PDF Version


 
                     TURNING SPY SATELLITES ON THE 
                    HOMELAND: THE PRIVACY AND CIVIL 
       LIBERTIES IMPLICATIONS OF THE NATIONAL APPLICATIONS OFFICE 

=======================================================================

                              FULL HEARING

                                 of the

                     COMMITTEE ON HOMELAND SECURITY
                        HOUSE OF REPRESENTATIVES

                       ONE HUNDRED TENTH CONGRESS

                             FIRST SESSION

                               __________

                           SEPTEMBER 6, 2007

                               __________

                           Serial No. 110-68

                               __________

       Printed for the use of the Committee on Homeland Security
                                     
               [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]                                    

  Available via the World Wide Web: http://www.gpoaccess.gov/congress/
                               index.html

                               __________

                         U.S. GOVERNMENT PRINTING OFFICE 

48-963 PDF                       WASHINGTON : 2009 

For sale by the Superintendent of Documents, U.S. Government Printing 
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; 
DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, 
Washington, DC 20402-0001 







4

















                     COMMITTEE ON HOMELAND SECURITY

               BENNIE G. THOMPSON, Mississippi, Chairman

LORETTA SANCHEZ, California,         PETER T. KING, New York
EDWARD J. MARKEY, Massachusetts      LAMAR SMITH, Texas
NORMAN D. DICKS, Washington          CHRISTOPHER SHAYS, Connecticut
JANE HARMAN, California              MARK E. SOUDER, Indiana
PETER A. DeFAZIO, Oregon             TOM DAVIS, Virginia
NITA M. LOWEY, New York              DANIEL E. LUNGREN, California
ELEANOR HOLMES NORTON, District of   MIKE ROGERS, Alabama
Columbia                             BOBBY JINDAL, Louisiana
ZOE LOFGREN, California              DAVID G. REICHERT, Washington
SHEILA JACKSON-LEE, Texas            MICHAEL T. McCAUL, Texas
DONNA M. CHRISTENSEN, U.S. Virgin    CHARLES W. DENT, Pennsylvania
Islands                              GINNY BROWN-WAITE, Florida
BOB ETHERIDGE, North Carolina        MARSHA BLACKBURN, Tennessee
JAMES R. LANGEVIN, Rhode Island      GUS M. BILIRAKIS, Florida
HENRY CUELLAR, Texas                 DAVID DAVIS, Tennessee
CHRISTOPHER P. CARNEY, Pennsylvania
YVETTE D. CLARKE, New York
AL GREEN, Texas
ED PERLMUTTER, Colorado
VACANCY

       Jessica Herrera-Flanigan, Staff Director & General Counsel

                     Rosaline Cohen, Chief Counsel

                     Michael Twinchek, Chief Clerk

                Robert O'Connor, Minority Staff Director

                                  (ii)

























                            C O N T E N T S

                              ----------                              
                                                                   Page

                               STATEMENTS

The Honorable Bennie G. Thompson, a Representative in Congress 
  From the State of Mississippi, and Chairman, Committee on 
  Homeland Security:
  Oral Statement.................................................     1
  Prepared Statement.............................................     2
The Honorable Peter T. King, a Representative in Congress From 
  the State of New York, and Ranking Member, Committee on 
  Homeland Security..............................................     3
The Honorable Paul C. Broun, a Representative in Congress From 
  the State of Georgia...........................................    35
The Honorable Christopher P. Carney, a Representative in Congress 
  From the State of Pennsylvania.................................    37
The Honorable Charles W. Dent, a Representative in Congress From 
  the State of Pennsylvania......................................    24
The Honorable Bob Etheridge, a Representative in Congress From 
  the State of North Carolina....................................    34
The Honorable Al Green, a Representative in Congress From the 
  State of Texas.................................................    26
The Honorable Jane Harman, a Representative in Congress From the 
  State of California............................................    22
The Honorable Sheila Jackson Lee, a Representative in Congress 
  From the State of Texas........................................    40
The Honorable Daniel E. Lungren, a Representative in Congress 
  From the State of California...................................    28
The Honorable Ed Perlmutter, a Representative in Congress From 
  the State of Colorado..........................................    30
The Honorable David G. Reichert, a Representative in Congress 
  From the State of Washington...................................    31

                               WITNESSES
                                Panel I

Mr. Charles Allen, Chief Intelligence Officer, Office of 
  Intelligence and Analysis, U.S. Department of Homeland 
  Security:
  Oral Statement.................................................     5
  Prepared Statement.............................................     7
Mr. Daniel W. Sutherland, Officer, Civil Rights and Civil 
  Liberties, U.S. Department of Homeland Security:
  Oral Statement.................................................     9
  Prepared Statement.............................................    11
Mr. Hugo Teufel, III, Chief Privacy Officer, U.S. Department of 
  Homeland Security:
  Oral Statement.................................................    14
  Prepared Statement.............................................    15

                                Panel II

Ms. Lisa Graves, Deputy Director, Center for National security 
  Studies:
  Oral Statement.................................................    49
  Prepared Statement.............................................    51
Mr. Barry Steinhardt, Director, ACLU Program on Technology and 
  Liberty, American Civil Liberties Union:
  Oral Statement.................................................    43
  Prepared Statement.............................................    45


                     TURNING SPY SATELLITES ON THE
                    HOMELAND: THE PRIVACY AND CIVIL
                     LIBERTIES IMPLICATIONS OF THE
                      NATIONAL APPLICATIONS OFFICE

                              ----------                              


                      Thursday, September 6, 2007

                     U.S. House of Representatives,
                            Committee on Homeland Security,
                                                    Washington, DC.
    The committee met, pursuant to call, at 10:00 a.m., in Room 
311, Cannon House Office Building, Hon. Bennie G. Thompson 
[chairman of the committee] presiding.
    Present: Representatives Thompson, Harman, Jackson Lee, 
Christensen, Etheridge, Cuellar, Carney, Green, Perlmutter, 
King, Lungren, Reichert, Dent, and Broun.
    Chairman Thompson. The Committee on Homeland Security will 
come to order.
    The committee is meeting today to receive testimony on 
``Turning Spy Satellites on the Homeland: The Privacy and Civil 
Liberties Implication of the National Applications Office.''
    The Department chose Congress' August recess as a time to 
announce, with great fanfare, the creation of a new National 
Applications Office, referred to as the NAO, to facilitate the 
use of spy satellites to protect the homeland.
    For the first time in our Nation's history, the Department 
plans to provide satellite imagery to State and local law 
enforcement officers to help them secure their communities. 
While I am all for information sharing with our first 
preventers, it has to happen the right way. Whether the 
National Applications Office is the right way remains to be 
seen.
    What was perhaps most disturbing about the Department's 
announcement, moreover, is that it wasn't an announcement at 
all. This authorizing committee did not learn about the 
National Applications Office from you, Mr. Allen, but from the 
Wall Street Journal. There was no briefing, no hearing, no 
phone call from anyone on your staff to inform any member of 
this committee of why, how, or when satellite imagery would be 
shared with police and sheriffs' offices nationwide.
    Apparently, we weren't the only ones left in the dark. 
Despite my repeated requests that the Department take privacy 
and civil liberties seriously, the privacy officer and civil 
rights and civil liberties officer were not brought into the 
National Applications Office development process until this 
spring, more than a year and a half after the National 
Applications Office started coming together. This is 
unacceptable. The rigorous privacy and civil liberties 
protection must be baked into from the beginning, and your 
Department's experts on these topics were shut out.
    Furthermore, the National Applications Office will be up 
and running in less than 4 weeks. How the working group 
responsible for developing the rules for State and local use of 
spy satellite imagery will complete their work in this time is 
beyond me. Indeed, they only recently began their work.
    We are here today to help to ensure that privacy and civil 
liberties at the Department do not remain the afterthoughts 
that they have apparently been.
    I want to know from our Department witnesses the scope of 
the program, its legal basis, and specifically how 
constitutional protections will be incorporated. I note, 
however, we will be doing it with one hand tied behind our 
back.
    Last week, we invited the Department's Office of General 
Counsel to send an attorney to explain all this. What we got 
instead was a letter from the Department's Acting General 
Counsel stating, I do not feel that it would be useful for me 
to participate as a witness.
    We frankly don't need the Acting General Counsel's advice 
on determining who will be a useful witness and who will not. I 
had a reason and a purpose for asking him to testify, and his 
absence creates a new question that I will seek to have 
answered later.
    I firmly agree that America must use the tools at its 
disposal to prevent another terrorist attack on our soil, but 
we must do so within the confines of the law. Sharing spy 
satellite information with our State and local law enforcement 
simply goes to far more noncontroversial applications. As Kate 
Martin of the Center for National Security Studies has aptly 
stated, this potentially gives rise to a Big Brother in the 
Sky. Like Ms. Martin, I am not convinced that the potential 
impact of all this has been fully considered or that adequate 
protections are in place.
    I look forward to hearing from our witnesses on how the 
Department plans to address these concerns, and from our panel 
of civil rights and civil liberty experts on the consequences 
of failure to get it right. We welcome our panel of witnesses.
    [The statement of Mr. Thompson follows:]

   Prepared Statement of the Honorable Bennie G. Thompson, Chairman, 
                     Committee on Homeland Security

    The Department chose Congress' August recess as the time to 
announce--with great fanfare--the creation of a new National 
Applications Office (NAO) to facilitate the use of spy satellites to 
protect the homeland.
    For the first time in our nation's history, the Department plans to 
provide satellite imagery to state and local law enforcement officers 
to help them secure their communities.
    While I'm all for information sharing with our first preventers, it 
has to happen the right way. Whether the NAO is the `right way' remains 
to be seen. What was perhaps most disturbing about the Department's 
`announcement', moreover, is that it wasn't an announcement at all.
    This authorizing Committee did not learn about the NAO from you, 
Mr. Allen, but from the Wall Street Journal. There was no briefing, no 
hearing, and no phone call from anyone on your staff to inform any 
Member of this Committee of why, how, or when satellite imagery would 
be shared with police and sheriffs' officers nationwide.
    Apparently we weren't the only ones left in the dark.
    Despite my repeated requests that the Department take privacy and 
civil liberties seriously, the Privacy Officer and Civil Rights and 
Civil Liberties Officer were not brought into the NAO development 
process until this spring--more than a year and a half after the NAO 
started coming together.
    This is unacceptable. Rigorous privacy and civil liberties 
protections must be `baked in' from the beginning, and your 
Department's experts on these topics were shut out.
    Furthermore, the NAO will be up and running in less than four 
weeks. How the working group responsible for developing the rules for 
state and local use of spy satellite imagery will complete their work 
in time is beyond me. Indeed, they only recently began their work!
    We're here today to help and to ensure that privacy and civil 
liberties at the Department do not remain the afterthought that they 
have apparently been. I want to know from our Department witnesses the 
scope of the program, its legal basis, and specifically how 
Constitutional protections will be incorporated.
    I note, however, that we'll be doing so with one hand tied behind 
our back. Last week, we invited the Department's Office of General 
Counsel to send an attorney to explain all this.
    What we got instead is a letter from Gus Coldebella, the 
Department's Acting General Counsel, stating, `I do not feel that it 
would be useful for me to participate as a witness,' I frankly don't 
need the Acting General Counsel's advice on determining who will be a 
useful witness and who will not. I had a reason and a purpose for 
asking Mr. Coldebella to testify, and his absence creates new questions 
that I will seek to have answered.
    I firmly agree that America must use the tools at its disposal to 
prevent another terrorist attack on our soil--but we must do so within 
the confines of the law. Sharing spy satellite information with state 
and local law enforcement simply goes far beyond more non-controversial 
applications. As Kate Martin of the Center for National Security 
Studies has so aptly stated, it potentially gives rise to a `Big 
Brother in the Sky.' Like Ms. Martin, I am not convinced that the 
potential impact of all this has been fully considered or that adequate 
protections are in place.
    I look forward to hearing from our witnesses on how the Department 
plans to address these concerns and from our panel of civil rights and 
civil liberties experts on the consequences of failure to `get it 
right.'

    Mr. Thompson. I now yield to the ranking member for his 
statement.
    Mr. King. Thank you, Chairman Thompson. I want to welcome 
the witnesses. I look forward to their testimony.
    I also share Chairman Thompson's concern and frustration 
that this committee was not made aware of this program at an 
early date, early time. Not for any reasons of turf or ego, but 
because if we are to be an effective oversight committee, if 
there is to be an effective relationship between the committee 
and the Department, it is essential that we be brought in at 
the start, not find out about it from press reports after the 
fact.
    I have great regard for Mr. Allen. I am confident this will 
not be repeated in the future. I just want to emphasize that I 
fully agree with the chairman on this that this was not handled 
properly. And, again, we are not just talking about questions 
of technicalities or procedure, we are talking about the 
effectiveness and the legality of the program itself.
    Now, having said that, from the information we have gotten 
over the past several weeks, including a briefing this morning, 
I at this stage do not see constitutional issues. Having said 
that, there is still no reason why--and the reason I say that, 
I don't see a fourth amendment issue here. But, again, as the 
testimony comes out today and as we hear especially from the 
second panel of witnesses, there may be issues raised that 
cause concern.
    And also, it is my understanding that for the most part, if 
not entirely, what is going to be done under this program in a 
comprehensive, coordinated, cohesive way is what has been done 
in an ad hoc way in a variety of ways over the past 30 years. 
So this certainly appears to be a step in the right direction, 
and it is unfortunate we have what may well be a needless 
controversy because we were not brought in early on.
    I also must say to Chairman Thompson, though, that I am 
disappointed that we could not accommodate the requests of the 
DNI to have the Deputy Director of National Intelligence for 
Collection and also the DNI Civil Liberties Protection Officer 
testifying with the governmental witnesses. And, again, this is 
not just a matter of protocol, but I just thought it would add, 
if we are concerned about civil liberties, if we are concerned 
about civil rights, if we are concerned about what protections 
are in place, I believe they should have been allowed to 
testify at the government panel. And by putting them and 
offering them to testify at the second panel in an adversarial 
role, to me, defeats the purpose of what we are trying to do 
here as a committee. So, again, Mr. Chairman, I am disappointed 
in your decision not to give them the opportunity to testify at 
the government panel.
    Having said that, I am sure this panel will give us the 
much needed information we need. I also look forward to the 
testimony of members on the second panel.
    And I think it is important to keep in mind that we are 
talking about here confronting an enemy which is attempting to 
destroy us. It is essential that we do have effective 
surveillance. It is essential that we use all the necessary 
tools. From what I have learned so far, I believe sufficient 
protections are in place. But, again, we could avoid a lot of 
this issue if we had been brought in early on. And certainly 
not just Chairman Thompson and myself, but certainly people 
such as Chairperson Harman who has such a long experience in 
this and is Chair of the relevant committee, and as Chairman 
Conyers of the oversight committee. This would be a lot further 
along I think standing together in a much more bipartisan way 
if it had been done that way from the start.
    So with that, I yield back the balance of my time the 
balance of my time. I thank the chairman for calling this 
hearing, and I look forward to the testimony.
    Chairman Thompson. Thank you very much, Mr. King. Let me 
indicate that we invited DNI to participate on the second 
panel. They refused, as you know. But we are also opened to 
holding additional hearings on this matter going forward.
    We thought it important, since Mr. Allen's shop is 
responsible for this particular program, that they be given 
exclusive panel presentation for this hearing, and for that 
reason we made that decision. But other members of the 
committee are reminded that, under the committee rules, opening 
statements may be submitted for the record.
    I welcome the first panel of witnesses.
    Our first witness, Charlie Allen, is the Department's Chief 
Intelligence Officer. Mr. Allen leads the Department's 
intelligence work through the Office of Intelligence and 
Analysis and focuses on improving the analysis and sharing of 
terrorist threat information.
    Our second witness, Mr. Dan Sutherland, is the Department's 
Officer for Civil Rights and Civil Liberties. Mr. Sutherland 
provides advice to the Secretary and senior department officers 
on a full range of civil rights and civil liberties issues.
    Our third witness, Hugo Teufel, is the Department's Privacy 
Officer. Mr. Teufel is primarily responsible for privacy policy 
at the Department. That includes assuring that the technologies 
used by the Department to protect the United States sustain and 
do not erode privacy protections related to the use, 
collection, and disclosure of personal information.
    Without objection, the witnesses' full statement will be 
inserted in the record. I now ask each witness to summarize his 
statement for 5 minutes, beginning with Mr. Allen.

STATEMENT OF CHARLES ALLEN, CHIEF INTELLIGENCE OFFICER, OFFICE 
 OF INTELLIGENCE AND ANALYSIS, DEPARTMENT OF HOMELAND SECURITY

    Mr. Allen. Chairman Thompson, Ranking Member King, members 
of the committee, thank you for the opportunity to speak about 
the National Applications Office.
    I would like to point out that the National Technical 
Means, such as overhead imagery from satellites, have been used 
for decades lawfully and appropriately to support a variety of 
domestic uses by the U.S. Government's scientific, security, 
and law enforcement agencies. The National Applications Office, 
when operational, will facilitate the use of remote sensing 
capabilities to support a variety of customers, many of whom 
have previously relied on ad hoc processes to access these 
intelligence capabilities.
    The National Applications Office will provide not only a 
well ordered transparent process for its customers, but also 
ensure that full protection of civil rights, civil liberties 
and privacy are applied to the use of those remote sensing 
capabilities. In doing so, it will build on the outstanding 
work of the Civil Applications Committee, known as the CAC, 
which was established in 1975 to advance the use of the 
capabilities of the intelligence community for civil, 
nondefense, national security uses.
    My staff and I have worked closely with the CAC to ensure 
that the standup of the National Applications Office, with the 
broadened mandate to include homeland security and law 
enforcement communities, will still support civil and 
scientific need for geospatial imagery at a robust level. Let 
me give you some background on the standup of the NAO, the 
National Applications Office.
    In April 2005, the Director of National Intelligence, the 
DNI, and the Director of the U.S. Geological Survey 
commissioned an independent study group to review the current 
and future role of the CAC and to study whether the 
intelligence community was employing National Technical Means 
effectively for homeland security as well as law enforcement 
purposes. The study group, led by Mr. Keith Hall, former 
Director of the National Reconnaissance Office, concluded that, 
unlike civil users, many homeland security and law enforcement 
agencies lacked a Federal advocate for the use of National 
Technical Means. The study group's bottom line was, and I 
quote, ``an urgent need for action, because opportunities to 
better protect the Nation are being missed.''
    They recommended unanimously that the DNI establish a new 
program to employ effectively the intelligence community's 
national technical capabilities not only for civil purposes but 
also for homeland security and law enforcement.
    The study group also recommended that the program be 
established within the Department of Homeland Security. In 
response to the study group's recommendation, the Director of 
National Intelligence designated the Secretary of Homeland 
Security as executive agent in late spring 2007 to establish 
the program in the form of a National Applications Office. A 
National Applications Executive Committee, cochaired by the DNI 
and the DHS, will be established to provide senior interagency 
oversight and direction.
    In the past, with the CAC's assistance, scientists have 
used historical and current satellite imagery to study issues, 
such as environmental damage, land use management, and for 
similar purposes research. Similarly, some homeland security 
and law enforcement users also in the past routinely accessed 
imagery and other technical intelligence directly from the 
intelligence community, especially in response to national 
disasters such as hurricanes and forest fires.
    The Department of Homeland Security/U.S. Secret Service has 
used overhead imagery to identify areas of vulnerability based 
on topography and to build large maps to support its security 
planning.
    DHS and Federal law enforcement agencies have used imagery 
to identify potential vulnerabilities of facilities used for 
high-profile events such as the Super Bowl.
    These are all valid, useful, lawful uses of National 
Technical Means that enhance our ability to protect our Nation, 
whether the threats are manmade or naturally occurring.
    The objective of the NAO is to bring all these requirements 
for imagery support under one oversight body where they are not 
only prioritized but reviewed to determine whether the 
requirements are appropriate and lawful.
    In short, the NAO's mission is to serve the right customers 
with the right product at the right time. On a day-to-day 
basis, the NAO will work with civil applications, homeland 
security, and, on a case-by-base basis, law enforcement 
customers to articulate their requirements to determine how our 
satellite imagery systems may be able to satisfy them, and 
submit any validator request to the National Geospatial 
Intelligence Agency for collection tasking.
    The National Applications Office will also be able to 
access through the National Geospatial Intelligence Agency 
commercially available imagery to meet many of the customer 
needs.
    Allow me to state categorically that the National 
Applications Office will have no relationship or interaction 
with either the FISA or the terrorist surveillance programs.
    Now, let me talk about privacy and civil liberties. I am 
very pleased today to have with me my colleagues, Dan 
Sutherland and Hugo Teufel, who will speak in more detail about 
how NAO protects privacy and civil liberties. Since its 
inception, we have considered privacy and civil liberties to be 
at the forefront of the planning of the office.
    The independent study group in 2005 articulated the need to 
protect privacy and civil liberties as a guiding principle. In 
my view, the NAO will strengthen privacy and civil liberties. 
The NAO will be subject to direct oversight by privacy and 
civil liberties offices within both the Department of Homeland 
Security and the Office of the Director of National 
Intelligence. In addition, the National Applications Office 
will have its own legal adviser. At the executive level, the 
DNI's Civil Liberties Protection Officer and its Office of 
General Counsel, as well as DHS's Chief Privacy Officer and 
Officer for Civil Rights and Civil Liberties, will serve as 
advisers to the National Applications Executive Committee, 
which conducts the oversight and guidance. As evidenced today, 
the Congress will provide additional oversight of the NAO.
    Together, these oversight mechanisms will ensure that the 
NAO will protect privacy, civil rights, and civil liberties 
under the highest standards while serving the strength and the 
security of this Nation. I assure you and the American people 
that the appropriate use of National Technical Means 
capabilities will make the Nation safer while maintaining 
strong protections of privacy and civil liberties. The National 
Applications Office will continue longstanding practices of 
employing these capabilities with full regard for the privacy 
and civil liberties of all Americans.
    The rules for lawful and appropriate use for such 
capabilities have not changed. Under all conditions, especially 
in our increasingly uncertain homeland security environment in 
which we face a sustained and heightened threat, it is 
essential that our government use all of its capabilities to 
ensure the safety and well-being of its citizens. The NAO 
brings a critical and sensitive national capability to bear. It 
does so with the full respect for law and the rights our 
citizens cherish. I request your support for this vital 
national program.
    Thank you very much.
    [The statement of Mr. Allen follows:]

      Prepared Statement of the Honorable charles E. Allen, Chief 
           Intelligence, Office of Intelligence and Analysis,

    Chairman Thompson, Ranking Member King, Members of the Committee, 
thank you for the opportunity to speak with you about the National 
Applications Office (NAO). National Technical Means (NTM)--such as 
overhead imagery from satellites--have been used for decades, lawfully 
and appropriately, to support a variety of domestic uses by the US 
government's scientific, law enforcement and security agencies. The 
NAO, when operational, will facilitate the use of remote sensing 
capabilities to support a wide variety of customers, many of whom 
previously have relied on ad hoc processes to access these intelligence 
capabilities. The NAO will provide not only a well-ordered, transparent 
process for its customers but also will ensure that full protection of 
civil rights, civil liberties and privacy are applied to the use of 
these remote sensing capabilities.
    Once initially operational this fall, the NAO will facilitate the 
use of NTM for civil applications and homeland security purposes. A 
third domain, law enforcement, will be a part of the NAO, but will not 
be operational on October 1 to allow additional time to closely examine 
any unique aspects of law enforcement requirements in light of privacy 
and civil liberties. In doing so, it will build on the outstanding work 
of the Civil Applications Committee, known as the ``CAC,'' which was 
established in 1975 to advance the use of the capabilities of the 
Intelligence Community for civil, non-defense uses. My staff and I have 
worked closely with the CAC to ensure that the stand-up of the NAO--
with a broadened mandate to include the homeland security and law 
enforcement communities--will still support civil and scientific need 
for geospatial imagery, at an even more robust level.

