Transcripts For CSPAN3 Key Capitol Hill Hearings 20160617 :

Transcripts For CSPAN3 Key Capitol Hill Hearings 20160617

Over 3,000 of our fellow americans. And the porous out of ring of border security. The hijackers passed through the u. S. Border security a combined total of 68 times without arousing suspicion. More recently culeafy attempted to conduct a Suicide Attack in 2012. He had been in the country since 1999. On a tourist visa but never left. Another man arrested in the aftermath of the Boston Marathon bombing, who help destroy evidence was able to return to the United States despite being out of status on his student visa. Certainly its an important element of keeping the homeland secure. A widely sited 2006 hispanic study indicated that as many as 40 of all illegal aliens do not cross the desert in arizona, california, or texas but come through the front door at our land, sea, and armirports of ity with our permission. They released a demonstrating the visa over stay problem they be worse than previously thought. Fewer people were apprehended than over stayed their visas and are suspected of still being in the country making the estimate closer to 68 of those illegally in the United States. And we have a graphic up there, a little bit of math where did it go . It was up there. To show what were talking about here. If you think about, we have a 54 effective rate. We have to do a little math. And then if you look at that. So, 223,000 got aways and visa over stays, 482,000. So, the unlawful presence is up to 705,000, just based on these two numbers. So, that calculates 68 unlawful presence. These are estimates. Based on got aways. So, the point is we spend a lot of time focusing on the southern border, as we should but there is also another problem here. We have unlawful presence from the visa over stays and tlart wh thats what were focusing on today. Im concerned there are population and security risks which has historically been the primary means into the United States. They have first identify those who oenver stay they visa. More than 20 years, a data base has been in place. And a plandate has been a requirement for 12 years. Since 2003, we added biomettric and take finger prints of most visitors. They have made only marginal progress when it comes to exit. There are been project over the past 10 years but no plan has ever been implemented, none of it was seriously considered by the department. Cdp is now engaged in a series of operational experiments, such as designed to support a future biometric exit system. And to make it a priority was missing in the department. Thankfully it appears the department has finally turned this corner. Nation was p highest volume airports. An ambitious time line but long over due and congress has a new funding stream to bring this system online. Putting a biometric exit system in place as the 9 11 dmicommiss noted. Without that, visa holders can disappear into the United States, just as four of the 9 11 hijackers were able to do. We must dedicate resources necessary to properly remove those in the country illegally, otherwise we put our citizens at risk unnecessarily. And up to 25 of this group was found to have already departed the United States after special agents kuconducted full field investigations. Were spending too much time chasing our tails. It allows our experts to focus their efforts on preventing terrorist attacks. It reduces the terrorist threat in the process. The American People need to know answers to these simple questions. How many more over stays are out there who pose a serious threat to our homeland and can they quickly identify and remove them to litigate substantial security risks . I look forward to discuss the challenge of visa over stays. The gentleman from texas for an opening statement. I think chairman mcsally for holding todays hearing on visa over stays. I want to express my sympathies to the families of those lost in the tragedy in orlando. I expect to learn more at a house wide briefing with secretary jay johnson later today. But hope that the witnesses before us can touch briefly on the role of the department and its components related to this terrible incident. With respect to the topic before the subcommittee today, i am pleased were addressing the over stay issue. While congress has, in recent years, paid a great deal of attention securing our southern border, less attention as the been focussed on addressing visa over stays. The approximately 527,000 over stays in 2015 is a far greater number than the 331,000 individuals who were apprehended along the u. S. Mexico border that year. Illustrating the scope of the over stay problem. As a member of congress representing a district along our southern border. I understand the challenges. Our nations airports and sea ports were not built for exit controls, nor were our land borders, certainly. Overcoming the infrastructure chal lenges is an integral part of the task. I look forward to hearing what changes they have made towards addressing these challenges, as well as their plans for fulfilling the secretarys plan by 2018. I expect to hear how the Department Plans to address biometric exit at our land borders. Unlike canada, mexico doesnt have the processes necessary to share traveller information with the u. S. Whatever the ultimate solution, dhs must insure it doesnt slow the travel and trade so important to communities i represent. I hope to hear from ice about how it prioritizes individuals who may pose a National Security or Public Safety threat. With limited resources, we must first address those who may do us harm. Deploying and addressing over stays is no easy task but it is a necessary part of insuring