korea remains the
leading supplier of missiles and technologies. In recent years, some of
the states developing WMD or ballistic missile capabilities have become
producers and potential suppliers. Iran has supplied liquid-propellant
missile technology to Syria, and has marketed its new solid-propellant
SRBM.
We also are watching non-government entities and individual
entrepreneurs. The revelations regarding the A.Q. Khan nuclear
proliferation network show how a complex international network of
suppliers with the requisite expertise and access to the needed
technology, middlemen and front companies can successfully circumvent
international controls and support multiple nuclear weapons programs.
NATIONS OF INTEREST
Iran. Iran is important to the U.S. because of its size, location,
energy resources, military strength and antipathy to U.S. interests. It
will continue support for terrorism, aid insurgents in Iraq and work to
remove the U.S. from the Middle East. It will also continue its weapons
of mass destruction and ballistic missile programs. Iran's drive to
acquire nuclear weapons is a key test of international resolve and the
nuclear non-proliferation treaty.
Iran's long-term goal is to see the U.S. leave Iraq and the region.
Another Iranian goal is a weakened, decentralized and Shia-dominated
Iraq that is incapable of posing a threat to Iran. These goals and
policies most likely are endorsed by senior regime figures.
Tehran has the only military in the region that can threaten its
neighbors and Gulf stability. Its expanding ballistic missile inventory
presents a potential threat to states in the region. As new longer
range MRBMs are fielded Iran will have missiles with ranges to reach
many of our European allies. Although Iran maintains a sizable
conventional force, it has made limited progress in modernizing its
conventional capabilities. Air and air defense forces rely on out-of-
date US, Russian and Chinese equipment. Ground forces suffer from
personnel and equipment shortages. Ground forces equipment is also
poorly maintained.
We judge Iran can briefly close the Strait of Hormuz, relying on a
layered strategy using predominately naval, air, and some ground
forces. Last year it purchased North Korean torpedo and missile-armed
fast attack craft and midget submarines, making marginal improvements
to this capability.
The Iranian government is stable, exercising control through its
security services. Few anti-government demonstrations occurred in 2004.
President Khatami will leave office in June 2005 and his successor will
almost certainly be more conservative. The political reform movement
has lost its momentum. Pro-reform media outlets are being closed and
leading reformists arrested.
Syria. Longstanding Syrian policies of supporting terrorism,
relying on WMD for strategic deterrence, and occupying Lebanon remain
largely unchanged. Damascus is providing intelligence on al-Qaida for
the War on Terrorism. Its response to U.S. concerns on Iraq has been
mixed. Men, material and money continue to cross the Syrian-Iraqi
border likely with help from corrupt or sympathetic local officials.
Damascus likely sees opportunities and risks with an unstable Iraq.
Syria sees the problems we face in Iraq as beneficial because our
commitments in Iraq reduce the prospects for action against Syria.
However, Damascus is probably concerned about potential spill-over of
Iraqi problems, especially Sunni extremism, into Syria. We see little
evidence of active regime support for the insurgency, but Syria offers
safe-haven to Iraqi Baathists, some of whom have ties to insurgents.
Syria continues to support Lebanese Hizballah and several
rejectionist Palestinian groups, which Damascus argues are legitimate
resistance groups.
Syria is making minor improvements to its conventional forces. It
is buying modern antitank guided missiles and overhauling some
aircraft, but cannot afford major weapon systems acquisitions.
President Bashar al-Asad is Syria's primary decisionmaker. Since
becoming President in 2000 upon the death of his father, Asad has
gradually replaced long-serving officials. Potential domestic
opposition to his rule--such as the Muslim Brotherhood--is weak and
disorganized. We judge the Syrian regime is currently stable, but
internal or external crises could rapidly threaten it.
China. We do not expect Communist Party Secretary and President Hu
Jintao's succession to chairman of the Central Military Command (CMC)
to significantly alter Beijing's strategic priorities or its approach
to military modernization. The commanders of the People's Liberation
Army (PLA) Air Force, Navy, and Second Artillery (Strategic Rocket
Forces) joined the CMC in September, demonstrating an institutional
change to make China's military more ``joint.'' The CMC traditionally
was dominated by generals from PLA ground forces.
China remains keenly interested in Coalition military operations in
Afghanistan and Iraq and is using lessons from those operations to
guide PLA modernization and strategy. We believe several years will be
needed before these lessons are incorporated into the armed forces. We
judge Beijing remains concerned over U.S. presence in Iraq, Afghanistan
and Central Asia. Beijing may also think it has an opportunity to
improve diplomatic and economic relations, to include access to energy
resources, with other countries distrustful or resentful of U.S.
policy.
China continues to develop or import modern weapons. Their
acquisition priorities appear unchanged from my testimony last year.
Priorities include submarines, surface combatants, air defense,
ballistic and anti-ship cruise missiles and modern fighters. China
recently launched a new conventional submarine and acquired its first
squadron of modern Su30/FLANKER aircraft for the naval air forces from
Russia. The PLA must overcome significant integration challenges to
turn these new, advanced and disparate weapon systems into improved
capabilities. Beijing also faces technical and operational difficulties
in numerous areas. The PLA continues with its plan to cut approximately
200,000 soldiers from the Army to free resources for further
modernization, an initiative it began in 2004.
Beijing was likely heartened by President Chen Shui-bian
coalition's failure to achieve a majority in the recent Legislative
Yuan elections. We believe China has adopted a more activist strategy
to deter Taiwan moves toward independence that will stress diplomatic
and economic instruments over military pressure. We believe China's
leaders prefer to avoid military coercion, at least through the 2008
Olympics, but would initiate military action if it felt that course of
action was necessary to prevent Taiwan independence.
Beijing remains committed to improving its forces across from
Taiwan. In 2004, it added numerous SRBMs to those already existing in
brigades near Taiwan. It is improving its air, naval and ground
capabilities necessary to coerce Taiwan unification with the mainland
and deter U.S. intervention. Last fall, for instance, a Chinese nuclear
submarine conducted a deployment that took it far into the western
Pacific Ocean, including an incursion into Japanese waters.
North Korea. After more than a decade of declining or stagnant
economic growth, Pyongyang's military capability has significantly
degraded. The North's declining capabilities are even more pronounced
when viewed in light of the significant improvements over the same
period of the ROK military and the US-ROK Combined Forces Command.
Nevertheless, the North maintains a large conventional force of over
one million soldiers, the majority of which we believe are deployed
south of Pyongyang.
North Korea continues to prioritize the military at the expense of
its economy. We judge this ``Military First Policy'' has several
purposes. It serves to deter US-ROK aggression. Nationwide conscription
is a critical tool for the regime to socialize its citizens to maintain
the Kim family in power. The large military allows Pyongyang to use
threats and bravado in order to limit US-ROK policy options.
Suggestions of sanctions, or military pressure by the U.S. or ROK are
countered by the North with threats that such actions are ``an act of
war'' or that it could ``turn Seoul into a sea of fire.'' Inertia,
leadership perceptions that military power equals national power and
the inability for the regime to change without threatening its
leadership also explains the continuing large military commitment.
The North Korean People's Army remains capable of attacking South
Korea with artillery and missile forces with limited warning. Such a
provocative act, absent an immediate threat, is highly unlikely,
counter to Pyongyang's political and economic objectives and would
prompt a South Korean-CFC response it could not effectively oppose.
Intemally, the regime in Pyongyang appears stable. Tight control
over the population is maintained by a uniquely thorough
indoctrination, pervasive security services and Party organizations,
and a loyal military.
Russia. Despite an improving economy, Russia continues to face
endemic challenges related to its post-Soviet military decline. Seeking
to portray itself as a great power, Moscow has made some improvements
to its armed forces, but has not addressed difficult domestic problems
that will limit the scale and scope of military recovery.
Russian conventional forces have improved from their mid-1990s low
point. Moscow nonetheless faces challenges if it is to move beyond
these limited improvements. Significant procurement has been postponed
until after 2010 and the Kremlin is not spending enough to modernize
Russia's defense industrial base. Russia also faces increasingly
negative demographic trends and military quality of life issues that
will create military manning problems.
Moscow has been able to boost its defense spending in line with its
recovering economy. Russia's Gross National Product averaged 6.7
percent growth over the past 5 years, predominately from increased
energy prices and consumer demand. Defense should continue to receive
modest real increases in funding, unless Russia suffers an economic
setback.
Russia continues vigorous efforts to increase its sales of weapons
and military technology. Russia's annual arms exports average several
billion dollars. China and India account for the majority of Russia's
sales, with both countries buying advanced conventional weapons,
production licenses, weapon components and technical assistance to
enhance their R&D programs. Efforts to increase its customer base last
year resulted in increased sales to Southeast Asia. Russian sales are
expected to remain several billion dollars annually for the next few
years.
Russia's struggle with the Chechen insurgency continues with no end
in sight. Chechen terrorists seized a North Ossetian primary school
where over 330 people were killed and two Russian civilian airliners
were bombed in flight last summer. Rebels continue targeting Russians
in Chechnya and Chechen officials cooperating with Moscow. While Moscow
is employing more pro-Russian Chechen security forces against the
insurgents, the war taxes Russian ground forces. Although the Chechnya
situation remains a minor issue to the average Russian, concerns over
spreading violence prompted new government security initiatives and
offered cover for imposition of authoritarian political measures.
Russian leaders continue to characterize Operation IRAQI FREEDOM
and NATO enlargement as mistakes. They express concerns that U.S.
operations in Iraq are creating instability and facilitating terrorism.
Russian leaders want others to view the Chechen conflict as a struggle
with international terrorism and accuse those who maintain contact with
exiled Chechen leaders or criticize Moscow's policies toward Chechnya
as pursuing a double standard. Russian officials are wary of potential
U.S. and NATO force deployments near Russia or in the former Soviet
states. Concern that Ukraine under a President Yushchenko would draw
closer to NATO and the EU was a factor motivating Russia's involvement
in Ukraine's presidential election.
CLOSING THOUGHTS
This year my testimony focuses on what I believe to be the most
immediate threats to our Nation and challenges to our interests. The
threat from terrorism has not abated. While our strategic intelligence
on terrorist groups is generally good, information on specific plots is
vague, dated or sporadic. We can and must do better. Improved
collection and analysis capabilities can make a significant difference.
We are increasing our ability to provide that timely, relevant
intelligence.
The Intelligence Community as a whole needs to improve its
collection and focus more analytic resources on pressures in the
Islamic world so that we can better understand the drivers for
extremism. We also need greater collection and more analytic resources
devoted to certain key Islamic countries. We have taken steps to
improve our collection and analysis, hiring more individuals with
Arabic and Farsi language skills. Nevertheless, more needs to be done
across the Intelligence Community, particularly in the area of
meaningful, penetrating collection and making the content of that
collection available to all who need it.
Proliferation of Weapons of Mass Destruction and Missiles is my
second priority. Collection must be improved. Additionally, improving
our analytic techniques, adoption of true ``all-source'' analysis
approaches and greater information sharing will help us avoid problems
similar to those in our pre-war analysis of Iraq's WMD program.
We also must not let our focus on numerous nations of interest
wane. Traditional military intelligence disciplines must remain robust
if we are to provide our national security policymakers, defense
planners and warfighters the information they need to successfully
execute their missions. We need improved collection so that we are
stealing our true secrets. There are significant gaps in our
understanding of several nations' leaderships' plans and intentions.
Additionally, more collection and analysis is needed to provide
adequate warning of attack and a more complete understanding of the
military capability, doctrine and war plans of numerous countries. We
are working to better target collection against these hard targets.
As I mentioned, the threats and challenges I briefed today are the
most significant and immediate. They are certainly not the only ones.
In previous years, I have spoken about the security situation in
Africa, Latin America and South and Southeast Asia. I also addressed my
concerns on information operations, international crime, problems
associated with globalization, uneven economic development and
ungoverned states. Those issues remain significant concerns and the
focus of collection and analytic resources for defense intelligence. We
will be requesting additional funding and billets to ensure we retain
coverage and reporting on global coverage. We are reallocating our
analytic capabilities, implementing the ``Master, Measure and Monitor''
concept in the Defense Intelligence Analysis Program to better address
many of these threats and disturbing trends.
Let me conclude by making two points. First, DIA is focused on
transforming its capabilities in all of its mission areas to operate in
a true ``all-source'' environment. We are committed to incorporating
all relevant information into our analyses, integrating analysts with
collectors and precisely targeting our analytic and collection
capabilities against complex threats and tough issues. More opportunity
for ``discovery,'' greater penetration of hard targets and higher
confidence in our judgments are our goals. Second, we are aggressively
reengineering our information management approach and architecture. We
are focused on harvesting non-traditional sources of data and
positioning ourselves to exploit information from new and future
sources. We are convinced commercial sector ``content management
practices'' and data standards hold the key to upgrading our
information management capability and providing the ``smart network''
we need. Much more work is required in the area if we are to realize
our potential and fundamentally improve our capabilities. These efforts
follow the Director of Central Intelligence and the Secretary of
Defense guidance and reflect the letter and spirit of the intelligence
reform act. Thank you. I look forward to your questions.
Chairman Roberts. Admiral Loy and Ms. Rodley, I apologize
for not asking for your response in the interest of time. But I
would just say, from the INR aspect, I know the Vice Chairman
and I and Members of this Committee want to thank you. You're
one agency that got it right in regards to the WMD situation.
And both of you have a very strong interest in this.
Senator Rockefeller and I apologize to my colleagues.
Vice Chairman Rockefeller. Thank you, Mr. Chairman.
I just second what the Chairman has indicated. I refer to
sharing and access. If you share, it's the decision to give.
It's a decision on the part of the holder. If it's access, then
it is the right of the receiver. So, sharing out/getting in.
And I think that will be worked out over the years.
Director Goss, the National Intelligence Council recently
issued its annual report to Congress on the safety and the
security of Russian nuclear facilities and military forces. The
report is both classified and unclassified. One excerpt from
the unclassified version is as follows:
``Russian officials have reported that terrorists have
targeted Russian nuclear weapons storage sites. Security was
tightened in 2001, after Russian authorities twice thwarted
terrorist efforts to reconnoiter nuclear weapon storage sites.
``We find it''--this is a continuation of the report,
unclassified--``we find it highly unlikely that Russian
authorities would have been able to recover all the material
reportedly stolen. We assess that undetected smuggling has
occurred and we are concerned about the total amount of
material that could be diverted or stolen in the last 13
years.''
Now, I'd ask you, sir, is the material missing from Russian
nuclear facilities sufficient to construct a nuclear weapon?
Director Goss. Senator, the way I would prefer to answer
that question, is there is sufficient material unaccounted for,
so that it would be possible for those with know-how to
construct a nuclear weapon. I hope that's sufficiently clear.
Vice Chairman Rockefeller. We'll wait for a closed session.
On the same subject, the National Intelligence Council
assessment, can you assure the American people--and I think
this is a yes-or-no type thing--can you assure the American
people that the material missing from Russian nuclear sites has
not found its way into terrorist hands?
Director Goss. No. I can't make that assurance. I can't
account for some of the material, so I can't make the assurance
about its whereabouts.
Vice Chairman Rockefeller. Appreciate it, sir.