             Background of the National Applications Office

    From its inception, the CAC has helped civil and scientific users 
understand how NTM can assist their missions and how to gain access to 
information normally in the hands of the intelligence agencies. With 
the CAC's assistance, for example, scientists have used historical and 
current satellite imagery to study issues such as environmental damage, 
land use management, and for similar purposes of research. The CAC also 
has used imagery to study glaciers and examine the effects of global 
climate change.
    Similarly, some homeland security and law enforcement users in the 
past routinely accessed imagery and other technical intelligence 
directly from the Intelligence Community, especially in response to 
natural disasters such as hurricanes and forest fires. The Department 
of Homeland Security (DHS), for example, used overhead imagery in 2005 
to examine areas damaged by Hurricanes Katrina and Rita to determine 
areas most in need of assistance. The DHS US Secret Service has used 
overhead imagery to identify areas of vulnerability based on topography 
and to build large maps to support its security planning. DHS and 
Federal law enforcement agencies have used imagery to identify 
potential vulnerabilities of facilities used for high-profile events 
such as the Super Bowl. These are all valid, lawful uses of NTM that 
enhance our ability to protect our nation--whether the threats are man-
made or naturally occurring. The objective of the NAO is to bring all 
of these requirements for imagery support under one oversight body, 
where they are not only prioritized but also reviewed to determine 
whether requirements are appropriate and lawful. Allow me to state 
categorically, the NAO will have no relationship or interaction with 
either the FISA or the Terrorist Surveillance Programs.
    Let me provide background on the decision to establish the NAO. The 
Director of National Intelligence (DNI) and the Director of the U.S. 
Geological Survey commissioned an independent study group in early 2005 
to review the current and future role of the CAC and to study whether 
the Intelligence Community was employing NTM capabilities effectively 
for homeland security and law enforcement purposes. The study group, 
led by Mr. Keith Hall, formerly Director of the National Reconnaissance 
Office, concluded that, unlike civil users, many homeland security and 
law enforcement agencies lacked a federal advocate for the use of NTM. 
In addition, the study group determined that many agencies, especially 
at the state and local level, did not know what remote sensing 
capabilities the Intelligence Community possessed that might be useful 
to them or how to request NTM in support of their missions. The study 
group's bottom line was that there was ``an urgent need for action 
because opportunities to better protect the nation are being missed.'' 
It recommended unanimously that the DNI establish a new program to 
employ effectively the Intelligence Community's NTM capabilities not 
only for civil purposes, but also for homeland security and law 
enforcement uses as well.
    In response to the study group's recommendations, the DNI 
designated the Secretary of Homeland Security as Executive Agent in 
late spring 2007 to establish the new program in the form of the NAO. 
As it becomes initially operational this fall, the NAO will work with 
the Intelligence Community to improve access to NTM for domestic users 
in the homeland security and civil applications communities at all 
levels of government, who, heretofore, have not had a structured 
process to request such intelligence. DHS, as executive agent, will 
operate the NAO. A National Applications Executive Committee, co-
chaired by the DNI and DHS, will be established to provide senior 
interagency oversight and guidance. ``This interagency forum will 
ensure the NAO adequately serves those government customers who have 
lawful and appropriate requirements for geospatial intelligence, to 
include classified satellite imagery and derived products.

                         Day to Day Activities

    On a day-to-day basis, the NAO will work with civil applications, 
homeland security, and in the future on a case-by-case basis, law 
enforcement customers, to articulate their requirements, determine how 
our satellite imagery systems may be able to satisfy them, and submit 
any validated requests to the National Geospatial Intelligence Agency 
(NGA) for review, approval and collection tasking. The NAO also will be 
able to access, through NGA, commercially available imagery to meet 
many customer needs.
    The NAO will be advised and supported by three working groups 
representing customer domains: civil applications, homeland security, 
and law enforcement. It should be noted that the law enforcement 
working group will be stood up over the next year, after closely 
examining any unique aspects of law enforcement requirements in light 
of privacy and civil liberties. All three domain working groups will 
include representatives from the DHS Privacy Office and the DHS Office 
for Civil Rights and Civil Liberties as well as an attorney assigned 
directly to the NAO.
    In addition to its day-to-day business of helping its customers 
gain access to NTM, the NAO will help customers take advantage of 
educational opportunities to learn about the Intelligence Community 
remote sensing capabilities, including their benefits and limitations. 
The NAO also will serve as an advocate in Intelligence Community 
discussions about future technology investments that might benefit the 
civil applications, homeland security, and law enforcement domains.

                      Privacy and Civil Liberties

    Since its inception, we have considered privacy and civil liberties 
to be at the forefront of the planning for the NAO. The independent 
study group in 2005 clearly articulated the need to protect privacy and 
civil liberties as a guiding principle in its findings. In my view, the 
NAO--when operational--will strengthen privacy and civil liberties. The 
NAO will be subject to direct oversight by privacy and civil liberties 
offices within both the Department of Homeland Security and the Office 
of the Director of National Intelligence. In addition, the NAO will 
have it own legal advisor. At the executive level, the DNI's Civil 
Liberties Protection Officer and its Office of General Counsel, as well 
as DHS's Chief Privacy Officer and Officer for Civil Rights and Civil 
Liberties Officer, will serve as advisors to the National Applications 
Executive Committee, which will provide executive oversight and 
guidance for the NAO. The President's Privacy and Civil Liberties 
Oversight Board will have oversight of the use of NTM for combating 
terrorism.
    In addition, all requests from the NAO for the use of classified 
satellite imagery will continue to abide by current NGA processes and 
be vetted by NGA attorneys and policy staff to determine legal 
appropriateness before collection tasking occurs. This review provides 
a supplemental level of oversight in addition to the strong protections 
already embedded in the NAO. In this way, both DHS and NGA will ensure 
adherence to applicable law and regulation, and intelligence oversight 
rules. DHS and NGA are bound by intelligence oversight rules, explained 
in Executive Order 12333, that protect the privacy and civil liberties 
of US persons. Further, DHS and NGA are required to report any 
violations of law or other questionable activities to the Intelligence 
Oversight Board of the President's Foreign Intelligence Advisory Board 
including violations of E.O.333. Finally, both DHS and NGA are 
subject to oversight by the House and Senate intelligence committees.

                               Conclusion

    I assure you and the American people that the appropriate use of 
these NTM capabilities will make the nation safer while maintaining the 
privacy and civil liberties of Americans. The NAO will continue long-
standing practices of employing these capabilities with full regard and 
protection for the privacy and civil liberties of Americans. The rules 
for lawful and appropriate use of such capabilities have not changed.
    Under all conditions, and especially in our increasingly uncertain 
homeland security environment in which we face a sustained and 
heightened threat, it is essential that our government use all its 
capabilities to assure the safety and well-being of its citizens. The 
NAO brings a critical and sensitive national capability to bear. It 
does so with full respect for the law and the rights our citizens 
cherish. I request your support for this vital national program.

    Chairman Thompson. Thank you, Mr. Allen, for your 
testimony.
    I now recognize Mr. Sutherland to summarize his statement 
for 5 minutes.

 STATEMENT OF DANIEL W. SUTHERLAND, OFFICER, CIVIL RIGHTS AND 
        CIVIL LIBERTIES, DEPARTMENT OF HOMELAND SECURITY

    Mr. Sutherland. Thank you, Chairman Thompson, ranking 
Member King, and distinguished members of the committee. Thank 
you for giving me the opportunity to speak to you today about 
the civil rights and civil liberties implications of the new 
National Applications Office.
    We believe that the work of the new NAO will reach its 
highest level of effectiveness when it is carried out in a way 
that respects America's rich constitutional history. So I want 
to begin by assuring you that our office, the Office for Civil 
Rights and Civil Liberties, is working very closely with 
Assistant Secretary Allen and his staff and our colleagues in 
the Privacy Office to assure that the new NAO meets that 
highest level of effectiveness. In addition, we look forward to 
continuing to work with the Director of National Intelligence's 
Civil Liberties Protection Officer and the Privacy and Civil 
Liberties Oversight Board as well as this committee on this 
issues. There are a complex range of people who are working on 
these issues, and we have a good working relationship that we 
look forward to building on.
    Just briefly, let me touch on the mission of our office 
generally. In accordance with 6 USC, Section 345, the mission 
of the Office for Civil Rights and Civil Liberties is to assist 
the dedicated men and women of the Department of Homeland 
Security to secure our country while preserving our freedoms 
and our way of life.
    We have worked on issues, almost all the issues that have 
faced the homeland security effort from the Hurricane Katrina 
recovery, to the operation of watch list immigration policy, to 
the training of our workforce. Of course, we collaborate 
extensively with our colleagues in the Privacy Office as well. 
So, just a general layout of our office.
    Let me talk about how it relates to the National 
Applications Office and our work here. I want to highlight 
quickly four reasons why we think that the protection of civil 
liberties should become a core responsibility, a part of the 
basic infrastructure of the NAO.
    The first reason is because the people who lead the program 
have made it clear that they are committed to protecting civil 
liberties. You just heard Assistant Secretary Allen's 
testimony. But, in addition, our office was written into the 
planning for the NAO and our important role was made clear in 
the NAO's concept of operations, and in recent weeks we have 
been working very closely with the NAO, the larger Intelligence 
and Analysis Directorate within which it operates, and a 
variety of these other agencies. And we have established a 
solid working relationship with the NGA where these 
applications will come from.
    So the first reason that we believe that there is a 
protection of civil liberties is that it is being built into 
the infrastructure as we begin to operate the program.
    The second reason why we are optimistic is that we have a 
solid track record of working with our colleagues in 
Intelligence and Analysis on projects such as this. For 
example, our offices have worked together on many initiatives 
relating to radicalization and engagement with American Arab, 
Muslim, Sikh, and South Asian communities, an extremism that 
our country is facing. We described some of that work in 
previous meetings with staff members here and in testimony in 
front of this committee.
    We are also heavily involved in the Department's 
information sharing environment efforts which are led by INA, 
and this year we have begun working on fusion centers and 
helping in terms of training and other work that INA is doing 
in terms of fusion centers.
    So there are numerous other projects that I could specify. 
Those are just a few. We have an increasing and deep working 
relationship with our colleagues in Intelligence and Analysis, 
and so we believe that that is a strong track record we can 
build on.
    Third, the NAO is creating important procedural safeguards 
to protect civil liberties. Just as Felix Frankfurter once 
wrote, the history of liberty has largely been the history of 
the observance of procedural safeguards. In other words, if 
parameters are established, if ground rules are laid out, the 
chances that violations will occur are much less likely, and 
that if those violations occur, they will be limited in scope 
and effect.
    So, Charlie has already referenced several of the 
safeguards. Let me just mention them again.
    First, we are working with the NAO to implement the Con Ops 
for the office. The Con Ops integrates in the protection the 
role of the Civil Rights and Civil Liberties Office as well as 
the Privacy Office.
    Secondly, we are working on the standard operating 
procedures, and will make recommendations related to the extent 
and process for our review of any NAO requests. We have already 
begun working with and are assured that we are going to be 
involved in a variety of different legal and policy working 
groups that are associated with this.
    And, finally, we will serve as formal advisers to the 
National Applications Executive Committee which will be 
established in the upcoming weeks.
    So all of these procedural steps will help ensure that 
privacy and civil liberties issues are fully considered in the 
ongoing work of the NAO.
    So fourth and finally, maybe most importantly, we will 
provide training on these issues. We have already been asked to 
provide training on basic civil liberties protections to the 
staff of the NAO in the upcoming weeks, and we expect to 
accomplish that initial training here in this month. And we 
believe that our training efforts should extend beyond DHS 
employees in the sense of customer education on civil liberties 
as one means of warding off potential misuse.
    I want to thank you for inviting me to share our thoughts 
on the National Applications Office, and I look forward to 
working with this committee to provide oversight of this 
important program. Thank you.
    [The statement of Mr. Sutherland follows:]

                Prepared Statement Daniel W. Sutherland

Introduction
    Chairman Thompson, Ranking Member King and distinguished Members of 
this Committee: Thank you for providing me the opportunity to testify 
today on the National Applications Office (NAO) and the civil rights 
and civil liberties implications of its work. The work undertaken by 
the new NAO within our Department will be an asset to the country's 
homeland security effort, and NAO will reach its highest level of 
success when accomplished in ways that respect America's rich 
Constitutional history. I want to begin by assuring the Committee that 
the Office for Civil Rights and Civil Liberties is engaged with 
Assistant Secretary Allen and his staff and our colleagues in the 
Privacy Office to ensure that the NAO reaches the highest level of 
effectiveness. In addition, I look forward to continuing to work with 
our colleagues in the Office of the Director of National Intelligence's 
Civil Liberties Protection Officer, the Privacy and Civil Liberties 
Oversight Board and this Committee to provide strong oversight of the 
NAO.

The Mission of the Office for Civil Rights and Civil Liberties
    In accordance with 6 U.S.C. Sec. 345, the mission of the Office for 
Civil Rights and Civil Liberties is to assist the dedicated men and 
women of the Department of Homeland Security (DHS) to secure our 
country while preserving our freedoms and our way of life. We assist 
our colleagues in four ways:
         We provide proactive advice on a wide range of issues, 
        helping the Department to shape policy in ways that are mindful 
        of civil rights and civil liberties;
         We investigate and facilitate the resolution of 
        complaints filed by the public regarding Departmental policies 
        or actions taken by Departmental personnel;
         We provide leadership to the Department's equal 
        employment opportunity programs, seeking to make this 
        Department the model Federal agency; and,
         We serve as an information and communications channel 
        with the public regarding these issues.
    In essence, we provide advice to our colleagues on issues at the 
intersection of homeland security and civil rights and civil liberties. 
We therefore have the opportunity to work closely with every DHS 
component, both in Washington, D.C., and in many field offices across 
the country. Our Office has been involved in nearly all aspects of the 
critical issues facing the homeland security effort--from the Hurricane 
Katrina recovery, to the operation of watch lists, to immigration 
policy, to the training of our workforce.
    Because our Office is small, we realize that we must, to use a 
sports analogy, ``punch above our weight.'' One way we have 
accomplished this is by creating the ``Civil Liberties Institute,'' a 
program to provide high-quality training on a wide range of topics.
    Through the ``Civil Liberties Institute,'' we have developed:
         a training video that emphasizes elements of the 
        National Detention Standards;
         a multi-hour instructional video on how to screen 
        people with disabilities at airports;
         educational materials on how to screen those who wear 
        religious head coverings;
         an intensive training DVD for DHS personnel who 
        interact with Arab Americans, Muslim Americans, and people from 
        the broader Arab and Muslim world; and,
         ``Guidance Regarding the Use of Race for Law 
        Enforcement Officers,'' a tutorial on the Department of 
        Justice's Guidance and the DHS policy.
    These materials are available to DHS law enforcement employees in 
DVD, CD-ROM, or via on-line web-based training formats.
    Of course, we collaborate extensively with our colleagues in the 
Privacy Office. We work closely with colleagues from the Office of the 
Director of National Intelligence (DNI), the Privacy and Civil 
Liberties Oversight Board (PCLOB), and others across the government.
    The work of the Office for Civil Rights and Civil Liberties has 
been supported by other DHS elements because we provide constructive 
advice that allows the men and women of the Department to fulfill their 
mission at the highest level of effectiveness. Our work has also been 
welcomed by colleagues outside of government, as demonstrated by our 
frequent collaborations with leading civil rights, civil liberties, 
immigration, and community organizations. Our Office plays a unique 
role within DHS, and, we hope, a valuable one, and we will continue to 
assist our colleagues to tackle complex issues in innovative and 
constructive ways.

    The Office for Civil Rights and Civil Liberties' Role in the 
National Applications Office
    Having laid out the role of our Office, let me address the specific 
topic of the National Applications Office. I would like to highlight 
four reasons why the protection of civil liberties will become a core 
responsibility--part of the basic infrastructure--of the National 
Applications Office.
    First, the people who lead the program have made it clear that they 
are committed to protecting civil liberties. The Office for Civil 
Rights and Civil Liberties was written into the planning for the NAO 
and our important role is made clear in the NAO Concept of Operations 
(CONOPS). In recent weeks, we have been working very closely with the 
NAO, the DHS Office of Intelligence and Analysis (I&A) within which the 
NAO functions, the DHS Privacy Office, the DNI, the PCLOB, and the 
National Geospatial-Intelligence Agency (NGA). The Office for Civil 
Rights and Civil Liberties has established a solid working relationship 
with our colleagues in each of these organizations. The commitment to 
establishing safeguards to protect, and indeed enhance, our civil 
liberties has been front and center of all of these discussions. We 
believe that a great foundation has been laid for working together over 
the upcoming weeks, months and years.
    Second, we have a solid track record of working with our colleagues 
in I&A on complex projects such as this. Our offices have worked 
together on many initiatives related to extremism and radicalization. 
Assistant Secretary Allen and his colleagues at I&A are great 
supporters of our work to engage with the American Arab, Muslim, Sikh 
and South Asian communities, the fruits of which we have described in 
prior meetings with your staffs and in testimony before this Committee. 
We are heavily involved in the Department's Information Sharing 
Environment efforts led by I&A, and we are also taking a leadership 
role with respect to government-wide efforts lead by the Program 
Manager for the Information Sharing Environment at DNI. This year we 
have begun to partner with I&A to train personnel and develop sound 
civil rights and civil liberties policies and procedures for State and 
local fusion centers. There are numerous other projects for which our 
offices consult each other on a regular basis. This strong track record 
reassures us that we will be in a good position to advise the NAO for 
the long term.
    Third, the NAO is creating important procedural safeguards to 
protect civil liberties. Justice Felix Frankfurter once wrote, ``The 
history of liberty has largely been the history of the observance of 
procedural safeguards.'' \1\ That is, if parameters are established, if 
ground rules are laid out, the chances that violations will occur are 
much less likely and are much more likely to be limited in scope and 
effect. There are several significant safeguards that are being built 
into the NAO's infrastructure. First, we are working with NAO to 
implement the CONOPS for the office. The CONOPS includes a prominent 
role for our Office and the Privacy Office to provide support and 
guidance to the NAO, and will allow us to be embedded into the work of 
the NAO. Similarly, we will review the Standard Operating Procedures 
(SOP) and make recommendations related to the extent and process for 
our review of NAO requests for NGA Products and Services. We have 
already been assured that we will be part of the Policy and Legal 
Working Group, co-chaired by DNI and DHS, which we and the Privacy 
Office will participate in along with all relevant NAO sub-working 
groups. In addition, together with the Privacy Office and DNI's Civil 
Liberties Protection Officer, we will serve as formal advisors to the 
National Applications Executive Committee, which will be established in 
the upcoming weeks. All of these procedural steps will help ensure that 
privacy and civil liberties issues are fully considered in the on-going 
work of the NAO.
---------------------------------------------------------------------------
    \1\ McNabb v. United States, 318 U.S. 332, 347 (1943).
---------------------------------------------------------------------------
    Fourth and finally, we will provide training on these issues. We 
and the Privacy Office have already been asked to lead a training 
session on civil liberties and privacy protections to the new staff of 
the NAO. We expect that this training, which is anticipated to be 
scheduled for later this month, will only be the first of many such 
efforts. We believe that our training efforts should extend beyond DHS 
employees. For example, we will lead an effort for ``customer 
education'' on civil liberties as one means of warding off potential 
misuse.

Civil Liberties and the Domestic Use of Geospatial Imagery and Derived 
Products and Services
    As we undertake our work, we will assist the NAO effort by keeping 
a watchful eye on several key potential civil liberties issues. We will 
carefully watch:
         The expansion of customers and increased use of 
        geospatial imagery and derived products and services to ensure 
        that the increased volume does not lead to mistakes. As the NAO 
        customer base increases, it will likely receive many more new 
        project requirements, potentially posing an increased risk that 
        improper requests will be approved in error, with a concurrent 
        increased risk to civil liberties. We will help our colleagues 
        at NAO to ensure that quantity does not result in sacrifices of 
        quality.
         NGA provides a legal and policy review of all Federal 
        requests for domestic geospatial intelligence (GEOINT). NGA has 
        a long-established process to review domestic requests to 
        ensure compliance with the law and Intelligence Oversight 
        rules. That process employs the Proper Use Memorandum (PUM). A 
        PUM is a memorandum between the requesting agency and NGA 
        outlining the parameters of permissible requests. A PUM 
        includes the requesting agency's authorized mission permitting 
        use of such information, a description of the intended use of 
        the domestic imagery, who will exploit the domestic imagery, 
        who will receive the domestic imagery and derived products, 
        storage and protection of the imagery, and certification by an 
        appropriate official of the lawfulness and validity of the 
        request. We will work with the NAO to ensure that the NAO's-
        sponsored PUMs submitted to NGA contain the appropriate 
        parameters and authorities. We will also work with NAO to 
        ensure that requests received and information provided fit 
        within the contours of these PUMs.
         The NAO will review all State and local law 
        enforcement requests for the use of NGA products and services. 
        NAO will forward their vetted requests to NGA for legal and 
        policy review and final approval. Domestic requests for NGA 
        products and services will only be approved if they comply with 
        applicable legal requirements, including, but not limited to, 
        Executive Order 12333, and would not result in an unreasonable 
        search under the Fourth Amendment. Our Office will monitor 
        proposed efforts by law enforcement users involving novel uses 
        of geospatial imagery and derived products and services or 
        those which approach the limits of existing civil liberties 
        standards in this area. We will address those issues in the 
        planning phase and as they arise in the future.
         As geospatial imagery and derived products and 
        services are added to other data to form products for 
        dissemination throughout the information sharing environment, 
        civil liberties and civil rights concerns may arise. As these 
        products are developed, we anticipate that there may be 
        potential concerns related to access to those products, 
        retention of images or data, and the reliability of the data 
        and use of data. We will address those issues in the planning 
        phase and as they arise in the future.

Conclusion
    The Office for Civil Rights and Civil Liberties will work with the 
NAO to establish a firm and certain foundation that provides strong 
adherence to civil rights and civil liberties. We will closely monitor 
and address the areas I have mentioned and other issues that may arise. 
Building upon our success in civil rights and civil liberties 
compliance and training, and our track record of close cooperation with 
DHS components, we will work with the DHS Privacy Office, I&A, the 
Civil Liberties Protection Officer at DNI and the Privacy and Civil 
Liberties Oversight Board to protect and preserve civil liberties as 
NAO begins operations to help the government ensure the safety and 
well-being of our citizens.
    I thank you for inviting me to share our thoughts on the National 
Applications Office today, and I look forward to working with this 
Committee to provide oversight of this important program.

    Chairman Thompson. Thank you, Mr. Sutherland, for your 
testimony.
    I now recognize Mr. Teufel to summarize his statement for 5 
minutes.