meaningful border security. I thank our witnesses for joining us today and yield back. He yields back. Opening statements may be sub t submitted by the record. Were joined by four distingu h distinguished witnesses. Office of field operations. Mr. Wagner formally served as director of admissibility in passenger programs, with all policy related programs and the Electronic System for travel authorization, the Immigration Advisory Program and the fra fraujialant document unit. And ices Homeland Security investigations division. Mr. Heely began in the United States marine corps and served as a u. S. Customs officer before joining ice. He serve wouldd with the first entering iraq in support of iraqi freedom. He has served at ice headquarters in 2010. Assistant of Screening Office at Homeland Security. Shes responsible for developing and coordinating the screening policies, including the Visa Waver Program and the real id program. Is it before joining dhs, she was focusing on Identity Management programs and federal personnel identity credentials. Mr. Bob burns, Homeland Security advance Research Agency for the science and technology directort. He manages the apex program and Guides Community out reach initiatives. He was previously the director for air reentry exit from 2013 to december 2014. He led them in a partnership to enhance both air entry by developing and implementing technologies for airport inspecting for travellers in the u. S. The full written statements will appear in the record. The chair recognizes mr. Wagner for five minutes. Distinguished members of the subcommittee. That c thank you for the opportunity to come here and especially as it pertains to identifying travellers who may have over stayed their authorized stay in the u. S. In 2013, cbp has been actively moving forward on several initiatives ill discuss today. Id like to discuss how we discuss departure data from foreign visitors. Theyre are to provide manifests on all passengers which we run through automated targeting systems and address risk as far advance of travel as possible. When that traveller arrives, they present their pass port who confirms the validity of the document, the accuracy of the manifest information and fingerprints are collected and a digital photograph is also collected. If they have a visa we compare the fingerprints to the one at the embassy to make sure its the same person. Under the Visa Waver Program and previous visit. The cbp office also reviews all the results of the biometric vetting to make sure there are no other risk factors that will determine whether we need further inspection. We interview the traveller to determine the intent of travel. We stamp the pass port and write the period of admission into the pass port. When that same person leaves the United States, we again receive the mang fest information from the carrier and run this against the same data bases. This allows us to create a depand departure record. Its through this exit process that they apprehended the time square bomber who was planning to depart jfk in 2010. They arrested as a result of manifests provided by the carriers. We use this information to generate over stay lists on a daily basis. The determining status can be more complicated. A person may receive a sixmonth admission period but then apply for and receive an extension which is important in determine if theyre an over stay or not. So they need be carefully correlated against other systems. Theyre run through our automated targeting system. We apply ice to find criteria and prioritize these records and its provided to ice for appropriate action. Along with a comprehensive exit Program Includes biometrics into the exit of our system. Its actionable but it can certainly be enhanced with the biometric upon departure to validate the information were an alkting on. The challenge is not so much the technology as it is the infrastructure. Our ports of intry were not designed to have departure control processing. International departures share gates with domestic traffic. So, where the collection takes place, its critical. Placing the technology too far in advance of the departure process such as a tsa check point would not fight assurances that person actually boarded plane and left. We would default to the same system we have today. Weve launched several pilots that were mentioned earlier. We did a pedestrian pilot at california, and the hand held pilot at 10 airports across the current country. And testing the ability of our Information Systems to compare facial images of travellers departing against previously provided images of those travellers. This is done in an automated fashion without impacting airport operations. This is the logical next step to build on the previous pilots. This is now integrating this data into our back end systems. Its not another layered on process. We can incorporate this into their existing business processes. This will provide the final set of spes fs and rekwooirmquireme the exit procurement to meet our neesds for the biometric exit system. Law enforcement professionaprof has a critical layer of Data Integration will continue our close culab wragz with the department of and ice and the implementation of the biometric concepts. Its essential. In development of these solutions. Thank you again for the opportunity to appear today. Thank you, mr. Wagner. Mr. Healy. Thank you Ranking Member sally and distinguished members. Thank you for allowing me to discuss how we would benefit for the implementation of the biometric exit system. I recognize that visa over stay enforcement is an important issue for this subcommittee. Id like to briefly outline my Agency Involvement by my colleagues