Africa. Since the 1980s, a million people have died of
starvation, enormous dislocation, poverty, hopelessness,
despair, instability, a fertile breeding ground for terrorism,
both east and west, a large Islamic population. Instability in
the African continent has allowed us to intervene episodically
back and forth.
But the whole prospect of the concept that this is the next
great threat, and that being something called a failed
continent, General James Jones made that point to the Chairman
and me three times in a presentation in London, when he was
stationed there. He said, this is the continent that you in the
intelligence world need to be looking at--a failed continent,
because we are consumed by challenges in Iraq, necessarily,
Afghanistan and other world hotspots.
Again, Director Goss, are we facing the possibility, do you
think, of the collapse of civil society throughout much of
Africa? Shouldn't we be addressing the problems in these
countries now, rather than at a future date when our options
will be more likely to be military?
Director Goss. Senator, thank you.
As you know, I've made the statement many times that I
don't want to get into the Department of State's policy areas,
and the question you've asked me gets into actually a much
bigger question than just the intelligence community. But it's
a great question. And you are right on the mark, that this is
an over-neglected area that is under-resourced for American
interests, from my perspective.
I can tell you that I have read Kaplan's piece about the
resurgence of anarchy and I've read Friedman's pieces on this.
We have have seen all kinds of very nasty people, Foday Sankoh,
people like that in the past, who have taken advantage of
exploitation of the processes there.
We find that we are going backwards in some areas where we
should be going forwards. You heard me mention in my remarks a
whole series of bands, of arcs, as it were, of different kinds
of problems in Africa. I think it is a rich seabed for people
who have a mission on their mind to go and try and recruit
people. We have found that. And we are making efforts there.
And I would say we would be wise to solve problems sooner,
before they get more troublesome later. I do think that that is
an area that needs more attention in the intelligence community
and all other efforts that we make.
Vice Chairman Rockefeller. Thank you, sir.
Admiral Jacoby, I can't imagine that you wouldn't have some
comment.
Admiral Jacoby. Senator Rockefeller, you know in past
conversations we've talked about sort of the global spread of
issues. Certainly, there's a fertile ground in the Muslim
populations in Africa for recruitment to extremist causes.
Disaffected youth, the youth bulge, socioeconomic situation,
education shortfalls, unemployment and so forth make inviting
recruiting targets. And obviously, as we look at the Madrid
bombing and some of the things that have happened, particularly
the North African crescent is an area of concern.
Sir, we take the Africa situation seriously in the sense
that we have plussed up our presence in our defense attache
offices and will continue to do that with some new initiatives
that go in place here in 2005 and 2006.
We view Africa as place that needs to be monitored
carefully. Trends need to be carefully described and assessed
and that the intelligence assessments reach policymakers in
that part of the world as a sense of urgency.
Vice Chairman Rockefeller. I would follow through to both
of you that I think we all know that we have an enormous
scarcity of resources, of facilities, of capabilities, simply
because of what's going on elsewhere. And I hear what you both
say. And I hear the sense of urgency behind what you say.
But I also would guess that there's some frustration on
your part that we may not have the financial capability or the
trained personnel capability to be able to get to those areas
to get that intelligence. Those are difficult languages, and it
takes, as Director Goss has often said, 5 years to train a good
agent.
Director Goss. I think you've said it well, Senator.
Admiral Jacoby. I agree completely, sir. Absolutely.
Vice Chairman Rockefeller. Thank you, Mr. Chairman.
Chairman Roberts. Let me just say that, in reference to the
Vice Chairman's concern about the situation in Russia in
regards to loose nukes or loose bioweaponry or loose scientists
or loose anything in terms of security, that we should give a
lot of credit to the Armed Services Committee and its
distinguished Chairman, who is sitting over here to my left and
everybody's right--Senator Warner--for taking such a strong
interest in the CTR program, the Nunn-Lugar program.
And knowing something about that on the Emerging Threats
Subcommittee, we learned right away the most important thing is
to provide the security. We want to eliminate the stockpiles
and we want to safeguard the scientists and make sure they're
not, you know, going somewhere else. But we have made some
progress, and we have put some conditions and some of our
allies need to step up. And the Russians have stepped up. So
I'm very hopeful we'll continue to see additional funding and
really address that security issue.
Senator Bond.
Senator Bond. Thank you, Mr. Chairman.
Director Mueller, you noted that the third concern was the
recruitment of radical American converts. And this is something
that I've become increasingly concerned about.
I don't know if you've seen it, but recently, the Freedom
House put out a report on Saudi publications on hate ideologies
filling American mosques. And as you read through it, you see
the hate-filled language that is officially sponsored by the
cultural offices of the embassy of Saudi Arabia.
And mosques supported by the king has admonitions: be
dissociated from the infidels; hate them for their religion;
leave them; never rely on them; do not admire them; and always
oppose them in every way, according to Islamic law.
The list of documents and the list of publications goes on.
And it appears that the bargain with the devil they made about
25 years ago, that the Saudi government would support Wahhabism
if they stayed out of Saudi Arabia, is coming back to haunt us.
I would ask the question, number one, how serious a threat
that is? And I would ask you and Admiral Loy to respond to it.
And also, it seems to me if our doctrine is that a country
that harbors terrorists is guilty, what about a country that
fosters terrorists within our own country?
Director Mueller. Well, it certainly, as I think I
indicated in my opening remarks, it is an issue--the
radicalization of individuals within the United States. And it
can be done any number of ways.
We are looking, for instance, at the prison systems, not
just the Federal system but, through our 100 joint terrorism
task forces, working with State and local law enforcement to
address the possibility that radicalization can occur
throughout our prison system, as it has in the past in a
variety of ways.
Through our joint terrorism task forces, we also understand
that persons absolutely have the right to practice religion in
whichever way they want. But by the same token----
Senator Bond. That's not the question, Mr. Director. It's
what they are----
Director Mueller. But I'm going to say, on the other hand,
we have the obligation to determine and identify those persons
who are becoming radicalized and become a threat to the United
States.
And through our working with State and local law
enforcement, building up our intelligence capacity, working
through our joint terrorism task forces, we continuously seek
sources and information and intelligence as to those
individuals who may become radicalized in a variety of ways.
The last point I would make--and I think others would agree
with me--is that there has been a shift in the attitude of
Saudi Arabia in the wake of the May 2003 bombings--a
substantial shift, and an understanding and a recognition of
the threat not only to Saudi Arabia, but to Saudi Arabia's
interests around the world from those elements who have been
radicalized.
Senator Bond. Thank you, Mr. Director. They noted that
these documents were still, as of December 2004, were still in
the King Fahd mosque. They're still being handed out.
Admiral Loy, any thoughts about how, from the homeland
security standpoint, how dangerous is Saudi Arabia's supplying
of this literature?
Admiral Loy. Indeed, Senator Bond, there are three or four
points that I would make.
Number one, regardless of the sponsorship, the notions that
you are citing in the things that you read are dramatic
evidence of the challenge in front of us here, whether it's
pure Saudi from the implication of that particular set of
materials, or what that line of logic is as a pervasive notion
throughout not only Saudi Arabia, but the rest of the world.
I sit on a couple of joint contact groups with allies--with
the Brits, with Canada. And there has been over the last year a
growth of an agenda item referring to radicalization as a
significant issue that we have to grapple with.
Senator Bond. Admiral Loy, if I may interrupt. I apologize;
the light's on--I needed to ask Director Goss, Ms. Rodley and
maybe Admiral Jacoby, I think that Southeast Asia is the second
front of the war on terrorism.
Director Goss mentioned that. I've recently come back from
there. Jemaah Islamiyah, Moro Liberation Front, others, Abu
Sayyaf, are posing significant dangers. Singapore, Malaysia and
Indonesia have been aggressive.
Number one, I'd like to know whether you think these have
become a threat to the U.S. homeland and are our restrictions
on U.S. aid--IMET aid--to Indonesian military hurting our
ability to work cooperatively with that country?
Mr. Goss.
Director Goss. On the IMET question, there is no question
that--I can't speak specific to the particulars there. Maybe
Admiral Jacoby can.
But I will tell you that, in fact, we do have liaison
relationships in the war on terror, of course, on a global
basis. And they are affected by other matters such as that that
you have specifically mentioned.
In this case I can't answer your direct question, but I can
tell you there is a relationship, and it's important that we
understand that.
The second thing I would tell you is, I think you are right
to focus on Southeast Asia. It is an escalating area. We find
that the degree of capability to deal with the problem there is
the sophistication of dealing with the problem of terrorism
there by the governments, the states that are there, is not
adequate. Consequently, I would say it is a growth industry,
regrettably.
Yes, it is a threat.
Admiral Jacoby. Senator Bond, the key countries in the area
are the ones that Director Goss identified--Indonesia,
Philippines, Thailand. Two of those countries we've had very
longstanding IMET and other interactions and it makes it far
easier to work not only with their military forces, but also
with their military intelligence, with my counterparts.
The situation in Indonesia is quite different, where the
senior officers in that country, particularly in, again, my
case, the intelligence area, have not had those kinds of
interactions with the U.S. military.
It does create barriers for close interaction and
interoperation. And Southeast Asia in general is an area that
needs that kind of attention. And I'm going back to my days in
the Pacific command as a J-2 to say authoritatively that more
needs to be done there, sir.
STATEMENT OF CAROL RODLEY, PRINCIPAL DEPUTY
ASSISTANT SECRETARY OF STATE FOR INTELLIGENCE AND RESEARCH
Ms. Rodley. We really see it the same way as my colleagues
have outlined. Indonesia as the main problem.
Chairman Roberts. Speak right in the microphone.
Ms. Rodley. Indonesia has the most serious problem with
Jemaah Islamiyah and, to a lesser extent, the Philippines,
Thailand and some of the other nations in the region.
This is of particular concern because of Jemaah Islamiyah's
affiliation with al-Qa'ida. So the question of targeting U.S.
interests is one that we are very concerned about.
[The prepared statement of Hon. Thomas Fingar, Assistant
Secretary of State for Intelligence and Research follows:]
Prepared Statement of the Honorable Thomas Fingar,
Assistant Secretary of State for Intelligence and Research
Mister Chairman, Members of the Committee. It is an honor to be
asked to participate in this important review of threats to our Nation
and the challenges they present to the Intelligence Community. INR has
taken to heart your admonition to describe the spectrum of threats to
the United States and its interests, and to assess the probability,
immediacy, and severity of the dangers we face, but I will do so in a
way intended to complement the judgments presented by our colleagues in
other agencies by focusing on the way threats appear when viewed
through the lens of diplomacy.
The subject of this hearing is one on which there is broad
consensus in the Intelligence Community. INR concurs with the judgment
that terrorism is the single greatest threat to Americans, both at home
and abroad, and that the proliferation of weapons of mass destruction
(WMD), missiles, and certain types of advanced conventional weapons is
a close and dangerous second. We also share most of the other threat
judgments presented by our colleagues. But rather than merely echoing
their assessments, I will approach the subject reflecting INR's unique
perspective and responsibilities as the Secretary of State's in-house
intelligence unit.
As Secretary Rice has made clear in recent statements, diplomacy is
critical to U.S. efforts to contain, counter, and diminish the threats
we face. On February 8 she told her audience in Paris, ``We agree on
the interwoven threats we face today: terrorism, and proliferation of
weapons of mass destruction, and regional conflicts, and failed states,
and organized crime.'' She added that America stands ready to work with
other countries in ``building an even stronger partnership'' to address
these threats.
To combat the twin scourges of terrorism and proliferation requires
more than just the effective collection of hard to obtain intelligence.
At a minimum, it also requires deep understanding of the motivations
and objectives of those who resort to terrorism and/or pursue WMD. It
also takes sophisticated analysis of all-source information, informed
judgments about what we do not know, and detailed knowledge of other
countries, cultures, political systems, and the underlying causes of
discontent and radicalization. The prerequisites for meeting all these
requirements include global coverage, deep analytical expertise, and
Intelligence Community commitment to providing policymakers what they
need, when they need it, and in a form that they can use day in and day
out.
Why are terrorism and proliferation at the top of the threat list?
The short and conventional answer is that the normalization of
relations with China and demise of the Soviet Union dramatically
reduced the danger of nuclear war and eliminated or transformed
fundamentally a wide array of associated threats. But the end of the
cold war also brought many changes to other aspects of international
life, including the erosion of constraints on ``client'' states, the
re-emergence of long repressed political aspirations, and the rise of
ethnic and religious hatreds. Former DCI Jim Woolsey described the
change as the displacement of a few big dragons by lots of dangerous
snakes. But it was, and is, more than that. Globalization and the
information revolution have changed expectations and aspirations and
made it possible for nations and non-state actors, including
individuals, to do things that would have been unthinkable just a few
years ago.
One of the many resultant developments has been the emergence of
vast differences in coercive capabilities. This, in turn, has
exacerbated the dangers of both terrorism and proliferation. The
inability of all but a few nations to deter the most powerful countries
(including, but not limited to the United States) has reinforced the
determination of states that feel threatened (whether justifiably or
not) to seek asymmetric solutions to the disparity of power. For some,
this means pursuit of WMD and delivery capabilities because they know
they have no hope of deterring or defeating the attacks they fear with
conventional armaments. Perhaps the clearest illustration of this can
be found in DPRK public statements after Operation Iraqi Freedom
intended to reassure its public and warn potential adversaries that,
unlike Saddam, it had a (nuclear) deterrent; a claim reiterated
February 10. Pakistan pursued-and obtained nuclear weapons and delivery
systems to compensate for India's vastly superior conventional military
power and nuclear weapons.
Terrorism is at the other end of the spectrum of asymmetric
responses. State sponsors, most notably Iran, seem implicitly to warn
potential enemies that the response to any attack will include resort
to terror. They seem to be saying, in effect, ``You may be able to
defeat us militarily, but you cannot protect all your people,
everywhere, all the time.'' Such a porcupine defense/deterrent posture
is an unfortunate, but not irrational response to wide disparities of
power. The situation is somewhat analogous for non-state actors
frustrated by their inability to achieve their (however reprehensible)
goals by other means. Terror and guerrilla warfare are long-standing
measures of choice (or last resort) for weak actors confronting a much
stronger adversary. The targets vary widely, from established
democracies to authoritarian regimes. However, in some cases,
terrorists also direct their attacks against those who are seen as
responsible for-by imposition or support the actions or existence of
the regime they oppose. That appears to be one of the reasons al-Qaida
has targeted the United States in Saudi Arabia and terrorists in Iraq
have used suicide bombers and improvised explosive devices to attack
Iraqis and others supportive of the Iraqi government. The use of terror
tactics in liberal democracies is especially problematic because in
open societies, self-restraint under the rule of law and commitment to
respect human rights and dignity complicate the challenges of mounting
an effective response.
