[House Hearing, 114 Congress] [From the U.S. Government Publishing Office] DHS IN TODAY'S DANGEROUS WORLD: EXAMINING THE DEPARTMENT'S BUDGET AND READINESS TO COUNTER HOMELAND THREATS ======================================================================= HEARING before the COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION __________ MARCH 16, 2016 __________ Serial No. 114-60 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Available via the World Wide Web: http://www.gpo.gov/fdsys/ __________ U.S. GOVERNMENT PUBLISHING OFFICE 22-624 PDF WASHINGTON : 2016 ----------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 COMMITTEE ON HOMELAND SECURITY Michael T. McCaul, Texas, Chairman Lamar Smith, Texas Bennie G. Thompson, Mississippi Peter T. King, New York Loretta Sanchez, California Mike Rogers, Alabama Sheila Jackson Lee, Texas Candice S. Miller, Michigan, Vice James R. Langevin, Rhode Island Chair Brian Higgins, New York Jeff Duncan, South Carolina Cedric L. Richmond, Louisiana Tom Marino, Pennsylvania William R. Keating, Massachusetts Lou Barletta, Pennsylvania Donald M. Payne, Jr., New Jersey Scott Perry, Pennsylvania Filemon Vela, Texas Curt Clawson, Florida Bonnie Watson Coleman, New Jersey John Katko, New York Kathleen M. Rice, New York Will Hurd, Texas Norma J. Torres, California Earl L. ``Buddy'' Carter, Georgia Mark Walker, North Carolina Barry Loudermilk, Georgia Martha McSally, Arizona John Ratcliffe, Texas Daniel M. Donovan, Jr., New York Brendan P. Shields, Staff Director Joan V. O'Hara, General Counsel Michael S. Twinchek, Chief Clerk I. Lanier Avant, Minority Staff Director C O N T E N T S ---------- Page Statements The Honorable Michael T. McCaul, a Representative in Congress From the State of Texas, and Chairman, Committee on Homeland Security....................................................... 1 The Honorable Bennie G. Thompson, a Representative in Congress From the State of Mississippi, and Ranking Member, Committee on Homeland Security: Oral Statement................................................. 2 Prepared Statement............................................. 4 Witness Honorable Jeh C. Johnson, Secretary, U.S. Department of Homeland Security: Oral Statement................................................. 5 Prepared Statement............................................. 6 Appendix Questions From Chairman Michael T. McCaul for Hon. Jeh C. Johnson 51 Questions From Ranking Member Bennie G. Thompson for Hon. Jeh C. Johnson........................................................ 68 DHS IN TODAY'S DANGEROUS WORLD: EXAMINING THE DEPARTMENT'S BUDGET AND READINESS TO COUNTER HOMELAND THREATS ---------- Wednesday, March 16, 2016 U.S. House of Representatives, Committee on Homeland Security, Washington, DC. The committee met, pursuant to call, at 10:08 a.m., in Room 311, Cannon House Office Building, Hon. Michael T. McCaul [Chairman of the committee] presiding. Present: Representatives McCaul, Smith, King, Duncan, Barletta, Perry, Clawson, Katko, Hurd, Carter, Walker, Loudermilk, McSally, Ratcliffe, Donovan, Thompson, Sanchez, Langevin, Richmond, Keating, Payne, Vela, Watson Coleman, and Torres. Chairman McCaul. The Committee on Homeland Security will come to order. The committee is meeting today to examine the Department of Homeland Security's budget and readiness to counter homeland threats. I now recognize myself for an opening statement. Almost 15 years after 9/11, the war against Islamist terror has entered a dark phase. New battlefields have emerged across the world, and our enemies are on the offensive. They are recruiting through retweets and crowd-sourcing their attacks. They have brought the conflict to our doorsteps in new and dangerous ways. Only months ago, in San Bernardino, we witnessed the horrible violence terrorists can inflict on our communities. Yet we were reminded in the wake of that tragedy that such radicalism is no match for our resolve. The American people will not submit to the intimidation of jihadists, and we will not allow their repressive world view to infest and infect our free society. Secretary Johnson, your team faces no small task. We are in the most serious threat environment since 9/11, and the Department of Homeland Security is on the front line. You are responsible for keeping threats away from our shores at a time when terrorists are targeting us aggressively. Just 2 weeks ago, this committee released a report showing that, since 2014, ISIS has been tied to 75 terrorist plots against the West. One- third of those plots were aimed at the United States, making our Nation the group's No. 1 target. But I am alarmed that, despite these threats, the President still lacks a coherent vision for winning the wider war against Islamist terror. The administration's wait-and-see and lead- from-behind foreign policy not only allowed ISIS to create a terror incubator in Syria and Iraq, but it also allowed a terrorist wildfire to sweep the globe. Even still, the President has failed to develop credible plans for containing, let alone rolling back new extremist safe havens. If we do not win this war on offense, then our security falls to our defense. Much of that rests on your shoulders, Mr. Secretary. We have arrested, as you know, more than 80 ISIS supporters in the United States, and home-grown terror cases are being investigated in all 50 States. That is why I am grateful DHS is ramping up efforts to combat domestic radicalization. Your Department takes the issue seriously and has shown much-needed leadership. Overall, though, I am disappointed the administration is not doing more. Once again, the President is asking Congress to give him billions more for countering climate change than for countering violent extremism. Terror threats, however, are not the only homeland security challenge. Our borders are not secure, and they have become highways of illicit traffic and violence. The American people are demanding that Washington do its job and secure our territory, but time and again, they have let us down. The lack of a clear vision for securing the border is one of the administration's greatest failings. Incredibly, in this year's budget, the White House proposes cutting the number of Border Patrol Agents. This sends a signal to the American people that the Government is not serious about fixing this crisis. I hope today we will also spend time examining our cyber defenses. The effects of cyber intrusions are felt every day across America, from corporate boardrooms to kitchen tables. DHS has stepped up its efforts to secure Federal networks and to assist the private sector, but our country is still under daily assault, and the bad guys are winning. The network security is a central element of our National security, and today, I hope we can discuss the Department's cybersecurity agenda and where we need to focus our efforts the most. Finally, I am concerned about the steep cuts, more than $500 million in this year's DHS budget, for the Urban Area Security Initiative and State Homeland Security Grant Programs that help first responders. Once again, the terror threat level is higher than it has ever been during my time in Congress. The State and local responders are the country's first line of defense. We need them to be vigilant, trained, and equipped to stop acts of terror, so why on Earth would we slash their grant funding? Today, we are hoping for a good explanation, because I can tell you that, right now, our first responders don't need us to cut their budgets; they need us to have their backs. So let me again, Mr. Secretary, thank you for being here today. We hope to cover a wide range of issues. I look forward to hearing about your plans to confront these challenges. With that, the Chair now recognizes the Ranking Member. Mr. Thompson. Thank you, Chairman McCaul, for holding today's hearing. Secretary Johnson, thank you for appearing today. As you know, this is your first time before us this Congress, and we are happy to see you. Today's hearing, entitled ``DHS in Today's Dangerous World: Examining the Department's Budget and Readiness to Counter Homeland Threats,'' invites us to take a broad look at the threats that we face in the United States and how the Department is prepared to handle them. Mr. Secretary, the current threat posed by foreign terrorist organizations, such as ISIL and al-Qaeda, is significant and rightfully receive extensive attention. However, at the same time, anti-Government and militia groups grew by one-third in 2015. In a study by the Triangle Center at Duke University, 74 percent of law enforcement identified anti- Government groups as the top terrorist threat in their jurisdiction. Last year, we also witnessed a troubled surge of domestic terrorist groups. Mr. Secretary, you have stated that we have moved to a world that includes the threat of terrorist-inspired attacks, where terrorists are motivated by something on the internet. Both right-wing extremists and foreign-inspired terrorists have used the internet to organize and plan attacks. For instance, just this weekend a militia group organized on Twitter to attend and use force at Presidential campaign events. Mr. Secretary, I want to hear from you how the Department is maintaining situational awareness and response capability during the increasingly violent Presidential campaign season. I know that the Department has long recognized the threat from violent extremism and, in 2015, established the Office of Community Partnerships. In its budget, the Department requests $49 million for countering violent extremism grants for emerging threats from violent extremism and complex coordinated attacks. To date, the Department has provided Congress with little information on how these grants will be distributed. I hope that contained within forthcoming grant guidance are instructions for some of the funding to be directed at the prevention of right-wing extremist attacks. Mr. Secretary, as you have stated and as both sides of the aisle agree, it is a State or a local cop on the street who may prevent the next terrorist attack. With the right-wing attacks on the rise and, ISIL recruiting within our borders, it is baffling that cuts to State and local grants preparedness programs are in the budget. As the Chairman said, nearly $500 million are slated to be cut under your budget request. I