STATEMENT OF HUGO TEUFEL, CHIEF PRIVACY OFFICER, DEPARTMENT OF 
                       HOMELAND SECURITY

    Mr. Teufel. Thank you very much, Chairman Thompson, Ranking 
Member King, members of the committee, Mr. Perlmutter from my 
home State of Colorado.
    I want to thank you for the opportunity to discuss the 
Privacy Office's efforts to protect privacy within the National 
Applications Office of the Department of Homeland Security, and 
I will be brief in my remarks.
    I want to assure the committee that the Privacy Office is 
engaged with the Assistant Secretary and his staff, and our 
colleagues in the Office of Civil Rights and Civil Liberties 
and with the Office of the Director of National Intelligence's 
Civil Liberties Protection Office to ensure that the NAO will 
operate transparently and in full compliance with all statutory 
and policy requirements, including privacy.
    As the NAO develops, we will continue to identify privacy 
risks and fashion protections to mitigate or eliminate those 
risks. The NAO prioritizes the protection of privacy and civil 
liberties. All activities of the NAO fall under existing legal 
authorities, including Executive Order 12333 and the Privacy 
Act.
    I want to stress, as the program stands today, there has 
been no collection, use, or maintenance of records about 
individuals as covered under the Privacy Act. Moreover, the 
Privacy Impact Assessment, PIA, of the NAO undertaken by my 
office and Mr. Allen's staff identified that the necessary 
safeguards were in place on the processes of the NAO providing 
appropriate privacy protections. Of course, we will continue to 
work with the NAO to see that NAO continues to establish and 
maintain privacy protections throughout the development and 
implementation of this new effort, and we will be vigilant in 
our oversight responsibilities to ensure continued compliance 
with privacy law and Federal policies regarding the collection, 
use, maintenance, and dissemination of records.
    Two other things I want to add. First is, the Civil 
Applications Committee is not something that was new to me. I 
served as the Department of the Interior's Associate Solicitor 
for General Law from June of 2001, July of 2001, until January 
of 2004. And as one of a handful of attorneys within the 
Solicitor's Office with SCI access, the CAC was one of my 
clients.
    Other than the use of National Technical Means for map 
making and environmental uses, there was an ad hoc approach to 
the use of NTM, with NGA attorney and programmatic oversight, 
but not much else. So I can tell you that with the movement of 
the CAC and these responsibilities over to the NAO, there is 
far greater and layered oversight than existed previously.
    Two, I want to stress to you, since I became the privacy 
officer at the Department, my office has increased focus on 
intelligence and the intelligence community. We have been 
working with INA and our colleagues over at CRCL since the 
beginning on intelligence issues. And, I want to note that as a 
matter of policy, not as a matter of law because Section 208 of 
the E-Government Act exempts the intelligence community, we 
notwithstanding that exemption as a matter of policy since the 
beginning of the Department, have as a matter of policy that we 
will conduct privacy impact assessments on activities of 
intelligence and analysis, and we did so in this case.
    Additionally, throughout my office everyone involved in any 
way with INA or the intelligence communities is undergoing 
intelligence training on law and policy. I, myself, have been 
through the Army JAG School's intelligence law course at 
Charlottesville and, in completion of my master's program at 
the Naval War College, am currently enrolled in an intelligence 
and homeland security course.
    So we take this very seriously, and we want to better 
understand the intelligence community so that we can do a 
better job of overseeing what it is that Intelligence and 
Analysis does generally and with respect to NAO.
    With that, I am concluded. Thank you very much.
    [The statement of Mr. Teufel follows:]

                 Prepared Statement of Hugo Teufel, III

Introduction
    Chairman Thompson, Ranking Member King, and Members of the 
Committee, I thank you for the opportunity to discuss the Privacy 
Office's efforts to protect privacy within the National Applications 
Office (NAO) of the Department of Homeland Security (DHS).
    I want to begin by assuring the Committee that the Privacy Office 
is engaged with Assistant Secretary Allen and his staff, our colleagues 
in the Office for Civil Rights and Civil Liberties, and with the Office 
of the Director of National Intelligence's (ODNI) Civil Liberties 
Protection Office to ensure the NAO will operate transparently and in 
full compliance with all statutory and policy requirements, including 
privacy. As the NAO develops, we will continue to identify privacy 
risks and fashion protections to mitigate or eliminate those risks. The 
NAO prioritizes the protection of privacy and civil liberties. All 
activities of the NAO fall under existing legal authorities, including 
Executive Order 12333 and the Privacy Act. I want to stress, as the 
program stands today, there has been no collection, use or maintenance 
of records about individuals as covered under the Privacy Act. 
Moreover, the Privacy Impact Assessment (PIA) of the NAO undertaken by 
my office and Mr. Allen's staff identified that the necessary 
safeguards where in place on the processes of the NAO providing 
appropriate privacy protections. Of course, we will continue to work 
with the NAO to see NAO continues to establish and maintain privacy 
protections throughout the development and implementation of this new 
effort, and we will be vigilant in our oversight responsibilities to 
ensure continued compliance with privacy law and Federal policies 
regarding the collection, use, maintenance, and dissemination of 
records.

The Privacy Office Interaction with Intelligence and Analysis
    The Privacy Office believes it is never too early for a component 
or program to engage our office. Programs operate effectively and 
privacy interests are best served when privacy protections are 
considered in the earliest stages of program or system development. We 
call our efforts to embed privacy into Departmental programs in the 
earliest stages ``operationalizing privacy.'' Frequent privacy 
training--at the time of hire and annually thereafter--active 
involvement in the technology investment review process, and issuance 
of our Privacy Technology Implementation Guide are just a few examples 
of the tools the Privacy Office uses to encourage operationalizing 
privacy within the Department. The Government Accountability Office 
(GAO) acknowledged our gains in this important goal during its recent 
review of our office. Still, in an organization as large as DHS, one of 
our biggest challenges is keeping abreast of individual programs in 
their very earliest moments of conception. We rely very heavily on 
components to seize upon the lessons of our outreach and notify us of 
their future plans, even if the contemplated use of PII is remote.
    My staff became part of the NAO's Policy and Legal Working Group in 
November 2006. The purpose of this working group was, and is, to advise 
the Director of the NAO and the implementation planning team on issues 
related to the formation and anticipated operation of this new 
Departmental initiative. The Privacy Office's role in the group is to 
ensure strict compliance with all applicable privacy law and policies.
    The most significant result of this initial, but limited, 
interaction was the issuance of the NAO Concept of Operations (CONOPS). 
The CONOPS commits the NAO staff to conduct their authorized functions 
effectively while ensuring that their activities affecting U.S. Persons 
are conducted in a manner that protects privacy and constitutional 
rights. The CONOPS further commits the Privacy Office, along with the 
Office for Civil Rights and Civil Liberties, to provide support and 
guidance to the NAO, and recommend steps to reconcile the need to use 
domestic information with the keystone requirement of protecting the 
privacy and civil liberties of U.S. persons. DHS will also assure any 
future updates to the NAO CONOPS are reviewed by the Privacy Office in 
accordance with Privacy Office guidance. The governance structure calls 
for the DHS' Director of Operations Coordination to review the program 
annually, including its compliance with privacy requirements, and 
includes our offices and our colleagues at the ODNI Civil Liberties 
Protection Office as advisors to the National Applications Executive 
Committee.
    The Privacy Office became more involved with NAO during the 
iterative PIA process. I&A and the Privacy Office worked together for 
several months to draft a PIA cataloging and documenting both potential 
privacy risks and the steps the Department will take to mitigate these 
risks.

The NAO Privacy Impact Assessment
    The E-Government Act of 2002 requires agencies to conduct a PIA 
when developing or procuring IT systems or projects that collect, 
maintain, or disseminate information in an identifiable form or about 
members of the public. The Department has pioneered the use of PIAs 
beyond what the E-Government Act requires in two ways which are 
relevant to our work with the NAO.
    First, the Privacy Office recognized that privacy can be impacted 
by offices, such as the NAO, policies, and rules of the Department, in 
addition to information technology. Therefore, as a matter of policy 
the Privacy Office conducts PIAs to examine these offices, policies, 
and rules, as well, even though it is not required to under the E-
Government Act. These PIAs examine the application of the Fair 
Information Practice Principles (FIPPs) to the policy or, in this case, 
the office. The eight FIPPs are rooted in the tenets of the Privacy Act 
and govern the appropriate use of personally identifiable information 
(PII) at the Department.\1\ They are:
---------------------------------------------------------------------------
    \1\ The Department's PIA Guidance defines PII as ``any information 
that permits the identity of an individual to be directly or indirectly 
inferred, including any information which is linked or linkable to that 
individual regardless of whether the individual is a U.S. citizen, 
lawful permanent resident, visitor to the U.S., or employee or 
contractor to the Department.'' Section 208 of the E-Gov Act requires 
agencies to conduct a PIA for systems which collect, maintain, or 
disseminate information in an identifiable form, which is defined as 
``any representation of information that permits the identity of an 
individual to whom the information applies to be reasonably inferred by 
either direct or indirect means.'' (P.L. 107-347)
---------------------------------------------------------------------------
        1. Transparency: DHS should be transparent and provide notice 
        to the individual regarding its collection, use, dissemination, 
        and maintenance of PII. Technologies or systems using PII must 
        be described in a SORN and PIA, as appropriate. There should be 
        no system whose existence and purpose is a secret.
        2. Individual Participation: DHS should involve the individual 
        in the process of using PII. DHS should, to the extent 
        practical, seek individual consent for the collection, use, 
        dissemination, and maintenance of PII and should provide 
        mechanisms for appropriate access, correction, and redress 
        regarding DHS's use of PII.
        3. Purpose Specification: DHS should specifically articulate 
        the authority which permits the collection of PII and 
        specifically articulate the purpose or purposes for which the 
        PII is intended to be used and shared.
        4. Data Minimization: DHS should only collect PII that is 
        directly relevant and necessary to accomplish the specified 
        purpose(s) and only retain PII for as long as is necessary to 
        fulfill the specified purpose(s). PII should be disposed of in 
        accordance with DHS records disposition schedules as approved 
        by the National Archives and Records Administration (NARA).
        5. Use Limitation: DHS should use PII solely for the purpose(s) 
        specified in the notice. Sharing PII outside the Department is 
        limited to purposes compatible with the purpose for which the 
        PII was collected.
        6. Data Quality and Integrity: DHS should, to the extent 
        practical, ensure that PII is accurate, relevant, timely, and 
        complete, within the context of each use of the PII.
        7. Security: DHS should protect PII (in all forms) through 
        appropriate security safeguards against risks such as loss, 
        unauthorized access or use, destruction, modification, or 
        unintended or inappropriate disclosure.
        8. Accountability and Auditing: DHS should be accountable for 
        complying with these principles, providing training to all 
        employees and contractors who use PII, and should audit the 
        actual use of PII to demonstrate compliance with these 
        principles and all applicable privacy protection requirements.
    Second, as a matter of policy, the Privacy Office conducts PIAs on 
national security systems, which are exempted from the requirement 
under Title II of the E-Government Act (Section 202(i)); although, 
consistent with the need to protect the processes associated with 
national security, the Privacy Office refrains from publishing these 
PIAs on our public facing website, www.dhs.gov/privacy.
    This broad use of the PIA beyond the strict requirements of the E-
Government Act is consistent with the Privacy Officer's authority under 
Section 222 of the Homeland Security Act of 2002 to assure that the use 
of technologies sustain, and do not erode, privacy protections relating 
to the use, collection, and disclosure of personal information. We have 
found that PIAs are an invaluable tool for programs to understand how 
their use of information impacts privacy. In addition, PIAs enhance the 
confidence the public has in the steps DHS takes to protect privacy. 
Thus, I was pleased to see GAO report that our office had made 
significant progress in both the number and quality of PIAs issued by 
the office.
    On June 15, 2007, the Department issued a PIA for the NAO. I&A 
shared it with various Congressional Committees, and I know this 
Committee has now seen it as well. The document is For Official Use 
Only and, therefore, was not made public--and I am limited in what I 
can say about it here. Nonetheless, the PIA examined the application of 
the FIPPs to the NAO as it is presently planned. At this time, privacy 
concerns are nominal because the NAO does not presently anticipate 
routinely using or maintaining PII. Should this change, all notice, 
comment and oversight requirements imposed by the Privacy Act, the 
Privacy Office, and, I'll add, the DHS Office for Civil Rights and 
Civil Liberties, will be strictly followed. This PIA, like every other 
issued by the Department, will be updated as often as is required. In 
fact, we anticipate issuing a new version of the PIA soon incorporating 
additional views; when the revision is complete, we will of course 
share it with this Committee.
    Finally, I want to note that in order to improve our ability to 
conduct privacy oversight for I&A, Privacy Office staff, including the 
Chief Privacy Officer, are undergoing training on intelligence law and 
the intelligence community, to better understand that community's 
mission and legal constraints. The Senate Select Committee to Study 
Governmental Operations with Respect to Intelligence Activities, the 
``Church Committee,'' and the report of the Rockefeller Commission, are 
all required reading in our office. We are mindful of the abuses of the 
past and we are determined that those abuses not be repeated at our 
Department.

The Privacy Office and Office for Civil Rights and Civil Liberties and 
ODNI's Civil Liberties Protection Office
    I am particularly pleased to be appearing today with the Officer 
for Civil Rights and Civil Liberties, Dan Sutherland. His office and 
mine share a statutory obligation to work together to ensure programs, 
policies and procedures involving civil rights, civil liberties, and 
privacy considerations are addressed in an integrated and comprehensive 
manner.
    Both Mr. Sutherland and I have strived to give maximum effect to 
this statutory obligation. In addition to our frequent consultation, 
our staffs have instituted bi-weekly calls to ensure the close level of 
cooperation contemplated by the Homeland Security Act. The NAO is 
another opportunity for our offices to work together and coordinate our 
policies relating to privacy and civil rights and civil liberties.
    Our office has developed a very close working relationship, as 
well, with our colleagues at the ODNI's Civil Liberties and Protection 
Office, which is charged with ensuring appropriate protections for 
privacy and civil liberties are incorporated in the policies and 
procedures of elements of the intelligence community within the 
National Intelligence Program, including DHS. I am pleased to be 
appearing today with Mr. Joel, who heads the ODNI's Civil Liberties 
Protection Office.
    Our combined efforts on training and oversight will be critical to 
the success of the NAO.

Conclusion
    The Privacy Office is committed to ensuring the NAO will be a 
success, both in terms of forwarding the critical missions of the 
Department and the United States Government to ensure the safety and 
well-being of our citizens, and equally in preserving the privacy 
protections the American public has a right to expect. I believe the 
NAO will not only preserve, but strengthen, these privacy protections.
    This will require close cooperation between my office, the Office 
for Civil Rights and Civil Liberties, Assistant Secretary Allen and his 
staff, the Privacy and Civil Liberties Oversight Board, and the Office 
of the Director of National Intelligence. Together we will provide 
guidance, train staff and program participants, facilitate outreach 
with the privacy and civil liberties advocacy community, and exercise 
our oversight role zealously. We will continue to monitor the evolution 
and operation of the NAO to ensure the use of PII is done so in 
accordance with all applicable laws and policies. We will update the 
PIA as necessary, and will, of course, be happy to report our findings 
back to this Committee at any time.
    I thank the Committee for this opportunity to testify about the NAO 
and its privacy compliance documentation, as well as the Privacy 
Office's role in moving the program forward successfully. I look 
forward to answering your questions.