Attacking a distant country is difficult, even in the era of
globalization, and would-be assailants must choose between difficult,
high profile attacks, like those on 9/11, and easier to accomplish, but
probably lower impact incidents (like sniper attacks on random
individuals or small explosions in crowded public places). We remain
vulnerable to both types of terror attack, but arguably we are now less
vulnerable to relatively largescale, high profile attacks than we were
before 9/11. Nevertheless, it is extremely difficult to penetrate the
tight knit groups that are most capable of carrying out such attacks on
our country and our people. We have achieved great success in
disrupting alQaida, but may be witnessing a repeat of the pattern found
in the wars on illegal drugs and organized crime, namely, that we are
fighting a ``hydra'' with robust capabilities of resurgence and
replacement of lost operatives. The bottom line is that terrorism
remains the most immediate, dangerous, and difficult security challenge
facing our country and the international community and is likely to
remain so for a long time. Despite the progress we have made, it would
be imprudent to become complacent or to lower our guard.
The quest for WMD, missiles (or unmanned aerial vehicles), and
advanced conventional arms has become more attractive to, and more
feasible for, a small but significant set of State and non-state
actors. This poses major challenges to the security of the United
States and our friends and allies, but it is important to put this
threat in perspective.
Nuclear Threats. The nuclear sword of Damocles that hung over our
national existence during the cold war remains largely a concern from a
different era. Russia and China still have nuclear weapons (the number
is declining in Russia and increasing only modestly in China), but the
hostility of the past is no longer a pressing concern and neither
threatens to use them against our country. North Korea has produced
sufficient fissile material to make a small number of nuclear weapons,
but, despite its February 10 statement, there is no evidence that it
has produced such weapons and mated them to a missile capable of
delivering them to the United States. However, if it has made such
weapons, it could reach U.S. allies, our armed forces, and large
concentrations of American citizens in Northeast Asia. India and
Pakistan have nuclear weapons and the capability to deliver them to
targets in the region, but both nations are friends and neither
threatens the territory of the United States. Iran seeks, but does not
yet have nuclear weapons or missiles capable of reaching the United
States. INR's net assessment of the threat to U.S. territory posed by
nuclear weapons controlled by Nation states is that it is low and lacks
immediacy. But this should not be grounds for complacency. The
existence of such weapons and the means to deliver them constitutes a
latent, but deadly threat. Ensuring that it remains latent is a key
diplomatic priority.
The so-far theoretical possibility of nuclear weapons falling into
the hands of terrorists constitutes a very different type of threat. We
have seen no persuasive evidence that al-Qaida has obtained fissile
material or ever has had a serious and sustained program to do so. At
worst, the group possesses small amounts of radiological material that
could be used to fabricate a radiological dispersion device (``dirty
bomb''). The only practical way for non-state actors to obtain
sufficient fissile material for a nuclear weapon (as opposed to
material for a so-called dirty bomb) would be to acquire it on the
black market or to steal it from one of the current, want-to-be, or
used-to-be nuclear weapons states. The ``loose nukes'' problem in the
former Soviet Union continues to exist but is less acute than it once
was, thanks to the Nunn-Lugar cooperative threat reduction program and
diligent efforts by Russia to consolidate and protect stockpiles. North
Korea's possession of weapons-grade fissile material adds a new layer
of danger and uncertainty. There is no convincing evidence that the
DPRK has ever sold, given, or even offered to transfer such material to
any State or non-state actor, but we cannot assume that it would never
do so.
Chemical and Biological Weapons. Despite the diffusion of know-how
and dual-use capabilities to an ever-increasing number of countries,
the number of states with known or suspected CW programs remains both
small and stable. Most of those that possess such weapons or have the
capability to produce quantities sufficient to constitute a genuine
threat to the United States or Americans (civilian and military)
outside our borders are not hostile to us, appreciate the significance
of our nuclear and conventional arsenals, and are unlikely to transfer
such weapons or capabilities to terrorists. There are nations that
might use CW against invading troops, even American forces, on their
own territory, but we judge it highly unlikely that Nation states would
use CW against the American homeland or specifically target American
citizens except as an act of desperation. Terrorists, by contrast, have
or could acquire the capability to produce small quantities of chemical
agents for use against selected targets or random individuals. We judge
the chances of their doing so as moderate to high. One or a few
disgruntled individuals or a small terrorist cell could do so in a
manner analogous to the 1995 Aurn Shinrikyo sarin gas attack on a Tokyo
subway. The severity of such an attack would be small in terms of
lethality, but the psychological and political impact would be huge.
The risk posed by Nation states with biological weapons is similar
to that for CW; many nations have the capability, but few have programs
and even fewer would be tempted to use them against the United States.
The danger of acquisition and use by terrorists, however, is far
greater. Though hard to handle safely and even harder to deliver
effectively, BW agents have the potential to overwhelm response
capabilities in specific locations, induce widespread panic, and
disrupt ordinary life for a protracted period, with resulting economic
and social consequences o# uncertain magnitude.
Conventional Attack. INR considers the danger of a conventional
military attack on the United States or American military, diplomatic,
or business facilities abroad to be very low for the simple reason that
no State hostile to the United States has the military capability to
attack the U.S. with any hope of avoiding massive retaliation and
ultimate, probably rapid, annihilation. The only way to reach a
different conclusion, it seems to us, is to posit an irrational actor
model in which either all key decisionmakers in a hostile country are
irrational or there are no systemic constraints on a totally irrational
dictator. We judge that such conditions exist nowhere at present and
hence that U.S. military might is, and will be, able to deter any such
suicidal adventure for the foreseeable future. Here again, ensuring
that this situation continues is a major goal of American diplomacy.
A far more dangerous threat is the possibility, even the
likelihood, that advanced conventional weapons will be obtained--and
used--by terrorists. For example, the danger that groups or individuals
antithetical to the United States will obtain MANPADs or advanced
explosives is both high and immediate. The number of Americans likely
to be killed or maimed in such an attack would be small in comparison
with the casualties in a conventional war or nuclear attack, but would
be unacceptably large no matter how small the number of casualties and
could have a major economic and psychological impact. Attacks on
American nationals, whether they are aimed at workers in an American
city, American tourists abroad, U.S. diplomatic facilities, U.S.
businesses at home or abroad, or U.S. military facilities at home or
abroad, are possible and unacceptable. The fact that State Department
personnel, family members, and facilities have been frequent targets of
attack makes us acutely aware of this danger and determined to do
everything possible to thwart it. This determination is magnified
severalfold by the fact that it is an important part of the State
Department's mission, and the Secretary of State's responsibility, to
protect American citizens everywhere around the globe. We take this
responsibility very seriously, and an important part of INR's support
to diplomacy involves providing information and insights that
contribute directly to the success of this mission.
States of Concern. It has become something of a convention in
threat testimony to list a number of countries that, for one reason or
another, are judged to warrant special attention from the Intelligence
Community. A few countries on this list engage in activities that
directly or indirectly threaten American lives (e.g., North Korea's
deployment of massive military power close enough to Seoul to put at
risk our ally as well as American troops and tens of thousands of
American civilians). Most countries on the list do not threaten the
United States militarily, but are important to the success of policies
to protect and promote other American interests.
Rather than enumerate a long list of countries, I will simply
provide a series of generic examples to illustrate the kinds of
conditions and concerns germane to diplomatic efforts to protect and
advance American interests. The State Department needs good
intelligence on some countries primarily because their actions could
lead to internal instability that could, in turn, threaten other
American interests. Others belong on the list because they do not or
cannot prevent the growth and export of narcotics, harbor or assist
terrorist groups, have leaders who make anti-American pronouncements,
or have conditions conducive to the rise of extremist movements. Still
others illicitly traffic in persons, weapons, conflict diamonds, or
other commodities; control critical energy resources; or have fragile
political institutions, large and dynamic economies, or any of myriad
other attributes.
What states on this long and varied list have in common is the
capacity to affect American interests and the efficacy of U.S. foreign,
economic, and security policy. Most do not and will not ``threaten''
the United States in the way that we were once threatened by the Soviet
Union and the Warsaw Pact, but something, or many things, about them
pose challenges and/or opportunities for American diplomacy. The
problems of failing states and the tremendous drain on resources in
developing countries from AIDS and other pandemics, environmental
stress, and corruption affect our ability to partner with allies and
friends to meet humanitarian needs in the interest of promoting
stability and democracy. This, in turn, poses challenges and
requirements for the Intelligence Community that extend far beyond the
collection and analysis of information germane to the suppression of
terrorism and limiting the spread of WMD, delivery systems, and
advanced conventional weapons. Meeting these challenges requires global
coverage, deep expertise, extensive collaboration, and, above all,
acceptance of the idea that the mission of the Intelligence Community
demands and entails more than collecting and interpreting covertly
acquired information on a relatively small number of narrowly defined
threats. Focusing on known threats and concerns is necessary, but could
prove to be very dangerous if we are not equally vigilant in trying to
anticipate unknowns and surprises.
Intelligence is, or should be, about more than addressing
``threats.'' The Intelligence Community has been justifiably criticized
for serious failings and shortcomings, but we should not lose sight of
what we do well and must continue to do well. For example, America's
unrivaled military preeminence, demonstrated so dramatically in our
elimination of the Taliban regime in Afghanistan and the destruction of
Saddam's regime in Iraq, is inextricably linked to the capabilities and
accomplishments of our Intelligence Community. Intelligence collection,
analytic tradecraft, insights gained through years of experience, and
close ties among collectors, analysts, weapons designers, military
planners, and troops on the ground are all and equally critical to the
military successes we have achieved, the predominance we enjoy, and the
fact that conventional military threats to our Nation and our citizens
are low and almost certain to remain so for many years. Preserving this
State of affairs will be neither automatic nor easy, but our efforts
and the allocation of resources to do so must not foreclose equally
committed efforts to address other threats and challenges.
Terrorism and proliferation are at the top of every agency's list
of threats, and the Intelligence Community is committing substantial
effort and resources to provide the intelligence support required to
contain and reduce those dangers. In part, this requires and involves
penetration of highly restricted and suspicious organizations and
secure systems of communication, including sophisticated measures to
hide financial transactions, obscure relationships, and deceive human
and technical collectors. But collection is only one of many essential
factors in the equation. To place the intelligence we collect in
context, to distinguish between what is true and useful and what is
not, and to develop strategies to detect and disrupt activities
inimical to American interests requires expert analysts and information
on a very wide array of critical variables. Stated another way, it is
not possible to identify, anticipate, understand, and disrupt
terrorists and proliferatitios without broad and deep understanding of
the countries, cultures, contexts, social networks, economic systems,
and political arenas in which they spawn, develop, and operate. Without
broad and deep expertise and information that goes far beyond what we
can or should collect through clandestine means, we will not be able to
judge accurately the information we collect, and will ultimately be
reduced to reliance on lucky guesses and chance discoveries. That isn't
good enough. We can and must do better.
Senator Bond. Thank you. Thank you, Mr. Chairman. I
apologize to my colleagues.
Chairman Roberts. Senator Feinstein.
Senator Feinstein. Thank you very much, Mr. Chairman.
Let me begin by thanking each of you. I think those of you
that particularly head large departments, it is a most
difficult time to give your service. And I just want you to
know how much I appreciate it. So, thank you very much.
I view a worldwide threat to be our borders. And I'd like
to explain that a little bit. Let me begin by quoting the
Homeland Security statement today, Admiral Loy. On page four of
your statement: ``Recent information from ongoing
investigations, detentions, and emerging threat streams
strongly suggest that al-Qa'ida has considered using the
southwest border to infiltrate the United States. Several al-
Qa'ida leaders believe operatives can pay their way into the
country through Mexico and also believe illegal entry is more
advantageous than legal entry for operational security
reasons.''
I think that is a very important statement, particularly
when you consider the fact that a half-a-million other-than-
Mexican intrusions have been made on our borders since 2000.
Specifically, with respect to the southwest border, in 2003
there were 30,147 other-than-Mexican intrusions. The next year,
2004, which is the latest year that we have figures for, there
were 44,617. That's a 48 percent increase.
Now, let me take you to a hearing--because I sit on the
Judiciary Immigration Subcommittee--and a response by Mr.
Hutchinson to Senator Grassley's questions in February 2004.
This was a hearing held about a year ago. And let me read an
answer.
``At present, DHS has no specific policy regarding OTMs
apprehended at the southern border. While OTMs, as well as
Mexicans, are permitted to withdraw their applications for
admission and can be returned voluntarily to their country of
nationality, as a practical matter this option is not readily
available for them, as it is for Mexicans, whose government
will accept them back into the Mexican territory. Thus, when
apprehended, OTMs are routinely placed in removal proceedings
under Immigration and Nationality Act 240. It is not practical
to detain all non-criminal OTMs during immigration proceedings.
And thus, most are released. A majority of OTMs later fail to
appear for their immigration proceedings and simply disappear
into the United States.
``DHS is reviewing the possibility of extending its
expedited removal authority and means of addressing this
problem. DHS is also considering a variety of alternatives to
detention, especially for asylum seekers.''
Now, I've looked at the statistics for each country. And
the so-called countries of concern--Syria, Iran, others--the
numbers are up of penetrations through our southwest border.
Clearly we are deficient in a mechanism to deal with these.
Could you please comment and could you please indicate what
actions are being taken? I view this as a very serious
situation.
Admiral Loy. Thank you, Senator Feinstein. And, indeed, we
view it in exactly the same way you do, as a very serious
situation.
There have been a number of initiatives over the course of
the last year, many of which I know you're familiar with. For
example, the opportunity for deep repatriation of people back
into--not just across the border where the recidivism rate is
that they'll be back, coming our direction that night or the
next night.
The whole notion of being able to take the repatriation
decision and take Mexican nationals, illegal aliens back to----
Senator Feinstein. I'm not talking about--none of these are
Mexican nationals. These are all OTMs--other-than-Mexicans--
44,000 OTMs came across the southwest border last year.
Admiral Loy. Yes, ma'am. I'm just trying to array a set of
tools that could be potentially of use, not only in Mexico, but
wherever the OTMs might be from.
The challenge here is a lengthy border, as you well know.
We are introducing technology along that border that'll
substitute for what has historically been a very human-
intensive effort along the border, to make a difference in
terms of comings and goings.
So, US-VISIT, the notion of using UAVs on the border as
plugs between those portals of entry that we have worked so
hard to harden, if you will. But the entry-exit system that has
been now deployed by the Department of Homeland Security after,
I would offer, 20 years or so of effort on the part of INS
beforehand in failed efforts to establish some kind of a
legitimate, biometrically based entry-exit system into the
country, that we have some confidence in in terms of our
abilities to say who is here and who is not, and what are we
going to do about those who we can track and find.
Senator Feinstein. Let me have a little discussion on this.
Because essentially, there is no detention for these people.
They don't show up for their hearings and they disappear. So we
really don't know who comes into this country illegally over
that southwest border.
I have two cases that the FBI was involved in, one actually
in Michigan, where the gentleman was clearly a terrorist. He
pled guilty. He got 6 months. This is a big problem in the
United States. And I really don't think that the mechanical
aspect of it is going to solve it. You're not detaining these
people. They're released, essentially.
Admiral Loy. Well, there certainly is a prioritization
process to those with any degree of a connection against the
national terrorism database that has now been forged for us to
be able to bounce names against. So, to the degree we are
releasing because of the resource implications attendant to
keeping them and bedding them and detaining them until
resolution can come of their individual cases.
Those without any apparent criminal and/or terrorist
connection are obviously those that are on the high end of the
release order and the low end of the detention order.
Senator Feinstein. Can you give us a number of how many are
being detained?