do not believe the Department's budget should be focused on being balanced on the backs of first responders. I want to hear from you, Mr. Secretary, how you expect the proposed cuts to affect the ability of State and local response capabilities? Another concern is the staffing level at our Nation's airports. The Federal Aviation Administration is projecting passenger growth at a rate of 2 percent a year, making this summer one of the busiest in recent years. I, along with other Members of this committee, continue to hear from large airports, such as the letter we received from the head of Atlanta Airport, that they have the infrastructure for many security lanes, but due to staffing shortages, they can only use a small number of those lanes. Given the forecast of increased passenger volume, along with underutilized checkpoints, I am concerned that congested screening lines will create another vulnerability. So we need to hear from you, Mr. Secretary, on that. We have done PreCheck. It has been a good thing, but the lines are still getting longer. Also let me suggest that you look at the TSA behavioral detection program as possibility for over 3,000 people who are I would assume doing a good job, but we have yet to be provided the science behind the behavioral detection program that says it works. So we spent a lot of money doing that. If we don't have the science, let's put the men and women who are in that program in the position to provide relief to some of our airports. Additionally, I remain concerned about the Secret Service. I am supportive of the budget request that reflects the recommendation of the protective mission panel and the Office of Inspector General. However, I cannot stress enough that the Secret Service cannot enter a new chapter with an ugly cloud of a decade's long racial discrimination suit hanging over its head. Sixteen years, Mr. Secretary, is far too long. Let's put this baby to bed and get on with protecting and doing a job that our fine men and women do. Again, I don't have to tell you about morale; OPM does its annual report. We have to do something to get the morale up. I look forward to your testimony. I yield back, Mr. Chairman. [The statement of Ranking Member Thompson follows:] Statement of Ranking Member Bennie G. Thompson March 16, 2016 Today's hearing title, ``DHS in Today's Dangerous World: Examining the Department's Budget and Readiness to Counter Homeland Threats'' invites us to take a broad look at the threats that we face in the United States and how DHS is positioned to challenge them. Mr. Secretary, the current threat posed by foreign terrorist organizations such as ISIL and al-Qaeda is significant and rightfully receives extensive attention. However, at the same time, anti- Government and militia groups grew by one-third in 2015. In a study by the Triangle Center at Duke University, 74 percent of law enforcement identified anti-Government groups as the top terrorist threats in their jurisdictions. Last year, we also witnessed a troubling surge of domestic terrorist groups. Mr. Secretary, you have stated that we have moved to a world that includes the threat of terrorist-inspired attacks--where terrorists are motivated by something on the internet. Both right-wing extremists and foreign-inspired terrorists have used the internet to organize and plan attacks. For instance, just this weekend, a militia group organized on Twitter to attend Presidential campaign events. Mr. Secretary, I want to hear from you how the Department is maintaining situational awareness and response capabilities during this increasingly violent and volatile Presidential campaign season. I know that the Department has long recognized the threat from violent extremism and in 2015 established the Office for Community Partnerships. In its budget, the Department requests 49 million dollars for Countering Violent Extremism grants for emergent threats from ``violent extremism'' and ``complex coordinated attacks.'' To date, the Department has provided Congress with little information on how these grants will be distributed. I would hope that contained within forthcoming grant guidance are instructions for some of the funding to be directed at the prevention of right-wing extremist attacks. Mr. Secretary, as you have stated, and as both sides of the aisle agree, it is the State or local cop on that may prevent the next terrorist attack. With right-wing attacks on the rise and ISIL recruiting within our borders, it is baffling that cuts to the State and local grant preparedness grants programs are in this budget. Nearly $500 million are slated to be cut under your budget request. I do not believe the Department's budget should be so focused on being balanced on the backs of first responders. I want to hear from you, Mr. Secretary, about how you expect the proposed cuts to affect the ability of State and local response capabilities. Another area of concern is the staffing level at our Nation's airports. The Federal Aviation Administration is projecting passenger growth at a rate of 2 percent a year, making this summer one of the busiest in recent years. I continue to hear from large airports that have the infrastructure for many security lanes, but due to staffing shortages, they can only use a small number of lanes. Given the forecast of increased passenger volume, along with underutilized checkpoints, I am concerned that congested screening lines will create another vulnerability. I need to hear more from you than encouragement that travelers join PreCheck. I need to know how you intend to tackle this problem. I am also concerned that your budget still requests funds for TSA's behavioral detection program, which still has not been scientifically proven to disrupt terrorist activity. Additionally, I remain concerned about the Secret Service. I am supportive of the budget requests that reflect the recommendations of the Protective Mission Panel and the Office of Inspector General. However, I cannot stress enough that the Secret Service can not enter a new chapter with an ugly cloud of a decades-long racial discrimination suit hanging over its head. Finally, Mr. Secretary, the Department has the third-largest workforce in the Federal Government and faces low employee morale. You have personally committed to improving morale and workforce satisfaction. It seems as if we still cannot get out of the planning phase. Low retention rates are concerning, especially within the Border Patrol. CBP does not anticipate reaching its staffing goal in the current fiscal year. This has an impact on the Department's readiness. We have a shared goal of moving the Department forward. By working with you and across the components, the Department should be ready to counter homeland threats. Chairman McCaul. I thank the Ranking Member. I realize there is a Rose Garden ceremony at 11 o'clock. Let us know if you need to leave at any time. Secretary Johnson. I will be sitting right here. Chairman McCaul. Let me recognize the Secretary for an opening statement. STATEMENT OF HONORABLE JEH C. JOHNSON, SECRETARY, U.S. DEPARTMENT OF HOMELAND SECURITY Secretary Johnson. Thank you, Chairman McCaul, Ranking Member Thompson, Members of this committee. The 2017 budget request by the President funds our vital Homeland Security missions, but it does reflect hard choices to fit within the budget caps agreed to by the Congress and the President last year. We are requesting from Congress $40.6 billion in appropriated funds, which is down from the $41 billion level that we currently have in fiscal year 2016. The top line is an increase, however, from $64.8 billion this year to a request of total spending authority of $66.8 billion for fiscal year 2017. This includes a request for an increase in various fees to support that funding at $66.8 billion, mostly centered around aviation security. I would be happy to answer questions regarding that proposed fee increase. We have submitted to the Congress authorization language to authorize such a fee increase. The vital Homeland Security objectives that do need to be funded and are funded in this budget request center around aviation security; cybersecurity; adequate funding for the Secret Service; border security and enforcement and administration of our immigration laws; the recapitalization of the Coast Guard; the funding of a long overdue, new headquarters for the Department of Homeland Security; and grants. I recognize that this budget request reflects a significant cut in the grants. Again, the budget request reflects hard choices to fit within the budget caps. But I do recognize and appreciate the importance of our grant activity to fund and support State and local law enforcement and first responders. My top priority for the Department of Homeland Security while I am Secretary this last year in office is the top overall priority I had last year, which is management reform to more effectively and efficiently deliver our homeland security to the American public. The overarching effort here is our Unity of Effort initiative, which I launched 2 years ago, to have more centralized, effective, and efficient decision making when it comes to things such as budgeting acquisition and the like. I want to thank this committee for the support that you have provided to Homeland Security since I have been Secretary. I want to thank Members of this committee for the hard work that went into the Cybersecurity Act of 2015. I know that individual Members of this committee spent long hours working with the intelligence committees to come to a bill that passed the full Congress and was signed by the President. It is a good bill, and we are in the midst now of implementing this new law. We are meeting the milestones to implement this new law. One milestone occurs tomorrow, and we will meet that milestone on time. I appreciate this committee's support for authorization of many of our activities. This committee has already voted out authorization for our Joint Task Forces on the Southern Border; for our Office of Community Partnerships, as was noted; for our CBRNE Office, the Office of Chemical, Biological, Radiological, Nuclear, and Explosives detection; our Office of Policy, ramping that up. This committee has done a lot to authorize these various activities to improve the workings of our Department. I very much appreciate that it