    Chairman Thompson. Thank you very much. I would like to 
thank the witnesses for their testimony. I remind each member 
that he or she will have 5 minutes to question the panel. I 
will now recognize myself for questions.
    Mr. Allen, one of the concerns that I think you heard 
earlier this morning is that, at present, we have not or you 
have not developed the written policies for the implementation 
of this new program. And you further indicated that if that was 
not the case by October 1, you would in fact delay the rollout 
of this program. Is that still your opinion?
    Mr. Allen. Mr. Chairman, what I indicated is that we have 
been working on issues and the concept of operations. That has 
been finished and submitted, I believe, to Capitol Hill, 
including your office. We are working on guidelines, we are 
working on standard operating procedures.
    Chairman Thompson. Excuse me. I am not certain if we have 
that.
    Mr. Allen. If you don't, I was informed that you do, but I 
will verify that and get back to you, Mr. Chairman. But we do 
have a concept of operations. We are finishing guidelines and 
standard operating procedures, and looking at how to staff and 
stand up the organization. We think we can certainly meet the 
requirement that you all indicated that you wanted to have, a 
greater framework to understand the legal basis, which I think 
Mr. Teufel just spoke to at least in part, because we are not 
asking for new authorities or new forms of legislation, because 
this operates under the National Security Act of 1947, the 
Executive Order 12333, the Homeland Security Act of 2002, and, 
as Mr. Teufel said, under the Privacy Act we meet all those 
standards. We will give you that framework and the guidelines 
that we have developed, Mr. Chairman.
    Chairman Thompson. Thank you. I want you to understand that 
if the authorizing committee asked you today for the written 
protocol by which you will operate this program, we do not have 
it in a form that you can present it to us. Am I correct?
    Mr. Allen. I think we can provide that to you in short 
order, because we do have the concept of operations, we do have 
the privacy impact assessment. We operate, as you know, and we 
do have guidelines and SOPs. We can provide you with 
significant data.
    Chairman Thompson. I think it is important for you to 
provide this committee with all of the information that you 
propose to operate this program going forward. Do you have a 
timetable under which we can expect receipt of this 
information?
    Mr. Allen. We will provide you the concept of operations 
today. I thought your committee had it; and, if it doesn't, I 
apologize.
    Chairman Thompson. Now, just to talk about a few items 
associated with this rollout. Is it your understanding that the 
Privacy and Civil Liberties Oversight Board participated in the 
development of this National Applications Office?
    Mr. Allen. The Privacy and Civil Liberties Officer----
    Chairman Thompson. Not office. The board.
    Mr. Allen. The White House board. It is aware and has been 
informed of this particular National Applications Office and 
the fact it is to be stood up. Yes.
    Chairman Thompson. Well, if you will provide this committee 
with any communication associated with that board's 
notification and participation in the development of this 
project, in addition to the earlier requests, then I will be 
satisfied. There is some question as to whether they really 
know, Mr. Allen, and I want you to understand that.
    Mr. Allen. Thank you. We will take that for the record and 
get back to you.
    Chairman Thompson. Mr. Sutherland, since this program is 
about to be rolled out October 1, can you provide this 
committee with when you first participated in the review?
    Mr. Sutherland. Yes, sir. Our office was drawn in in late 
July.
    Chairman Thompson. Of this year?
    Mr. Sutherland. Of this year, yes, sir. Our colleagues at 
the DNI, the Civil Liberties Protection Office, were drawn in 
in the fall of last year. Our colleagues at the Privacy Office 
I know can speak to this more, but were more clearly involved 
as the spring came along, and we were drawn in the last few 
weeks.
    Chairman Thompson. Is your involvement at this point--just 
explain your involvement.
    Mr. Sutherland. Yes, sir. We have been extremely integrally 
involved over the past few weeks. We are working on helping to 
develop the standard operating procedures for the NAO. We are 
beginning to work on some of the legal and policy working 
groups that are going to be stood up as the executive committee 
begins. And so we have been working, getting briefings on the 
intricacies of the program both at NGA and at NAO, so we have a 
full understanding of the program and how it works.
    Chairman Thompson. Thank you very much. I think my concern 
is that, for the most part, the program was developed and 
presented to you before you were involved in it.
    Mr. Sutherland. I am sorry, sir. Again?
    Chairman Thompson. If the program was introduced in August 
and you first saw it in July, for all intents and purposes it 
was complete.
    Mr. Sutherland. If I could use a football analogy. We were 
brought in in the pre-season. The regular season is going to 
kick off October 1. We do believe, and Assistant Secretary 
Allen has said, we should have been brought in earlier. But we 
do have colleagues in the privacy and civil liberties community 
who were working on these issues earlier. But there is no doubt 
we should have been brought in earlier, but we are at a stage 
now where we feel comfortable we are able to make a large 
impact and really benefit the NAO with our expertise.
    Chairman Thompson. Thank you very much.
    I yield to the ranking member for questions.
    Mr. King. Thank you, Mr. Chairman.
    First of all, thank you for your testimony. It is my 
understanding that the conversation between you, Mr. Allen, and 
the concept of operations and privacy impact assessment were 
given to staff of the committee on August 17. I think this is 
the document we are talking about. But, in any event, I have it 
here.
    I have listened carefully to your testimony and I would 
like to know, is there anything that is going to be done under 
this program which has not been done ad hoc up until now or 
could have been done ad hoc up until now?
    Mr. Allen. Congressman King, there is nothing new in the 
sense we have done this in the past for homeland security when 
we have had hurricanes, disasters. The Civil Applications 
Committee is well established, and it still has to go through 
the whole review of NGA attorneys before any of its requests 
are acted upon.
    As far as law enforcement, we haven't begun that. We are 
going to stand up a working group between ourselves, DHS 
attorneys, DNI, and Department of Justice.
    So there is nothing new. It will be a broader customer 
base, I believe, once we are able to tell the nondefense 
community more about what might be available to support them 
for homeland security affairs. But the science applications 
will continue, and we hope to make them stronger than they are 
today.
    Mr. King. Now, has this been shared with law enforcement 
before?
    Mr. Allen. There is a Legal Law Enforcement Working Group 
that is standing up of Justice, the Director of National 
Intelligence, and the Department of Homeland Security. They are 
aware of it and they are looking at applications. As you know, 
we have on an ad hoc basis the National geospatial Intelligence 
Agency under the egress of both the DCI and now the DNI and has 
supported the Secret Service, supported the FBI in certain 
applications. But those have been for national security events 
where geospatial imagery can be of assistance in helping 
protect major events.
    Mr. King. My understanding was, when we had the D.C. 
snipers 5 years ago, wasn't this program used then?
    Mr. Allen. Yes. Congressman King, I was requested by the 
Director of Central Intelligence, George Tenet at the time, 
acting on a request from Director Mueller, to image the 
interchanges between Pennsylvania and North Carolina, because 
of the killings that could occur and had occurred along the 
interstate, because the Bureau wanted the National Geospatial 
Intelligence Agency to outline the sites, places where snipers 
might hide. It was used, and Director Mueller, as I recall, was 
very gratified.
    Mr. King. I am trying to determine whether constitutional 
issues may arise here. Is there any thermal imaging involved in 
this program?
    Mr. Allen. As far as----
    Mr. King. As far as being able to penetrate residences.
    Mr. Allen. No. We will not penetrate residences. This is 
not going to penetrate buildings. There can be some infrared 
collection of space to look at forest fires, hot spots. We have 
used this to support the National Fire Service for decades. 
This was used long before the proposal was made to establish a 
National Applications Office.
    Mr. King. If I could ask then, Mr. Sutherland and Mr. 
Teufel, both of you, is there any Supreme Court case on point 
involving a fourth amendment issue which would pertain to 
anything which would come under this program?
    Mr. Sutherland. We are----
    Mr. Teufel. Coordinating.
    Mr. Sutherland. --coordinating our thoughts on the Supreme 
Court litigation. There is Supreme Court litigation that sets 
the parameters under which we will evaluate the program. There 
was the Supreme Court case a few years ago on thermal imaging 
that you are talking about. But, to date, we have seen nothing 
that implicates that litigation. I mean, that litigation and 
those decisions lay the contours, the parameters under which we 
will evaluate the specific requests that are made.
    Mr. Teufel. There is the CAC's decision about the language 
with reasonable expectations of privacy, and there is well 
established case law on when law enforcement can fly over in 
air space and take pictures. But understand that, while we are 
both lawyers, we are not practicing as lawyers currently in our 
positions.
    Mr. King. I guess I am getting at, there has been talk 
about spies in the sky and spying and snooping and everything 
else. But I am just wondering if there is anything under this 
program which has not been done for at least 30 years under 
both Democrat and Republican administrations, for instance, 
whether it is in organizations, whether it is hurricanes, which 
as I see it is what you are going to continue doing but now it 
is going to be more consolidated and more coordinated.
    Mr. Allen. Yes, Congressman King. We use it for border 
security. We are trying to determine how best to employ its 
capabilities. For border security, for seaport security, 
critical infrastructure it is very helpful, and for national 
security events it has been used rather prolifically in the 
past, as well as natural disasters, including fighting fires 
and earthquakes. And, of course, it was used immediately after 
September 11. Within a half an hour, using a sensitive 
capability, we could see the extent of damage in New York City.
    Mr. King. Thank you, Mr. Chairman.
    Chairman Thompson. Thank you very much.
    Ms. Harman has agreed to start our questioning after we 
recess and come back. The plans will be, after the two votes, 
about 5 minutes after the last vote, to reconvene. So we will 
recess the committee.
    [Recess.]
    Chairman Thompson. We would like to reconvene the recessed 
hearing. The next questioner will be Ms. Harman from California 
for 5 minutes.
    Ms. Harman. Thank you, Mr. Chairman.
    Welcome to our witnesses. I have worked with each of you 
over some period of time and I appreciate your service, and I 
surely am grateful you are in the positions you have.
    Having said that, I am about to deliver as sober a message 
as I know how to deliver. Number one, I represent satellite 
central. My district in California is where most of our defense 
satellites are designed and built. I know a lot about 
satellites. I spent 8 years serving on the House Intelligence 
Committee, 4 years as Ranking Member, and I know their 
capabilities and I know that their capabilities are evolving 
and it is very serious business to use satellite feed for 
domestic purposes. And it not only serious right now, but 6 
months from now the capabilities will evolve further, and we 
will be able to do more and more. And obviously I am not going 
to discuss that in a public setting. That is my first point.
    My second point is, Charlie Allen, you said this is nothing 
new, it is just a broader customer base. Well, that is new, a 
broader customer base. Requests from customers to use materials 
that are ever more sensitive, for purposes that we may not even 
understand yet, is new. That is not old. That is new. And 
sharing information with this broader customer base provides 
all kinds of issues about privacy and civil liberties of 
Americans that weren't there before and that is new. That is my 
second point.
    My third point is I have listened up and, as best as I can 
tell, our two privacy and civil liberties witnesses were not 
cut into this until this year, July of this year. This program 
may have been shared with others last year. I know that the 
origins of it were 2005. And I am surely not saying that it is 
a bad idea to have a program, but privacy and civil liberties 
concerns apparently were an afterthought. And I understand that 
we have in this committee some kind of a privacy document which 
those who have read it--and I am not one of those--think is not 
an adequate document. So that is my third point.
    My fourth point is that just telling us that Executive 
Order 12333, the 1947 National Security Act, the Homeland 
Security Act of 2002, and the Privacy Act cover this program is 
not telling me anything. I am a trained lawyer, as some of you 
are, and some of our other members are, and I want to see the 
legal document that puts the clear, bright legal framework 
around this program and is speaking for me. I do not think it 
should proceed. I oppose the idea that it would become 
operational until we have that framework and have a chance to 
review it. I am not talking about delaying unnecessarily. But I 
am saying that the right way to do this is for Congress--which 
passes the laws of the United States and protects the 
Constitution, to review carefully the legal framework for what 
I consider to be a new program before it is rolled out.
    And finally, we are dealing in a context here. And the 
context is--and I speak as someone truly aggrieved that this 
administration, post 9/11, rolled out the terrorist 
surveillance program, decided unilaterally; it would not comply 
with FISA, something I didn't learn until years afterwards, and 
has been making security policy in the executive branch without 
full regard for the laws that Congress has passed. I think that 
is unacceptable. And that is my context.
    So what I worry about is that even if this program is well-
designed and executed carefully by all of you, and I take you 
as a man of good faith, that someone, somewhere else in the 
administration, could hijack it and use it for other means. I 
worry about it in this administration and I worry about it in 
the next administration.
    And to remind people who may have a short view of this, 
there will be another administration. The President may be of a 
different party, and I think some folks who just say the 
executive branch should have all the power it needs are 
forgetting that they may be giving power to a new Democratic 
administration and they may rue the day that they did that.
    So my time is almost out. My lecture has abated. But I have 
just one question. Has anyone focused on Posse Comitatus and do 
you know that this program, as you conceive it, will comply 
with the Posse Comitatus Act?
    Mr. Teufel. Ma'am, again while I am an attorney, I am not a 
practicing attorney. Neither is Dan. My understanding is that 
the lawyers have looked at the Posse Comitatus issue and that 
it is nonviolated. Again I am speaking as a nonpracticing 
lawyer here.
    Ms. Harman. My time has expired, Mr. Chairman, I made my 
point clear. But I would like to see that answer amplified by 
someone----
    Mr. Teufel. Yes, ma'am.
    Chairman Thompson. Well, I think, Mr. Allen, can you 
provide the committee with a response to Ms. Harman's question?
    Mr. Allen. We will certainly respond to that question and 
also give her the assurances of the legal framework and also 
how the various concept of operations, guidelines, privacy 
impact statement--which I think you already have--and the 
processes by which we will operate. I understand the concerns, 
but we believe that we are ready to operate this particular 
program starting on 1 October. Otherwise, it will--under ad hoc 
basis, I think you would want more layered oversight than what 
we currently have.
    Chairman Thompson. Thank you very much. Ms. Harman, do you 
want to make a comment?
    Ms. Harman. My comment is, Mr. Chairman, that with respect, 
I don't find that answer satisfactory. I think this committee 
should insist on reviewing the legal underpinnings of the 
program and satisfying ourselves that this is being done 
properly. And I say this on a bipartisan basis, this is the 
leverage we have. We let this thing go, it may be another blank 
check to the Executive, it may morph into things that will 
terrify you if you really understand the capabilities of 
satellites, and I for one would strongly oppose letting this 
proceed without doing that careful review as quickly as 
possible.
    Chairman Thompson. Thank you very much. And I want Mr. 
Allen to understand that I made the request; Ms. Harman has 
made the request again. There is still significant discomfort 
on the committee that we don't have enough written policies by 
which this program is scheduled to begin October 1. And that is 
an absolute unreadiness that I hope you hear from us in this 
hearing. And we will before the end of the day provide a 
written letter expressing similar unreadiness on the 
committee's part.
    We are now yielding 5 minutes to the gentleman from 
Pennsylvania, Mr. Dent.
    Mr. Dent. Thank you, Mr. Chairman. And I know Ranking 
Member King talked about Supreme Court decisions. I would like 
to follow up on what he talked about. As you gentlemen know, 
some courts have ruled that the heat signatures emanating from 
a public residence are protected by the fourth amendment. And 
in Virginia, as an example, courts have held that utilizing 
forward-looking infrared radar to detect the excessive heat 
detected by marijuana-growing operations as the basis for 
establishing probable cause to search that particular home is 
improper.
    I know that you are not dealing with infrared or heat 
sensors. Given that example, what kind of safeguards will the 
NAO have in place to ensure that law enforcement agencies 
requesting technical assistance in surveillance are complying 
with the existing State and Federal court decisions regarding 
the fourth amendment--particularly State court decisions which 
I think is more operable here.
    Mr. Sutherland?
    Mr. Sutherland. Thank you. Just to understand the process I 
think will help. A request comes in for someone to use one of 
the products or services of the NGA. It will now come into the 
NAO. Within the NAO, located within the Department of Homeland 
Security Intelligence and Analysis Directorate, there will be 
attorneys who review it. There will be a privacy officer and an 
officer for civil rights and civil liberties who will have 
oversight of that. So there will be that filter.
    The case law that you are referring to will be a 
significant part of that filter, as well as other case law in 
other areas. It wouldn't necessarily raise a fourth amendment 
issue; it could raise other issues. If our internal analysis 
decides that that is a request that does meet the proper use, 
we would then forward it to the NGA, and the NGA has another 
distinct and robust set of measurements and analysis that they 
do and have been doing for many, many years.
    So what Assistant Secretary Allen is saying is that by 
bringing the NAO to DHS, which DHS has the unique capabilities 
of a privacy officer and an officer for civil rights and civil 
liberties, you are adding additional layers of review onto that 
analysis of whether that is a proper use of the system. So NGA 
is a robust way to look through the issues and our Department 
will have that as well.
    Mr. Teufel. I would like to expand on that. NGA has the 
proper use memorandum, PUM, process. When a request comes into 
NGA, as we understand it, NGA conducts a legal and policy 
review and establishes controls on the information that will be 
collected. And if a request is approved, the PUM will specify 
what can be collected, who can receive the raw data, how it is 
to be stored, how it can be used and who will receive the final 
product. So at the NAO, the collection manager will review 
existing PUMs and say, okay, I have a current request; does it 
fall under an existing PUM? If not, a new PUM is requested and, 
as I understand it, NGA has denied PUMs in the past for various 
reasons. If it falls under a PUM, then the collection manager 
will go to NGA under the PUM and make the request.
    Mr. Allen. I would like to add to what Mr. Teufel said, is 
that the Civil Applications committee falls directly under the 
same rules and restrictions, even though it has operated for 30 
years, and on occasion they have redirected some of the civil 
application committee requests to make sure they are in 
accordance with the proper use of that request.
    Mr. Teufel. When I was at Interior, we did not review CAC 
requests the way we at DHS will review NAO and CAC requests. It 
is far more robust oversight than existed previously.
    Mr. Dent. I guess my next series of questions--and I will 
try to be quick--will be directed to Secretary Allen. I guess 
the main question I have: Is there a risk of overloading our 
intelligence communities with requests from various civil 
authorities, and what happens if the NAO receives too many 
applications for assistance, and how do we process these things 
timely?
    Mr. Allen. That is a great question because the process we 
have today is ad hoc. If there is competition, NGA has to make 
that decision sort of as the requirements flow in. Now we have 
a more ordered process to look at the needs of the customers. 
And then one of the good things, this is a clearinghouse. The 
NAO is a clearinghouse and sets--not only looks at the needs, 
but establishes priorities so we don't overburden these 
classified capabilities that are used almost entirely for 
foreign collection.
    Mr. Dent. How long do you think--how much time would it 
take between the time of the request being submitted to the 
actual time of return of the requested information to the civil 
authority? Do you have any idea?
    Mr. Allen. If it is a research type of effort that the 
Civil Applications Committee--it could take days, weeks or 
months. If it is in extremis, as we did when the World Trade 
Center was struck by airplanes, that was in extremis and was 
done in matter of a few minutes. But as a general rule, it is 
going to take--it is a very deliberate, considered type of 
action. It can take days, certainly weeks and months if it is a 
research type project.
    Mr. Dent. Thank you, gentlemen. I yield back.
    Chairman Thompson. Thank you very much. We now yield 5 
minutes to the gentleman from Texas, Mr. Green.
    Mr. Green. Thank you, Mr. Chairman. I thank you and the 
Ranking Member for your opening comments. I thought they were 
very insightful.
    I would also like to thank these fine men for the service 
they are rendering to their country.
    Friends, if I may, I would like to share with you briefly 
this thought. This country was founded, in part, because of the 
unfetterred access that the king's men had to our property, to 
our papers; and it was that unfetterred access that caused 
people to venture across the ocean and come here so that they 
could establish a system that would give them the kind of 
privacy that we enjoy to this day.
    The Founding Fathers were really brilliant men and--well, 
of course, there were some women involved--who understood the 
need and necessity for a fourth amendment. The Supreme Court 
has held in Kyllo versus the U.S. that thermal imagery is 
subject to the fourth amendment. The fourth amendment really is 
kind of the cornerstone, if you will, of the home being the 
castle. If we allow the unfetterred access by way of satellite 
technology, which is unchartered space for us, we really don't 
know exactly where this will end. We know where we are. And if 
we allow it based upon custom and tradition, meaning we have 
always done what we are doing, we allow it based upon the 
notion that we have in-house people who will review this and 
our in-house people will tell us whether we are making mistakes 
or not, I think we are making a mistake.
    It is not a question of whether it has been done before. 
The question is whether what was done before was 
constitutional. The question is whether what will be done is 
constitutional. So we are at a point where, in my opinion, we 
have to ask ourselves, do we have the kinds of checks and 
balances that the Constitution envisions, not the kinds of 
checks and balances that the executive branch envisions?
    We just found that Dr. King's wife, Mrs. King, was being 
surveilled unconstitutionally by the executive branch. We have 
discovered that a Congressperson had his papers taken from his 
office unconstitutionally. The question is: Is this 
constitutional and are there checks and balances as envisioned 
by the executive branch? To have the NGA under the executive 
branch--and let me pause for a second and get this on the 
record--is the NGA under the executive branch? Does everybody 
agree that it is?
    Mr. Allen. Yes.
    Mr. Green. All right. If the NGA is under the executive 
branch, it is not comparable even to the FISA courts. It is at 
best an executive remedy. The constitution requires a broader 
remedy that envisions the judiciary being a part of something 
as pervasive as what we are capable of doing with the 
satellites. My question is: Why don't we have the NGA or 
something comparable to the NGA under another branch of 
government? This is kind of the clearinghouse; do you agree?
    Mr. Allen. I believe, sir, you are talking about the 
National Applications Office.
    Mr. Green. No. The National Applications Office, as I 
understand it, it will go to the NGA and the NGA will review 
and approve the collections of information. Is this not true?
    Mr. Allen. That is not exactly the way it will work. 
Because the National Application's Office, working with both 
civil agencies, science agencies, as well as the Homeland 
Security and potentially law enforcement----
    Mr. Green. If I may, sir, please. Let me abridge your 
comments. Will not the National Applications Office receive the 
request?
    Mr. Allen. They will receive the request and it will 
prioritize it.
    Mr. Green. If I may, please. Will not the National 
Applications Office then take the request to the NGA?
    Mr. Allen. After explicit, significant legal review.
    Mr. Green. Yes, but they take it to the NGA. And will not 
the NGA then give a yea or nay?
    Mr. Allen. Another review, yes. If there is a difference, 
it will be resolved between the two organizations.
    Mr. Green. A rose by any name--that which we call a rose by 
any name still smells just as sweet. Call it NGA, call it 
National Application; either office is under the auspices of 
the executive, true?
    Mr. Allen. Both offices will fall under the executive 
branch.
    Mr. Green. That creates a great amount of consternation in 
the minds of constitutional scholars. I believe it does. Why 
not have NGA--or if we want to talk about the National 
Applications Office, why not have this under the auspices of 
the judiciary, something comparable to FISA? Probably I 
shouldn't say comparable to FISA, but something--something 
comparable to what FISA was envisioned to be. Why not have it 
on the judiciary? The President appoints these FISA judges. Why 
can't we have some other entity outside of the executive to 
perform these as a clearinghouse?
    Mr. Allen. I believe that no other element can really 
understand the customers or----
    Mr. Green. I beg to differ.
    Mr. Allen. --or priorities.
    Mr. Green. I beg to differ. If you are saying there are not 
other people that have the intelligence and intellect to 
understand the Constitution of the United States of America, 
then we need to do away with the Supreme Court.
    Mr. Allen. That is not what I said. You didn't let me 
answer.
    Mr. Green. Let me give you more time.
    Mr. Allen. There are limits to physics. What we have is an 
application for civil and homeland security purposes. And the 
National Applications Office is going to bring into order and 
focus already existing processes. It will have a broader 
customer set, as Congresswoman Harman noted, but it will all be 
done in accordance with the Constitution, in accordance with 
the laws, and there will be checks and balances.
    Mr. Green. If I may, please, sir. I have to intercede 
because I have little time. It will be done according to the 
executive branch's interpretation. And that, many times, will 
conflict with the Constitution, which is why you have another 
branch to give another opinion that can supersede the executive 
branch's interpretation. Listen, I am imploring, I beseech you, 
I beg that you please give some consideration to the notion 
that we need a third branch of government or another branch of 
government involved.
    Thank you, Mr. Chairman. I yield back the balance of my 
time.
    Chairman Thompson. Thank you, gentlemen. The time has 
expired. Mr. Allen, I hope you get the understanding that the 
committee desperately needs the guidelines under which this 
program is expected to be implemented. And the discomfort you 
continue to hear is the lack of information that we have, and I 
think you will hear it throughout the hearing.
    I yield 5 minutes to the gentleman from California. Mr. 
Lungren.
    Mr. Lungren. Thank you, Mr. Chairman. This is a most 
interesting hearing and I appreciate what the gentlemen at the 
table are attempting to do, and I appreciate what members of 
this committee are attempting to do. But let us see if we can 
clarify this a little bit.
    On the fourth amendment questions. In Florida v. Riley, the 
United States Supreme Court said that surveillance by 
helicopter at 400 feet did not implicate the fourth amendment 
because anybody could be flying over at--a plane could fly over 
and observe things.
    In the Dow chemical v. U.S. case, where it was a business 
that they were talking about, aerial photography over chemical 
company complex, they found it was not a fourth amendment 
search. But Justice Burger, Chief Justice, said this: It may 
well be, as the government concedes, that surveillance of 
private property by using highly sophisticated surveillance 
equipment not generally available to the public, such as 
satellite technology, might be constitutionally prescribed 
absent a warrant, but the photographs here are not so revealing 
of intimate details as to raise constitutional concerns.
    It appears that the courts have viewed even sophisticated 
aerial photography from satellites is not implicating the 
fourth amendment because you are using enhanced techniques, but 
you are basically doing what you could do if you were flying a 
bit lower, and protecting yourself by being at a higher level. 
But--wait a second. The question that comes up is with thermal 
imagery, because in the Kyllo case that the gentleman 
suggested, in an opinion written by Justice Scalia, they talked 
about--this is a law enforcement case using thermal imagery in 
a law enforcement investigation against a home. And we were 
talking about the right of privacy really implicating itself 
when you are talking about a home.
    So I guess my question is this: Are all three of you 
agreeing that this program does not send it to thermal imaging 
of homes? Would that be correct?
    Mr. Allen. That is my view. As I said, we can use infrared 
in a broad sense to look at forest fires and hot spots, but not 
homes. There is a huge difference.
    Mr. Lungren. You are using infrared and those sorts of 
things to look at hot spots. The idea of thermal imaging to 
penetrate a house is to see--in cases we had in California when 
you are dealing with marijuana, you were trying to find out 
whether marijuana grows there. The courts basically said, 
absent a warrant, you couldn't do that. You could actually get 
a warrant to find out the electrical bills of a company and 
look at it that way, but still you had to have some basis to 
get it. But the idea was that somehow that imagery allowed you 
to penetrate the walls and see people.
    That is different than finding hot spots to locate the 
presence of fires or look at agricultural grows and those sorts 
of things. And that is all that I want to make sure we are 
doing. Because when I saw the article that appeared in the New 
York Times, and they are talking about spy satellites being 
used domestically, the idea was we were violating the fourth 
amendment. But if what you are telling us is what you had done 
before, where we use sophisticated technology, we enhance the 
view that we get from satellites so that we can see what can be 
seen by the eye if you were there at a lower elevation, that is 
one thing. And that doesn't bother me because that passes the 
test. I mean, it passes the Supreme Court test in every single 
situation. But the specter has been raised by the headlines to 
suggest that you are going to spy on people in their homes, 
violating my-home-is-my-castle doctrine which underlies, 
really, the basis of the privacy protections in the 
Constitution.
    I think that is where you have members very concerned. And 
if you could be very explicit in your rules that that is not 
what you are doing, I think you resolve a lot of the problems 
we have here. And the American public then realizes we are not 
talking about looking into your bathroom, we are not talking 
about looking into your bedroom. We are talking about things 
that are otherwise visible if you were there in closer 
proximity. That is all I am trying to get from you.
    Is that your understanding and will that be incorporated in 
the documents that you have that we will be able to review?
    Mr. Allen. That is well understood, and we can demonstrate 
that that is the case, that we are not here, it does not 
penetrate buildings, it does not penetrate homes. This is to be 
used in a much broader sense as you have described. And the 
differentiation is very significant. I will let Mr. Teufel----
    Mr. Lungren. Is there anything I said that you disagree 
with?
    Mr. Teufel. No, absolutely not. If the national technical 
means were to be used in that fashion and there were not a 
warrant, as required under the fourth amendment of the United 
States Constitution, my colleague, Dan Sutherland, and I would 
be racing over to see Charlie Allen to talk to him about the 
improper unconstitutional use.
    Mr. Lungren. That is incorporated in the principles that 
you have in the documents that you are bringing forward; is 
that correct?
    Mr. Teufel. And it is also part of NGA's PUM process. And 
NGA would not allow such an inappropriate, improper use of the 
satellites.
    Mr. Lungren. But it is part and parcel of the documentation 
that you have that regulates this program and that we are going 
to have a chance to look at; is that correct?
    Mr. Teufel. The Constitution of the United States, sir.
    Mr. Lungren. I am talking about the principles laid out in 
the way you are going to operate.
    Mr. Sutherland. If I can say, the concept of operations 
incorporates that. Yes, we are working on standard operating 
procedures for--they are in draft form, yes. And the executive 
committee, as it forms, and the working groups that come from 
it will incorporate all of this. So the answer is absolutely 
yes.
    Mr. Lungren. Thank you very much. Thank you, Mr. Chairman.
    Chairman Thompson. Thank you. But the point, for the 
committee's sake at this point, is that at present there is no 
such approved document that guarantees just what Mr. Lungren 
said, other than the Constitution of the United States?
    Mr. Sutherland. Chairman Thompson, right now there is a 
concept of operations document that is set final, and I believe 
it has been provided to staff. But this is what Secretary Allen 
was saying earlier. He will make sure that is in everybody's 
hands by the end of the day. But in the upcoming weeks, we have 
a standard operating procedures document and other documents 
like that. And as I think we have been saying, we clearly need 
to be working with the committee, as we form those, in giving 
you visibility on this to give everybody the level of comfort 
that they need to have.
    Mr. Allen. That is correct. We provided, I believe, the 
concept of operation on the 17th of August. As you know, we 
also worked with the Intelligence Committees to ensure they had 
no concerns, and briefed them as well as the appropriators. So 
you need to have more materials to satisfy your needs.
    Chairman Thompson. Excuse me. You briefed the appropriators 
but not the authorizers. I think that is the point. And 
whatever documents we have received, we got them from the 
appropriators. We did not get them from the Department.
    Mr. Allen. We did brief the HIPC, which authorizes my 
budget, since it falls under the national intelligence program. 
We did not brief you from an oversight perspective, and I have 
apologized for that.
    Chairman Thompson. Well, the standard operating procedures 
are yet to be received by this committee. And I think until we 
receive those documents by which this program is to go forward, 
it is not in the best interest of any of us for that October 1 
to come with you implementing that program.
    I yield 5 minutes to the gentleman from Colorado, Mr. 
Perlmutter.
    Mr. Perlmutter. Thanks, Mr. Chairman. I really don't have 
that many questions. It is more of a statement, and I apologize 
for missing a number of the questions that you have been asked. 
You three gentlemen come to this committee--and I think the 
committee and I know I hold all of you in high regard. And the 
real disappointment has been we feel like you have gotten the 
cart before the horse, that this thing really has--is a fait 
accompli--and some of the others may have said this-before you 