Admiral Loy. I don't have that with me at the moment, but
I'll be happy to provide it to you.
Senator Feinstein. I would appreciate it. Out of the 44,000
that came in in 2004, how many are detained. I appreciate that.
Admiral Loy. We'll provide that.
Senator Feinstein. Thank you, Mr. Chairman.
Chairman Roberts. Senator Chambliss.
Senator Chambliss. Thank you, Mr. Chairman.
Director Goss, because of our longstanding relationship
going back to our House days, you know how keen my interest has
been in this area of information sharing. I was very pleased to
hear you, as well as Director Mueller, say that things are
improving. But at the same time, you both recognize we still
have a long way to go.
Donnie Harrelson, the Sheriff of Criss County, Georgia,
happened to be in the back a little earlier, and I visited with
him for a minute. He was keenly interested in a number of
things that were being said. And I told him that we really
can't let this issue of information sharing rest until his
office and every other local law enforcement office has the
information in real time that they need to help us win this war
on terrorism domestically. So, I appreciate the continued
effort of everybody at the table on this issue, but obviously
especially you two.
Director Goss and Admiral Jacoby, there was a report on Fox
News this morning in which it stated that the Iranians have
alleged that an aerial vehicle of some sort fired a missile and
it did not explode, but it was fired in the area of a nuclear
facility owned by the Iranians.
Would either of you care to comment on the information that
has come out of Iran this morning relative to that issue?
Director Goss. Senator, thank you for your comments about
vertical integration of information and your patience on
letting us get the technology and our architecture, our
enterprise, together on that. There is progress since we last
talked, and that's good news.
On the subject of Iran, I know nothing in my official
position. What I do know is, I think, from press reports that
something did fall out of the sky and came down somewhat near
Bushehr, their ongoing building of their nuclear power plant in
that area.
I also heard a subsequent report--and I have no idea
whether I'm spreading a rumor or not--that it was a gas tank
that fell off an aircraft and exploded. And I have no idea
whether that's true or not. It just came into my ear.
Admiral Jacoby. Senator Chambliss, I have no knowledge of
the report or any incidents involving Iran.
Senator Chambliss. Director Mueller, I have had the
opportunity to visit with your joint terrorism task force folks
in Atlanta and intend to do so again in the very near future.
And I will tell you, I am very impressed by the work that's
ongoing with that operation.
Every time I meet with them, I am told by some of your FBI
agents in the field, as well as other local law enforcement
officers, of the importance of the PATRIOT Act, and their
ability to fight terrorism as well as fight crime with the
tools that they have under the PATRIOT Act.
Now, as you know, the PATRIOT Act, or certain provisions of
it, are going to be expiring at the end of this year. Would you
care to comment on what your thoughts are relative to the
reauthorization of those provisions that are set to expire, and
how useful the PATRIOT Act has been to your organization in
fighting crime and fighting terrorism?
Director Mueller. Let me just start off by saying that the
provisions of the PATRIOT Act are indispensable to the
protection of the American public against further terrorist
attacks.
And the heartland of the bill that is so important--and
it's not just important to the FBI, but it's important to the
CIA, the DIA and others in the intelligence community, as well
as State and local law enforcement--is the breaking down of
walls that inhibited our ability to share information across
our agencies and across our disciplines and across our
programs. And the safety of the United States depends on the
ability of all of us together to be able to accumulate the
information, share the information.
And I don't mean just in pushing, but having access, equal
access to the information, and having the opportunity to act on
that information and all the information, whether it be act
within the United States, in a city, in a town, in a State or
nationally, or overseas, by having access to information that
may have been collected within the United States or outside the
United States.
And the PATRIOT Act has been instrumental in breaking down
those walls and enabling us to do it. It has given us new
authorities. That has given us the ability to obtain
information that will allow us to identify persons who present
a threat against the United States with adequate predication of
their interest and motivation in so doing.
It has given us access to records that we previously did
not have, but often are instrumental pieces of a puzzle that'll
give us a broader vision, a broader view of the intentions of
an individual or of a group of individuals in the United
States.
And I know myself and others who live day in and day out
trying to prevent terrorist attacks will be here before
Congress on a number of occasions, asking Congress to please
continue to let us have those tools to protect the American
public.
Senator Chambliss. Thank you. Thank you, Mr. Chairman.
Chairman Roberts. Senator Levin.
Senator Levin. Thank you, Mr. Chairman.
Mr. Goss, we were given information on an unclassified
basis in January of 2002, as follows. This is a CIA assessment.
``We assess that North Korea has produced enough plutonium for
at least one, and possibly two, nuclear weapons.'' I'm
wondering, Director, if you could give us the current CIA
assessment.
Director Goss. I'm honestly not sure whether or not the
assessment is classified that we have. But our assessment is
that they have a greater capability than that assessment. In
other words, it has increased since then.
I would also point out there are other agencies that are
making assessments, and there is a range. And I think that the
range we're fairly comfortable on--and I know that is
classified. Be happy to share that with you in closed session.
Senator Levin. If you also could tell us for the record if
there's any unclassified numbers you can give us--for the
record, if you can do that. I'm not asking----
Director Goss. Senator, I will.
Senator Levin. If you can give us numbers the way that
number was given. And also, Director Goss, this is for you.
The 9/11 Commission included a number of recommendations
for realigning the Executive Branch, including the following.
``Lead responsibility for directing and executing paramilitary
operations, whether clandestine or covert, should shift to the
Defense Department.'' Do you agree?
Director Goss. I recall the issue very well.
Senator Levin. Just briefly, do you agree with that?
Director Goss. I do not agree with that conclusion. We have
studied it, and the Secretary of Defense and I have a memo
which I anticipate signing today.
Senator Levin. Is that going to be public?
Director Goss. Certainly the conclusion of it will be.
Senator Levin. I think as much public as you can make,
obviously.
Director Goss. It's in everybody's interest to know, I
think, how we are dividing up the responsibility.
Senator Levin. I think it is.
Director Goss. I can tell you we spent a lot of time
looking at this. And the Secretary feels that he has
capabilities that are important, and I agree. And I feel I have
capabilities that are important, and he agrees. There's not a
lot of disagreement on this. We just didn't come out the same
place the 9/11 Commission did.
Senator Levin. Thank you, Director.
I understand that your CIA's Inspector General's report on
treatment of detainees by members of the intelligence community
is somewhere in the pipeline. Can you tell us where it is?
Director Goss. Yes, sir.
Senator Levin. When is it going to be available?
Director Goss. The IG, or the inspector general of the
agency, has indeed got all of the complaints and the referral
on that matter in hand. As you know, it's an independent
position. I have checked.
There is one report that was ordered by my predecessor,
which has come back, which had 10 recommendations or so in it.
About, I think, eight of those have been done.
We are now into the process of looking at some of the
specific cases that have been brought to the IG. I cannot tell
you what his timetable is, but I'm sure he would be very happy
to tell you. I am assured that the work is ongoing, as it
should be appropriately.
Senator Levin. Well, if he'd be happy to tell us, wouldn't
he be happy to tell you?
Director Goss. Sure.
Senator Levin. Well, what is the timetable? I mean, is
there a time?
Director Goss. I haven't asked him what day he's going to
finish all these cases.
Senator Levin. Or a month?
Director Goss. As soon as they are through. I know one case
has been dismissed. I know one case has been prosecuted. You've
read about it in the paper, in North Carolina. know there are
still a bunch of other cases. What I can't tell you is how many
more might come in the door.
Senator Levin. OK. Thank you.
Director Mueller, this is for you. It relates also to the
interrogation question. The FBI documents which were released
under a FOIA request include e-mails from FBI agents expressing
their deep concerns, that during late 2002 and mid-2003, overly
aggressive and coercive interrogation techniques were being
used by the Defense Department people at Guantanamo's detention
facility which ``differed drastically from the FBI's authorized
practices.''
Those memos described the Department of Defense's methods
as, quote: ``Torture techniques,'' expressed disbelief over the
military's interviews, telling their colleagues back in
Washington--this is in the FBI--that ``you won't believe it.''
The FBI agents also described heated exchanges and battles
with the commanding generals at Guantanamo over the Department
of Defense's interrogation techniques, which FBI agents ``not
only advised against, but questioned in terms of their
effectiveness.'' Incidents described included detainees being
chained hand and foot in fetal positions, no chair, food or
water for long periods, ended up defecating on themselves. One
detainee apparently had been literally pulling his own hair out
throughout the night.
Another major concern of the FBI agents present at
Guantanamo was that the Defense Department interrogators were
impersonating FBI agents in order to gain intelligence. FBI
agents were deeply worried that should detainees ever publicly
report their treatment at Guantanamo the FBI would be left
``holding the bag,'' because it would be appear falsely that
``those torture techniques were done by FBI interrogators.''
Those documents make clear that the FBI was so concerned
about the Department of Defense's interrogation techniques that
it issued guidance to FBI agents at Guantanamo to stand clear
and to keep away from those techniques when the DoD took
control of interrogation.
I assume that because of the serious and extensive
objections that were lodged by FBI agents against those
techniques, and particularly given the heated discussions at
which your personnel were present and engaged in, that you or
your senior advisers were aware of the concerns of those
members of your staff.
And I'm just wondering--this is my question--did you raise
those concerns with either senior officials at the Department
of Defense, the Attorney General or the head of the criminal
division at the Justice Department, or higher-ups in the
Administration, including the National Security Council?
Director Mueller. Senator, I know that those concerns were
raised with the Department of Defense by persons within the
FBI. At least some of those were, at least three incidents
early-on.
Certainly after the issues were raised about Abu Ghraib
there were additional memoranda that were generated as a result
of an inquiry to the field that you may have been alluding to
there. Those also have been brought to the attention of the
military.
I will also say that our inspector general is doing a
review of when the information came in and what happened to
that information once it came into the FBI.
Senator Levin. You personally did not raise those concerns
with senior officials at the Department of Defense or with the
Attorney General or the head of the criminal division?
Director Mueller. I was not aware of those concerns until
May of 2004.
Let me just be precise on that, Senator. I was not aware of
the concerns that you raised, that you allude to there, in
Guantanamo until May of 2004.
Senator Levin. Thank you. Thank you, Mr. Chairman.
Senator Levin. Thank you.
Chairman Roberts. Senator Snowe.
STATEMENT OF THE HONORABLE OLYMPIA J. SNOWE,
U.S. SENATOR FROM MAINE
Senator Snowe. Thank you, Mr. Chairman. I want to welcome
all of our panelists here today.
Director Goss, just to follow up on one of the questions
that the Chairman raised with respect to A.Q. Khan, there's no
question that he masterminded a far-reaching, wide-ranging,
global in scope operation in dispersing nuclear information
activities and technology.
Have we pressed the Pakistani government to allow a U.S.
representative to directly have access to A.Q. Khan for
questioning to determine the extent of his network of elicit
nuclear activities?
Prepared Statement of the Honorable Olympia J. Snowe,
U.S. Senator from Maine
Mr. Chairman, thank you again for holding this vital hearing that
will give us an opportunity to examine the threats currently arrayed
against our Nation as well as a look at those threats that may endanger
our society in the future. Identifying these threats each year is
crucial to our ability to gauge our progress in defeating or mitigating
those threats and to understanding this Committee's role in providing
the oversight and resources required by the Intelligence Community to
help defeat those who wish us harm.
This hearing will also give us an opportunity to examine the
progress of the changes initiated since passing the Intelligence
Community reform in the last Congress and the confirmation of the new
Director of Central Intelligence. But, in the end, it is the current
and emerging threats to the Nation that drives our investments in, and
the development of priorities for, the Intelligence Community's
collection and analytic capabilities. I intend to look at a wide
spectrum of these threat scenarios--from the threat posed by nuclear-
capable terrorists to the future emergence of a regional peer-
competitor, as well as to our abilities to protect the homeland.
I also want to thank Mr. Goss, Director of Central Intelligence and
Mr. Mueller of the FBI for once again appearing before the Committee to
describe to us their view of the world and how their respective
agencies are facing the many challenges before them.
I especially want to acknowledge Admiral James Loy's appearance
here today. Although he has announced his departure from public life
later this spring, he remains committed to the nation's defense, as he
has been for his entire career, and has come before us today to
describe the Department of Homeland Security's efforts to counter the
threats arrayed against the homeland. On a personal note, as Chair of
the Senate's Subcommittee on Oceans, Fisheries and Coast Guard, I was
able to work closely with Admiral Loy when he was Commandant of the
Coast Guard. His charge to protect the Nation has always been a part of
his personal code of honor and he has been unwavering in accomplishing
his mission. For that and his many years of public service, I thank
him--the Nation is not only grateful, but safer, for his loyalty and
dedication.
I would be remiss if I didn't comment directly about the dedication
and professionalism of the thousands of Americans who make up our
Intelligence Community. Each day, across this country and around the
world, they labor, often without recognition, to keep this country safe
from harm. It is their vigilance upon which we rely to give us the
forewarning necessary to counter the many dangers present in our world.
Although it is impossible to directly express our deep appreciation for
their efforts, I charge our witnesses to relay our eternal gratitude to
those who serve America so well.
It has been an extremely challenging year for the Intelligence
Community; one in which we saw two major reports detailing the actions
and failures of our collective intelligence community to provide
national decisionmakers with the timely and quality intelligence they
must have to prepare America for the threats faced by the Nation and
the need to go to war. On the heels of those reports, we in Congress
undertook the largest revamping of the intelligence community since its
inception with the 1947 National Security Act. This self-examination
and correction is a hallmark of our democracy and will serve to make us
stronger. It is my fervent hope that the professionals of the community
see this reorganization as an opportunity to renew their dedication and
take on the challenges to strengthen their craft. In these perilous
times, the Nation needs them now more than ever.
We on this Committee have spent a great deal of the past 2 years
poring over the intelligence provided to decisionmakers before the
commencement of Operation Iraqi Freedom and, of course, we all learned
many things and reached many conclusions. In my analysis of that
information, I became more and more convinced that while Saddam's
nuclear programs may have been defunct, our Nation continues to face
the very real threat of nuclear terrorism.
Terrorists are known to be seeking nuclear technologies and have
already displayed a proclivity for catastrophic destruction on a
massive scale. For terrorists, attacking a U.S. city with a nuclear
device would likely be their ``dream come true.'' In the February 6
Washington Post, Steve Coll, author of ``Ghost Wars,'' notes that Osama
bin Laden's inspiration, repeatedly cited in his writings and
interviews, is the American atomic bombing of Hiroshima and Nagasaki,
which he says shocked Japan's fading imperial government into a
surrender it might not otherwise have contemplated. Bin Laden has said
several times that he is seeking to acquire and use nuclear weapons not
only because it is ``God's will,'' but because he wants to do to
American foreign policy what the United States did to Japanese imperial
surrender policy.
I intend to focus my work on the Committee on this specific threat
to the United States because I believe it is time for us to look
closely at how we can prevent and deter such a threat. I am also
acutely aware from my work on the Commerce Committee in the area of
transportation, maritime and port security that we must look to the
seas as a very likely path of introduction of such a weapon into the
United States. The 9/11 Commission found that ``Opportunities to do
harm are as great, or greater, in maritime or surface transportation
(compared to commercial aviation).''