has been done on a bipartisan basis. We are looking for Congress for support for our reorganization of NPPD and to a more streamlined and effective and operational cyber and infrastructure protection agency. We are looking for authorization for our Joint Requirements Council, for acquisition reform, and for authorization for joint duty assignments within the Department of Homeland Security, so we are less stovepiped. We have our various missions, which have been noted by the Chairman and Ranking Member, which I remain focused on. But my overall goal for the Department of Homeland Security in my remaining 10 months in office is to leave it better than I found it and to make it a more effective and efficient place to deliver our services to the American people. Thank you, and I look forward to your questions. [The prepared statement of Secretary Johnson follows:] Prepared Statement of Jeh C. Johnson March 16, 2016 introduction Chairman McCaul, Ranking Member Thompson, and Members of the committee, thank you for the opportunity to be here. The President's fiscal year 2017 budget request for the Department of Homeland Security reflects hard choices to fit within the caps established by the bipartisan budget agreement of 2015, but, at the end of the day, it funds all of our vital homeland security missions in these challenging times. The President's fiscal year 2017 budget request calls for $40.6 billion in appropriated funds (compared to $41 billion currently in fiscal year 2016) but an increase in total spending authority to $66.8 billion (compared to $64.8 billion currently in fiscal year 2016). Total workforce requested is 229,626, compared to 226,157 in fiscal year 2016, accompanied by an overall workforce pay raise of 1.6%. Like this year, the President's budget requests $6.7 billion to finance the cost of major disasters in FEMA's disaster relief fund, and the ability to collect fees of $19.5 billion (compared to $17.1 billion this year). As I said before, the President's budget request funds our vital homeland security missions. Our request includes:$5.1 billion for transportation screening operations, including increased screening personnel, to ensure the security of our airways, a $100 million increase; $1.6 billion, an increase of over $200 million, to fund our vital cybersecurity mission, including increased investments in the Continuous Diagnostic Mitigation program; $1.9 billion for the Secret Service, which is the same as enacted in fiscal year 2016, to protect our National leaders, fight cyber crime, and support increased hiring; $319 million to cover costs associated with unaccompanied children and families; $1.1 billion for recapitalization of the U.S. Coast Guard's assets, including a sizable investment in the Nation's future arctic capability; and $226 million for continued investment in the construction of a future DHS headquarters at St. Elizabeths. management reform Like last year, reforming the way in which the Department of Homeland Security functions and conducts business, to more effectively and efficiently deliver our services to the American people, is my overarching objective for 2016. We've done a lot in the last 2 years, but there is still much we will do. There are still too many stove pipes and inefficiencies in the Department. My goal as Secretary is to continue to protect the homeland, and leave the Department of Homeland Security a better place than I found it. The centerpiece of our management reform has been the Unity of Effort initiative I announced in April 2014, which focuses on getting away from the stove pipes, in favor of more centralized programming, budgeting, and acquisition processes. We have already transformed our approach to the budget. Today, we focus Department-wide on our mission needs, rather than through component stove-pipes. With the support of Congress, we are moving to a simplified budget structure that will support better decision making across the Department. We have transformed our approach to acquisition. Last year I established a DHS-wide Joint Requirements Council to evaluate, from the viewpoint of the Department as a whole, a component's needs on the front end of an acquisition. We have launched the ``Acquisition Innovations in Motion'' initiative, to consult with the contractor community about ways to improve the quality and timeliness of our contracting process, and the emerging skills required of our acquisition professionals. We are putting faster contracting processes in place. We are reforming our human resources process. We are making our hiring process faster and more efficient. We are using all the tools we have to recruit, retain, and reward personnel. As part of the Unity of Effort initiative, in 2014 we created the Joint Task Forces dedicated to border security along the Southern Border. Once again, we are getting away from the stove pipes. In 2015, these Task Forces became fully operational. In 2016, we are asking Congress to officially authorize them in legislation. We are achieving more transparency in our operations. We have staffed up our Office of Immigration Statistics and gave it the mandate to integrate immigration data across the Department. Last year, and for the second year in a row, we reported our total number of repatriations, returns, and removals on a consolidated, Department-wide basis. The long-awaited entry/exit overstay report was published in January, providing a clearer picture of the number of individuals in this country who overstay their visitor visas. It reflects that about 1% of those who enter the country by air or sea on visitor visas or through the Visa Waiver Program overstay. We are working with outside, non-partisan experts on a project called BORDERSTAT, to develop a clear and comprehensive set of outcome metrics for measuring border security, apprehension rates, and inflow rates. Since 2013 we've spearheaded something called the ``DHS Data Framework'' initiative. For the protection of the homeland, we are improving the collection and comparison of travel, immigration, and other information against Classified intelligence. We will do this consistent with laws and policies that protect privacy and civil liberties. We want to restructure the National Protection and Programs Directorate from a headquarters element to an operational component called the ``Cyber and Infrastructure Protection'' agency. Finally, we will improve the levels of employee satisfaction across the Department. We've been on an aggressive campaign to improve morale over the last 2 years. It takes time to turn a 22-component workforce of 240,000 people in a different direction. Though the overall results last year were still disappointing, we see signs of improvement. Employee satisfaction improved in a number of components, including at DHS headquarters. This year we will see an overall improvement in employee satisfaction across DHS. counterterrorism In 2016, counterterrorism will remain the cornerstone of the Department of Homeland Security's mission. The events of 2015 reinforce this. As I have said many times, we are in a new phase in the global terrorist threat, requiring a whole new type of response. We have moved from a world of terrorist-directed attacks to a world that includes the threat of terrorist-inspired attacks--in which the terrorist may have never come face to face with a single member of a terrorist organization, lives among us in the homeland, and self-radicalizes, inspired by something on the internet. By their nature, terrorist-inspired attacks are harder to detect by our intelligence and law enforcement communities, could occur with little or no notice, and in general makes for a more complex homeland security challenge. So, what are we doing about this? First, our Government, along with our coalition partners, continues to take the fight militarily to terrorist organizations overseas. ISIL is the terrorist organization most prominent on the world stage. Since September 2014, air strikes and special operations have in fact led to the death of a number of ISIL's leaders and those focused on plotting external attacks in the West. At the same time, ISIL has lost about 40% of the populated areas it once controlled in Iraq, and thousands of square miles of territory it once controlled in Syria. On the law enforcement side, the FBI continues to do an excellent job of detecting, investigating, preventing, and prosecuting terrorist plots here in the homeland. As for the Department of Homeland Security, following the attacks in Ottawa, Canada in 2014, and in reaction to terrorist groups' public calls for attacks on Government installations in the Western world, I directed the Federal Protective Service to enhance its presence and security at various U.S. Government buildings around the country. Given the prospect of the terrorist-inspired attack in the homeland, we have intensified our work with State and local law enforcement. Almost every day, DHS and the FBI share intelligence and information with Joint Terrorism Task Forces, fusion centers, local police chiefs, and sheriffs. In fiscal year 2015 we provided homeland security assistance to State and local governments around the country, for things such as active-shooter training exercises, overtime for cops and firefighters, salaries for emergency managers, emergency vehicles, and communications and surveillance equipment. We helped to fund an active-shooter training exercise that took place in the New York City subways last November, as well as exercises earlier this year in Miami and last week in Louisville, Kentucky. Last month we announced another round of awards for fiscal year 2016 that will fund similar activities over the next 3 years. As I said at a graduation ceremony for 1,200 new cops in New York City in December, given the current threat environment, it is the cop on the beat who may be the first to detect the next terrorist attack in the United States. We are also enhancing information sharing with organizations that represent businesses, college and professional sports, faith-based organizations, and critical infrastructure. We are enhancing measures to detect and prevent travel to this country by foreign terrorist fighters. We are strengthening our Visa Waiver Program, which permits travelers from 38 different countries to come here without a visa. In 2014, we began