really took time, in our opinion, to look at the privacy issues 
that come with this.
    And, Mr. Teufel, it is a big difference between going from 
the Interior Department and the U.S. Geologic Survey to the 
Intelligence Department of Homeland Security. There is a major 
shift in emphasis just by going from one place to the other. 
And if it is only that, these protocols and procedures have to 
be in place.
    And the fact that we are the last people to hear about it, 
as some of you in the Privacy Department of the Homeland 
Security were, that is the problem. And and some of these 
things, as Mr. Lungren has said, and I think Mr. King too, have 
been going on a long time, whether it is for Hurricane Katrina 
or maybe a national security event.
    So we need to know, though--and there may be instances, Mr. 
Allen, where you might want to be able to view into a home with 
infrared. But obviously if that is the case, we want to have 
some procedures that comply with the Constitution.
    And it isn't just the courts that set those parameters as 
to what the first amendment means or the third amendment. I 
mean, everybody talks about the fourth amendment, the 
warrantless,--the need for warrant. But the third amendment 
says you are not going to have government in your house, 
period, except during times of war.
    And my comment--and I guess how in the future, Mr. Allen, 
can--as you develop new programs, can you include the privacy 
side of the Department earlier on and contact us earlier on? I 
am on the Intelligence Committee of this committee and really 
hadn't heard anything about it until we got the papers a few 
days ago.
    Mr. Allen. And I appreciate, Congressman, your concerns. 
And as I said, the legal framework, the guidelines, the 
procedures, the protocols, we have a good number of them in 
place and I think they will meet your needs and requirements. 
One of the things that came very late, of course, was the 
Director of National Intelligence letter of designation which 
put into motion full planning back in June. We only received 
the actual letter of designation that the Secretary of Homeland 
Security will be the executive agent in June. So we had done 
some preliminary planning, but now we are doing it full bore.
    So part of it is catching up with the fact that now we are 
working with the Civil Applications Committee, the Department 
of Interior, the U.S. Geologic Survey and others. We had set a 
tentative date to begin operation around 1 October. We advised 
the appropriators of this and they have provided us with 
reprogramming so we can spend some dollars to get ready for 
this.
    But I understand your concerns, procedures, protocols, 
guidelines. We certainly will give you the legal framework 
which we have outlined already. But this has been probably one 
of the most reviewed programs, certainly, in the executive 
branch. That has been my experience. But I understand your 
concern.
    Mr. Perlmutter. Thanks, Mr. Chair.
    Chairman Thompson. Thank you very much.
    We now yield 5 minutes to the gentleman from Washington, 
Mr. Reichert.
    Mr. Reichert. Thank you, Mr. Chairman. Thank you all for 
being here. It is good to see all three of you again.
    I just want to follow up on some of the same discussion and 
conversation you have heard here this morning already. First, 
Mr. Allen. Was it an oversight on your part not to include the 
civil rights and civil liberties and chief privacy officer 
until later on in the process, or was that----
    Mr. Allen. We had the DNI's civil rights and civil 
liberties officer involved in November of 2006 when we started 
talking about the fact that this could come to Homeland 
Security with a letter of designation which we didn't have at 
the time, and Mr. Teufel, I believe, had an officer with that 
working group. We got the letter of designation and, of course, 
the civil rights, civil liberties, and Mr. Teufel did a privacy 
impact statement this spring and early summer. So I think we 
have worked very much, as these gentlemen have stated, in close 
cooperation and collaboration with both officers.
    Mr. Reichert. Mr. Sutherland testified that he came into 
the process in July. Do you agree, Mr. Allen, he should have 
been brought into the process earlier?
    Mr. Allen. In retrospect I think that would have been the 
case. But we have worked cooperatively on all issues with Mr. 
Sutherland.
    Mr. Teufel. Sir, if I may. I had the opportunity to speak 
with Alex Joel, who is the civil liberties protection officer 
over at ODNI. I know what my office's timeline was and I wasn't 
quite sure what his was. Alex Joel became aware of this process 
back in October of 2006. And in November of 2006, a member of 
my staff participated in a working group or the entity that was 
brought together to look at this. And both Alex and my staff 
were aware that at the very beginning, back in November or 
shortly after November 2006, put into the documents is the 
privacy officer and the civil rights and civil liberties 
officer must be working--we must be working with them on this 
to ensure that we protect privacy and civil liberties.
    Now, my office got more heavily involved with the NAO in 
spring of 2007, and for a period of time--I want to say between 
1 and 2 to 3 months--my office worked with the NAO and INA to 
put together this privacy impact assessment.
    Mr. Reichert. Would you disagree with the member of the 
second panel that has provided testimony that you were 
marginalized in this process?
    Mr. Teufel. I haven't seen that testimony.
    Mr. Reichert. Do you feel you were marginalized in this 
process?
    Mr. Teufel. No, not at all. Since I have been in the 
office, I have done a great deal working with Charlie and folks 
on his staff to get the privacy office more deeply involved 
with the things that INA is doing so that we can be there early 
and often to make sure the privacy protections are in place.
    Can we do better? We can always do better. But I have got a 
very good close working relationship with Charlie Allen and his 
staff, as does Dan. Dan and I worked together very closely, as 
we do with our colleague over at ODNI, Alex Joel. So I would 
disagree that my office--and, for that matter, Dan's office--
has been marginalized.
    Mr. Reichert. Can you explain to me, then, what the process 
is when you do witness a violation? What happens?
    Mr. Sutherland. Congressman, we deal with issues that cover 
the whole gamut of the Department of Homeland Security and the 
homeland security efforts. So we deal with them essentially the 
same. We go to the people responsible for the program and 
explain our views on why they might shape the policy in a 
different way. If we are--Hugo and I both talked about this 
publicly. If we feel that there are major concerns, I report 
directly to Secretary Chertoff. I have great relationships with 
Assistant Secretary Allen and his peers in the Department, and 
we talk regularly. So we would go directly to senior officials 
and raise these issues.
    Mr. Reichert. Your investigative policy would be put 
forward, you would investigate the issue and come out with a 
finding?
    Mr. Teufel. Sure, if necessary. If there is a problem, 
typically it is resolved at the staff level. If it were to get 
to me, and, I assume probably also with Dan, I am going to make 
a phone call to the principal or that principal's chief of 
staff within the Department to say, hey, we have got an issue 
here we need to address. Around the same time, I am going to be 
in contact with the general counsel's office to let them know 
there may be a legal issue that needs to be addressed. If it 
doesn't get resolved then--and it has never been the case that 
we haven't resolved an issue when we have been speaking with 
the component head--then I am going to the Secretary and the 
Deputy Secretary with my concerns.
    Mr. Reichert. If I may, Mr. Chairman, one last question, a 
simple question. Does moving the Civil Applications Committee 
from the Department of the Interior to the National 
Applications Office within Homeland Security create new risks 
to the privacy and civil liberties of U.S. citizens?
    Mr. Allen. I will let my colleague speak. But we are going 
to continue the same processes, only with greater layers of 
review from the Civil Applications Committee. My commitment to 
the CAC, as it is known and been known for many years, is to 
give it robust support so that it--scientific research, 
particularly on things like climate change and environmental 
damage can be continued. They have done some great work. The 
CAC needs stronger support, and I intend to give them that and 
I will let my colleagues talk about the civil rights/civil 
liberties aspects.
    Mr. Sutherland. Congressman, we believe there are 
additional layers of review and analysis that are brought to 
bear with this new structure. That did not exist before. 
Protections, procedural protections that are in place. 
Certainly when you expand the customer base, there are going to 
be novel--I presume there will be novel requests for use of the 
technology. That is the reason why it is great to have the 
increased scrutiny that the NAO brings.
    The Department of Homeland Security is unique in the 
Federal Government in that we have a chief privacy officer who 
sits in the position, and with the authorities that Hugo does, 
and officer for civil rights and civil liberties. We are a 
unique department in that sense and that is one of the values 
of having the National Applications Office within this 
Department.
    Mr. Reichert. If I may just comment quickly, Mr. Chairman. 
I appreciate your testimony and I do share the same concerns 
that the rest of the members of the committee have shared with 
you, but I do have a great amount of faith in your abilities to 
protect our Constitution. But I do think that the oversight, as 
Mr. Allen and others have said, and the access to that report 
would be a great asset for us.
    I have personal experience in asking for assistance from 
the Secret Service and the FBI--in some of this technology that 
you talk about--back in the mid-1980s and it was denied to 
local law enforcement, the sheriff's office that I happened to 
be the sheriff of back in Seattle. So I know there is some 
oversight there. At least back then. And I am certain that 
Congress was made aware of the technology when it existed back 
in the middle 1980s.
    And I appreciate your testimony. Thank you.
    Mr. Teufel. If the fourth amendment required a warrant 
before, the fourth amendment requires a warrant today. And if 
there are any violations of intelligence law or policy, they 
have to be reported to the President's Foreign Intelligence 
Advisory Board and potentially to the Attorney General. So I 
just wanted to advise you all of that.
    Chairman Thompson. Thank you.
    I yield 5 minutes to the gentleman from North Carolina, Mr. 
Etheridge.
    Mr. Etheridge. Thank you, Mr. Chairman.
    Let me thank each of you for being here and also for your 
service. And I will say from the outset, so you know where I am 
coming from, I agree with Ms. Harman. I think that we have got 
work to be done in this area.
    I hope you understand why this committee is so sensitive to 
this, of what is going on. When you read it in the paper first, 
it puts us in a defensive mode to start with.
    So that sort of leads me to my question. I served in the 
State legislature one time with what I thought was an 
outstanding legislature, but also a great attorney, and I 
remember one comment he always made. When he was a trial 
attorney, he always wanted to depend on people trusting him. 
But when he got to the General Assembly, he always wanted to 
know about the law. He was concerned about what the 
underpinnings of the law are.
    I think we are here in an area where where a high level of 
trust you can delegate to people you trust. But what happens to 
those people who follow when you don't have firm, hard 
guidelines with underpinnings of the law? Let us talk beyond 
that. Because I think it is critical and we are getting on an 
area where Mr. Allen said earlier, we are talking about an 
expanded customer base. We are in a new area. This hasn't been 
there before.
    So my question is this, I guess. What has sparked the need 
to expand the access to spy satellite imagery? And I guess my 
big question ought to be why was the former system so 
inadequate?
    Mr. Allen. The former system was--I don't know that it was 
totally inadequate. It did excellent work. All that the 
commission--and we had distinguished Americans serve on it and 
studied it and recommended unanimously that there probably were 
some opportunities that were being missed to help protect the 
homeland, to provide greater security on things like ports and 
borders and infrastructures; that we should address those kinds 
of requirements.
    What it recognized was that these are capabilities that 
probably could be used with great care--because it emphasized 
civil rights and civil liberties and privacy in this report 
back to the Director of National Intelligence--was that there 
could be greater opportunities to help keep the country safer 
and more secure. That is the reason that the report--the study 
was conducted. The DNI did not designate the Secretary of 
Homeland Security until June of this year, just 3 months ago, a 
couple of months ago, as the executive agent. We are now 
working hard to get the protocols in place.
    Mr. Etheridge. Let me follow that. Can you provide examples 
of requests you would feel exceed the existing legal limits? 
And secondly, are you aware of any such potential abuses of the 
spy satellite imagery that occurred in the wake of Hurricane 
Katrina; because you talked about having to use it for that, to 
help with that?
    Mr. Allen. I will let my colleagues speak about any 
violations. I was not at Homeland Security when it was used in 
Katrina and Rita, but it was used. It was very valuable. The 
National Spatial Intelligence Agency did good things to bring 
capabilities in a hurry to help save lives and to prevent 
further damage to our country, particularly down in Louisiana 
and Mississippi. It was of great use. The Secretary of Homeland 
Security deeply appreciated that capability. But I know of no 
violations of any law during that. Now, as far as what might be 
violations of the law, I leave it to my colleagues to discuss.
    Mr. Sutherland. One can always imagine hypotheticals that 
would violate the law. You pointed out it would be difficult to 
imagine a fourth-amendment issue in this context, but we will 
certainly be looking at it. And the advantage, as I said 
before, of having the NAO within DHS is you add a layer of 
several additional attorneys, and then those with specialties 
in the area of privacy and civil liberties more generally, who 
are going to be reviewing these. So one can imagine 
hypotheticals. That is our responsibility, is to look at the--
when we have an increased customer base, hopefully you will 
have increased quantity of requests for this outstanding 
technology. Our job is to make sure that increased quantity 
does not sacrifice quality, and we will be able to do that in a 
number of different ways.
    Mr. Etheridge. Mr. Chairman, it seems to me in closing that 
the request that each member has made, I think thus far--and I 
echo that--that we spend more time with you, and getting your 
hands on the documentation so that we can feel comfortable; and 
hopefully in the future others can feel comfortable and the 
American people can feel comfortable that we really are working 
to protect them, as I know you are, but also protecting our 
civil liberties as well as theirs.
    Mr. Allen. Thank you, Congressman. We will do that.
    Chairman Thompson. Thank you very much.
    Yield 5 minutes to the gentleman from Georgia, Mr. Broun.
    Mr. Broun. Thank you, Mr. Chairman. I believe in my heart 
you are honorable folks and I believe, as you state very 
fervently, that there are protections within your agency. That 
doesn't satisfy me. Frankly, I don't believe this horse is dead 
yet, so I will beat it more.
    I agree with Ms. Harman that I think you have a real Posse 
Comitatus problem here and also I know that technology is 
expanding tremendously--minute by minute almost. And I have a 
tremendous distrust of government. And I am not assured by you 
gentlemen that there are sufficient checks and balances put in 
place, because what I hear from you-all is that the agency can 
police itself and there is no outside policing of the agency by 
some separate entity of government.
    As Mr. Green was talking about, I believe very firmly that 
there needs to be some outside review, there needs to be some 
way of going to check the agency itself. We are talking about a 
new agency. We are talking about new technology. We are talking 
about advancing technology. And I believe that every person on 
this committee wants to make sure that this Nation stays safe 
and secure. But I for one am not willing to give up my 
liberties and my constitutionally protected God-given rights to 
your agency or any other. And I hope you see from all of us 
that there is a tremendous concern here.
    I am new on this committee and I am just trying to get 
ahold of things that are going on. And it just deeply concerns 
me as a new Member of Congress about what you are telling me, 
because I don't see any outside review. I don't see any sort of 
effort on your part of looking beyond the agency itself.
    So please reassure me, how--when there are other people 
sitting in your seats, how in the future, as new technologies 
develop, how as we advance a year, 5, 10 years from now, that 
there won't be intrusions into people's privacy and their 
private lives so that we can protect our homeland, that we can 
protect the national interest, but that individuals, law-
abiding citizens aren't under danger. And I don't see that. 
Frankly, I don't see that and I don't hear that from this 
testimony today.
    So if you-all could assure me, I would feel a whole lot 
more comfortable and hopefully the other members of this 
committee will, too.
    Mr. Allen. I think we have gone through the layers of 
review. And this is an office within a Department, and there 
are layers of review there. There is another whole agency 
within the intelligence community called the National 
Geospatial Intelligence Agency which has also significant 
reviews and they only--they only do this where there is a 
proper use memorandum. There are--and there is significant 
review of them.
    There is also the Director of National Intelligence who has 
his own civil rights/civil liberties officer. And the DNI is, 
you know, responsible to ensure that all of his activities are 
under his--he designated this to the Secretary, or done legally 
and properly. There is the President's Foreign Intelligence 
Advisory Board, PFIAB, and under it is the Intelligence 
Oversight Committee which also looks for any violations of 
intelligence law, of intelligence operations and activities. So 
there is huge review. And it is beyond just this office, which 
I will be the operations manager within the Department. But I 
will let my colleagues talk about proper use. And, of course, 
probably the most significant review is here today, the 
Congress of the United States.
    Mr. Sutherland. I think Secretary Allen said it well. I 
think Mr. Toefel and I both have been getting briefings on the 
capabilities of the system, and I think the technology, which 
the Secretary could speak about much more articulately than I 
can. The technology and what the purpose of the imagery is, is 
not concerning just the capabilities of the system. And I don't 
know if you have been able to talk about that a little bit 
more.
    Mr. Allen. The capabilities, I know and I deeply respect 
Congresswoman Harman. There are limits of physics. We are 
talking about space systems. We are not talking about, as 
Congressman Lungren pointed out, airborne or other kinds of 
manned or unmanned aircraft. We are talking about systems 
today, a great deal of the requirements probably as they come 
in from these civil users, non-Defense users under the National 
Applications Office, a lot of them could be satisfied by 
commercial imagery. Commercial imagery is a growing industry, 
and commercial industry has capabilities that are reaching and 
approximating those of classified imagery satellites. And there 
are many waiting to be launched around the world.
    So I agree with you, we are in a different era where 
technology is driving us into a world of deeper concern. And no 
one has more concern I think than I do, given my career with 
intelligence and with the Central Intelligence Agency.
    But from my perspective, there is significant oversight 
throughout these processes. And these systems are not directed 
at individuals, because these systems are not capable of that 
from space. And we are talking about a space-based system here.
    Mr. Toefel. I just want to add, sir, I share your distrust 
of government. That is why I took the job that I hold 
presently. And I know that the Founders had a profound distrust 
of government. And so when they crafted the Constitution of the 
United States, they made it a limiting document, limiting what 
we all can do, we who work in the Federal Government. And so I 
am very focused on that because we all have sworn an oath to 
protect and defend the Constitution. And so I want to tell you 
that, that the Constitution means a great deal to me.
    There are a number of agencies that are involved in 
oversight here, far more than existed previously. A number more 
people who are going to be looking at this thing, including 
career employees, career employees in my office who in our 
close work with INA are becoming more and more involved at an 
earlier and earlier level with intelligence and analysis 
activities. And they have various protections under the law 
that, if necessary, to protect their country and the 
Constitution, they can and doubtless will exercise.
    Chairman Thompson. I can appreciate that. But I have asked 
Ms. Harman and Mr. Carney to expand on this whole issue from 
the Committee's perspective in their chairmanship. There are 
some real concerns that we have going forward with this program 
that I have heard from everyone. And some of the things that 
are being said, I am not comfortable with. The technology can 
do a lot of things, and people saying that it can't causes me 
real concern. But those two individuals kind of take the 
leadership.
    Mr. Carney is chairman of the subcommittee for the full 
committee, and I will yield 5 minutes to him.
    Mr. Carney. Thank you, Mr. Chairman. I do have a number of 
questions, but first I will yield 30 seconds to my colleague 
from Texas, Mr. Green.
    Mr. Green. Thank you, Mr. Chairman. And thank you for 
yielding.
    Two things. One, the Constitution, the Fourth Amendment 
contemplates privacy in the home. But it really concerns 
privacy, and the home is not the only place where the Fourth 
Amendment contemplates privacy.
    The second point: If you have an issue that you deem to be 
important enough to take to a court to receive a proper 
warrant, what court would you take it to?
    Mr. Sutherland. I assume, sir, that it would be taken by 
the prosecuting attorney in whatever jurisdiction which they 
are seeking to use that information.
    Mr. Green. I ask this question, Mr. Chairman, because it 
may be necessary for us to deal with jurisdictional questions 
in terms of the judiciary as it relates to the issue of what 
court they would eventually go to, assuming they had a 
legitimate question they wanted to bring up.
    Finally, I would make this comment. I respect you, sir, and 
have great appreciation for what you are saying. But J. Edgar 
Hoover, who was the head of the FBI, a great patriot, spied on 
Dr. King. The FBI spied on Mrs. King after his death. It was 
all unlawful. So, we cannot assume that the Executive is going 
to be judicious when it comes to the Fourth Amendment.
    Mr. Toefel. You are right, sir. So let me point out that, 
under the 9/11 Commission Report bill----
    Chairman Thompson. The gentleman yielded back his time. It 
did not require an answer.
    Mr. Carney. If Professor Toefel would like to answer, that 
would be fine.
    Mr. Toefel. I just wanted to point out that, under the 9/11 
Commission Report bill that was enacted, the Privacy and Civil 
Liberties Oversight Board has far greater independence. And 
that is the first entity with independence that I would point 
you to, greater independence than my office or Dan's office.
    And then the second office that I would point you to is the 
various Offices of Inspector General at DHS, at whatever 
requesting agency, and over at DOD. And the inspector generals 
have great independence and can look into allegations of 
impropriety, unconstitutional, unlawful activity whether at DHS 
and the NAO or over at NGA.
    So I wanted to call that to the committee's attention.
    Mr. Carney. Thank you for that.
    With my background, I have a little more faith in our 
systems and their capabilities than Mr. Allen is letting on, I 
think, here. Can somebody describe the steps and the process, 
how this actually works? You get a request from law enforcement 
agency X. Then what happens?
    Mr. Allen. You could get a request from the Federal Bureau 
of Investigation. Today it goes directly to the National 
Geospacial Intelligence Agency. Under our proposed system, it 
would go to the National Applications Office, where it would be 
looked at to see if it is lawful and meets the needs for what 
for the request, that it is prioritized, and then sent over to 
the GNGA where it is looked at again for its proper use, under 
the Proper Use Memorandum which the Bureau would have 
submitted. And then, if it is proper and lawful, it will then 
be put into the system to get access to conduct, collect that 
imagery. The NRO would do that. The NRO simply operates the 
satellites. And then the material would come back and then be 
geospacially looked at and read out by analysts. The U.S. 
Geological Survey has its own analysts, and they do a great 
job. Some of the material is read out immediately by the 
National Geospacial Intelligence Agency.
    So it works very well today, but I think it could work 
better under this National Applications Office, certainly a 
broader set of customers.
    Mr. Carney. How long does this take, this process?
    Mr. Allen. We are getting into classified areas when we 
talk about capabilities of our satellites.
    Mr. Carney. No. How long does the process take?
    Mr. Allen. The process can be very quick. It can be a 
matter of hours, or it can take a significant longer period of 
time if it is a routine, a nonemergency type of request. I 
mean, I am restricted on speaking specifics about our 
classified satellites and their capabilities.
    Mr. Carney. That, I understand. But I am just talking about 
just the process here. We are talking about novel issues 
sometimes. I think that was Mr. Sutherland's term.
    Mr. Allen. If it is a novel issue, I am sure it would be 
given a lot of scrutiny and would take significant layers of 
review before. And if it was decided not proper, the requesting 
agency or department would be told it was improper.
    Mr. Carney. Are we talking days, weeks, hours?
    Mr. Allen. It depends on the urgency. Because--I think you 
all do not have a clear idea of what the NAO is. It is a 
clearinghouse that looks at needs and/or requirements from non-
Defense users, potentially, and then to help look at those; if 
they are competing priorities, to help make recommendations to 
the NGA on which takes precedence. So we view this generally as 
sort of a nonurgent, nonemergency process. But if a hurricane 
hits Louisiana or Mississippi, we obviously are going to give 
it high attention. And NGA will turn it around in a very quick 
period, certainly overnight.
    Mr. Carney. But for law enforcement applications, how does 
that work?
    Mr. Allen. We are only now forming a legal working group 
under DHS, DNI, and the Department of Justice to look at how 
law enforcement uses might be employed. But it would be on a 
case-by-base basis. So this is downstream. This is not my 
highest priority. My highest priority is to make sure that 
homeland security, along with civil applications, gets full 
support.
    Mr. Carney. Well, there are criminal applications in 
Homeland Security. For example, legal immigration, et cetera. 
The concept of operations and the SOPs, two different things 
obviously. The Con Ops have been done for a few weeks now. Is 
that correct?
    Mr. Allen. We provided it I believe to your staff on 17 
August, is what I was told by my own staff.
    Mr. Carney. And the SOPs should be done, when?
    Mr. Allen. We are working on the SOPs. Some of the 
guidelines are done at this stage. Others are yet to be 
completed. But we are moving ahead.
    Mr. Carney. Will the SOPs be completed by the October time 
frame?
    Mr. Allen. I believe, as we understand how to use--for 
example, if we ever use law enforcement applications directly, 
that is downstream. Most of the standard operating procedures 
will be available and the guidelines by 1 October. I believe we 
can meet that deadline.
    Mr. Carney. Certainly, Mr. Secretary, you understand that 
we are anticipating downstream; we are trying to do that, too, 
to make us all think about how this is going to go forward. We 
all have jobs to do, we all have our roles in protecting this 
Nation, and we've got to get it right. So I just want to get as 
much clarified up front as we could.
    Thank you, Mr. Chairman.
    Chairman Thompson. Thank you very much.
    We yield 5 minutes to the gentlelady from Texas, Ms. 
Jackson Lee.
    Ms. Jackson Lee. Thank you, Mr. Chairman. And let me thank 
you for the hearing; as well as the subcommittee chairwoman, 
Ms. Harman, for her insight.
    Allow me to first of all lay the framework and make it very 
clear that I don't intend to suggest untoward activities or 
thoughts behind this program by any of the individuals who work 
for the American people. I believe your intentions are well. 
However, I have come to understand since being on the Select 
Committee on Homeland Security, this Committee was set to 
ensure or to assure the American people that the Congress of 
the United States must have as its highest priority the 
securing of America. So I would take great issue and offense 
and will continue to have this offense to have discovered this 
process and program in the Wall Street Journal.
    And then it seems that the administration embraces August 
as a month where they make big announcements. Maybe it is so 
that you can have the complete limelight, and Congress is not 
in session. But that, I think, does damage to the 
constitutional premise of the three branches of government and 
how we are to work together. So we find that you issue a fact 
sheet on August 15, 2007, which leaves a great deal of question 
as to the good purposes and good intentions of making sure that 
Congress and this Committee is a real partner.
    We have a very important responsibility that I will never 
undermine or deny, to protect the American people, but also 
their civil liberties and civil rights. Let me remind you of an 
incident by the former majority leader of this Congress, Tom 
DeLay who decided to use the FAA and to use a government plane, 
and I will not suggest it was Department of Defense because our 
facts get somewhat strayed, to go after State legislators in 
the Texas legislature regarding a question of redistricting. I 
am sure the utilization of the plane on behalf of the United 
States of America and the American people was originally of 
good intentions but, unfortunately, ultimately a member of this 
body abused the process. So abuse is not unknown to government. 
And I would simply suggest that our concern is more than 
legitimate because of the way, first of all, that we were 
apprised of it. It almost seems that we wanted to make sure 
that we were not a partner.
    Let me pose this question to Mr. Allen and again thank him 
for his service. I know that it may have been raised before, 
but we realize that these satellites are coming in from the 
Department of Defense, and we know how to find a firewall that 
we want to keep, based upon the Posse Comitatus Act, and we 
also know that you have had for 30 years access to the National 
Geographical Survey Civil application system, which is also a 
satellite. What precise mechanisms are going to ensure us that 
we are not violating the Posse Comitatus Act with the use of 
this spy satellite? And again, if you would recite for me the 
firewall, the, if you will, complete concreteness that there 
will not be an abridgement of the civil liberties of 
individuals who could be caught up in the fishnet of the local 
law enforcement requesting utilization of this equipment, Mr. 
Allen.
    And if all would answer this question, I appreciate it.
    Mr. Allen. I think all should comment. We certainly want to 
keep you informed and be transparent. I have told the chairman 
that, evidently in this case, we did not fully brief him or his 
subcommittees at a level that was required, and that is 
regrettable. And I have said that, and so did the Secretary of 
Homeland Security has said that.
    Ms. Jackson Lee. And it opens us all up to exposure.
    Mr. Allen. So let me again say that that was not done well. 
But I think we have set forth here an organized structured 
process to bring into order processes that are occurring and 
have occurred over decades for other purposes than just civil 
applications. Scientific research. We want to continue that. 
And we believe that, in response to the Blue Ribbon Commission 
that there are other things that we can do on a very protected 
basis for civil rights, civil liberties, and privacy to help 
assure better the security of this country. We do not call them 
spy satellites, we call them remote sensing capabilities or 
classified satellites. These are imagery satellites that we are 
talking about. We are not talking about anything beyond that.
    I will let me colleagues again speak to any issues relating 
to constitutional questions or Posse Comitatus or questions of 
firewalls.
    Mr. Sutherland. Congresswoman, we have described the 
different layers of review that are incorporated here and the 
concepts that you are laying out and other members are laying 
out about the importance of protecting civil liberties. That is 
a principle that has been embedded throughout. I laid out in my 
testimony why I am optimistic that we will have a good working 
relationship to be able to bring the kind of analysis that you 
are talking about into the work of the NAO.
    I think that much of the concern here in the Committee 
could be alleviated by more extensive briefings from NGA, which 
again has had nearly 30 years of experience in working through 
these issues and how they deal with Posse Comitatus, how they 
deal with routine requests, and just to have a depth of 
understanding of how they deal with their process onto which 
then we are adding additional layers of review.
    Ms. Jackson Lee. Mr. Toefel, you are solely responsible for 
this. Give me a straight answer on the Posse Comitatus, please.
    Mr. Toefel. Ma'am, I will do the best I can. Understand 
that I am the privacy officer; I am not in a legal position, 
and I am not here testifying in my other government capacity as 
a judge advocate in the Army National Guard. So I will do the 
best that I can do to describe the Posse Comitatus Act, but it 
is really something for our lawyers to do.
    As I understand the Posse Comitatus Act, it prohibits 
direct support to law enforcement activities such as arrests. 
When in title 10 status----
    Ms. Jackson Lee. Using Department of Defense.
    Mr. Toefel. Yes. When in title 10--and if I recall 
correctly, the language of the Posse Comitatus Act addresses 
the Army and the Navy. Again, I am here as the privacy officer, 
not as a judge advocate or a representative of the General 
Counsel's Office at the Department. So if I am getting this 
incorrect, understand it is a policy guy speaking with you, 
ma'am, trying to do his best to answer your question. So----
    Ms. Jackson Lee. I am just trying to get you to help Mr. 
Sutherland.
    Mr. Toefel. I am doing the best I can, ma'am.
    So NGA can provide indirect support, technical sorts of 
things, but it must be done under the direction of law 
enforcement. Again, as I understand the Posse Comitatus Act.
    There is no Posse Comitatus Act implication if the national 
technical means are used under title 50 status. And, as I 
understand it, they can then provide support. But, again, this 
is as a nonpracticing lawyer trying to answer the question 
about whether the Posse Comitatus Act applies.
    Ms. Jackson Lee. I know my time is up. I just want to say 
that I think they have tried their best to answer the question, 
but it has not been fully answered, and we need to pursue it 
further.
    Chairman Thompson. I was going to make that point. Ms. 
Harman had already raised that issue, and I am sure these 
gentlemen will have that opportunity to respond in writing to 
some of the inquiries we will have.
    Thank you, gentlemen, for your presence and presentation 
and response to the questions. As you know, we will probably 
have significant issues to share with you that have been raised 
with the committee. We look forward to not only your 
acknowledgement of those issues but your prompt response back 
to the committee, given this October 1 time frame that we have 
been told that this program is scheduled to begin. Thank you 
very much.
    Mr. Allen. Mr. Chairman, thank you. We look forward to 
responding and getting back to you promptly. Thank you.
    Chairman Thompson. Thank you very much.
    We would like to ask our second panel to come forward, 
please.
    Chairman Thompson. We would like to welcome our second 
panel. Our witnesses, Mr. Barry Steinhardt is director of the 
ACLU program on technology and liberty. And Mr. Steinhardt 
served as associate director for the American Civil Liberties 
Union between 1992 and 2002.
    The second witness, Ms. Lisa Graves, is the deputy director 
for the Center for National Security Studies, a nongovernmental 
organization that researches and advocates for civil liberties 
on national security issues.
    We would like to welcome you to the hearing. And, without 
objection, the witnesses' full statements will be inserted in 
the record.
    I now recognize each witness to summarize his or her 
statement for 5 minutes, beginning with Mr. Steinhardt.