Recognizing these vulnerabilities, I included a number of
provisions and acted as a conferee to the Maritime Transportation
Security Act signed into law in 2002. One of my provisions included a
requirement that foreign shippers send their cargo manifest before
arriving at a U.S. port so the Department of Homeland Security can more
efficiently evaluate individual container shipments for risks of
terrorism. I have also held several port security hearings at the
Subcommittee on Oceans, Fisheries and Coast Guard and will continue to
do so because I do not believe we are anywhere near finished with fully
securing our maritime borders.
That is why I was encouraged by the President's announcement in
December of his Maritime Security Policy National Security/Homeland
Security Presidential Directive, which outlined his vision for a fully
coordinated U.S. Government effort to protect U.S. interests in the
maritime domain. The directive charges the Department of Defense and
the Department of Homeland Security with the alignment of all U.S.
Government maritime security programs and initiatives into a
comprehensive and cohesive national effort involving appropriate
Federal, State, local and private sector entities.
This move comes at a critical time. As we sit here right now, the
Department of Defense is proceeding with the 2005 Base Realignment and
Closure (BRAC) process, which I continue to believe is the wrong thing
to do while we are engaged in a global war on terrorism. We must ensure
that in the DoD's drive to meet an arbitrary 25 percent reduction
figure in infrastructure, we do no harm. For example, Brunswick Naval
Air Station on the coast of my home State of Maine is home to one of
four remaining maritime patrol bases remaining in the Navy and, in
fact, possesses the only remaining fully capable active runways in the
entire Northeast.
While many say that the maritime patrol community, whose chief
mission is anti-submarine warfare, is not relevant in the post-cold war
world, the community has reinvented itself as the warfighting
commander's premiere manned, long-range intelligence, surveillance and
reconnaissance (ISR) platform and is performing admirably in direct
support of Operation Enduring Freedom and Operation Iraqi Freedom.
But this community also has a role in the President's maritime
security policy. We have been talking to the Coast Guard and it is
clear that if we want to be able to conduct ISR operations against
inbound maritime traffic farther than 200 miles from our shores, the
maritime patrol community offers a ready and proven capability. These
points are made eloquently in a white paper written by retired Navy
Captain Ralph Dean who concludes that optimum basing for maritime
interdiction assets is as important as the assets themselves. We must,
therefore, carefully factor in future requirements for maritime
interdiction before closing any of the maritime patrol bases, which are
located in the four corners of the continental U.S.--Maine, Florida,
Washington state, and California.
The use of conventional forces to interdict the asymmetric threats
facing the Nation leads me to my final point. The Nation cannot afford
to develop tunnel-vision when it comes to the threat we face. Just as
the U.S. failed to adequately counter the developing threat of
terrorism as we focused solely on the cold war threat, I am concerned
that we do not now focus solely on terrorism and ignore the growing
likelihood of a regional peer competitor in the Pacific region. Like
many, I am alarmed by the rapid and unprecedented buildup of naval
forces, particularly destroyers and submarines, by the Chinese People's
Liberation Army Navy.
Last month members of the House Armed Services Committee visited
China and came away deeply concerned. Representative Randy Forbes said,
``We're seeing China really make huge moves in the area of its navy. .
.There's no question our Navy is the best in the world. . .but at some
point, sheer numbers start to matter.''
So I am doubly concerned when the Navy sends Congress a budget that
radically cuts the number of next generation destroyers and submarines
to be built by the Navy. I believe that in the future we will need
conventional ``blue-water'' ships to maintain our global presence in
the Northern and Western Pacific. I look forward to hearing from VADM
Jacoby as to the Defense Intelligence Agency's assessment of the
Chinese naval threat and what we are doing now to counter that threat
before we wake up one morning to yet another ``new normalcy,'' just as
we did on September 12, 2001.
I look forward to hearing the testimony of our witnesses and
working with them as part of this Committee to ensure that our
intelligence community has the resources and structure it needs to meet
the national security challenges we face today and in the future.
Thank you.
Director Goss. Senator Snowe, I want to be very careful how
I answer your question. I think my definition of ``pressed''
and yours would be the same. And I would say yes.
I can tell you that there is continuous attention to this
matter. And I believe that is being done with the necessary
urgency and fortitude, to make sure our interests are
completely understood.
Senator Snowe. So, could you characterize the cooperation
on the part of the Pakistani government, sharing information?
Director Goss. Yes.
Senator Snowe. I think it is disconcerting. I'm sure you
saw the article in Time Magazine recently citing a source close
to the Khan research laboratories in Islamabad. And he's quoted
as saying, ``even though its head has been removed, Khan's
illicit network of supplies and middlemen is still out there.''
Director Goss. Senator, in about 2 minutes in a private
conversation, I think I could satisfy your answers to these
questions.
Let me just simply say, there is an understanding that A.Q.
Khan enjoyed a certain amount of celebrity status in his
country because he was the man who brought them the bomb, which
was very critical to that culture and their national pride and
so forth.
It has been a difficult prospect. And understanding the
problem there, have to dealing with it, is useful in
negotiating our interests, which are to get all the information
possible.
I think that those discussions are understood and
appropriate steps by the right people are taking place. I can
be more specific in private.
Senator Snowe. I appreciate that.
Admiral Loy, I'm sure you're familiar with this report from
the inspector general of the Department of Homeland Security
regarding the visa waiver program and the use of stolen
passports from the visa waiver countries.
And it's pretty troubling and disconcerting the extent to
which aliens have applied for admissions into the United States
with stolen passports from these specific countries and have
been admitted, even when information has been submitted to the
lookout system, all the more disconcerting, I think, when you
consider--and I think we all agree--the greatest threat to this
country is having terrorists have access to nuclear weapons or
the materials to manufacture them.
And this report indicates ``aliens applying for admission
to the United States using stolen passports have little reason
to fear being caught and are usually admitted. Our analysis
showed that it only made a small difference whether the stolen
passports were posted in the lookout system.''
They reviewed two groups. Of the first group, 79 of the 98
aliens attempting entry were admitted. The second group had
lookouts posted for their stolen passports prior to their
attempted entries. And from the second group, 57 out of the 78
aliens who attempted entry were admitted.
Thirty-three of these admissions occurred after September
11, 2001. And then 136 successful entries using stolen
passports were allowed.
I mean, obviously, this is significant and disturbing, to
say the least, that obviously we haven't made much headway with
respect to this issue regarding stolen passports. And when you
think that worldwide there are 10 million stolen passports, it
only takes one to gain admission into the United States.
You know, when you think about the fact on June 6, 2001,
according to this report, 708 blank passports were stolen from
the visa waiver program. The IG reported that this was
significant because the passports were stolen in a city that
also was the location of the al-Qa'ida cell that played a
significant role in providing financial and logistical support
for the September 11th terrorists.
It's interesting as well because there is little attempt by
law enforcement officials to follow up and to try to locate
these individuals, even when they have learned--even when
officials have learned--that they have come into this country
illegally.
So, one, what are we doing to investigate these activities
of these aliens that have used stolen passports? What are we
doing to determine their whereabouts? And what are we doing to
improve our ability to locate, investigate and remove these
individuals from the United States, who have stolen passports
to gain entry?
Admiral Loy. Thank you, Senator Snowe. It's a very serious
issue. The ICE agency is following up dramatically as a result
not just of the IG's investigation but, rather, of their
recognition of this, I'll call it, chink in the armor, so to
speak.
We must recall that, of course, over the course of a couple
of hundred years of our country's openness to people coming to
our borders, our exit-entry control system attendant to those
borders was, frankly, very weak.
The fact that the last year-and-a-half that we have
established US-VISIT as an entry-exit control system, that we
have engaged internationally to try to use Interpol as a
database storage for stolen passport information, so that
there's a database that can be used internationally, not just
by folks of concern coming to the United States, but crossing
any borders anywhere.
The visa waiver program in and of itself now is required--
any folks coming into our country from visa waiver countries go
through US-VISIT, and we begin to gain the biometric value of
the fingerprints and the facial imagery that we capture as they
come into our country each time they enter.
We are conducting reviews of the visa waiver countries as
we speak. There are 25 of the 27 countries being reviewed, as
the Congress biannually, with a report due back to provide you
a solid status report on the visa waiver countries as it
relates to the issue that you're describing.
Furthermore, that review process always has the opportunity
for sanctions attendant to it, as to whether or not one stays
in the visa waiver program at the other end of the day.
There have been rather dramatic, public reflections of both
Germany and France and other countries having this nightmarish
problem of not tens or twenties, but literally thousands of
their brand-new, machine-readable passport blanks finding their
way into the status that you were describing. So it is a
significant international issue that we're trying to fight on
all those fronts.
Senator Snowe. Well, it's clear that we need to do
something very expeditiously.
Admiral Loy. Including the enforcement.
Senator Snowe. I think it's a huge challenge and the
countries better be cooperating in that regard.
Admiral Loy. Exactly.
Senator Snowe. Thank you, Mr. Chairman.
Chairman Roberts. Senator Wyden.
Senator Wyden. Thank you, Mr. Chairman and gentlemen.
Sorry, we've got multiple hearings going on this morning and I
didn't get to hear all of your testimony.
But I did understand that several of you made the point
that information sharing is improving. And I will tell you that
I'm still concerned that the walls that have prevented
information sharing still have not been brought down. And to
some extent what has happened, the pre-9/11 walls that prevent
information sharing seem to have been replaced with a new set
of walls that prevent information sharing. And I want to give
you an example that revolves around the area that you all
talked about, the National Counterterrorism Center, NCTC, where
you all feel things have gotten better.
Now, our Committee has been told that, while information
can be shared among those who work at the center, an analyst
has to go out and seek approval before sharing information that
may be of value with the home agency, and the approval may or
may not be granted and it's sort of a bureaucratic shuffle to
get it done.
My question would be to you, Director Goss. Are you aware
of the problem? And if so, how do you believe it ought to be
addressed?
This is something that our Committee has heard about now
several times. And it sort of caught my attention when you all
were talking about information sharing improving.
Director Goss, your response?
Director Goss. Yes, I'd be very happy to, Senator. Thank
you.
I do believe that the across-the-board information sharing
is improved. There are still areas--and this is one of them.
Senator Wyden. I want to make sure I got that you say this
is an area that you will still be willing to work with us on.
Director Goss. Oh, absolutely. This is not finished
business yet.
We have the question of how do you protect an individual
agency's sources and methods? How do you get assurance for that
agency when they are making a contribution?
And the question of how we use either TAGINTs or tearlines,
or how we make this available, it's easier if you're just
talking about a customer. But if you're talking about an
analyst that wants to go further in and probe further and
perhaps do tasking, then you come to the questions of some of
the things we're trying to use, like co-location, getting the
analysts and the collectors to talk together, changing things
with agencies, setting up different rules.
Part of that is going to be the business of the new DNI. As
you know, the NCTC reports to the DNI. And the NCTC is now run
very, very effectively, I would say, but on an acting basis, by
John Brennan.
They have absorbed the TTIC into the NCTC. And I think
they've gone just about as far down the road as they can go
without stepping on the prerogatives of a new DNI, whose main
function, in my view, is going to have to be sorting out the
authorities and the interface between the DNI's job and
responsibilities and the individual agencies--and those
interfaces between the 15 agencies in the community.
Because until you do that and make those lines clear, the
question of sharing proprietary--and excuse me for using the
word, but it does fit--information is going to be difficult,
because everybody is charged with preserving their sources and
methods.
Senator Wyden. I think what concerns me is that there are a
finite number of people working the terrorism issue for the
entire intelligence community. They all hold security
clearances. They're all trained.
And it just seems to me that these analysts ought to have
access to all the information that can help our side. And I
would like to talk about this with you all further, talk about
it more, perhaps, in a private session.
But it seemed to me, what we ought to have is the
equivalent of a terrorism analyst program--a special terrorism
analyst program--that would allow all of these analysts access
to all the same data.
And until we get there, we're still going to be trying to
break down these walls. And time is short. We'll talk about it
some more, but I think, Mr. Director, your answer is
constructive. The acknowledgment that there is more work to do
is what I was interested in hearing.
It just seems to me there's only so many people in this
community. Let's make sure they all can get access to the same
kind of information. And there's an awful lot of shuffling
going on, just with NCTC. And I'm just not going to take this
further, but I saw Bob Mueller nod, and I consider that
constructive, as well.
The second area that I'd like to touch on involves
accountability. If there's one thing my constituents are
frustrated about as it relates to government is the absence of
accountability. And still after 9/11, I keep looking for
anybody who lost a job, was demoted, was reprimanded--any kind
of consequences--and I can't find any. I can't find any
anywhere.
And my question would be to you, Director Goss, in that you
all apparently have a report from the Inspector General, as a
result of input from this Committee, the Joint Inquiry on the
terrorist attacks, where there was clear interest in the
Inspector General conducting a review to determine if any CIA
officials ought to actually be held accountable for the
mistakes that led to the attacks. And I'm trying to figure out
where this Inspector General report is. I gather there are just
layers and layers of review.
But where are we on this Inspector General report? What can
you tell us today? When are we going to get it on this
Committee, so that we can get serious about some
accountability?
Director Goss. Senator, thank you. You will get the IG
report as soon as it is finished. I've made the same pledge
yesterday to HPSCI. It was commissioned, I think, by Congress,
and you'll get it. And the IG is independent.
Now, as for where is it right now, the IG came to me
shortly after I came in and said that this matter was under
review and he would be presenting it shortly to me, for the
next step, because there is a process, apparently, in how this
works.
And I asked him a very simple question. I said, if you are
naming names, are you giving those names the opportunity to
express their views? And it turned out that in the process he
had not taken that option. I suggested to him that in the
interest of what I would just simply call American fair play,
if you're going to start bandying people's names about, you
might let them know what it is you're saying about them. And he
agreed. I did not instruct him to do that, please understand.
We just had a discussion about how this process would unfold.
This is somewhat new.
And so I understand that he has done that. And individuals
have been advised of what this report says about them, on a
confidential basis. I also understand that some of these
individuals have hired attorneys because they wish to, for
whatever reason, have that kind of advice. When attorneys come
into the issue like this, I understand that the timing becomes
a little uncertain of when matters will be concluded.
I do not feel it appropriate for me to demand a deadline at
this point, since the process has elements of due process in
it. And I view that the IG is capable of making the decisions
of when he's ready to present that to me. That has not happened
at this point.
When he does, I have already got two staffers I've
selected, who are in the process or I suspect have probably
read the report. So we will be able, when it comes to my level,
as the Director of the Central Intelligence Agency, to decide
whether or not it is appropriate to convene boards in the
agency, in-house, to deal with accountability or not. And that
is apparently what my responsibility will be.
Either way, this Committee and the other Oversight
Committee--the House Oversight Committee--will get the IG's
report. And it is understood, it will be classified.
Senator Wyden. Do I have time for one additional question,
Mr. Chairman?
Chairman Roberts. I think Senator Mikulski has been waiting
very patiently throughout the whole hearing. And if we have
time for a second round, I would be delighted to recognize the
Senator. And I don't mean to pick on him, in that most Senators
have gone red.
I think I'll probably leave that comment alone.