to collect more personal information in the Electronic System for Travel Authorization, or ``ESTA'' system, that travelers from Visa Waiver countries are required to use. As a result of these enhancements, over 3,000 additional travelers were denied travel here in fiscal year 2015. In August 2015, we introduced further security enhancements to the Visa Waiver Program. Through the passage in December of the Visa Waiver Program Improvement and Terrorist Travel Prevention Act of 2015, Congress has codified into law several of these security enhancements, and placed new restrictions on eligibility for travel to the United States without a visa. We began to enforce these restrictions on January 21. Waivers from these restrictions will only be granted on a case-by-case basis, when it is in the law enforcement or National security interests of the United States to do so. Those denied entry under the Visa Waiver Program as a result of the new law may still apply for a visa to travel to the United States. Last month, under the authority given me by the new law, I also added 3 countries--Libya, Yemen, and Somalia--to a list that prohibits anyone who has visited these nations in the past 5 years from traveling to the United States without a visa. We are expanding the Department's use of social media for various purposes. Today social media is used for over 30 different operational and investigative purposes within DHS. Beginning in 2014 we launched 4 pilot programs that involved consulting the social media of applicants for certain immigration benefits. USCIS now also reviews the social media of Syrian refugee applicants referred for enhanced vetting. Based upon the recent recommendation of a Social Media Task Force within DHS, I have determined, consistent with relevant privacy and other laws, that we must expand the use of social media even further. CBP is deploying personnel at various airports abroad, to pre-clear air travelers before they get on flights to the United States. At present, we have this pre-clearance capability at 15 airports overseas. And, last year, through pre-clearance, we denied boarding to over 10,700 travelers (or 29 per day) seeking to enter the United States. As I said here last year, we want to build more of these. In May 2015, I announced 10 additional airports in 9 countries that we've prioritized for preclearance. For years Congress and others have urged us to develop a system for biometric exit--that is, to take the fingerprints or other biometric data of those who leave the country. CBP has begun testing technologies that can be deployed for this Nation-wide. With the passage of the omnibus bill, Congress authorized up to $1 billion in fee increases over a period of 10 years to pay for the implementation of biometric exit. I have directed that CBP begin implementing the system, starting at top airports, in 2018. In January, I announced the schedule for the final 2 phases of implementation of the REAL ID Act, which goes into effect 2 and then 4 years from now. At present 23 States are compliant with the law, 27 have extensions, and 6 States or territories are out of compliance. Now that the final time table for implementation of the law is in place, we urge all States, for the good of their residents, to start issuing REAL ID-complaint drivers' licenses as soon as possible. In the current threat environment, there is a role for the public too. ``If You See Something, Say Something''TM must be more than a slogan. We continue to stress this. DHS has now established partnerships with the NFL, Major League Baseball, and NASCAR, to raise public awareness at sporting events. An informed and vigilant public contributes to National security. In December we reformed ``NTAS,'' the National Terrorism Advisory System. In 2011, we replaced the color-coded alerts with NTAS. But, the problem with NTAS was we never used it, it consisted of just 2 types of Alerts: ``Elevated'' and ``Imminent,'' and depended on the presence of a known specific and credible threat. This does not work in the current environment, which includes the threat of home-grown, self-radicalized, terrorist-inspired attacks. So, in December we added a new form of advisory--the NTAS ``Bulletin''--to augment the existing Alerts. The Bulletin we issued in December advises the public of the current threat environment, and how the public can help. Finally, given the nature of the evolving terrorist threat, building bridges to diverse communities has become a homeland security imperative. Well informed families and communities are the best defense against terrorist ideologies. Al-Qaeda and the Islamic State are targeting Muslim communities in this country. We must respond. In my view, this is as important as any of our other homeland security missions. In 2015 we took these efforts to new levels. We created the DHS Office for Community Partnerships, headed by George Selim. George and this office are now the central hub for the Department's efforts to counter violent extremism in this country, and the lead for a new interagency CVE Task Force that includes DHS, DOJ, the FBI, NCTC and other agencies. Funding is included in the President's budget request to support these counterterrorism efforts in the following key areas: $2 billion requested in total grants funding will prepare State and local governments to prevent, protect against, mitigate, respond to, and recover from incidents of terrorism and other catastrophic events. These funds also include Firefighter and Emergency Management Performance Grants that support local first responders in achieving their missions and $50 million for Countering Violent Extremism grants for emergent threats from violent extremism and from complex, coordinated terrorist attacks. $292 million sustains U.S. Customs and Border Protection (CBP) targeting programs, which includes support for the National Targeting Centers (NTC) for passengers and cargo. The NTCs effectively target and interdict inadmissible high-risk passengers, cargo, and agriculture/bioterrorism threats before reaching U.S. ports of entry. And, the newly established Counter Network Program will expand CBP's partnerships to exchange information and coordinate actions to identify, disrupt, and dismantle illicit networks and associated organizations. $197.5 million to sustain inspection and enforcement efforts abroad, which include the Immigration Advisory Program, created by CBP in 2004 to prevent terrorists and high-risk or improperly-documented travelers from boarding commercial aircraft destined for the United States. This investment also funds Preclearance operations. In addition to improving CBP's ability to protect the American homeland by extending our borders and preventing terrorists from gaining access to the United States, Preclearance relieves congestion at U.S. ``gateway'' airports and opens up new destinations for international flights. $103.9 million to purchase radiological and nuclear detection equipment, an increase of $14 million over funding appropriated in 2016, enabling the proposed new CBRNE Office (a combination of Office of Health Affairs and Domestic Nuclear Detection Office) and the U.S. Coast Guard, CBP, and TSA, to keep U.S. ports of entry safe and secure by detecting and interdicting illicit radioactive or nuclear materials. $81.9 million sustains the BioWatch program to provide detection and early warning of the intentional release of select aerosolized biological agents in more than 30 jurisdictions Nation-wide. $79.9 million sustains Infrastructure Security Compliance funding to secure America's high-risk chemical facilities through systematic regulation, inspection, and enforcement under the authority of the Chemical Facility Anti-Terrorism Standards. aviation security We are taking aggressive steps to improve aviation and airport security. Since 2014 we have enhanced security at overseas last-point-of- departure airports, and a number of foreign governments have replicated those enhancements. As many of you know, in May of last year a Classified DHS Inspector General's test of certain TSA screening at 8 airports, reflecting a dismal fail rate, was leaked to the press. I directed a 10-point plan to fix the problems identified by the IG. Under the new leadership of Admiral Pete Neffenger over the last 6 months, TSA has aggressively implemented this plan. This has included ``back to basics'' retraining for the entire TSO workforce, increased use of random explosive trace detectors, testing and re-evaluating the screening equipment that was the subject of the IG's test, a rewrite of the standard operating procedures manual, increased manual screening, and less randomized inclusion in Pre-Check lanes. These measures were implemented on or ahead of schedule. We are also focused on airport security. In April of last year TSA issued guidelines to domestic airports to reduce access to secure areas, to require that all airport and airline personnel pass through TSA screening if they intend to board a flight, to conduct more frequent physical screening of airport and airline personnel, and to conduct more frequent criminal background checks of airport and airline personnel. Since then employee access points have been reduced, and random screening of personnel within secure areas has increased four- fold. We are continuing these efforts in 2016. In early February, TSA issued guidelines to further enhance the screening of aviation workers in the secure area of airports. I am particularly proud of the newly-established TSA Academy housed by the Federal Law Enforcement Training Centers in Glynco, Georgia. All new TSOs are now receiving 2-week training on how to screen for threats. DHS has built a full-scale representation of an airport screening station for students to use as they are taught how to serve the traveling public, interpret X-ray machine images, and check bags for dangerous materials or weapons. In the President's fiscal year 2017 budget request, funding is included for aviation security in the following key areas: $3.0 billion to support 42,848 Transportation Security Officers, an increase of $26.9 million over fiscal year 2016, to ensure effective screening operations while minimizing wait times. $199.8 million for transportation screening technology, enabling TSA to continue improving the capabilities of its checkpoint