   STATEMENT OF BARRY STEINHARDT, DIRECTOR, ACLU PROGRAM ON 
     TECHNOLOGY AND LIBERTY, AMERICAN CIVIL LIBERTIES UNION

    Mr. Steinhardt. Thank you, Mr. Chairman.
    The government's use of spy satellites to monitor its own 
people, and let me emphasize that. This is to monitor the 
American people. This is not weather phenomena. This is not our 
National infrastructure, bridges or the like. This is people 
who are being monitored here, represents another large and 
disturbing step towards what amounts to a surveillance society. 
Our response, especially the Congressional response to this new 
technology, will serve as an important test case for how wisely 
we handle the introduction of powerful new technologies.
    Congress needs to act before this new technology, this new 
tool is turned inward on the American people. We need to 
establish a regime of checks and balances and law that protects 
us against their misuse.
    The chairman and this Committee have taken an important 
first step in calling the Department of Homeland Security to 
account and holding this hearing. You have our thanks, Mr. 
Chairman. But it has been interesting. I have heard a lot of 
discussion this morning about the respective roles of the three 
branches of government here. Most of the discussion about the 
two other of branches of government beyond the executive 
branch, that is the legislative branch and the judicial branch, 
have come from the members of this Committee.
    One of the things that I find disturbing about this 
discussion this morning, not the Committee's participation in 
it but the Department's, is the degree to which you have been 
told by the Department of Homeland Security, ``trust us; we can 
handle all of this powerful technology, and we will handle it 
in a manner that is consistent with our principles and 
consistent''--they haven't even said consistent with the laws, 
but I suppose that is implied.
    I guess I am from the Ronald Reagan school here, trust but 
verify. You need to verify that in fact this technology will 
not be misused. And one way in which you can verify that is to 
establish a clear legal framework for how this technology can 
in fact be used. As Mrs. Harman said earlier, the capabilities 
here are extraordinary. They go far beyond what the human eye 
can process. These are very powerful technologies, everything 
from thermal imaging that you discussed a little bit this 
morning, to infrared, to ultrawide band. We can tick them all 
off. But the point is, these are extraordinarily powerful 
technologies, and they go well beyond what you and I could see 
if we happened, for example, to be in a helicopter. We need to 
have laws that make it clear how these technologies can be 
trained inward on the American people.
    Now, there is a very good starting base for all this, and 
it has been referenced here this morning, and that is Posse 
Comitatus. In my written testimony, we discuss this in greater 
length, and with the Committee's permission, we will make 
available to you a memorandum from our legal counsel on the 
applicability of Posse Comitatus here. But it is important to 
remember what the basic principle of the Posse Comitatus and 
the ensuing Federal statutes was. The notion that military is 
not to be trained on the American public; it is for our 
National defense. It is not to be used for law enforcement 
purposes. These are the Department of Defense satellites. These 
offices are within the Department of Defense. This is the 
military. And we need to be very careful that Posse Comitatus 
and that principle that we not use the military we have trained 
on the American public; these are not folks who are trained or 
capable in protecting the rights of Americans. That is why we 
have set them apart and said, you protect us from foreign 
enemies, but we do not use you for domestic law enforcement. So 
I think Posse Comitatus raises important questions.
    We have four recommendations for the Committee which I will 
just highlight now. The first is that Congress should demand 
and the Department of Homeland Security should impose a 
moratorium on the domestic use of these satellites and 
enactment of this program. The moratorium should not be lifted 
until the Congress receives answers to the key questions that 
you have already begun to ask and the many other questions that 
will arise as you learn more details. But that moratorium is 
extraordinarily important. There is no hurry here. You have 
heard, if it is necessary to use this, for example, to track a 
hurricane or even to look at another natural disaster, there is 
already sufficient authority for that.
    Secondly, Congress should not authorize the enactment of 
this program before enacting statutory checks and balances to 
ensure not only the proper oversight of this program but that 
the potentially enormously powerful surveillance tools that are 
at play here be used properly. This measure should include 
rules for when domestic satellite use is permissible and be 
combined with judicial oversight.
    Lastly, the Congress should strengthen and make truly 
independent the chief privacy officer and civil rights officers 
of the Department of Homeland Security. As Representative 
Thompson pointed out in his letter to Secretary Chertoff, those 
bodies, those offices appear to have been marginalized through 
this process. I think this morning's testimony made that clear 
as well. It is possible to give these bodies true independent 
authority where they report equally to the Congress as they do 
to the Secretary of their agencies, that it is possible to get 
beyond a discussion which is purely internal to the agency to 
have those officers report to you, report to the American 
public, and make sure that our civil liberties and privacy is 
in fact being protected.
    With that I will take your questions. Thank you for your 
indulgence.
    [The statement of Mr. Steinhardt follows:]

                 Prepared Statement of Barry Steinhardt

Summary of Recommendations
        1. Congress should demand, and DHS should impose, a moratorium 
        on the enactment of this program. The moratorium should not be 
        lifted unless Congress receives answers to the key questions 
        outlined above and raised by the Chair and Congressman Markey.

        2. The moratorium should not be lifted until Congress 
        authorizes it.

        3. Congress should not authorize the enactment of this program 
        before enacting statutory checks and balances to ensure the 
        proper oversight of this potentially enormously powerful 
        surveillance tool. Those measures should include clear rules 
        for when domestic satellite use is permissible combined with 
        judicial oversight of such use.

        4. Congress should also strengthen and make truly independent 
        the Chief Privacy Officer of the Department of Homeland 
        Security, which, as Rep. Thompson pointed out in his letter to 
        Secretary Chertoff, appears to have been marginalized by the 
        department in the course of planning this initiative. Congress 
        should also institute similar independent privacy officers for 
        other arms of our national security establishment.
----------------------------------------------------------------------
--------
    My name is Barry Steinhardt and I am the director of the Technology 
and Liberty Program at the American Civil Liberties Union (ACLU). The 
ACLU is a nationwide, non-partisan organization with nearly 500,000 
members dedicated to protecting the individual liberties and freedoms 
guaranteed in the Constitution and laws of the United States. I 
appreciate the opportunity to testify about the privacy and civil 
liberties implications of domestic spy satellites on behalf of the ACLU 
before the House Committee on Homeland Security.

A surveillance society?
    Government satellite technology is representative of a larger trend 
that has been underway in the United States: the seemingly inexorable 
drift toward a surveillance society.
    The explosion of computers, cameras, sensors, wireless 
communication, GPS, biometrics, and other technologies in just the last 
10 years is feeding what can be described as a surveillance monster 
that is growing silently in our midst. Scarcely a month goes by in 
which we don't read about some new high-tech method for invading 
privacy, from face recognition to implantable microchips, data-mining 
to DNA chips, electronic identity systems, access passes that record 
our comings and goings, and even plans for RFID radio computer chips in 
our clothing and other consumer goods. The fact is, there are no longer 
any technical barriers to the creation of the surveillance society.
    While the technological bars are falling away, we should be 
strengthening the laws and institutions that protect against abuse.
    Unfortunately, even as this surveillance monster grows in power, we 
are weakening the legal chains that keep it from trampling our privacy. 
We should be responding to intrusive new technologies by building 
stronger restraints to protect our privacy; instead, we are doing the 
opposite--loosening regulations on government surveillance, watching 
passively as private surveillance grows unchecked, and contemplating 
the introduction of tremendously powerful new surveillance 
infrastructures that will tie all this information together. (The ACLU 
has written a report on this subject, entitled Bigger Monster, Weaker 
Chains: The Growth of an American Surveillance Society, which is 
available on our Web site at www.aclu.org/privacy.)
    Given this larger context in which the plans for domestic 
deployment of our spy satellites are being made, several conclusions 
are clear:
         This step is part of a trend of turning our nation's 
        surveillance capabilities inward upon our own population.
         If spy satellites are to be deployed domestically, it 
        is vital that the most rigorous checks and balances and 
        oversight mechanisms be put in place.
         There is much that we do not know about our nation's 
        satellite surveillance capabilities.
         A moratorium should be placed on this program until 
        Congress receives answers to the key questions about the 
        program, enacts far-seeing statutory protections against its 
        misuse, and explicitly authorizes the program.
    The government's use of military spy satellites to monitor its own 
people represents another large step toward a surveillance society. Our 
response--and especially the Congressional response--to this new 
technology will serve as a test case for how wisely we handle the 
introduction of a powerful new surveillance technology by the 
government.
    Chairman Thompson and the Committee have taken an important first 
step in calling this hearing. But other steps must be taken before this 
program is allowed to go into effect.
    There is much that we do not know about this classified system of 
spy satellites that was designed for military and foreign intelligence 
purposes. One fact seems plain:
    The satellites have capabilities that far exceed those that are in 
commercial use.
         They have far better resolution. They can see much 
        more clearly and in greater detail.
         While perhaps not as nimble as they have been 
        portrayed in popular entertainment like 24 or Enemy of the 
        State, they apparently do have advanced targeting capabilities.
         They can and do see far more than the human eye. There 
        is much we do not know about their ability to pierce opaque 
        objects, but there is every reason to believe they have some 
        (and perhaps substantial) capacity to do exactly that with the 
        power to convey information about how Americans live and work.
         The military and the intelligence community are at the 
        cutting edge of technological change. The satellites are only 
        going to grow more powerful and capable and change will occur 
        quickly.
    The Congress needs to act before our military satellites are 
deployed domestically. You must act before they are turned on our own 
people.
    It is vital that the most rigorous checks and balances and 
oversight mechanisms be put in place. The domestic use of spy 
satellites represents a potential monster in the making, and we need to 
put some chains on this beast before it grows into something we cannot 
control.

Our laws aren't strong enough
    The Department of Defense (``DoD'') and Department of Homeland 
Security (``DHS'') have strongly implied in media reports that there is 
no legal guidance available to them regarding the use of spy 
satellites. Nothing could be further from the truth. Congress has 
thought long and carefully about this issue. Beginning in 1981 and 
steadily updated over the subsequent two and a half decades, Congress 
has passed detailed statutory guidance as to how the military is to act 
when involved with civilian law enforcement. Currently embodied by 
Title 10 Sections 371 through 382 of the U.S. Code and military 
regulations such as DoD Directive 5525.5, federal law controls 
everything from the use of military equipment and facilities to 
emergency situations like those involving weapons of mass destruction.
    Military involvement in civilian law enforcement is something that 
Americans have always regarded with deep unease and the Posse Comitatus 
Act reflects those concerns. When Congress updated the Posse Comitatus 
Act it did so with careful deliberation. Authorizations for military 
involvement were limited, originally only allowing the military to 
operate directly in one area: suppression of the drug trade at the 
border. Congress generally limited the military to indirect 
assistance--loaning equipment and training civilian police. Direct 
action by the military could only be undertaken outside the United 
States.
    These laws have been updated over the years, but the basic 
prohibitions (currently embodied in 10 USC 374) have remained intact: 
direct assistance by the military is permitted only for a limited 
number of crimes, and monitoring of individuals is largely limited to 
the area outside the continental United States. DoD and DHS simply 
cannot be allow to step in and pretend that none of these rules apply 
and that this substantial body of law does not exist.
    While there is substantial law to be applied in this situation, it 
may not be sufficient to contend with the new reality of military spy 
technology stationed miles above the earth, rather than soldiers with 
their boots on the ground.
    Unfortunately, given uncertainties about the precise technical 
capabilities of the spy satellites and the applicability of the Posse 
Comitatus Act in this context, Congress cannot regard the act as a 
reliable legal bulwark against the abuse of satellite technology. In 
addition, it is certainly conceivable that a domestic law enforcement 
agency could in the future launch its own spy satellite, or that one of 
the spy satellite agencies could be transferred out of the Pentagon and 
into a civilian branch of government. In either of those cases, Posse 
Comitatus would lose all relevance--and yet it would still be crucial 
that the use of spy satellites be subject to checks and balances.
    In any case, permitting domestic spying by the military using 
powerful high-technology spy satellites certainly runs contrary to the 
spirit of the act and the concerns that prompted its passage: the fact 
that the might of the military is a dangerous thing in a democracy--a 
tiger in our midst--and must be carefully bounded and restricted in 
light of the experience of so many societies throughout history where 
the military has become a political force with power that comes not 
from the ballot box but from the barrel of a gun--or the lens of a 
camera.
    Aside from the Posse Comitatus Act, another apparent restriction on 
the use of satellites domestically is the U.S. Supreme Court decision 
Kyllo v. United States, in which Justice Antonin Scalia, writing for 
the majority, found that police could not peer inside a private home 
using a thermal imaging device without a warrant.\1\ That ruling should 
prevent some hypothetical uses of satellites, such as the scanning of 
entire neighborhoods for the presence of heat sources.
---------------------------------------------------------------------------
    \1\ 533 U.S. 27 (2001)

The need for oversight
    Of course, without proper checks and balances there is no guarantee 
that appropriate limits would be observed. Whenever we contemplate the 
introduction of tremendously powerful new technologies into our 
domestic arena, our current generation and the current Congress needs 
to think like Founding Fathers, and Mothers. It was not clear in 1776 
what the threats to freedom and democracy would be as the new nation 
developed, but the Founders were wise enough to put in place a robust 
system of checks and balances that has withstood the full range of 
human folly and perfidy for over 200 years. When it comes to spy 
satellite technology, we may be living in the equivalent of the year 
1789 right now. Put another way, we may be looking at a potential 
monster is still in its infancy. And if this technology is going to be 
permitted to be turned inward upon the American people, we need 
absolute certainty we have the right kind of restraints in place to 
ensure that, as it grows and evolves in ways we cannot predict, it will 
not trample on Americans' privacy or other rights.
    It is not simply a matter of whether we believe rogue agencies will 
flout the law (though in the absence of oversight that would certainly 
be a possibility over time). Often, it is not clear what the law says, 
and the issue is whether that will be decided in secret or hashed out 
in public. For example, take the Supreme Court's Kyllo ruling against 
thermal imaging inside a home. When satellite use includes non-visible 
spectrum technologies, questions must inevitably arise about the 
interpretation and limits of that ruling and how it applies to specific 
uses. For example, scientists use satellite images outside of the 
visible spectrum to study the earth and environment; that would not 
seem to be a violation. But it is not clear where the boundary between 
that application and the one struck down in Kyllo would lie.
    The question of oversight is partly the question of who gets to 
decide such questions and make such interpretations. If satellite 
surveillance is permitted to take place completely within the shadows, 
then those interpretive decisions will be made unilaterally by the 
military itself, and will almost certainly be made in a manner that is 
as generous as possible to the military.
    We believe that the first step in imposing the needed oversight 
over this program is for a moratorium to be placed on its commencement. 
The second step is for Congress to ask all the key questions that need 
to be asked in constructing proper systems of oversight of this 
program--and for answers to be provided by the National Reconnaissance 
Agency, the National Geospatial-Intelligence Agency (formerly the 
National Imagery and Mapping Agency), the Department of Homeland 
Security, or whatever other agency might be appropriate.
    Only with the answers to those key questions can Congress begin the 
task of writing legislation to impose checks and balances on this 
program, and only with the passage of such legislation should Congress 
authorize the start of this program.

Key questions for Congress to ask
    Two members--Congressmen Thompson, the chair of this committee, and 
Rep. Edward J. Markey, a member of this committee--deserve our thanks 
for raising the right questions and beginning the process of vigorous 
oversight.
    Chairman Thompson has done so not only by calling this hearing, but 
also through his August 22 letter to Homeland Security Secretary 
Michael Chertoff (attached for reference). In that letter, Rep. 
Thompson requests regular briefings on the status of the project, and 
expresses well-deserved dismay at DHS's decision to launch a program 
such as this without making use of DHS's own Chief Privacy Officer and 
Officer for Civil Rights and Civil Liberties, and the president's 
Privacy and Civil Liberties Oversight Board.
    We share Mr. Thompson's concerns; the failure of the government to 
avail itself of even those weak oversight institutions that now exist 
does not bode well for how oversight will be conducted over this 
program by the government in the absence of more serious oversight 
mechanisms enacted into law. It also serves as a reminder of how 
important it is that true checks and balances include truly independent 
countervailing institutions that cannot simply be written out of the 
process at will.
    A good start to Congressional oversight of this program has also 
been provided by Rep. Markey in his capacity as Chair of the 
Subcommittee on Telecommunications and the Internet of the House Energy 
and Commerce Committee. In his August 16 letter to Mr. Chertoff 
(attached), sought the answers to a number of vital questions about 
this program, including:
         Privacy and Civil Liberties. What DHS has done to 
        ensure that the program would not violate privacy? In 
        particular, what current policies and procedures govern the 
        domestic use of satellites? Have inadequacies been found in 
        those processes? Have or will new policies be developed before 
        the program is launched? Will any agencies retain any of the 
        output from spy satellites after it has been evaluated? What 
        privacy and security safeguards will be used for the storage of 
        the information? How will the Department handle complaints from 
        individuals subject to surveillance under this program?
         Legality. Has DHS conducted an assessment of the 
        legality of the program?
         Science. Might the surveillance efforts erode the 
        current scientific mission of the satellite program?
         Commercial alternatives. Why has DHS not turned to 
        commercial satellite providers to meet the objectives it is 
        seeking with this program?
    All of those questions, like those posed by Rep. Thompson, must be 
answered before this program can be allowed to go into effect. In 
addition, I would like to add several more questions that we believe 
Congress must obtain answers to.