and how we use that information. Ice, Homeland Security investigations or hsi through orexploitation unit is dedicated to identifying and initiating enforcement action on priority over stay violators. Its accomplished in close coordination and our primary objective is to vet generated leads to prioritize true over stay violators for over stay action. Ice uses dedicated special agents, analysts and cysystems specifically address over stays who may pose a National Security concern. In 2015, our agents and analysts devoted approximately 660,000 investigative hours. And the criminal exploitation unit received approximately 971,000 potential over stay leads received from entry, exit, International Student data bases and other government systems. The system generated leads are created using biographical and travel data stored in the arrival and departure system. This allows dhs to identify immigrants who have remained in the United States beyond their authorized periods of admission or have violated their veeisas. Once received, ice conduct searches to determine if they require further review in which case a lead will be sent out to a field office. Additionally, ice prioritizes nonimmigrant over stay leads through risk based analysis. A targeting framework consisting of 10 tiers was developed in close consultation with the intelligence and Law Enforcement communities to insure that our National Security and Public Safety consrntz are prioritized. We meet with interagency departments to make sure theyre aligned with current u. S. Government threat information, trends, and priorities. To better manage investigative resources, the Counter Terrorism and criminal exploitation unit not only relies on the previou previously discussed framework but incorporates removal operations on individuals who are threats to National Security, border security, Public Safety, or who are convikted of significant criminal ofenlsces. In 2015, approximately 1 or roughly 10,000 leads were determineded to potentially pose a National Security or Public Safety concern. Fortunately, with further investigation, ice is able to determine that even many of these leads were not in fact high risk. However, all of these leads were sent to hsi field offices for further investigation. Of the 10,000 field referrals or 10,000 investigations that were sent out to the field. Trafficking, dealing with migrants at sea, and u. S. Policy in the arctic. From the center for strategic and international studies, this is about one hour. Good morning everyone. Welcome to csis, im kathy hits director of the Security Program here and together with our partners at the u. S. Naval institute and daly who is taking a seat representing hit them today. Where happy to bring your Maritime Security dialog. Today were especially happy to be inviting you to speak on the u. S. Coast guard, admiral paul. That always connected come here about 17 months ago so this is a great update on everything that has happened for and with the coast guard. In the meantime which is both significant. He, as you may well know has extensive Operational Command experience in the pacific and the atlantic, and of of no, he was the federal on scene coordinator for the deepwater horizons bill and he directed there more than 47,000 responders, and 6500 vessels and 120 aircraft dealing and 120 aircraft dealing with the Largest Oil Spill in u. S. History. So i think you can agree that he has both the Extensive International experience in the homeland experience necessary for any coast guard. Sorry about that, you can be a very core, not as well. Before we begin today i want to go through safety procedures. We have doors behind us and then we have the door behind me that leads to the back of the building and this leads to the front of the building. The star normal safety precautions that we relate to you. And i would be here to direct to you in case of fire alarm goes off. I want to also thank our sponsors for this event and for the whole series and that is Martin International and hunting ingles industry so thank you for making the series possible. Without further do, over two. Thank you kathy and its a good to see some a family faces here. First of all is a somber week, lets face it 49 at the last count and i know there are families morning and it is always mindful the threats that face us on a daytoday basis. And certainly those are the threats that we always look at and the coast guard and maritime domain as well. But what i like to open up with here first is what i came into this job just a over two years ago. On day one we put up mike, not direction, and usually thats a tendency to let me wait six months and i will study and see whats going on and then i will provide my direction. But i realize i only have four years. So you you dont have six months to waste. So the first day one we put out my direction and the first piece of that was about service to nation. Though i broke that down to first of all strategy needs to drive our budget. For nearly 225 years we have always looked at here is our our budget now what we do with it. We were doing what was left over, really not looking at what our unique authorities are and where do we plug and play on a global scale, not just just here in the homeland but worldwide as well. So not just strategy driving budget, but also intelligence a driving operations. We have been a member of member of the National Intelligence community now for 14 years. But it is not just driving the operations, it is also driving where you do not operate. Where you apply what i would say risk a base decisionmaking. We have 11 statutory missions, and historically we would try to fill all of those 11 buck

© 2025 Vimarsana