screening equipment throughout almost 450 airports to better protect against passenger-borne threats, an increase of $5 million. $116.6 million to provide training for TSA screeners, which supports an increase of $20 million for new basic training to be provided at the TSA Academy located at the Federal Law Enforcement Training Center in Glynco, Georgia. $84.0 million for TSA's intelligence operations, an increase of $2.0 million to expand the number of intelligence officers to 87 in front-line facilities that will enhance the effectiveness of checkpoint security screening. $815.3 million to support the continued deployment of Federal Air Marshals (FAMs), $10 million above the fiscal year 2016 levels. The Federal Air Marshal Service has been subject to a hiring freeze since 2011, and recently completed a new Concept of Operations (CONOPS) detailing a new deployment strategy that achieves optimal FAMs staffing to ensure its operations mitigate the maximum risk as with other TSA aviation security activities. cybersecurity While counterterrorism remains a cornerstone of our Department's mission, I have concluded that cybersecurity must be another. Making tangible improvements to our Nation's cybersecurity is a top priority for President Obama and for me to accomplish before the next President is inaugurated. On February 9, the President announced his ``Cybersecurity National Action Plan,'' which is the culmination of 7 years of effort by the administration. The Plan includes a call for the creation of a Commission on Enhancing National Cybersecurity, additional investments in technology, Federal cybersecurity, cyber education, new cyber talent in the Federal workforce, and improved cyber incident response. DHS has a role in almost every aspect of the President's plan. As reflected in the President's 2017 budget request, we want to expand our cyber response teams from 10 to 48. We are doubling the number of cybersecurity advisors to in effect make ``house calls,'' to assist private-sector organizations with in- person, customized cybersecurity assessments and best practices. Building on DHS's ``Stop. Think. Connect'' campaign, we will help promote public awareness on multi-factor authentication. We will collaborate with Underwriters Laboratory and others to develop a Cybersecurity Assurance Program to test and certify networked devices within the ``Internet of Things''--such as your home alarm system, your refrigerator, or even your pacemaker. Last year we greatly expanded the capability of DHS's National Cybersecurity Communications Integration Center, or ``NCCIC.'' The NCCIC increased its distribution of information, the number of vulnerability assessments conducted, and the number of incident responses. At the NCCIC, last year we built a system to automate the receipt and distribution of cyber threat indicators in near-real-time speed. We built this in a way that also includes privacy protections. I have issued an aggressive time table for improving Federal civilian cybersecurity, principally through 2 DHS programs: The first is called EINSTEIN. EINSTEIN 1 and 2 have the ability to detect and monitor cybersecurity threats in our Federal systems, and are now in place across all Federal civilian departments and agencies. EINSTEIN 3A is the newest iteration of the system, and has the ability to block potential cyber attacks on our Federal systems. Thus far E3A has actually blocked 700,000 cyber threats, and we are rapidly expanding this capability. About a year ago, E3A covered only about 20% of our Federal civilian networks. In the wake of the OPM attack, in May of last year I directed our cybersecurity team to make at least some aspects of E3A available to all Federal departments and agencies by the end of last year. They met that deadline. Now that the system is available to everyone, 50% are actually on line, including the Office of Personnel Management, and we are working to get all Federal departments and agencies on board by the end of this year. The second program, called Continuous Diagnostics and Mitigation, or CDM, helps agencies detect and prioritize vulnerabilities inside their networks. In 2015, we provided CDM sensors to 97% of the Federal civilian Government. This year, DHS will provide the second phase of CDM to 100% of the Federal civilian Government. We have worked with OMB and DNI to identify the Government's high- value systems, and we are working aggressively with the owners of those systems to increase their security. In September, DHS awarded a grant to the University of Texas San Antonio to work with industry to identify a common set of best practices for the development of Information Sharing and Analysis Organizations, or ``ISAOs.'' Finally, I thank Congress for passing the Cybersecurity Act of 2015. This new law is a huge assist to DHS and our cybersecurity mission. We are in the process of implementing that new law now. Just last month, I announced that we issued guidelines and procedures, required by this law, providing Federal agencies and the private sector with a clear understanding of how to share cyber threat indicators with the NCCIC, and how the NCCIC will share and use that information. We issued these guidelines and procedures consistent with the deadline set by the new law. Funding is included for cybersecurity in the fiscal year 2017 budget request in the following key areas: $274.8 million for the Continuous Diagnostics and Mitigation program which provides hardware, software, and services designed to support activities that strengthen the operational security of Federal ``.gov'' networks, an increase of more than $170 million over the fiscal year 2016 enacted level. $471.1 million sustains the EINSTEIN program, to continue to combat intrusions, enhance information sharing, and deploy analytical capabilities to secure the Federal civilian information technology enterprise. The fiscal year 2017 budget request sustains ICE and USSS resources to combat cyber crime and investigate cyber criminals. immigration/border security Immigration policy must be two sides of the same coin. The resources we have to enforce immigration laws are finite, and we must use them wisely. This is true of every aspect of law enforcement. With the immigration enforcement resources we have, ICE is focused more sharply on public safety and border security. Those who are convicted of serious crimes or who have recently been apprehended at the border are top priorities for removal. And we will enforce the law in accordance with these priorities. Accordingly, over the last several years deportations by ICE have gone down, but an increasing percentage of those deported are convicted criminals. And, an increased percentage of those in immigration detention, around 85%, are in the top priority for removal. We will continue to focus our resources on the most significant threats to public safety and border security. In furtherance of our public safety efforts, in 2014 we did away with the controversial Secure Communities program and replaced it with the new Priority Enforcement Program, or ``PEP.'' PEP fixes the political and legal controversies associated with Secure Communities and enables us to take directly into custody from local law enforcement the most dangerous, removable criminals. Since PEP was created, cities and counties that previously refused to work with Secure Communities are coming back to the table. Of the 25 largest counties that refused to work with ICE before, 16 are now participating in PEP. In 2016, we will work to get more to participate. And, because we are asking ICE immigration enforcement officers to focus on convicted criminals and do a job that's more in the nature of law enforcement, last year we reformed their pay scale accordingly. Now, the pay scale for these immigration officers is the same as other Federal law enforcement. We have also prioritized the removal of those apprehended at the border. We cannot allow our borders to be open to illegal immigration. Over the last 15 years, our Nation--across multiple administrations--has invested a lot in border security, and this investment has yielded positive results. Apprehensions by the Border Patrol--which are an indicator of total attempts to cross the border illegally--are a fraction of what they to use to be. In fiscal year 2014, overall apprehensions by the Border Patrol increased, as we saw a spike in the number of families and unaccompanied children from Central America during the spring and summer of 2014. That year the overall number of apprehensions was 479,000. Across the Government, we responded aggressively to this surge and the numbers fell sharply within a short period of time. In fiscal year 2015, the number of those apprehended by the Border Patrol on the Southwest Border was 331,000--with the exception of 1 year, the lowest since 1972. From July to December 2015 the numbers of migrants from Central America, especially families and unaccompanied children, began to climb again. In January I announced a series of focused enforcement actions to take into custody and remove those who had been apprehended at the border in 2014 or later and then ordered removed by an immigration court. I know this made a lot of people I respect very unhappy. But, we must enforce the law in accordance with our priorities. In January overall apprehensions by the Border Patrol on the Southwest Border dropped 36% from the month before. At the same time, the number of unaccompanied children apprehended dropped 54%, and the number of those in families dropped 65%. In February, the numbers of unaccompanied children have remained at this lower level. We are closely monitoring the situation on the Southwest Border and will not dial back our efforts, as, illegal migration traditionally increases in the spring. We will do all we can to prevent another summer surge in illegal crossings. We will continue to enforce the law consistent with our priorities for enforcement, which includes those apprehended at the border in 2014 or later. Then there is the other side of the coin. The new enforcement policy the President and I announced in November 2014 makes clear that our limited enforcement resources will not be focused on the removal of those who have committed no serious crimes, have been in this country for years, and have families here. Under our new policy, these