What are the capabilities of today's spy satellites?
    The striking thing about our spy satellites is just how much we do 
not know about them. And it's difficult to draw conclusions about the 
domestic use of spy satellites when we don't know what they're capable 
of. In order to craft the right restraints, we need to know just what 
this monster looks like--and how it is likely to grow.
    For example, we do not even know the answer to perhaps the most 
basic question: what resolution they are capable of. We know Google can 
go to half a meter, and experts outside the intelligence community say 
that government satellites exceed that. But, we do not know by how 
much.
    Government satellite images presumably differ in several ways from 
publicly available online images provided by Google, Microsoft and 
other Web providers. Online images are merely snapshots taken at most 
once every few months. Spy satellites may have or gain the capability 
of producing live, moving images like that from a video camera. 
Satellites may also be capable of sweeping through much greater 
geographical areas, and/or of quickly moving their lenses to examine a 
particular spot within a much greater area at a moment's notice. And 
they also have capabilities such as radar and infrared imaging. And of 
course, they can observe ground activities silently and invisibly.
    We do not know what they can do in terms of penetrating roofs or 
other structures, live monitoring, the scanning of large geographical 
areas, the use of artificial intelligence to guide imaging, or other 
capabilities that we might not even think of. Without knowing the 
answers to such questions, we cannot even begin to evaluate their 
potential threat to our privacy.
    There is a lot of discussion and speculation about this topic on 
the Internet and elsewhere, and many experts have ideas of what the 
limits of this technology are. Undoubtedly, many will emphasize those 
limits to you in trying to downplay the privacy threat of this 
technology.
    But Americans have the right not just to be free of secret 
government spying of their innocent activities, but also to have 
confidence that they are not susceptible to the constant possibility of 
being invisibly observed. So in our view the government must completely 
declassify and disclose publicly the full extent of the technological 
capabilities of any satellites that will be aimed at the American 
people, and you, Congress, must think like Founding Fathers and 
institute checks and balances that would be strong enough to protect 
Americans' privacy even in the face of every gee-whiz satellite 
capability that Hollywood has ever imagined.

What might spy satellites be capable of in the future?
    The Congress also needs to know how satellite technology is likely 
to develop in coming decades given how rapidly technology is advancing. 
A reasonable forecast of future progress might be made based on factors 
such as:
         The continuing exponential growth in computing power 
        and data transfer rates
         The similar rapid growth in the power of digital 
        imaging that we have all seen in the prices and capabilities of 
        consumer digital cameras
         The continuing development of imaging technologies 
        outside the visual spectrum, such as infrared, ultra-wideband, 
        various kinds of radar, etc.
         The possible solution to research problems that are 
        currently being worked upon.
         The amount of resources that are likely to be devoted 
        to the development of our spy satellite technology in coming 
        years
    Of course a wise policymaker will institute checks and balances 
that account not only for reasonably foreseeable developments, but also 
the possibility for the sudden emergence of new inventions that are 
today completely unanticipated.

Just what uses does our security establishment envision putting these 
new satellites to?
    Are there really serious advantages that spy satellites can provide 
to police and Homeland Security agencies that cannot be provided by 
commercial satellite images of the type available on the Internet or 
elsewhere? If so, what are those uses? Are the advantages provided by 
this program substantial enough to counterbalance its threat to our 
privacy? Or is this just another example of an arm of our security 
establishment seeking to find new missions and new reasons for being in 
order to expand its budgets and bureaucratic reach? Or is law 
enforcement being seduced by the siren call (to which many of us are 
susceptible) of really cool toys?
    If this new program does not actually show substantial promise in 
making people safer, the matter should end there. There is no need to 
engage in detailed balancing tests or evaluations of a program's effect 
on privacy if it is not going to increase security.

Recommendations
    We recommend 4 basic steps in response to this situation.
        1. Congress should demand, and DHS should impose, a moratorium 
        on the enactment of this program. The moratorium should not be 
        lifted unless Congress receives answers to the key questions 
        outlined above and raised by the Chair and Congressman Markey.
        2. The moratorium should not be lifted until Congress 
        authorizes it.
        3. Congress should not authorize the enactment of this program 
        before enacting statutory checks and balances to ensure the 
        proper oversight of this potentially enormously powerful 
        surveillance tool. Those measures should include clear rules 
        for when domestic satellite use is permissible combined with 
        judicial oversight of such use.
        4. Congress should also strengthen and make truly independent 
        the Chief Privacy Officer of the Department of Homeland 
        Security, which, as Rep. Thompson pointed out in his letter to 
        Secretary Chertoff, appears to have been marginalized by the 
        department in the course of planning this initiative. Congress 
        should also institute similar independent privacy officers for 
        other arms of our national security establishment.
    Satellites are but one of many powerful new technologies that are 
entering our lives at this exciting point in our history. Many of those 
new technologies promise wonderful new innovations and conveniences-but 
many, in the absence of due concern and care over their effect on 
privacy, and in the absence of strong privacy regulations, threaten to 
become an out-of-control monster that moves us closer than ever to a 
genuine surveillance society. Congress needs to craft sufficiently 
strong restraints on this program to ensure that it does not go out of 
control--to protect Americans against the potential for unacceptable 
uses of satellite surveillance. And it should treat military spy 
satellites as a test case for how other technologies should be handled, 
ideally backed up by an overarching privacy law that will create more 
clarity and stability of expectations for Americans living in an era of 
constant change.

    Chairman Thompson. Thank you very much.
    I would now yield 5 minutes to Ms. Graves for summation of 
her testimony.

STATEMENT OF LISA GRAVES, DEPUTY DIRECTOR, CENTER FOR NATIONAL 
                        SECURITY STUDIES

    Ms. Graves. Thank you, Mr. Chairman. We appreciate very 
much the invitation to be here. On behalf of the Center for 
National Security Studies and my partner, Kate Martin, we 
appreciate very much the opportunity to testify today about 
these very important matters. I am going to dispense with the 
statement that I prepared because I found the testimony this 
morning so astonishing that I would like to respond to some of 
the points made. And, in addition, I would like to associate 
myself with the remarks of my colleague over here. I thought 
those were very important observations.
    The Center for National Security Studies stands by our 
statement about our grave concerns about the proposed activity, 
whether it is down the stream or the present proposed activity. 
Calling the potential unilateral deployment by the executive 
branch of these extraordinary surveillance powers on the 
homeland domestically is a dramatic change in the law, and we 
do think that it is like Big Brother in the Sky.
    Now, I understand that there is classified information 
about the range of this technology, about the scope of it. Let 
me just be clear about our understanding from the public 
records. There are assertions that the current resolution of 
even the imaging satellites is between 0.5 meters and a meter. 
In essence, for things that are 3 feet across, 3 feet wide. But 
that is in essence the commercial technology right now. The 
current estimates in the public domain about the true 
possibilities of this surveillance are that it is within the 
inches range of its resolution. That is in the public domain of 
that speculation. And that actually informs in some way this 
new desire to implement this new technology, because it is now 
about people, about being able to monitor people.
    So when the Department of Homeland Security says, don't 
worry, we can't tell if you need a hair cut, I would say, yet. 
They are still looking at people. The purpose of this, the 
examples highlighted in this so-called Blue Ribbon Commission 
about how they would like to use this, are directed at people. 
So I hope you won't be misled unintentionally about the scope 
of this authority. But let me just add a few additional things.
    I was astonished by the assertions today that no law needs 
to be changed to accomplish this. Let me just refer you to the 
record that was before the House Judiciary Committee in 1981 
when Congress, not the executive branch, when Congress 
considered whether to allow the military to be involved in the 
enforcement of drug laws extraterritorially and at the border. 
This was the record.
    Before Congress at that hearing there were opinion after 
opinion of legal opinions of the Office of Legal Counsel about 
their understanding of the scope of Posse Comitatus and whether 
it would reach or not reach the activity, the specific activity 
proposed, versus this far-reaching Federal, State, local, 
tribal, civil, criminal application proposed to be begun on 
October 1st.
    We know more about what William Rehnquist and the Nixon 
administration thought about the scope of Posse Comitatus than 
we do about this administration. And we know from other 
sources, including the torture memos, that this administration 
has taken a very expansive view of its authority domestically 
in a wide range of areas. And, in fact, according to the 
torture memo there is a memo that was written by John Yoo in 
which he asserts that Posse Comitatus generally prohibits the 
use of the Armed Forces for law enforcement, absent 
constitutional or statutory authority to do so.
    Now, I would hesitate to associate myself with the comments 
or legal views of John Yoo. But if John Yoo has a memo out 
there, which we can provide you the full site, I think it is in 
my written testimony, you should have that memo and you should 
have any subsequent memos. You are entitled to those memos. 
This body is entitled to those memos. There is ample precedence 
from the Reagan administration for getting those memos. You 
should have the general counsel. But you shouldn't just have 
all assurances. You should have this in writing. And, more than 
that, the American people should have this in writing. We are 
entitled to this as a matter of our democracy.
    Obviously, there are things we can't know in terms of some 
of the specifics of the particular operations or sources or 
methods of those operations. But the fact of the matter is that 
there are fundamental constitutional principles at stake and 
statutory principles at stake.
    The suggestions that were made by the panel before us that 
this is useful in disasters, that this is useful in hurricanes, 
what they didn't tell you was that those are already exceptions 
that are long recognized in the law. This is not about the use 
of this technology in hurricanes or disasters. It is about the 
use of this technology for law enforcement purposes. And I 
referred in my testimony to the lengthy report of Professor 
Pyle who goes through why, from a constitutional perspective, 
it is essential that it not just be about having the military 
arrest people. The limitations on military surveillance, 
technology being deployed domestically are not just about that 
sort of really direct intervention law enforcement; it is much 
broader than that as part of our constitutional system. And 
there is good reason for that, and let me just give you two.
    One is, as Professor Pyle documents, and the Center of Sam 
Ervin also documented, the use, the direction of the military 
toward the collection of information about Americans raises 
substantial civil liberties concerns. As Senator Ervin said 
after his lengthy review of this, after a simple request, a 
request against the capacity of the Defense Department, that 
began with a simple request to help the Defense Department keep 
order, the Defense Department obtained files and created files 
on over 100,000 people, including Members of Congress.
    And the second point, let me conclude with this, is to say 
the second reason why this is so important is because public 
trust is essential for our national security. Public trust has 
been eroded by the unilateral actions of this administration 
time and time again. The public press is enhanced by the direct 
full intervention of this Committee of Congress in these 
important matters of our democracy, and public press is 
enhanced by the public's involvement in those debates. And so 
we would urge, along with the ACLU, that this program not be 
permitted to go forward as planned on October 1, and it should 
not go forward until it is fully investigated in a series of 
lengthy examinations by this committee and other committees 
examining the scope and rights of the American people.
    [The statement of Ms. Graves follows:]

                   Prepared Statement of Lisa Graves

    Chairman Thompson, Ranking Member King, and distinguished Members 
of the Committee on Homeland Security of the United States House of 
Representatives, we thank you for scheduling this full committee 
hearing so quickly to examine the administration's announced deployment 
of spy satellites to surveil Americans in the continental United 
States. The Center for National Security Studies appreciates the 
opportunity to testify about our grave concerns regarding this unwise 
and proposal made unilaterally and containing no checks against abuse. 
The Center was founded over 30 years ago to help protect civil 
liberties and human rights against erosion by claims of national 
security, in the aftermath of the first wave of disclosures to Congress 
regarding extensive, secret military and civilian government 
surveillance of Americans in this country.
    Kate Martin, the Center's director, and I work closely on 
surveillance issues, and the types of military surveillance of the 
civilian population first disclosed in news articles during the August 
recess pose significant threats to our constitutional system and civil 
liberties. The administration continues to be tone deaf on matters of 
civil liberties, with all due respect to my colleagues on the first 
panel--their comments are an after-thought, a sound bite. As the 
Chairman mentioned in his letter, this satellite deployment was 
basically a ``fait accompli'' by the time it got to the agency privacy 
designees this spring.
    At the outset, I would like to raise some questions and try to help 
clarify the scope of the surveillance at issue today. I will then 
discuss core constitutional and legal principles that call into 
question the extraordinary surveillance activities proposed. I will 
conclude by describing the need for more oversight and proposing some 
solutions.

    I. Civil Liberties and Privacy Concerns Raised by the Civil 
Applications Committee's Report.
    In May 2005, the Director of National Intelligence commissioned a 
Civil Applications Committee Blue Ribbon Study, which was completed in 
September 2005. Several of the Committee's recommendations, including 
the creation of the Domestic Applications Office in the ODNI have 
apparently been adopted. The domestic deployment of military satellites 
is also apparently the result of these recommendations. However, it is 
not known what other actions have been taken in response to these 
recommendations. It is important to understand the breadth, scope and 
danger of the recommendations.
    While the deployment of military satellites to monitor U.S. 
civilians has been the focal point of the press on this breaking story, 
the actual scope of Intelligence Community (IC) powers that could be 
deployed is broader than that, including ``national satellite sensors; 
technical collection capabilities (archival, current & future) of the 
DoD; airborne sensors; NSA worldwide assets; military and other 
``MASINT'' sensors; and sophisticated exploitation/analytic 
capabilities.'' Civil Applications Committee's Report (CACR), at p. 8. 
MASINT, which is the acronym for ``Measurement And Signatures 
Intelligence,'' describes technologies that ``exploit fundamental 
physical properties of objects of interest'' and techniques that 
include advanced radar, electro-optical sensors, infrared (including 
spectral) sensors, geophysical measures such as acoustics, and 
materials sensing, processing, and exploitation systems. MASINT is 
distinct from other techniques averred to in the report such as 
``imaging'' (photography, both still photography and real-time video-
type recording) and signals intelligence (SIGINT), which includes 
electronic surveillance, commonly called eavesdropping or wiretapping. 
While this list might sound like Big Brother incarnate, it might give 
some Americans comfort to know that these are the capabilities that 
have been created to protect us against foreign enemies. It should be 
obvious, however, that deploying these extraordinary powers against 
people in the U.S. would fundamentally alter the relationship between 
the government and the governed. Calling this ``Big brother in the 
sky'' is modest given the array of array that might be available multi-
headed, medusa-like powers to monitor Americans encompassed by this 
array of arrays.
    The Committee concluded that there is ``an urgent need for action 
because opportunities to better protect the nation are being missed,'' 
a finding contradicted later in the same report: ``During the course of 
the study no one said they were failing in their mission due to lack of 
access to IC capabilities. There was no `Burning Bridge' identified by 
the participating agencies and stakeholders.'' Compare CACR p.4 with 
id. p. 10 (emphasis added). To be plain, the question is whether this 
blurring of the lines between civilian and military activities is wise 
and prudent. The report has a view on that as well: while law 
enforcement has ``traditionally focused on arrest and prosecution and 
the IC on disruption and prevention. These mission foci are blurring'' 
and this blurring should be considered a `` 'feature' as opposed to a 
`flaw.' '' Id. p. 12.
    The report also casts a critical eye toward civil liberties, 
asserting that the protection of ``individual civil liberties'' and 
protection of sources and methods ``are the predominant concerns'' in 
the ``risk-averse'' environment. Id. p. 10. It then sets up a decision-
making process about deploying IC technology domestically in which the 
protection of civil liberties in just one of ten factors. The report 
then proposes ``fast-tracking'' consideration and decisions on such 
legal concerns. Id. p. 18. It is striking that Congress is not 
mentioned anywhere in the process for flagging legal concerns and 
deliberating about how to resolve ``issues on the boundary or not 
covered by policy.''
    While the report contends that a ``strict set of legal and 
protection of civil liberties guidelines would be followed,'' such 
secret guidelines could be changed at the direction of the executive or 
the whim of a zealous attorney at OLC, such as a John Yoo. That is 
precious little protection. In fact, the report relies upon the kind of 
now-discredited parsing of words engaged in by the Office of Legal 
Counsel in the first term of this administration. For example, one of 
the reasons why the report supports encouraging the U.S. Marshals 
Service to use IC technology is that because their job is to execute 
warrants by apprehending fugitives there is ``a very low probability 
the IC's involvement would be subject to a judicial proceeding,'' a 
kind of don't ask-don't tell/win-win situation according to the 
operating ``ethos'' of the report. See id. at p. 24.
    Even when reading legal precedents, the report puts its thumb on 
the scale of increasing surveillance of the American people, by 
providing a roadmap for activities that proponents would likely argue 
are permissible, if the government took more of a ``risk management'' 
rather than ``risk-averse'' approach to civil liberties issues:
         Warrantless ``aerial searches of private property'';
         Warrantless ``use of highly sophisticated mapping 
        cameras to photograph the interior of a building''; and
         Warrantless satellite surveillance of this same kind.
    The report does acknowledge that the Supreme Court recently held 
that thermal imaging of a residence without a warrant was unlawful. See 
Kyllo v. United States, 533 U.S. 27 (2001). However, the report notes 
that there is ``no clear authoritative guidance issued on the impact'' 
of this decision on the use of domestic MASINT.' CACR at p. 30. Despite 
this decision that post-dates other decisions relating to aerial 
searches, the report goes on to justify expansion by claiming that the 
Congress ``did not substantiate the allegations of the illegal use'' of 
photographic sensors to image domestic areas, hardly a ringing 
endorsement of doing so now. See id. The report is also critical of the 
``cultural aversion toward collection of domestic imagery based on 
concerns involving the potential of congressional oversight sanctions 
centering around 4th Amendment concerns.'' Id. at 32.
    The report credits the tragic events of 9/11 and the ``global war 
on terror'' with creating a better environment for domestic expansion 
of these authorities. And, the report suggests that simply having a 
Privacy and Civil Liberties Oversight Board is sufficient to ensure 
that Americans' privacy is being protected. The actual report of the 
PCLOB earlier this year demonstrated far from model oversight--the 
report was basically a rubber-stamp of White House initiatives. The 
White House's editing of the report led in part to the resignation of 
the only Democratic appointee of the five-member board. (Subjecting the 
board members to Senate confirmation, as the 9-11 implementation bill 
did, is unlikely to change the make-up of the board until the end of 
the next presidential term.) This utterly inadequate Executive Branch 
``check'' is no substitute for robust congressional oversight and 
judicial review to protect the Fourth and First Amendment rights of 
Americans. To the contrary, as the Committee recognizes, the PCLOB can 
be enlisted to help ratify, the domestic use of IC capabilities. See 
id. pp. 31--32 & n.11.
    It is also quite worrisome that the report recommends revising 
Executive Order 12333 that governs U.S. intelligence activities ``to 
permit as unfettered an operational environment for the collection , 
exploitation, and dissemination as is reasonably possible'' of domestic 
intelligence activities. See id. at p. 31 (emphasis added). We are also 
concerned that the report proposes a way around U.S. person rules by 
adding unique ID numbers to information derived through foreign 
intelligence electronic surveillance to make it easier to know more 
about subjects without their names attached. Id. p. 41. Lest any Member 
believe this issue is distinct from the disastrous changes in the law 
rammed through Congress before August vacation, it is clear that 
surveillance of Americans' communications is included in the report's 
recommendations for expanding domestic applications of satellite and 
other IC technologies. Yet it seems highly likely that there has been 
no forthright or comprehensive briefing of Congress on how this issues 
impact each other; certainly there has been no public debate to 
evaluate the potentially severe impact on the privacy rights of 
Americans.
    While asserting the need to abide by ``the rule of law,'' the 
report concludes that many rights ``have now been abridged at least in 
practice if not in law.'' Id. at p.38. The defense contractors call 
this the ``new normal'' and note that there is a whole body of 
``Presidential memoranda and executive branch decisions that direct 
certain actions and events that are germane,'' documents that it is 
highly likely the congressional branch, charged with writing the law--
in contrast to the executive branch that is charged with executing the 
law--has likely never even seen. See id. p. 39. The report concludes by 
positing a very troubling, Cheney-esque point of view, claiming that 
the Church and Pike Committee investigations ``created a hyper-
conservative view of what can be done.'' See id. at p. 42. It 
recommends that overseers should not look for ``black and white'' 
distinctions but instead ``experimentation'' should be the rule, while 
remaining thoughtful about the ``legitimate'' rights of Americans, 
whatever those may be. Id. at p. 43. That's a very sunny view, but the 
reality is that there is no country in the world where domestic 
intelligence collected in secret has not been misused by the government 
in power, usually against its political opponents, including the United 
States. The long-standing rules and understandings that this report and 
the DNI's proposed office seeks to undo would turn back the clock to 
the dark days when military surveillance of the American people was the 
``new normal,'' but would do so with exponentially better, more 
intrusive technology than J. Edgar Hoover ever dreamed of.