The patient, but always accommodating, Senator from
Maryland.
Senator Mikulski. Patient. Yes, a signature characteristic
of myself, well known to all.
[Laughter.]
Senator Mikulski. Good morning, and thank you really for
what you do everyday. I think all of us appreciate the fact
that the job of everybody here is to prevent predatory attacks
against the homeland, against U.S. assets abroad, against our
troops, and even to help predatory attacks against allies.
I'm going to focus on the issue of terrorism and want to
come back to this whole issue of how we have gotten better at
connecting the dots and focus really on threats to our ports.
So these are really questions for Directors Mueller, Goss,
and Admiral Loy. There's considerable concern that sea-based or
ship-borne terrorist attacks are big concerns and big
possibilities. Many analysts are concerned about the security
of U.S. ports, foreign ports, but in my case, like Baltimore
and other coastal Senators.
So my question is: Of the various scenarios, which do we
fear attacks on our ports? Do we fear nuclear weapons being
smuggled in and detonated at a U.S. port? And what are we doing
about it? And how did the three of you work together?
And Admiral Loy, of course, we know you from your Coast
Guard days, and you've adapted to a new transportation mode
pretty quick. But you see where we are. So there's Goss, you
know, looking at the world. You know, Loy's got Mr. Homeland
Security. And there's Mueller, and he's got the domestic
whatever. So where are we on the threat to the ports, and what
are we doing to prevent the threat? And how do you all
coordinate this information so that Governors, and mayors, and
the people can feel pretty good about it?
Director Goss. Thank you, Senator. I'll start.
I will tell you that my normal day starts in the company of
these two gentlemen. And matters of this urgency are discussed
between us. But, not only that, we have close working
relationships between our agencies. And it is well understood,
the danger of which you speak, properly.
In terms of our part, from the national foreign
intelligence program, obviously, leaning overseas and getting
all the information we can to stop it over there and to get
information before something's put on a ship, or to understand
a plot, is very, very important. I would point out--somebody
can correct the statistic--but it's a very high percentage of
success, perhaps 95 percent, of all drug interdictions come
from good tips from information, not from random searches.
But you have to do the gates-guns-guards approach
domestically to take care of the ports. And you have to do the
information approach. Am I satisfied they're as plugged in as
they can be? Yes, under the circumstances that we have.
Now, with the DHS and with the FBI, law enforcement people,
people with new responsibilities dealing with homeland
security, and our very clear understand that this is part of
the target for our operatives overseas, I think we have done as
good as we can do, in terms of understanding information that's
critical.
Senator Mikulski. I appreciate that the three of you meet,
but I'm talking about all the way down, are we really
communicating?
Director Goss. I think it goes pretty far down for us.
Director Mueller. For us, in every city that there's a
port, there's a Joint Terrorism Task Force with a specific
responsibility to work closely with the elements of the port to
exchange information and provide what can be done to enhance
the port security. In several of the ports around the country,
we have--particularly where there's substantial ferry traffic,
for instance--we have done intelligence analyses of
vulnerabilities of the ferry services.
Each port has a little different mixture of the type of
shipping that comes in. And consequently, the Joint Terrorism
Task Forces, working with the Coast Guard and other elements,
work closely with State and local law enforcement as well as
the other Federal components, to come up with a plan to assure
that we have the intelligence that's necessary to focus on the
threat of a potential attack. And then, if there's an attack,
how we are going to respond to it.
And perhaps I can turn that over to Admiral Loy to pick up
on.
Admiral Loy. Thank you, Senator Mikulski.
The information flow into this challenge is as was just
described by Director Goss and Director Mueller. At the other
end, I would offer that the chair I was sitting in on 9/11 was
still in uniform as the Commandant of the Coast Guard. And,
frankly, we spent the rest of the time that I was in that great
service focusing on domestic maritime strategy--domestic
maritime security strategy.
We also recognized that it was enormously important to see
that this was an international challenge immediately, because
all of those 9 million containers a year, 20,000 a day, that
find their way to Baltimore and many other ports come from
overseas. And so one of the first things we did was literally
take a delegation to the International Maritime Organization to
start a process which has become a standard-setting effort for
international commerce as it relates to facilities, crews,
ships that ply the waters of the United States, to meet those
international standards.
Second, there have been excellent resource plus-ups
attendant to the Coast Guard's capability to shift gears from
emphasizing what it has always been able to emphasize as an
array of responsibilities it has for the Nation and focus on
port security in this particular time of need.
I think one of the greatest strengths of that service is
its agility to reshape its focus on what Nation needs it to
focus on now. And it certainly has done so over the course of
these last 3 years.
We have also recognized the legitimacy through port
security grants and Operation Safe Commerce. The requirements
that we have to look down the supply chain, literally from the
point of origin to the point of destination, with a sense of
transparency all the way through that, in order to see and be
able to apply the insights we gain from the intelligence
community as to what we should be doing operationally in those
various responsibilities.
The notion of pushing our borders out so that they don't
become the first portal that we look at things under concern
about, the Container Security Initiative, as I mentioned in my
opening comments, is now alive and well in 34 different ports
where customs agents, side by each with their host nation
counterparts, are watching the stuffing of those boxes, the
sealing of those boxes, as it relates to cargo security.
One of the most dramatic initiatives that we had already
underway for what then Vern Clark and I, as the Chief of Naval
Operations, viewed as an asymmetric array of threats, which
shifted focus to the terrorism piece of that asymmetric array
after 9/11, had already been underway in Suitland with a joint
effort, with respect to intelligence reviews that the two sea-
going services of this Nation jointly conduct there day after
day after day.
That has developed into two initiatives today. One of them
attended to something I termed maritime domain awareness and
has become almost a term of art in this look that the two
services take. With NORTHCOM's responsibility reaching 500
miles out to sea on the Pacific side and literally almost 1,700
miles to sea on the Atlantic side, we have joined forces, the
Navy and the Coast Guard, to truly understand what's going on
and how do we assure that we know what's going on in the domain
we're responsible for.
Senator Mikulski. Let me come back.
First of all, this was really, I think, very helpful, and I
hope enlightening to the Committee. I know my time's up. But
number one, how real is this threat?
And number two, Admiral Loy, homeland security is the
ultimate user of the intelligence, the ultimate customer, of
course, along with the FBI. But, you know, you're Coast Guard.
You're Customs. That's the battle line.
Admiral Loy. We hold the bag. Yes, ma'am.
Senator Mikulski. Yes. One, how real is this threat? And
number two, do you really feel that what has been described is
really working well?
Admiral Loy. The gathering and the sharing of the
information, this is, I think, working extraordinarily well in
this particular domain. I think, to go back to the Chairman's
commentary about information access as opposed to information
pushing and the comments that the Vice Chairman made attendant
to that, are absolutely right on point.
We discussed, though, there just two operatives. You talked
about the analyst and you talked about the collector. And I
would offer that the operator is the other absolutely crucial
ingredient to keep in that algorithm. The requirements that the
operator can express to the collector and the analyst go a long
way to figuring out the workload of those people on any given
day, any given week, for any given purpose or project.
So I would ask you to have the operators articulate their
requirements, those things that they're going to be able to use
properly to do the work they're required to do. Let the
analysts and the collectors then get about that business to
meet those operators' requirements.
Senator Mikulski. Threat?
Admiral Loy. The threat is as real here. We have the same
kind of exercise program to think our way through the nightmare
scenarios on the maritime sector, as in any other sector. Ports
represent that place where it all comes together. Ninety-five
percent of what comes and goes to this country comes and goes
by the water. So the port complexes are clearly a targeted area
for the terrorists.
Senator Mikulski. Mr. Chairman, I presumed my time was up.
That was a lengthy conversation, but I think really is crucial,
because that's where it all comes together.
Chairman Roberts. As usual, the Senator raised an important
point. Has the Senator finished her comments?
Senator Mikulski. My time is up.
Chairman Roberts. The distinguished Chairman of the Senate
Armed Services Committee.
Senator Warner. I thank you, Mr. Chairman and the Ranking
Member. We've had a good hearing. I'm sorry I had to step out
for a moment.
Sixty years ago this month, at age 17, I started my very
modest and inauspicious military career. And I had over a half
century of the privilege of being associated with the men and
women of the United States military. And this afternoon, like
so many of our colleagues, I go to Arlington for the burial of
a brave Marine who lost his life in Iraq.
As I sit through these ceremonies quietly, the thought
always occurred to me, ``Senator, have you failed to do
anything in your official capacity either to equip or train
this individual or to provide him the intelligence, or his
superiors the intelligence, which could have prevented this
death?''
There is an issue here, I say to my distinguished Chairman
and Ranking Member and colleagues on the Committee, which I
think we've got to address, both in my Committee and in this
Committee. And that is the manner in which we gain intelligence
from those that are captured, either on the battlefield or in
other areas.
There has been a good deal written, and I draw the
attention of my colleagues to an article today in The New York
Times entitled, ``CIA is Seen as Seeking New Role on
Detainees.'' And so my question to you is as follows.
America has always been a Nation that follows the rule of
law, and we must preserve that. And the Geneva Convention, as
such, is a part of our body of law. But we recognize other
nations have other laws, traditions, whatever. And there could
well be means by which they gain intelligence which we can't,
following the rule of law. And I'm not suggesting we deviate
from the rule of law.
But when an individual is apprehended in Iraq, should we
turn him over to the Iraqis, who may have a different system,
and from that individual we gain information that not only
preserves the opportunity to protect our coalition forces, but
indeed the terrible and tragic killing of so many Iraqi
citizens and their own security forces.
I think largely this issue has to be addressed in closed
session. But I wonder, Mr. Director, to what extent you can
talk about what your hope is in this area to gain the maximum
intelligence that we need to not only bring to, hopefully, a
successful conclusion of the Iraqi campaign, but other
campaigns on other fronts and, at the same time, carefully
preserve the traditions of this country by following the rule
of law.
And most specifically, what should we do in dealing with
other countries in terms of sharing the burdens of captivity
and interrogation of a witness or a captive or whatever we may
have in our possession? And then I'll ask the Department of
State, Ms. Rodley, to give the views of State on that.
Director Goss. Thank you, Mr. Senator.
The subject is of critical importance to us. You are
correct to point out that we are dealing in a life-and-death
business, and you are correct to point out that interrogation
is a mainstream of information. Having enough professional
interrogators operating the proper way, that would be within
the rule of law, and professional interrogators will tell you
that torture is not something they would wish to have, because
it doesn't work. There are better way to deal with captives.
So I don't think there is any inconsistency with the idea
of professional interrogation of combatants, whether they're
conventional or unconventional, taken off the field of
hostility and brought into our captivity, being subject to a
professional interrogation. I do not think that's an impossible
job.
The question of who does it and under what circumstances
does get us into some legalities. I'm not a lawyer, an
attorney. And I will obviously be guided by what they say. But
that is not going to be a deterrent to a professional program.
It's just going to affect the mode a little bit.
Clearly, as Americans, we are concerned with legality, the
rule of law. We are concerned with human rights because we are
compassionate human beings, and what we stand for is what we're
fighting for. And we're not going to abrogate that.
We have an immediacy of protection of forces and protection
of innocent lives in the interrogation process. We do not want
to forego that opportunity. Nor would we ask another country to
do something that we would not do ourselves as a cute way of
end-running our commitment to the law and decency.
I believe that we have most of that in hand. There are some
parts of that that I cannot answer with you yet that are sort
of down-the-road pieces of it that I need to talk to you about
in closed session.
But if you asked me today, is interrogation vitally
important to saving lives, and disrupting terrorists, and
protecting our forces, the answer is unequivocal. Yes.
If you are asking me today if we are handling interrogation
within the proper norms and bounds, the answer is yes. If you
are asking me today if I would like to get more information
from some of our captives that I still think have information
we would like to have, the answer is yes. And if you asked me
would I like to have more captives tomorrow to interrogate, the
answer is yes.
Senator Warner. Let's take it to one last subject. When
you're given the option that you could transfer this prisoner
to another nation, recognizing that nation employs methods
different than we, how would deal with that?
Director Goss. I would require safeguards, if that captive
were going back, either as a non-interrogee or as an
interrogee. If that individual is being returned to a nation, a
judgment should be made that nothing beyond, I would say, due
process punishment, if that is deserved, would happen to that
individual, even though they may not have the same standards in
that nation.
As you know, many nations will claim their citizens back.
And we have a responsibility of trying to ensure that they are
properly treated. And we try and do the best we can to
guarantee that. But, of course, once they're out of their
control, there's only so much we can do. But we do have an
accountability program for those situations.
Senator Warner. Thank you.
Chairman Roberts. Senator Bayh.
Senator Warner. I hadn't finished.
Chairman Roberts. I beg your pardon.
Senator Warner. Could the witness from the Department of
State give their perspective from their department?
Chairman Roberts. Certainly.
Ms. Rodley. Thank you, Senator Warner.
One of our key policy goals in Iraq, obviously, has been to
build and to build up institutions in Iraq--government
institutions, government services--that will adhere to the rule
of law. This is a long-term process. Mr. Goss's agency has been
involved in this project with us in the stand-up of the new
Iraqi intelligence service.
It's a long-term process, obviously. But we are, of course,
heartened by the results of the election in Iraq. And we are
following closely the formation of the new government there.
And we are hopeful that the new government in Iraq will be a
government that respects the rule of law, and that the Iraqi
people, who suffered horribly for a long time under a brutal
dictatorship, won't be subject to the kind of abuses that
routinely went on under Saddam Hussein.
So I wouldn't automatically assume that detainees turned
over to the Iraqi services now would suffer the same fate that
has been the case very commonly in the past.
Senator Warner. But, Mr. Chairman, if I could just ask a
question for the record, such that they can, I guess, given my
time's up, have to answer for the record.
But I'm following carefully initiatives by Secretary of
Defense Rumsfeld as he begins to augment his gathering of
intelligence which he deems essential. And, frankly, thus far,
in my examination, he's acting within the guidelines of the
law, including the newest law that passed the Congress, in
establishing a greater ability to collect, I think, largely
tactical intelligence.
And if the Director would provide for the record his
views--because I'm sure you're following this--as to whether or
not you're of the mind that he is acting within the bounds of
the law and not in any way conflict with the objections of the
new law in establishing these units.
The distinguished Chairman and Ranking Member have begun to
look at this. We both, our Committees, have had hearings or
briefings on this subject. And it's a matter of active
consideration here in the Senate side.
Director Goss. If I'm permitted----
Senator Warner. You'll have to take it for the record,
because I don't want to interfere.
Director Goss. I'm very happy to answer if the time is
permitted.
Chairman Roberts. Let me just say that the distinguished
Chairman has asked the question that I was going to ask in
reference to the encroachment stories that we have been seeing,
both in reference to the FBI and the Department of Defense, in
augmenting their intelligence operations in cooperation with
you. You don't look encroached upon as of this morning.
And that we have had a hearing with Admiral Jacoby and with
Dr. Cambone in the Intelligence Committee about Title 10, Title
50, and the legalities involved. They have, in fact, kept the
Committee informed through the staff and through this hearing,
but I do think that if you could submit that answer to the
record, you know, for the Chairman, I think it would be very
helpful, because I think this is a subject we're all interested
in.