people are not priorities for removal, nor should they be. In fact, the President and I want to offer, to those who have lived here for at least 5 years, are parents of U.S. citizens or lawful permanents residents, and who have committed no series crimes, the opportunity to request deferred action on a case-by-case basis, to come out of the shadows, get on the books, and be held accountable. We are pleased that the Supreme Court has agreed to hear the case of Texas v. United States, which involves the new deferred action policies we announced in November 2014. Our overall policy is to focus our immigration enforcement resources more effectively on threats to public safety and border security, and, within our existing legal authority, do as much as we can to fix the broken immigration system. We're disappointed that Congress has not been our partner in this effort, by passing comprehensive immigration reform legislation. Finally, we recognize that more border security and deportations may deter illegal migration, but they do nothing to overcome the ``push factors'' that prompt desperate people to flee Central America in the first place. We are prepared to offer vulnerable individuals fleeing the violence in Central America a safe and legal alternate path to a better life. We are expanding our Refugee Admissions Program to help vulnerable men, women, and children in Central America who qualify as refugees. We are partnering with the U.N. High Commissioner for Refugees and non-governmental organizations in the region to do this as soon as possible. This approach builds on our recently established Central American Minors program, which is now providing an in-country refugee processing option for certain children with lawfully present parents in the United States. The President's fiscal year 2017 budget request includes the following key resources for immigration and border security: $7.0 billion to fund the salaries and benefits of Border Patrol Agents and CBP Officers. In fiscal year 2017, CBP plans to hire up to 21,070 Border Patrol Agents, a decrease of 300 from the 2016 enacted level, and 23,821 CBP Officers. $1.4 billion to enable U.S. Immigration and Customs Enforcement to maintain nearly 31,000 detention beds for individuals presenting a flight risk, a risk to public safety or National security, or who are subject to mandatory detention. $2.0 billion sustains the Coast Guard counter-drug and alien migration interdiction operations. These intelligence-driven mission activities are critical to disrupting Transnational Criminal Organizations and securing the Southern Border. $1.6 billion sustains the Coast Guard's ports, waterways, and coastal security efforts. These include screening to ensure unauthorized and illicit individuals do not gain access to, or disrupt, key maritime transportation and commerce nodes. All crew, passengers, and cargo of vessels over 300 tons are screened prior to arrival in U.S. waters to mitigate potential risks to our Nation. $319 million, a decrease of more than $370 million, to cover the costs associated with the temporary care and transportation of up to 75,000 unaccompanied children, along with other resources for the custody of adults with children who cross our borders. $126.0 million for the Alternatives to Detention Program, an increase of $12 million, to monitor 53,000 average daily participants, including families, who may pose a flight risk but who are not considered a threat to our communities. The ATD program places low-risk individuals under various forms of non- detained, intensive supervision, which may include electronic monitoring. $347.5 million for the Criminal Alien Program, an increase of $7 million, to support ICE in the apprehension and removal of both at-large and incarcerated convicted criminals. These resources include funding for an additional 100 officers to support the expanded implementation of PEP. $268.4 million, an increase of $30 million that sustains the increase of 311 attorneys in the fiscal year 2016 appropriation, for ICE's Office of Principal Legal Advisor, which represents the U.S. Government in removal proceedings and litigated over 400,000 immigration related cases in fiscal year 2015. $355.7 million to maintain the necessary infrastructure and technology along the Nation's borders to ensure CBP law enforcement personnel are supported with effective surveillance technology to improve their ability to detect and interdict illegal activity in a safer environment. This represents a decrease of $91 million from the substantial increase provided in the fiscal year 2016 appropriation. refugees We are doing our part to address the Syrian refugee crisis. USCIS, in conjunction with the Department of State, is working hard to meet our commitment to admit at least 10,000 Syrian refugees by the end of this fiscal year. We will do this by carefully screening refugees in a multi-layered and intense screening process involving multiple law enforcement, National security, and intelligence agencies across the Federal Government. secret service Over the last year, Director Joe Clancy of the Secret Service has done a tremendous job reforming the agency, including hiring a chief operating officer from outside the Secret Service, altering the structure and management of the agency, ramping up efforts to hire new members of its workforce, and expanding training opportunities. In 2016 we will continue to work on areas that still need improvement. The President's fiscal year 2017 budget requests $108.2 million to enhance White House security, an increase of $42 million, which includes support for the U.S. Secret Service's Operational Mission Support initiative to enhance protection at fixed and temporary sites and includes advanced protective countermeasures. the coast guard With the help of Congress, in 2016 we will continue to modernize the Coast Guard fleet, including all major air and surface asset lines. We propose continuing these investments in the 2017 budget request, and we seek an additional $150 million for the design of a new Polar-class icebreaker. Our fiscal year 2017 budget request includes $1.1 billion to support the Coast Guard's air and surface fleet recapitalization, to include $240.0 million for production of four Fast Response Cutters; $130.0 million to convert Air National Guard C27J aircraft for Coast Guard use; $150.0 million for acquisition activities for a new Polar icebreaker; and $100.0 million to complete evaluation of detailed design and long lead time material for the lead Offshore Patrol Cutter. fletc Our fiscal year 2017 budget includes $243 million to support FLETC's mission. Since 2012, the Federal Law Enforcement Training Center has trained more than a quarter million Federal, State, and local officers and agents. At the same time, FLETC continually updates its curriculum to address the biggest challenges facing law enforcement, to include training for active-shooter situations, cyber forensics, and human trafficking. fema FEMA continues to carry out its extraordinary responsibility of supporting the American people and communities to prepare for, respond to, and recover from various disasters. FEMA will continue to focus on efforts to enhance resilience and mitigation measures before disaster strikes, to prevent loss and save lives. Our fiscal year 2017 budget request supports the Disaster Relief Fund, grant programs, disaster preparedness plans, and training for our homeland security and law enforcement partners. This includes $6.7 billion to sustain relief fund levels that provide immediate and long- lasting assistance to individuals and communities stricken by emergencies and major disasters. Our 2017 budget request also includes $365.0 million for the Pre-disaster Mitigation Fund and for flood hazard zone mapping. The administration is committed to helping communities take steps to protect themselves from extreme weather and other climate impacts. These investments build on recent progress and pursue strategies to build a more climate-resilient America. lawful trade and travel We continue to promote lawful trade and travel. We will continue to pursue the President's U.S.-Mexico High Level Economic Dialogue and his Beyond the Border Initiative with Canada. We are implementing ``Single Window'' for international trade, which, by December 2016, will enable the private sector to use just one portal to transmit information to 47 Government agencies about exports and imports, thereby eliminating over 200 different forms and streamlining the trade process. conclusion As I stated before, developing this budget request within the topline constraints of the bipartisan budget agreement of 2015 required difficult choices. But I am confident that the Department of Homeland Security will build upon the progress we have made over the past year and continue to fulfill our vital mission of keeping the homeland safe. I again thank you for the opportunity to speak here today and for your continued support of DHS. I look forward to your questions. Chairman McCaul. I thank the Secretary. I think you have improved the Department significantly. We appreciate that. I recognize myself for questions. I also want to thank you for discussing the authorization bills, particularly the cybersecurity bill, which I think was perhaps the most significant bill passed out of this committee in quite some time, and so I thank you for that. I had a question about the border. In a letter you sent to Secretary of Defense Ashton Carter, dated November the 30, 2015, you requested a 50 percent reduction of flight hours by the National Guard, or the equivalent of 3,850 hours less than what was provided last year, and then a reduction in 300 Border Patrol Agents. So, as we look at trying to get the border more secure, can you tell me why you have requested a 50 percent reduction in aviation assets? Secretary Johnson. Mr. Chairman, you are referring to Operation Phalanx. This is something that the Department of Defense provided over the last 10 years or so, which includes flight hours with DOD assets. DOD began originally supporting that effort some years ago when DHS itself had far less capability in that regard, both in terms of people on the ground and surveillance equipment in the air. In the intervening years, because of the support of Congress, DHS is in a much better place