    II. Constitutional and other Legal Considerations Support Being 
``Risk Averse'' to Protect Rights
    The proposed expanded surveillance of Americans call to mind the 
1998 movie, ``Enemy of the State,'' where Will Smith's character is 
tracked by NSA and other government agents via satellite surveillance, 
through tiny GPS transmitters, via bank records, and through via 
electronic monitoring of domestic conversations and call data without 
warrants. It's just a fictional movie, of course, but it is one of the 
more recent visual depictions of some of the IC capabilities at issue 
here. In response to questions raised at the time of the film's release 
about whether the National Reconnaissance Office (NRO), which maintains 
the spy satellite network, could ``read the time off your watch'' NRO 
spokesman Art Haubold pointed out that, ``legally, his organization is 
not allowed to turn its surveillance systems on the United States.'' If 
the Domestic Applications Office is allowed to pursue the proposals 
made by the Committee, that assurance will no longer be true.
    The principle at stake, as stated by the NRO, was that satellite 
technologies were not allowed to be turned on the U.S. Now the 
administration spokespeople are left with saying don't worry, we won't 
be able to ``tell if you need a haircut,'' not the same kind of 
assurance at all. To the contrary, it implies the opposite of the 
uniform assurances made before this administration--now they might be 
watching but can watch you, they just do not yet have the technology to 
see everything.
    Less than a decade ago, commercial satellites could conduct what is 
known as panchromatic electro-optical surveillance with a resolution of 
one to .5 meters. According to public accounts, the actual resolution 
of military satellite technology four decades ago, in 1967, was one 
meter, which means the ability to distinguish objects almost three feet 
across. Recall the black and white photos later released regarding the 
Cuban missile crisis. There is no doubt that military technology has 
made dramatic leaps forward since then and while the true resolution is 
secret, public estimates are that the military can create visual images 
of much better quality than the commercial applications, in the range 
of 10--15 centimeters, or objects up to four inches across. That is why 
the Department of Homeland Security can claim there is no worry about 
seeing your haircut from space. To which I would add one word: yet. 
It's imminent.
    What this means is the government will have the capacity to 
photograph from satellites or platforms on high not just borders or 
buildings or missiles or cars but ordinary people. And there are the 
other sensors, infra-red, thermal, audio/greatly amplified hearing 
devices and the patented technological capacity to sort through 
conversations in a crowded room. There are GPS transmitters, which 
Americans rely on for driving directions or in their cell phones and 
which the government could easily use to track individuals.
    There is only one given in this debate: that technology will 
continue to improve. As Bill Gates has remarked, technology will 
improve often in ``great leaps over relatively short periods.'' The 
resolution of military satellite images and quality of other IC sensors 
are only going to get better and better, especially with the amount of 
money available for R & D.
    The rules for turning military satellites inward on the American 
people should not depend on how great the photo resolution and GPS 
tracking technology is at the moment. The rule should depend on 
principles, what the report disdains as ``black and white 
distinctions''. These conservative principles, which the report 
criticizes as ``risk averse,'' are the principles that have preserved 
our civilian democracy from military control. One principle that has 
been the glue that has preserved the compact between the citizens and 
the state is that the branch that uses power cannot be the branch that 
creates the rules for such use or enforces them. Turning military 
satellites and sensors inward on Americans should not be the unilateral 
decision of the DNI, or other intelligence officials, or of the 
proponents of the untrammeled executive power.
    Much has been said over the years about whether the Posse Comitatus 
Act applies or does not apply to a given activity. The posse comitatus 
statute itself has a bit of a checkered past, as it was passed a decade 
after the end of the Civil War in response to complaints by Southerners 
against federal troops still policing reconstruction efforts and in 
particular the rights of African Americans to vote. The statute makes 
it a crime to ``willfully use'' the military ``to execute the laws,'' 
except in cases ``expressly authorized by the Constitution or Act of 
Congress.'' Congress has created several exceptions over the years, 
such as emergency situations as with an insurrection or health 
quarantine as well as narrowly drawn exceptions for circumstances 
involving nuclear weapons or assassination. Other exceptions have been 
less well drawn, such as enforcement of federal drug laws, although 
that has been confined to the borders.
    It is plain that under the terms of the statute Congress can make 
exceptions, although it is not plain to us that every exception would 
pass constitutional muster. We believe that a new statutory exception 
for the deployment of spy satellites to spy on the American people 
without any judicial check would not only swallow the rule but would be 
unconstitutional. It does not appear, however, that the Executive 
Branch is asking for your permission or a statutory exception. It is 
instead a ``fait accompli.''
    I suspect their arguments are two-fold. First, that so long as they 
are not permitting the military to arrest a person they are not 
executing the law. (But the military has already taken a citizen and 
others into custody inside the United States without charges as ``enemy 
combatants.'') This would be a rather narrow interpretation of what it 
means to execute the law, especially for an administration that claims 
for itself maximum deference in its executive functions. The more 
sophisticated argument they might make on this point is that such IC 
capabilities would be passive, not directed at executing the law. (Such 
an argument might reach back to some lower court decisions stemming 
from the particular facts of the massacre at Wounded Knee where a 
military officer was reported to have directed law enforcement agents.) 
The statute should not be read so narrowly.
    On these points I would refer the Committee to the eloquent legal 
analysis of Dr. Christopher Pyle. As he demonstrates in his memorandum, 
``the primary objective of the Posse Comitatus Act has not been merely 
to forbid energetic, aggressive, intrusive assistance, but to forbid 
routine assistance as well.'' He presciently observed that ``the 
political pressures for information may cause the armed forces to 
redefine the `normal course of military operations' so as to re-involve 
the military in the surveillance of civilian political activity.'' This 
forecast unfortunately came true in the case of the recently abandoned 
``TALON database,'' which the Defense Department used to collect 
information on innocent Quakers and members of other peaceful religious 
groups that have spoken out against the war in Iraq. As Dr. Pyle noted:
        During the late 1960s, it was `normal' for the U.S. Army 
        Intelligence Command to dispatch plainclothes agents to observe 
        nearly every demonstration in the United States involving 20 or 
        more persons, to infiltrate domestic political groups, to 
        maintain huge data banks on dissidents, and to share 
        information about wholly lawful political activity with 
        civilian law enforcement agencies, including some with 
        notorious records for violating First Amendment rights. 
        Overseas, it was normal to open civilian mail, wiretap American 
        civilians, and violate confidential communications between 
        American civilian attorneys and their clients.
    (I would ask to make his full statement part of the record, as an 
attachment to my testimony.) While some of these specific activities 
have since been prohibited, the proposal to deploy satellite and other 
technologies involves the same dangers.
    I would submit that there are also larger principles at stake than 
that particular statute, based on the Constitution's structure of 
limited powers. For example, the Constitution means to make the 
imposition of martial law the rare exception by barring standing armies 
and forbidding the suspension of the writ of habeas corpus except in 
rebellion or invasion (and grants that power to Congress, not the 
president, in Article I). As Senator Sam Ervin noted: the 
``Constitution clearly contemplates that no part of the armed forces 
may be used in the United States for any purpose other than the 
following: (1) to repel a foreign foe; (2) to quell a domestic 
insurrection against the government; or (3) to suppress domestic 
violence which the states are unable to suppress without federal aid.'' 
Senator Ervin conducted a lengthy and thorough investigation of the use 
of the armed services to spy on Americans, and I would ask that a 
historical article and letter from him regarding military surveillance 
be included in the record as an attachment to my testimony. In his 
article, Senator Ervin noted that Congress had documented the abuses 
that occurred the last time the military was permitted to engage in 
domestic surveillance. Among the many examples cited, I would note in 
particular the following example from an Army Intelligence unit in 
Chicago in the late 1960s and early 1970s:
        He described how this unit targeted for surveillance 800 
        persons in Illinois, collected by overt and covert means 
        information about them, stored such information in dossiers, 
        and transmitted some of it to intelligence installations 
        elsewhere. Among those persons spied upon were Senator Adlai E. 
        Stevenson, Representative Abner Mikva, and United States 
        Circuit Judge and former Illinois Governor Otto Kerner, as well 
        as state and local officers, clergymen, journalists, lawyers, 
        and contributors to political and social causes.
    Senator Ervin also stated that through notes, recordings, and 
photography, the dossiers recorded the ``attitudes, aspirations, 
thoughts, beliefs, private communications, public utterances'' and 
financial information. The stated justifications for some of this 
surveillance was predict civil disturbances. In all, ``[m]ore than 
100,000 civilians were subjects of surveillance by military 
intelligence. . . . Their reports were fed into scores of computers and 
data banks across the country. No meeting or demonstration was too 
trivial to note; no detail of one's personal life too irrelevant to 
record.''
    While the military acknowledged its failings and adopted new rules 
to prevent such surveillance by individual personnel, Senator Ervin's 
warnings from the past about the need for clear rules are again 
relevant given the technology now available. History was already 
repeating itself in the TALON database and, while we welcome the 
announcement of its demise, the potential for mission creep by the 
military, with its enormous resources, is still quite dangerous. It is 
the nature of the military to take actions on a massive scale, with 
individual collectors simply following orders, collecting against 
requirements from on high. Indeed, one of the military's strengths is 
its massive force and capabilities. But this sledgehammer-like strength 
should not be deployed, even or perhaps especially via surveillance, 
against the American people as a whole or against selected groups or 
individuals here in the U.S., without judicial oversight, in response 
to requests by civilian law enforcement agencies at all levels of 
government seeking military involvement and assistance in the 
enforcement of all kinds of criminal and civil laws.

    III. The Need for More Complete Disclosure and More Investigation 
into this Matter
    Clearly, more investigation is warranted.
    Two years ago, the report produced by the non-governmental Civil 
Applications Committee recommended establishing a ``Domestic 
Applications Committee'' in ODNI to fund and accommodate access to 
current Intelligence Community ``collection and processing 
capabilities'' as well as to increase funding for R & D, acquisition 
and ``Tasking, Collection, Processing, Exploitation, and 
Dissemination'' (TCPED). In essence, military contractors studied the 
potential to use military resources domestically and agreed that these 
military resources should be used for domestic intelligence and 
domestic law enforcement with increased funding. I suppose one should 
not be surprised by this result.
    What should surprise, or at least offend, Congress is that in the 
two years the DNI has had this report and on the eve of its 
implementation it took the press to discover this revolutionary plan. 
It appears that this Committee was not informed that the DNI had begun 
to implement this taxpayer-funded study. (Although the administration 
told reporters that it had briefed ``key'' members of this Committee, 
as well as Appropriations and Intelligence, press also reported that 
neither the Chairman nor the Ranking Member of this Committee were 
aware of it before it was reported in the news.) There is no public 
record to support the conclusion that the DNI consulted with this 
Committee before striking a deal in May with the Department of Homeland 
Security and its secretary Michael Chertoff, to provide access to 
information about people in the U.S. collected via satellites flying 
over the U.S. There is no record to indicate that DHS sought advice 
from this Committee before entering into the reported Memorandum of 
Understanding (MOU) or that the Members of this Committee have seen 
this MOU and have a clear understanding of its scope, its intended 
effect and its likely unintended consequences.
    How many times have Director McConnell or Secretary Chertoff or 
their staff been up to Congress in the last four months or two years, 
making assurances and claims, without mentioning this massive expansion 
of domestic surveillance? How much longer can you continue to rely on 
assurances when time and time again Executive Branch officials have 
omitted key facts or provided you with carefully selected information 
in response to only the precise questions asked. This game of hide and 
seek is unbefitting a democracy.
    There is also no record to support the conclusion that Congress has 
any concrete estimate of how much this might cost or what the 
opportunity costs are of directing military satellites toward the 
American people, let alone a full and accurate assessment of civil 
liberties and privacy concerns, other than what has been presented by 
military contractors and political appointees of the Executive Branch. 
It is the nature of the Executive Branch to maximize executive power 
and discretion, which is why robust checks are essential. We have 
witnessed this inherent tendency in overdrive over the past six years 
due to the extreme views of Vice President Cheney about inherent, 
unlimited power of the president, views that have been adopted and 
implemented throughout the Executive Branch. Some of the related OLC 
opinions were written by the discredited John Yoo, whose views the 
subsequent head of OLC, Jack Goldsmith called ``tendentious,'' ``overly 
broad'' and ``legally flawed.'' See Jeffrey Rosen, ``Conscience of a 
Conservative,'' The New York Times Magazine (Sept. 9, 2007).
    I mention this background because in my observation Congress needs 
to establish its own Office of Legal Counsel for purposes of assessing 
the scope of authority under the Constitution and statutes, because the 
Justice Department's OLC has an institutional bias in favor of the 
branch within which it resides. In some ways the Congressional Research 
Service fulfills this role, but it has not been given the 
responsibilities or credit it deserves to be a counterweight to OLC's 
defense of presidential power and diminution of congressional controls, 
as evidenced in this recent period. Despite the great flaws in some of 
these OLC opinions, they are important markers for what the Executive 
Branch thinks it has the power to do. The tradition prior to this 
administration was to make almost all of the opinions that relate to 
the interpretation of public law public even if redactions were needed. 
And, yet, as we sit here today debating whether public statutes, such 
as the Posse Comitatus Act preclude the deployment of military 
satellites to target or track civilians in the U.S., this Committee 
does not have the relevant memos from the administration to assess what 
the administration thinks it has the power to do with or without the 
consent of Congress. Specifically, the administration apparently 
reinterpreted the Posse Comitatus Act, along with several other 
statutes in October 2001. As stated in footnote 16 of the OLC August 
2002 ``torture memos'':
        We recently opined that the Posse Comitatus Act, 18 U.S.C. s. 
        1385 (1994), which generally prohibits the use of the Armed 
        Forces for law enforcement purposes absent constitutional or 
        statutory authority to do so, does not forbid the use of 
        military force for the military purpose of preventing and 
        deterring terrorism within the United States. See Memorandum 
        for Alberto R. Gonzales, Counsel to the President and William 
        J. Haynes II, General Counsel, Department of Defense, from John 
        C. Yoo, Deputy Assistant Attorney General and Robert J. 
        Delahunty, Special Counsel, Office of Legal Counsel, Re: 
        Authority for the Use of Military Force to Combat Terrorist 
        Activities within the United States at 15-20 (Oct. 23, 2001).
    What does this memo say about using military force or tools, such 
as satellites or what is known as ``remote sensing'' data or devices on 
these shores? Was the administration's rhetorical argument that the 
battlefield is everywhere translated into legal opinions that would 
permit the military to electronically surveil Americans without 
warrants and seize and ``arrest'' civilians on the general ground of 
terrorism prevention, hold them in military brigs and detain them 
without trial. These matters are all inter-related and Congress has not 
yet gotten to the bottom of what has been wrought, although it has now 
begun to do so.
    We respectfully request that this Committee begin a comprehensive 
review, jointly with the Judiciary and Intelligence Committees, of how 
domestic surveillance powers are being used. As former CIA advisor 
Suzanne Spaulding has noted:
        The inquiry should start with an open question about the design 
        or efficacy of oversight and accountability mechanisms. The 
        inquiry should ask first whether some powers should ever be 
        granted to the government; whether the law or institutional 
        safeguards can ever be adequate to protect constitutional 
        government and individual liberties against the kind of power a 
        government will amass when it harnesses all potential 
        technological surveillance capabilities.
    The proposal to deploy military surveillance powers domestically 
only adds to the urgency of the need for a systematic review of 
domestic and foreign surveillance powers, as currently deployed and as 
proposed by the administration. In the absence of such an examination 
and full disclosure to Congress, no new surveillance powers should be 
approved and ratified.
    We also believe this Committee has a duty to insist on seeing the 
Yoo memo and any subsequent memos that attempt to justify domestic use 
of military satellites for intelligence gathering in the U.S. related 
to terrorism or for other purposes. Has this memo and any later 
clarifying memos by Jack Goldsmith or by officials at ODNI or elsewhere 
on the application of the posse comitatus or other restraints been 
provided to this Committee? If it has been provided, we would ask that 
it be made public to the extent possible. We suspect, given this 
administration's dubious claims of the need to classify or keep secret 
even interpretations of public laws, that the Committee has not 
received the Yoo memo or any others we have identified. We do not 
think, however, that the Congress should permit the Domestic 
Applications Committee to implement recommendations until these and 
other key documents are transmitted. Even then the Congress should 
examine carefully this dramatic expansion of the use of military 
resources in the US homeland against people in the US and withhold 
approval if the only case that is made is that it might have some 
utility.
    The administration seems to be operating under a variant of the 
bureaucratic dictum, it is easier to ask for forgiveness than 
permission: often they seek neither permission nor forgiveness. They 
simply act in secret, violating statutes such as the Foreign 
Intelligence Surveillance Act, until their unlawful conduct is leaked 
and then they investigate the whistleblowers. They then seek to 
legalize what they have done and institutionalize it with Congress' 
acquiescence. We are concerned that the administration plans to 
implement the domestic satellite spy program with or without the formal 
blessing of Congress, although it is possible that this expense is 
obscured in some ambiguous line in the so-called black budget.
    Congress, however, has some tools in its constitutional toolbox and 
should enact a funding rider to prevent any more American taxes from 
being spent on the Domestic Applications Committee or the 
implementation of the satellite-spying proposal. This House should use 
the power of the purse and let the president threaten to veto the 
federal budget over this, or the House should at least take steps to 
force the president's allies in the Senate, from whatever side of the 
aisle they hail, take a vote on the record in favor of spy satellite 
surveillance of the American people. Congress should not just let this 
proposed activity be implemented without those who support spying on 
Americans paying any price. Without such credible action by this 
Congress, the next 14--17 months at least will be filled with more 
liberty eroding policies being implemented without consequence. Once 
implemented, such programs and expenditures can be very difficult to 
undo.

IV. Conclusion
    Intelligence officers have sometimes described the IC's 
capabilities as a ``weapon.'' We believe these incredible powers should 
not be trained on the American people. The Center for National Security 
Studies stands by its initial fears about the proposed surveillance--it 
is big brother in the sky. The military surveillance activity that 
could be deployed unilaterally by this administration as proposed 
``experimentation'' is nothing short of revolutionary. We call on this 
Committee to continue to investigate this proposal and to withhold 
funding unless and until full information is received and it is clear 
that such capability is necessary and consistent with the Constitution 
and the protection of civil liberties. Thank you for considering our 
views.

    Chairman Thompson. Thank you very much. I thank the 
witnesses for their testimony. I now recognize myself for 5 
minutes of questioning, and I yield that time to the gentlelady 
from California.
    Ms. Harman. Mr. Chairman, I thank you for that. I apologize 
to you and our members and the witnesses for having to leave in 
5 minutes, but I have found this 3 hours extremely useful.
    You were all here and heard my rant to the first panel. I 
stand by that, but I would now add a few things and ask you a 
question.
    I like Mr. Steinhardt's idea about a moratorium. I think on 
a bipartisan basis this committee is very concerned, and Mr. 
Brown's comments could have been any of our comments in terms 
of the overreach of executive power into our homes in a way 
that we have not permitted. So, I think a moratorium is a good 
idea. The Committee will be sending a letter to Mr. Allen later 
today requesting all the materials that you have suggested we 
get. And, as far as I am concerned, I would like us to do 
whatever we can to delay this program proceeding until we have 
fully reviewed those materials. There is no intent to delay it 
unnecessarily, but we are on the front end of this, an 
expansion of the power to look into the activities of Americans 
in America, and we have to insist that it fully comply with our 
Constitution and our laws. And if the laws are not adequate, we 
have to add laws. So that is my first comment.
    My second comment is I agree with you on Posse Comitatus; 
we didn't get a full answer today. But I think the full answer 
is not as easily explained as it was by the couple of witnesses 
who tried to address it. They said they are not expert on it. 
And I know the history as you do, and I actually worked in the 
Senate when Sam Ervin was in the Senate. I am a fossil. So I 
remember that, and I remember how careful he was to protect 
Americans, and we had better take care again. So that is my 
second point.
    My third point is that we have been rolled on the Terrorist 
Surveillance Program in Congress. That thing was full blown 
before I as a member of the Gang of Eight was briefed on its 
operations. I was not briefed on the legal underpinnings until 
after the President disclosed the existence of the program. And 
I could consult a few people and come back to the Gang of Eight 
format and insist that we be briefed. But even now, facts are 
coming out. And the bottom line is, this is administration 
feels free to disregard the law Congress passes in exercising 
the President's Commander in Chief authorities. And there has 
been a very clear Supreme Court case on that, and it is called 
the Steel Seizure case that at least persuades me that the way 
they are proceeding is improper.
    So since we have been rolled, I intend not to get rolled 
again. And this is what I want your comment on. I think, unless 
we fully understand what is proposed--and I am not even certain 
Mr. Allen in his colleagues fully understand what is being 
proposed--and know--and I know Mr. Green feels the same way--
that we have some sort of careful Article 3 court review 
mechanism in place, we should just not go here. Just not do it.
    Like anyone else, I think we want to find out the plans and 
activities of those who would intend to harm us, including 
Americans. But if we give up our Constitution and our system of 
laws to find out those plans and activities, I think they win.
    So that is basically my comment on the philosophical 
question of how to proceed. And I have just a minute of time 
left, and I do want to respect my time limit here, so please 
answer me briefly, if you can.
    Ms. Graves. Let me just say, I appreciate very much your 
leadership, Congresswoman Harman. You have been a tremendous 
leader on these issues from the national security standpoint 
and taking due care for our civil liberties.
    Our concern echoes yours in that this unilateral activity 
basically, it is presented as a fait accompli. It is presented 
as they are starting October 1, whether you do anything or not, 
unless you do something to try to stop them, basically. And we 
think that is entirely the wrong way to proceed in this 
democracy. We think it is the wrong way to proceed from a civil 
liberties standpoint. And we don't have confidence given the 
track record of this department, even with their good 
intentions and, with this administration, that they will 
actually protect civil liberties. We know they are reviewing to 
rewrite Executive Order 12333, and we know that they are 
reviewing and have reinterpreted countless laws that we don't 
even know about. So we can't trust them and take their word for 
it.
    Ms. Harman. Thank you.
    Mr. Steinhardt. If I could add two points to that. I 
entirely agree with Mrs. Harman. There needs to be a time out 
here. There needs to be a break in order for the Congress to 
step in and make clear what the rules are.
    I would just say parenthetically, I didn't regard your 
earlier remarks as a rant. I thought they were forceful and 
insightful.
    Finally, I commend to the Committee an article that 
appeared in this morning's Washington Post on page D-3, if my 
printout is correct, that discusses how the Department of 
Homeland Security has dropped now the use of a large data 
mining program some of us have been concerned about known as 
ADVISE. And part of the reason they dropped it is not only 
really their inability to implement it, but also because they 
learned that in fact they had violated the law by using data 
involving real live Americans.
    Chairman Thompson. Excuse me, Mr. Steinhardt. We are going 
to have to go and do a vote. And in deference to the Committee 
members who stayed, I am going to ask them to do 2 minutes 
starting with Mr. Green.
    We heard you. We have already dispatched a letter to the 
Department talking about the Advise program and raising a lot 
of the concerns in the article.
    Mr. Steinhardt. Of course, Mr. Chairman.
    Mr. Green. Thank you, Mr. Chairman. And I sincerely thank 
you for your vision and your foresight and your willingness to 
host this hearing. It is exceedingly important. My comment will 
be brief.
    This is a technology that is not only omnipresent but also 
invisible. We will not know the extent to which it can be 
penetrate our privacy without sufficient oversight. The best of 
intentions are the means by which the road to a place that none 
of us want to go has been paved. I just think, Mr. Chairman, 
that we are at the genesis but there are revelations yet to 
come, and we are to shape the revelations. Thank you.
    Chairman Thompson. Thank you.
    Mr. Perlmutter.
    Mr. Perlmutter. Thank you, Mr. Chairman. Just a lot of 
thoughts based on your testimony, and just kind of a thought 
that I had. I had signed on to the impeachment bill of Alberto 
Gonzalez, and then I saw the Bourne Ultimatum the next night. 
And it made me nervous actually as to the capability and the 
capacity of this government to just look in on all of us. And 
that was confirmed for me, and it wasn't a government company, 
or it was a major corporation. I visited their plant. And the 
resolution of the camera that they had in the ceiling, just to 
be able to see just a tiny pore on my hand was unbelievable.
    So the fears that you all have expressed as to the capacity 
of the government, the potential for abuse are things that we 
have just got to deal with.
    You know, there is a piece of me that, though, thinks that 
there may be a proper component for law enforcement, I don't 
know all about the Posse Comitatus, but the proper role, so 
long as we have procedures in place that respect the rights of 
each and every one of us. And we haven't really had a chance to 
see if those procedures are in place and that the oversight is 
in place. And I am just glad that you two are looking at this. 
And hopefully that prior panel, you know, Congresswoman Harman 
has been a major supporter of the Intelligence Community, but 
she has also been a supporter of each and every one of us 
having our rights protected. And hopefully that panel got it, 
that this is something that is of major concern to all of us. 
And I am with you on the moratorium. Thank you.
    Chairman Thompson. Thank you very much. Now, chairman of 
the Oversight Committee for the full committee, Mr. Carney.
    Mr. Carney. Thank you, Mr. Chairman. I, too, want to 
associate myself with the much of what is being said here 
today.
    Now, I do have a quick question. Do you see from your 
perspective a use in satellites as a tool in law enforcement 
and protecting society?
    Mr. Steinhardt. You know, we are not Lignites; we are not 
saying this technology should be smashed and never used. What 
we are suggesting is there may be appropriate uses, but the 
Congress needs to establish what the procedures are before they 
can be used. And they need to be narrowly tailored, and we need 
protective rights. Let us do that first before we begin to 
understand the technology.
    Mr. Carney. Understood.
    Ms. Graves. And let me just say that that is the way the 
Posse Comitatus Act has proceeded in the past. It is written to 
provide for whether there is a constitutional exception, which 
I wouldn't say is just unlimited Commander in Chief power. But 
a constitutional exception, or statutory exceptions, that those 
can be created. Of course, an exceedingly broad statutory 
exception could be subject to the constitutional challenge. So 
we would obviously urge that Congress really have as much time 
as the administration had. They talked this morning about how 
extensive and lengthy and thorough their review was either in 
the last 3 months or in the preceding year and a half, by 
primarily political appointees. Whether it is the privacy 
officers or others, you should have at least that amount of 
time to unravel this and take a look at these issues. And we 
would support the moratorium on that basis as well.
    Mr. Carney. Thank you, Mr. Chairman.
    Chairman Thompson. Thank you very much. I think my comments 
have been echoed in the questioning and comments of the 
Committee.
    I want to thank the panel for their valuable testimony and 
for the members for their questions.
    Some of you may have noticed the empty seats there at the 
witness table. We had invited two DNI witnesses to testify at 
this hearing, and they declined the offer as they didn't want 
to be on the same panel as our friends from the ACLU and Center 
for National Security Studies. No offense to either one of you, 
of course.
    As I noted previously, this is a very serious issue, and 
one hearing alone will not suffice. I believe additional 
hearings and briefings are merited. DHS has promised certain 
get-backs to the committee. And, when they are provided, I hope 
to hold additional hearings. I have asked Ms. Harman and Mr. 
Carney to take the leadership on many of these issues, and I 
hope and expect that DNI will participate in those hearings.
    In addition, I think that the lack of answers and legality 
of the proposed programs require testimony from the general 
counsel of both DHS and DNI going forward.
    Hearing no further business, the committee hearing stands 
adjourned.
    [Whereupon, at 2:10 p.m., the committee was adjourned.]