Senator Warner. Thank you, Mr. Chairman.
Director Goss. Mr. Chairman, Mr. Chairman, I am completely
comfortable with where we are in terms of forward-leaning
efforts by all of the elements in the intelligence community to
do the best they can with the missions that we have been
assigned. It is quite clear to me that there has been a lot of
speculation and RUMINT and so forth, and comment in the paper,
which is unfounded or badly founded.
The truth is that I believe that the efforts that the
Department of Defense is trying to undertake are entirely
appropriate. They are looking forward to the best ways to get
the information they need to accomplish their objectives with
the maximum protection for their warfighters. I think that is
excellent.
What it involves is some coordination overseas and some
understanding about who's doing what where. I go to the analogy
that the leader of our country team in any overseas situation
is the Ambassador, the chief of mission, that the person who is
normally in charge of intelligence, all intelligence
activities, is the representative of the Central Intelligence
Agency.
That does mean there's no other intelligence going on
except under the Central Intelligence Agency's immediate
direction. It means it's coordinated there. And I believe that
we understand that. Those details, in some cases, yet to be
worked out, because there is forward-leaning, which we have not
seen forward, which is entirely appropriate.
I can say on the domestic front exactly the same thing.
There have been a lot of stories about who is doing what. There
is no question that the intelligence community has the
experience to do--it's the National Foreign Intelligence
Program overseas. There's also no question that occasionally
agencies like the FBI need to be overseas doing things that
they do very well in pursuit of their role in counterterrorism.
We ask that it be coordinated.
Equally, I think that the FBI wants to be assured, as do I,
that we are not usurping our authorities in the domestic
homeland. We all know Americans do not spy on Americans. And
that is our absolute pledge. It is equally true, however, we
need some support. And we do have a support base that we use in
the United States. It is critical that we keep that coordinated
with Director Mueller.
These are questions of working out details. Perhaps a DNI
would have done it faster than we are doing it. But I frankly
think we're doing it quite well, considering we've got 15
agencies doing very intense things that we haven't done before.
I realize that the DCI, which is one of my titles, is an
endangered species. But I will be handing off my thoughts to
the DNI. And my thoughts are forward-leaning by all agencies is
good, and we can coordinate it and make it work.
Senator Warner. Mr. Chairman, I'm very impressed by the
responses you've given to both of my questions. I wish you
well, and we're fortunate you've taken on this task.
Director Goss. Thank you, sir.
Senator Warner. You could have been basking in that sunny
clime of Florida.
Director Goss. Thank you, Senator.
Chairman Roberts. Senator Bayh.
Senator Bayh. Senator Warner, sometimes the heat in
Washington is just as warm.
Thank you very much, all of you, for your service to our
country. I really do appreciate it. These are issues of
profound importance, the resolution to which is often not
clear. I wouldn't be surprised if all of you didn't lose a
significant amount of sleep over your service to our country
and dealing with what you're dealing with, so I thank you for
that.
I also apologize, Mr. Chairman, to you and the panel for
having to shuttle back and forth. Alan Greenspan, Chairman
Greenspan, was testifying before the Banking Committee today,
so we are trying to simultaneously deal with our Nation's
economic security and prosperity and our physical security
here. So I apologize for my absence.
Let me begin by asking a question that involves
credibility. And I want to make very clear that it doesn't
involve personal credibility. No one would question any of your
personal credibility. But I think we do have a national
credibility problem.
And so what I want to ask specifically is, for the
Americans watching us today and hearing about assessments
involving Iran and North Korea and what is maybe going on there
that could be threatening our country, what has improved over
the last couple of years since the assessments about weapons of
mass destruction in Iraq that would give greater assurance to
the American people that what we're hearing today is accurate?
Without getting into obviously classified specifics, have
our collection capabilities improved significantly? Have our
analytical capabilities improved significantly? Why should
people place, you know, credibility behind what we're saying
here today, given the history with regard to WMD in Iraq?
Director Goss. That's actually the perfect question, and
that's what we do. That's, I think, why we all go to work.
How do we take what we were using and make it better and
more appropriate? And I think I can report back that we have
more collectors, better technology being properly applied and
more focused in the application, more analysts who understand
the language, who understand the pitfalls of group-think, more
systems that put this together to make the information come out
more timely, more flexibility in our systems to deal with
problems as they pop up--and the nature of our enemy is pop-up,
quite often--and a greater understanding of each other's
problems.
We have all walked a little in everybody else's shoes, and
I think we see it a little differently. And I think that that's
been a helpful exercise. We need to get on with the
architecture of what the community is going to look like, and
we need to make sure that each unique contribution of each of
the elements of the community is provided for in a way that it
is still unique and adding value to the total product.
I think that we are moving well.
Senator Bayh. Are we encouraging contrarian analysis? You
mentioned group-think.
Director Goss. Indeed, we are. And we're publishing it,
too, right on the same page.
Senator Bayh. Any of the rest of you care to comment about
capabilities having improved? If not, that's OK, too.
Admiral Jacoby. I'd like to just echo the Director's words
and talk about a couple of other things, processes, processes
that you bring, you know, the different views together,
processes that have made more sourcing of information available
as we go to community products, and in my agency, a tremendous
emphasis on training and retraining all the way through the
senior levels to make sure that we are reinforcing good
analytical, logical source utilization kinds of capabilities
that are available to us.
Senator Bayh. Thank you.
Yes, Director Mueller.
Director Mueller. I would say our capabilities have
dramatically increased. We had a little bit over 1,300
counterterrorism agents before September 11th. We now have
3,000-plus. We've established an intelligence directorate which
has a total complement of 3,787. Of those, 438 are agents, 490
translators, 2,273 analysts.
We have, in each of our field offices, a field intelligence
group that was not there before. Our ability to obtain the
intelligence, analyze the intelligence, and getting the
intelligence to the operators has improved dramatically since
September 11th.
Senator Bayh. One of the things I think we've all realized
is that in some of these areas there is just an irreducible
level of ambiguity. And we try and minimize that, but in some
of these areas it's still there. And so a certain level of
humility in reaching conclusions is, I think, in order in all
of our parts.
Let me ask you about North Korea and what you assess to be
the likely reaction to our current strategy in North Korea and
the role that China might play. But let me back up for a
second. At least in 2000, with regard to their plutonium
effort, it seemed to have been in stasis. Now they may have
been cheating on the uranium side, but cameras were in place.
Those have been removed. Inspectors were in place. Those have
been removed.
There were published reports that plutonium has been
reprocessed and possibly devices have been created. There are
even published reports that perhaps in some other areas they
may have proliferated. This is not a happy course of events
over the last several years, and at least the initial strategy,
which seemed to be threaten and ignore, does not seem to have
worked too well.
Now we currently have a strategy of engagement through the
6-party talks, trying to encourage the neighbors to take charge
of their own neighborhood. My question is: What do you assess
the North Koreans' likely response to be to our current sort of
sticks and carrots approach, number one? And number two, might
a cynic not think that China, which is in a very good position
to be helpful on this, that there might be an interest there in
not resolving this problem, because as long as North Korea is
there and of concern to us, that gives them leverage over us in
a variety of other areas.
So, my question is, what do you assess the likely response
of North Korea to our current approach? And second, how do you
assess the role that China will play in trying to reach a
positive conclusion?
Director Goss. I'm going to try and avoid a policy comment.
My view is that we are seeing what is the traditional
bluster diplomacy by North Korea, trying to threaten something
terrible and get something concrete back. They're dealing with
nothing to get something, and they do it very effectively. And
this has been their MO, in my view.
As to their response, I think that their responses are
predictable. They are going to continue to do what they want to
do. Their number-one goal is survivability of the regime. And
that is where they are going to go. And whatever it takes,
that's what they'll do. How ridiculous they look on the world
stage does not seem to bother them.
Senator Bayh. Forgive me for interrupting, Director. Is
there anything, in your estimation, or anybody else's
estimation, that could convince them that the survival of their
regime--since that's their top priority--is inconsistent with
the creation and possession of nuclear weapons? They seem to
have concluded that those two things have to go hand-in-hand.
What, in your estimation, could lead them to a different point
of view?
Director Goss. I do not know the answer to that question. I
just simply don't have that information. I could make a guess
and say for them to be relevant, they feel that they have to be
in the nuclear club.
There is another aspect that's practical. That's the way
they make their money. Their bread-and-butter money is selling
this stuff, proliferating.
The Chinese response that you ask, I think the Chinese
understand they have got a very troublesome child right there
in the nest of the family, and they can't go anywhere. The real
estate's not going to change. They've got to deal with the
problem.
They have border problems, refugee problems, all kinds of
things. I think the Chinese are genuinely interested in not
having this be a worse problem. Now, I'm not going to practice
diplomacy. I'm going to yield to the Department of State. Much
of that was my personal view, not an informed intelligence
response.
Senator Bayh. Thank you, Director.
Ms. Rodley. I'm just going to pick up on that point about
the Chinese. We agree with that assessment, that the Chinese
are genuinely interested and have concluded that it is in their
interest to resolve the problem with North Korea. We don't see
any indications that they think it is somehow in their interest
in dealing with us to have North Korea continue to be a
problem.
Senator Bayh. But they seemed to be in denial for such a
long time, I'm glad they finally found religion on this issue.
Just two quick things, just very, very quickly.
Hizbollah, you report their capabilities in terms of
striking U.S. interests, if provoked. Should we assume that if
it was ever in our national--if we ever felt compelled to act
against Iran, that might be the sort of triggering event that
we would have to anticipate, Hizbollah taking some sort of
action against us?
Director Goss. I would certainly recommend that any
policymaker considering that take that calculation.
Senator Bayh. My final question is with regard to FARC,
kind of looking out beyond the horizon. Any assessment by any
of you about--obviously, they have capabilities of striking our
interests in Colombia. Are you at all concerned about their
potential for striking us here in the homeland?
Director Goss. Well, I used to represent southwest Florida.
And I have perhaps a different view than others. But I do feel
there is an immediacy to making sure we understand what is
going on there. There are, obviously, dialog and communications
going on between the countries. That means there can be between
the bad players. And I think it's very important for our law
enforcement people to be absolutely on top of that. And, as far
as I know, they are.
Senator Bayh. Director Mueller.
Director Mueller. We have not seen, I do not believe, any
indications or preparations for FARC to launch an attack in the
United States. However, there are ties between individuals
associated with FARC and persons in the United States. And
they're something we have to keep an eye on.
Senator Bayh. Thank you. Again, I appreciate your service.
Thank you all.
Chairman Roberts. Let me just say that, in reference to
Senator Bayh's comment, if Kim Jong-Il would suddenly get
religion, having been to North Korea and trying to deal with
that regime in regards to the famine--and they always have a
famine, but it was a more severe famine several years ago--he
is the religion. He is a deity in his own mind, and the people
believe that, as was his father. So it's a little difficult.
And I would agree with Director Goss. That's the only card
he has to play on the world stage, and they're going to play
it. And they're going to continue. I still think our best
opportunity is to do exactly what the Director said with China
in the 6-party talks. But I have no illusions of all of a
sudden him getting a light bulb to go off. They don't have any
light bulbs, by the way, in North Korea.
And following on your statement, I'd like to ask a question
about Iran. And by your statement, I mean Senator Bayh.
Admiral Jacoby, your written statement says that Iran is
likely continuing nuclear weapon-related endeavors, is devoting
significant resources to its WMD programs, and that, unless
constrained by a nuclear non-proliferation agreement, Tehran
will probably have the ability to produce a weapon early in the
next decade.
Director Goss, your statement notes that the CIA is
concerned about the dual-use nature of the technology that
could also be used to achieve a nuclear weapon.
Ms. Rodley, your statement notes that Iran seeks, but does
not yet have, any nuclear weapons.
It sounds like to me you all agree that, just like Iraq
before 2004, Iran has troubling dual-use nuclear capabilities.
What I'm interested in, and both the Vice Chairman and I want
to get into capabilities and whether or not we have the
capabilities to determine some intelligence analysis on intent.
As far as Iran's intent to build a nuclear weapon, it sounds
like there might be a difference of opinion between you three.
I'm not suggesting that, but at least that might be the case.
I would ask all three of you to give us your assessment of
Iran's intent, to characterize your confidence in that
judgment, and if you feel that should be better handled in a
classified section, I certainly appreciate it.
Director Goss. Mr. Chairman, I would limit my answer. I
think there is something I would say that is obvious. There are
other players in the neighborhood that are very concerned that
also have views about what Iran is up to. And it's important
that we understand what that might lead to.
I believe that, having watched the pride of some countries
in acquiring the world-stage status of having nuclear weapons
and what that has meant for nationalism and leadership, is that
it becomes almost a piece of the holy grail for a small country
that otherwise might be victimized living in a dangerous
neighborhood to have a nuclear weapon.
So, in my view, there is an inclination, a very strong
inclination, by the conservative leadership, present
conservative leadership of Iran to make sure that they can live
up to the same levels as some of their neighboring countries.
And some of those neighboring countries--indeed, Pakistan comes
to mind--have the bomb.
Chairman Roberts. Admiral Jacoby.
Admiral Jacoby. I would join Director Goss, in terms of the
intent part. We did some work recently looking at the direction
that threats were going. And they are going away from
conventional force-on-force confrontation strategy with the
United States toward terrorism on one end and nuclear weapons
and not only the status, but the perceived deterrent value,
that comes with them.
So I would join the Director, in terms of intent in Iran,
and would also say that we're engaged in a hard look at
sequentially nuclear programs or suspected nuclear programs in
various countries. Iran is next on our agenda, and I believe
that our look and the Committee's look will probably coincide.
And we look forward to working that together.
Chairman Roberts. Ms. Rodley.
Ms. Rodley. I don't disagree with anything that's been
said. I would merely add that another element that makes this
harder to get at is the advantage of ambiguity when it comes to
nuclear programs.
In a sense, the Iranians don't necessarily have to have a
successful nuclear program in order to have the deterrent
value. They merely have to convince us, others and their
neighbors that they do. This is a lesson that hasn't been lost
on them, and it merely complicates both the collection and the
analysis on this issue.
Chairman Roberts. I thank all three of you for your
comment.
I'm enjoying the red light--I'm now a member of the red
light club. Have patience, Senator Wyden.
This is a parochial question, but it's really not. It's a
national question. Tommy Thompson, the former secretary of HHS,
left and said his was worried about the Nation's food supply.
And all of us who are privileged to represent States who are
involved in agriculture were asked time and time again--I just
heard it again on the radio as of yesterday. I'm not sure why
Tommy said that.
But, at any rate, Admiral Loy, can you tell me how the
Department of Homeland Security views the threat of what we
call agroterrorism. The Emerging Threats Subcommittee of the
Armed Services Committee 4 or 5 years ago got into this subject
area, knowing how serious it could be, but not many people were
really thinking about it.
They had an exercise, or one of the many exercises that has
been held, called Crimson Sky. Six States were infected by
foot-and-mouth with an attack from Iraq. Devastating results
happened, utter chaos. We lost our markets. The herds had to be
destroyed. People panicked in urban areas. Our food supply
was--and I'm not talking about 1 year. I'm talking several
years.