in terms of flight hours, aerial capability, and capability on the ground. So, this past year, the Department of Defense and I did agree that we could accept less from DOD because of the investments that had been made over the last several years by DHS itself. So, overall, we are at a much better place in terms of total flight hours, so we accepted less from DOD, which represents about a 5 percent cut in flight hours from last year, but longer term, we are in a much better overall place. Chairman McCaul. Let me move on to another issue. The Paris attackers and the Garland case involved what is called dark space communications, an encrypted space using apps. Without the ability to see these communications, it is hard to stop it. There has been a lot of talk with the Apple case, obviously, in Federal court. You at one point in time talked about that if smart people are in a room together, to ensure all stakeholders are represented in that discussion, that that could be part of the solution. As you know, sir, Senator Warner and I introduced a bill to form a National commission on technology and security to address this very important issue in their report to Congress, just as the 9/11 Commission did with solutions to this very difficult challenge to Federal law enforcement. Can you give me your opinion on that? Secretary Johnson. Mr. Chairman, I agree that there needs to be a discussion among smart people to arrive at the appropriate balanced solution to the encryption problem. I think that in response to demands from the marketplace, the tech sector has gone pretty far down the road of encryption, not to hide criminal or terrorist activity but in response to the demands of the marketplace for increased security and encryption by Americans everywhere. That has, in fact, made it harder for us to detect terrorist activity and criminal activity. I agree that there needs to be a conversation among smart people representative of all the stakeholders in this debate to arrive at the--and I believe there is an appropriate solution to this--to arrive at it, that includes not only representatives of the law enforcement community, Federal, State and local, privacy advocates, the tech sector, the intelligence community. I believe we can arrive at that if you have the right people in the room to do that. So I am agreeing with the principle of what you are saying. Chairman McCaul. That is principally what the bill states. Last question---- Secretary Johnson. Excuse me, sir. May I have just one second so you can hear me? Chairman McCaul. Sure. [Recess.] Secretary Johnson. I apologize. I think I am in a better place. Chairman McCaul. Many of us are suffering from the same illness. So I think you agree conceptually with what the bill represents. Secretary Johnson. I think there needs to be a recalibration, and I believe that there is a solution to this problem that encompasses all interests. Some smart people if they come together to consider this issue I think can solve this issue. Chairman McCaul. Just going to the refugees, the Syrian refugee issue. We have the SAFE Act that passed the House but not the Senate. You testified before this committee that it is a challenge. We know that organizations like ISIS might like to exploit the refugee program, and then, subsequent to that, the director of national intelligence wrote to me in a letter indicating that, ``individuals with ties to terrorist groups in Syria have attempted to gain entry to the United States or have already attempted to through the refugee program.'' Let me ask you a 2-part question. No. 1, do you still agree that that poses a potential threat to the security of the United States? Let me just ask you that question first. Secretary Johnson. In all candor, I do agree that the refugee flow coming out of Iraq and Syria represents a potential opportunity for terrorist organizations to move its members into other nations for potential attacks. So I agree that there is that potential, which is why just within the last several months we have enhanced our vetting for refugees. With that said, just the week before last, I was in Turkey, as I think you know. One of the places I visited was a Syrian refugee camp. The overwhelming number of people in that camp are women and children who left Syria because their homes had been ravaged and destroyed, and want to go back there. They are the victims of terrorism and violence. So I think we need to support the effort to resettle this population someplace else. But we are going to do it carefully, and we have put on a number of security enhancements to the process, which is already very cumbersome and time-consuming, and we are evaluating whether more is necessary, but my basic answer to your first question is yes, sir. Chairman McCaul. Well, let me just follow up. When I go home, and I talk to my local community, State representatives, you know, Federal law requires that the State and local governments be consulted with. When I go home, they basically tell me as you move the refugees in--and they are coming into the United States now--and as you move them in, the local communities want to know when you are moving them in and where for a lot of reasons, safety and security and maybe the safety of the refugees themselves. Can you tell me why this is not being done? Secretary Johnson. Well, as I am sure you know, the actual resettlement in the United States is principally the responsibility of the State Department and the State Department is supposed to be consulting with State governments, with local communities, local not-for-profit organizations. My observation, just in the State of Texas--and I have met communities that have embraced Syrian refugees in particular in Texas--is that it is going well, that the communities that have accepted the refugees are embracing of refugees. They are learning the language. They are getting jobs. Their families are relatively happy to be here. That has been my observations. I know that there is friction with Governors, which the State Department and I have been seeking to address, and I think we are in a better place now than we were, say, in December. Chairman McCaul. I would encourage you to do as much consultation as possible before they are moved into these communities. With that, the Chair recognizes the Ranking Member. Secretary Johnson. I am now adequately doctored up here with 2 cups of tea, a lot of candy, Life Savers. I am good for another 6 hours. There must be something in the air. Mr. Thompson. Thank you very much. Mr. Secretary, I talked a little bit about the wait times that a lot of airports presently are experiencing and the implications for additional times, wait times this summer. We had Administrator Neffenger here before the committee recently and shared the information with him. Can you kind of give some assurance to this committee that that existing problem, as well as a future problem, is high on your radar screen and that this budget would not impede a solution to that problem? Secretary Johnson. The answer is yes. Let me say 3 things. First, wait times are due in significant part to increased travel. More people are flying these days. No. 2, we have in fact applied a renewed focus to security at checkpoints at domestic airports. That is something that Administrator Neffenger and I both support, and it is something I asked him to do, in part because of the results of the inspector general's tests last summer, which we all know about. So we made a renewed effort at aviation security, aviation screening, and checkpoints, which I hope and expect and believe that the American public supports and understands; it is for the protection of them. With regard to the workforce, as I am sure you know, Congressman, for years, we have been reducing the number of TSOs, because of risk-based security. In this budget request, we are beginning to reverse that trend. We want to stop the process of reducing the number and in fact start building on that so that we have more TSOs available to do the screening, and that will help with the wait times. I track wait times myself every time Pete Neffenger comes in to brief me, and I see the numbers going up. But I think it will get better over time. A lot of it is due to increased travel volume, which is a good thing in my view. Mr. Thompson. So you anticipate that the problem will be managed? Secretary Johnson. I anticipate that the problem will be managed. It is being managed. We are approaching the summer months, as you know. I am sure we will see added wait times at certain airports, but we are in this budget request seeking a slight increase in the number of TSOs, and I expect that to be a longer-term trend to deal with the screening at airports, but there has been a renewed focus on security, without a doubt. Mr. Thompson. I talked a little bit about Presidential campaigns, security. It is that time of the year. Some of us are concerned with the activities of people who are attending campaign events. I would hope that the mission for the Secret Service is maintained toward the protection of, particularly, individuals running for office and that other security responsibilities will fall to other law enforcement. Secretary Johnson. Okay. That is exactly the line they draw. The Secret Service, and I want to make this very clear, is responsible for the physical security of the protectee. The Secret Service is not responsible for removing demonstrators, removing those who violate the rules or are noisy, unless it represents a physical threat to the protectee. So, very often at these large events, as you have observed, there will be security provided by the event space, provided perhaps by the event organizers, but the Secret Service, you know, the people that the taxpayers pay for are there to provide physical security for the protectee. That is their job, and that is the limit of their jobs. It also includes magnetometers at the screening of the events for the physical safety of the protectee. But as a protectee myself, I have been in situations where there are protestors, demonstrators, and things get a little hot, but the Secret Service is there to just take care of the protectee; that is it. They are not there to deal with the demonstrators, unless the demonstrators present a threat to the protectee. Mr. Thompson. Thank you, I yield back. Chairman