So are those efforts now really being coordinated well with
other agencies, specifically the Department of Agriculture? Are
you getting the intelligence you need? What kind of a priority
are you putting on this? This is sort of the Mikulski port/
Roberts agriculture question.
Admiral Jacoby. Yes, sir, Mr. Chairman.
Without a doubt, the Homeland Security Presidential
Directive 7 first of all directs the Secretary of Homeland
Security to be the collaborate effort to pull together the
critical infrastructure protection of our Nation writ large.
One of the economic sectors cited in that directive is the food
sector. And so that has caused the Secretary of Homeland
Security to challenge that designated lead-sector agency in the
Department of Agriculture to develop a plan attendant to
becoming a piece of this puzzle that will be the additive piece
for food, as it relates to the whole critical infrastructure
protection of our Nation.
So there has been very good work undertaken with the
Department of Agriculture in agricultural operations, the meat-
poultry-eggs world, and in the HHS/FDA world responsible, if
you will, for the rest of the food production and distribution
chain that they're responsible for.
We're at a point where this critical national
infrastructure protection plan, the base plan, has been
completed and submitted to the White House. Each of these
sector plans, we have taken stock--we at the Department have
taken stock of how we felt their original plan submission met
the specifications that were outlined in HSPD-7 and have
offered that commentary back to, in this case, the Secretary of
Agriculture, with a bit of a challenge to go back to the
drawing boards a bit and resubmit such that the thresholds are
reached with what we think are the right concerns to allow not
only that to be a free-standing sector and plan attended to
food protection for our country.
Chairman Roberts. OK. When did you send that over?
Admiral Jacoby. That's back just before the holidays, sir.
Chairman Roberts. So that would be under the auspices of
the new Secretary of Agriculture, obviously. How many people do
you have on board in regards to homeland security that either
are on loan from, or consulting with, or are a regular employee
that are dealing with this? I know that's a tough question to
ask you right here. I think I know the answer. There's one, at
least that I know of.
Admiral Jacoby. There's one as a detailee, if you will,
into the Department in this business.
Chairman Roberts. Yes.
Admiral Jacoby. And, of course, we've got those elements
from Agriculture that came into the border portal validation
process.
Chairman Roberts. Yes.
Admiral Jacoby. But the effort is to allow the Agriculture
Secretary to take the lead with respect to developing these
plans for our country and make sure that they fit well, because
we could have 13 perfect plans, and I'm convinced that it's the
interdependencies between and among them that are the real
challenge.
Chairman Roberts. It's a very hard thing to develop a
contingency plan to try to mitigate this. Well, OK, I'll stop
at that point, because I've already gone way over my time. But
I need to visit with you and the new Director about this as we
can determine.
Chairman Roberts. Senator Rockefeller.
Vice Chairman Rockefeller. Director Goss, just a very
specific and one short question. Before the election, we went
up a color.
Director Goss. I'm sorry?
Vice Chairman Rockefeller. On imminent threat, we went up
from yellow to orange, and nothing happened. And there has been
no talk or consideration, at least that I'm aware of, of
similar elevations since then. I'm wondering if, to the extent
that you're involved with it, sir, to the extent that Homeland
Security, FBI is involved with it, has there been attempt to go
back and review the nature of that intelligence and whether or
not it was a psychological move or whether--I don't mean by
that political. I mean psychological simply as a warning to
others--or whether it was, in fact, justified. Has there been
an effort to go back and re-look at that intelligence?
Director Goss. Senator, in part, the answer's yes. I don't
know all of the things that have been looked at. But part of
that, and again, I'm not--that's not my decision area. We
provide the information. Part of that, I think, was an
assessment of the Usama bin Ladin statement that came out, that
there was a question, was that trying to interfere, and some of
the questions of propaganda began to really take shape. Exactly
how that figured into the decisions that were made by others on
raising the elevation, I don't know.
Have we gone back and taken a look? The answer is yes. And
I'll tell you why. One of the things that Senator Bayh was
pointing out--I should have answered and I neglected to--is
that we have learned the difference between a worst-case
scenario and a most-likely scenario. We need to be very careful
how we need to present these things so people are hearing
things not as worst-case scenarios, but as most-likely
scenarios, if that's what we believe.
We find that, when the chatter level goes up--that's an
expression we like to use because it sort of covers up what
we're really talking about--but it means there's something to
be tuned into. All of our sensors out there, the system is
blinking red, all of those kinds of statements that we've
heard. What it means is that we're getting a huge flow of
information.
The problem is, how much of that is just wishful thinking
and how much of it is real planning? That is a very hard
question to make a judgment on. We are going back, as part of
our process of how do we get our product better, how do we make
sure our customer understands what we're saying.
And that process is very clearly part of the overall
process that Senator Bayh was asking about. Are we attending to
correcting not only the collection piece, but the analytical
piece, including operators, incidentally, when they're
available?
Director Mueller. I think there has been an effort to go
back and look at the--well, we continuously review the threat
posture day in and day out. And I convinced, given the
information we had at the time, that we made the right
decision, in terms of the actions we took, given the
intelligence at the time.
Subsequent to that there has been further development in
that intelligence that may call into question at least some of
that intelligence. But you also have to reflect upon the fact
that we had al-Hindi, we had the surveillance documents, the
Prudential, the stock exchange, a number of things back in this
time prior to the election, along with intelligence that
indicated that we can expect a threat or an attack in that
period before the election.
As I indicated in my opening statement remarks, we
undertook substantial efforts to assure that such an attack did
not take place. We will never know whether those efforts, our
efforts, the efforts of the CIA, the efforts of DHS, the
efforts of our counterparts overseas, were effective in
reducing or removing that threat of an attack before the
elections.
But in reflecting upon what we knew at the time, I believe
that we took the right steps. That doesn't mean that we can't
do it better the next time, but I'm comfortable with the
decision that was made back then.
Admiral Loy. Sir, I think that's a very good capture of the
time. One thing I would offer is that, over the last 2 years
and certainly in the last year, where we are with respect to
capability, where we are with respect to stature of an
interagency security plan that we keep track of day after day
after day, I would offer that today's yellow is probably much
closer to yesterday's orange as it relates to the constancy of
capability that is there 24 by 7/365 around our country.
So we have simply grown and matured, both as a brand-new
department trying to coordinate and collaborate on many of
these things. And the absolute value of some of the
contributions that are being made by many yield an attitude, if
you will, that has the country sort of at a level significantly
stronger than it ever was before.
That offers us a chance to keep from the going up and down
road, so to speak, when the net evaluation of all the players
at a SVTC or a series of weekly and daily meetings that we
conduct, rates the flow going by as not being ``worthy'' of
adjusting the homeland security advisory system to a greater
level.
I think the country should take great assurance that the
level of capability attendant to these things is significantly
higher day after day after day. And that simply is a result of
us learning lessons going back from each of the experiences of
up-and-down that we've undertaken and then ratcheting up, as
appropriate, the prevention, the protection, and the response
capabilities of the Nation across the board.
Vice Chairman Rockefeller. I thank you.
Chairman Roberts. Let me just say--and Senator Wyden, I'll
have to buy you lunch or something or, for that matter,
probably all of you, but we don't need to get in any food
depravation here. And so I'll try to make this quick. I hope
there's a look-back on this.
Admiral Loy. Indeed, there is.
Chairman Roberts. The same people, same table, same threat,
no consensus before our Committee in regards to access to
information. That was the problem. Same representatives
testifying before us that you're in charge of, that do this on
a day-to-day basis. And then, 30 days later, a lot of questions
about the credibility of the sources.
Now, if you're going to err, you're going to err on the
side of safety, for goodness sakes. I know that. And if you
take certain steps, you can't come back. We even had one
Senator leave this place as a result of this. He did come back.
But I'm saying that the leadership and this Senate and this
House were informed in such a way with a very aggressive kind
of consensus that was not shared when we had them before the
Committee.
That's not been too long ago. And then, 30 days later,
because of detainee information that's been so highlighted
here, why, then we decided, well, you know, we just didn't have
a consensus. Now, damn, that's got to quit. Now I know that you
can't have every source and have a consensus threat analysis
that's perfect. I'm not asking that.
But at the time, when you had the same people at same
table, you know, one of my questions is, do you people know
each other? And again it was information access. Now I feel
very strongly about that. And I think it was a classic example
of why you have to go back--the Vice Chairman calls it red
teaming--and take a look at this, and say, well, what in the
heck went wrong? Because we panicked, the entire Congress, not
to mention Washington, DC., so on and so forth.
Thank God it didn't happen. You know, maybe I'm wrong.
Maybe there was an element there that we missed. But it
certainly was not present in regards to the presentation that
we received.
Senator Wyden.
Senator Wyden. Thank you, Mr. Chairman. As you know, I
share your concerns about this whole question of how
information is shared, and that's one of the reasons I raised
the questions I did on the last round.
I'd like to go into another area, though, that goes to the
heart of what I think the challenge is in America. I believe
strongly in the proposition that our country has got to fight
terrorism relentlessly and ferociously. And it's got to be done
in a way that's consistent with protecting the privacy of law-
abiding people, innocent people.
Now it's been 2 years since the Congress closed down the
Operation Total Information Awareness program, but the Congress
is still totally in the dark with respect to what kind of
information your agencies collect on citizens and how it's
used. And I want to be very specific and talk about data
mining.
Data mining, by the way of shorthand, is essentially
technology that your agencies use to sift through the records
and information that involves millions and millions of American
citizens. I can't find any rules on data mining anywhere.
And so what I'd like to ask each of you is, what do your
agencies do with respect to data mining, A? B, are there any
rules at all? And, C, how are the rules enforced? Because I've
spent a lot of time on this. And I cannot find any rules at all
on data mining.
So maybe if we just go right down the row.
Admiral Loy.
Admiral Loy. Sir, you and I have spoken about this a lot,
as it's been perhaps 18 months or 2 years ago associated with,
at that point, the Computer Assisted Passenger Pre-Screening
second program, then known as CAPPS II. As you know, I have
worked very, very hard to work with the privacy community and
with many others attendant to recognizing what then became a
list of eight absolutes that the GAO report initiated for CAPPS
II and is now ten items that the Congress put in the
appropriations bill last year for this department, attendant
to, ``You're not going any further with CAPPS II--and it's now
Secure Flight, the new program--until all ten of those concerns
that we have as a Congress are taken care of.''
We have very diligently gone to great lengths to explore
each and every one of the eight, each and every one of the now
ten, and are right on the cusp, I believe, of satisfying the
Congress and satisfying GAO that it is the right thing for us
to press on with that particular program, because it has come
to represent three things.
Senator Wyden. Admiral, are you saying that that's the only
program that involves data mining at your agency? I appreciate
what you've tried to do, and you've certainly been a
straightshooter on it.
What I'm concerned about is whether there are any rules
with respect to data mining generally. I do know what happens
when Congress picks up on one thing or another and suddenly the
travel records get out on somebody. You all work with us. We
try to get something to deal with that specific problem. But I
don't see any rules with respect to data mining generally. And
that's what troubles me.
Admiral Loy. I do not have a management directive in force,
if you will, in the Department that I'm aware of covering data
mining.
Senator Wyden. Are there plans to do that?
Admiral Loy. I'll be happy to take that on and work with
you, sir.
Senator Wyden. All right. Let me just go right down the
row. We've established at least one agency, other than the
computer-assisted travel records, doesn't have it.
Yours, sir?
Admiral Jacoby. Senator, we have very clear, definitive
restrictions on what the Department of Defense can do with
respect to having any information having to do with U.S.
persons in our files. And those are very conservative
interpretations and they are regularly inspected by inspectors
general at all levels inside the departments.
When we apply data mining tools against the information
that we have available, there's no U.S. person's data in there
to begin with. So it's a bit different situation than maybe
some of the other departments.
Senator Wyden. So you get no data, for example, from non-
governmental sources, sir?
Admiral Jacoby. We are not permitted to maintain
information on U.S. persons, sir.
Senator Wyden. OK.
Director Goss.
Director Goss. As you know, the National Foreign
Intelligence Program was specifically set up to make sure that
Americans do not spy on Americans and our work is done
overseas. And I think that the proposition you have given us is
one that, when I left Congress, was still red-hot after a
couple of years of debate, which I think will go on. And that
is the crossroads between privacy and protection.
As far as I know, our agency is not a relevant agency to
answer your question, because we don't do data mining on U.S.
persons unless it's under some safeguarded procedure which is
properly notified and so forth.
Senator Wyden. That's what I'm curious about. I know there
are areas where you do it, and I'm wanting to know what the
safeguards are. You're saying you don't do----
Director Goss. The safeguards are notification of this
Committee, sir.
Senator Wyden. Director Mueller.
Director Mueller. Well, we have one entity in the
counterterrorism area called the Foreign Terrorist Tracking
Task Force that, accomplishes certain data--I wouldn't call it
data mining, but requesting from sources outside the Bureau
information relating to possible locations of terrorists in the
United States. And that has been briefed to Congress on a
number of occasions. It's transparent. We're happy to have you
come over and brief on it.
Senator Wyden. That's the only set of rules you have with
respect to data mining?
Director Mueller. Well, it's not the only set of rules in
terms of data mining. You're definition of data mining----
Senator Wyden. That's what I'm asking.
Director Mueller. We have information that's brought into
the Bureau.
Senator Wyden. Right.
Director Mueller. When information is brought into the
Bureau, it's brought in on predication. We have some reason to
bring the data in. It may be telephone numbers. It may be
addresses of potential terrorists. Now, we data mine that data.
But it's data that we have a basis for bringing into our
databases, whether it comes from our cases or from the
collection of intelligence that is based on adequate
predication.
Senator Wyden. The reason I'm asking the question is that
there are a lot of people in this country who believe that a
lot of this information, you know, data mining, takes place
without predication. And that's why I'm trying to figure out
what the rules are. And I'm going to let Ms. Rodley answer the
question. Then I'm going to ask something of all of you, and
let my colleagues wrap up.
Ms. Rodley. Senator Wyden, as you know, the State
Department is not an intelligence collection agency. To my
knowledge, the only information that we collect and maintain on
American citizens is passport information. And passport
information is held very closely and has a very strict set of
rules regarding its use. I believe, but I will confirm to you
later, that that's restricted to use for notifying next-of-kin
when an American citizen is injured or dies abroad and
cooperation with law enforcement.
Senator Wyden. Thank you.
What I'd like from each of you is to confirm in writing
what policies exist with respect to the sifting of information
on Americans. And I would like it also to include how
information is used, if it's used at all--and I understood that
the Pentagon they had nothing--how it's used when it comes from
non-governmental agencies where there, I think, is really the
Wild West.
I mean, it's one thing if it comes from a Government
agency. It's quite another if it comes from a non-government
body. And having spent a fair amount of time digging into this
area, I can't find what the ground rules are for data mining.
Can I ask, then, that each one of you will get us the
ground rules you use for data mining within the next 30 days?
Director Goss. Absolutely, sir.
Senator Wyden. Thank you, Mr. Chairman.
Chairman Roberts. We thank you for your patience, your
perseverance and your commitment to our country. Thank you very
much.
This hearing is adjourned.
[Whereupon, at 1:17 p.m., the hearing adjourned.]
.