McCaul. The Chair recognizes Mr. King from New York. Mr. King. Thank you, Mr. Chairman. Secretary Johnson, at the outset, thank you for your service as Homeland Security Secretary both with the Department and also the level of cooperation you give to this committee and the open door that you have. I would like to focus on the grant programs. I say this coming from New York, but I think it would apply to almost any urban area, even suburban areas throughout the country. It is high and when the ISIS threats are so high, we see a 45-percent reduction in the urban area security grants. From my observation, these grants have been effective. They have been administered in an efficient way. I am not aware of any particular waste or corruption or abuse of the grants. Also cities attempt to process them as quickly as possible for grant applications. So I would just like your observations as to what you believe the effectiveness of these grant programs have been now and going forward. Secretary Johnson. The budget request, Congressman, with respect to grants, again reflects hard choices to fit within the budget caps. I do agree that our grant activity is very important to State and local law enforcement, State and local first responders. I have seen first-hand the effectiveness of our grants that support for the NYPD, for example, communications equipment, surveillance equipment, overtime for cops, for firefighters, and active-shooter training. I personally attended an active-shooter training exercise in the New York City subway system in November with Commissioner Bratton. Active-shooter exercises right now, given the existing threat we face, are very important. So I have not only been to New York City; I have been to Miami to observe active-shooter training exercises there, and Louisville, Kentucky, to highlight the importance of this. So given how, as was noted, we have more and more reliance on State and local law enforcement to detect the next terrorist attack, supporting State and local law enforcement in their counterterrorism efforts is very, very important in my judgment. I support the President's budget obviously, but I do agree that our grant money is very important for State and local law enforcement, State and local governments. Mr. King. Thank you. I would just to add to that, in many ways, your local police and fire department are carrying out a Federal function as far as resisting terrorism. So I appreciate your testimony on that. As follow-up to what the Ranking Member was asking about Secret Service protection, I realize that their job is to protect the protectee, but planning for the conventions this summer, will Secret Service have a role in dealing with the preparation of the local police and with local security coordinators? Secretary Johnson. Yes. Mr. King. Or will the candidates at the convention itself, and again the local police departments? Secretary Johnson. Yes. A National political convention is an NSSE. There is a Federal coordinator of the security of the effort. The planning that goes into that takes a year or more. This year in particular, I have told the Secret Service that we should do as much of that advanced planning as possible. I will be particularly involved myself. It does involve working with State and local law enforcement, State and local responders for perimeter security, traffic patterns and the like. I think this year I want to see us--ensure that we are adequately prepared. Mr. King. Going forward, do you think more money should be allocated just for the contingency of what might happen going into a Presidential year? I mean, you could be caught short this year just by I think--I don't think any of us anticipated the level of interest or level of potential violence. Is there enough funding? Going forward, can you make a recommendation for your successor? Secretary Johnson. I believe we are adequately funded. But I am going to speak for myself here and not for my administration for a moment to say that I think that we should--I know we try to adequately fund the Secret Service at higher levels during election years, but there are variables to campaigns. This year, at one point, we had 14 candidates running for the Republican nomination, any one of whom could have requested Secret Service, and they may have qualified for it. But there is a huge variable there. I think, perhaps, and again I am speaking for myself, we ought to think about some sort of fund that is multi-year money that the Secret Service can draw on to deal with these variables. I think that is something that we and the Congress should think about for the future because there are some things you can't anticipate or you can. But depending upon events, you could be funding at this level versus that level. Mr. King. Thank you, Mr. Secretary. I would just say in conclusion, I certainly would urge the Congress to do all it can to restore the grant money and get cooperation as we move forward on that. I yield back, thank you. Chairman McCaul. The Chair recognizes Mr. Langevin. Mr. Langevin. Thank you, Mr. Chairman. Mr. Secretary, I want to thank you for being here and welcome you back. I want to thank you as well as the hardworking men and women who work under your supervision at the Department of Homeland Security and the work that they do to protect our Nation. So I have a few questions on issues of great importance to me, to you, and to the country that begins with cybersecurity. I just want to begin by saying that I was very pleased with the administration's Cybersecurity National Action Plan the President just now announced recently, which I really do believe makes even steps toward centralizing dot-gov information security, something that I have long called for, for a number of years now. Can you discuss the Department's role in the CNAP? In particular, how will DHS interact with the new Federal Chief Information Security Officer? Secretary Johnson. Well, a couple of things, DHS will be involved--is involved with almost every aspect of that plan. Every head of Federal agencies and Departments--every head is legally responsible for their own systems, but having a central information cybersecurity officer I think is good thing. I am responsible for the overall security of the Federal civilian dot-gov system. I think we are fulfilling that responsibility right now, particularly with the authorities in the new law. The CNAP I think puts focus on a couple of things that are important. One is education; the other is hiring a cyber workforce. The third and I know this is the thing that the President is very emphatic about, modernization of our Federal systems, some of which are very old, go back to the 1970s and 1980s, and so we are requesting a huge long-term investment in doing that. But DHS is involved in virtually every aspect of the plan, and we are involved in virtually every aspect of cybersecurity day to day as we go about our mission. Mr. Langevin. Thank you. I understand that the President's National Plan of Action is actually moving away from this idea of departments and agencies procuring their own cybersecurity. Is that your understanding as well? Secretary Johnson. I think the idea is we would like to have a more strategic centralized approach to the acquisition of systems so that we get the best deals, and there are lessons learned across the departments and a consistency in how we go about this so it is not case by case and happenstance. Mr. Langevin. So, continuing along that line, in your testimony, you point out CDM and EINSTEIN continuing to expand their reach across dot-gov programs like these allow departments and agencies to outsource important cybersecurity functions with the subject-matter experts in your Department. However, as you point out, only 50 percent of personnel are protected by E3A at the moment. Do you need more authorities to make sure agencies adopt these valuable resources? If not, how should we ensure that they are used? Secretary Johnson. I think that the Cybersecurity Act of 2015 did a good job of addressing this. There was some doubt about the authority of DHS to go into other Federal agencies with an intrusion detection system, but the new law addresses that. I will say that there are still some lingering concerns about that in certain departments and agencies, but we are addressing them armed with this new law that you give us last year. Mr. Langevin. Okay. Secretary Johnson. One of the things the law requires is that we get to 100 percent by the end of this year, and I think we are on track to do that. Mr. Langevin. I am anxious for us to get there, and I know you are as well as. Mr. Secretary, one additional question, I know my time has expired, but 2 weeks ago the Defense Department announced that it would be establishing a bug bounty program to provide security research as a clear path to detect and report vulnerabilities to the DOD. Is this something you would support for DHS? Secretary Johnson. I haven't thought carefully about that question, but it sounds like a good idea, yes, sir. Mr. Langevin. Of all the places that you think would not want to support, DOD, in terms of being hypersensitive about security and the networks, to allow something like this I think is very forward leaning, very creative. I support it. I think it is a good thing, and I hope you would seriously consider doing something similar. Secretary Johnson. Yes, sir. Mr. Langevin. With that, thank you, Mr. Chairman. My time has expired. I yield back. Chairman McCaul. The Chair recognizes Mr. Smith. Mr. Smith. Thank you, Mr. Chairman. Mr. Secretary, I just want to get an idea, first, to the extent of the problem we are trying to address with the budget. First of all, how much of an increase has there been in illegal immigration since the first of this year? My understanding is it is up 25 percent. Is that accurate? Secretary Johnson. Are you referring to apprehensions? Mr. Smith. Yes. Secretary Johnson. Since the first of this calendar year, it has remained pretty steady. I have the numbers right here if you would like. Mr. Smith. Okay. Secretary Johnson. But as I mentioned earlier, apprehensions on the Southern Border in February and January have gone down significantly. Mr. Smith. Rather than the beginning of this calendar year, I meant to say the beginning of the fiscal year. The first 4 months of a fiscal year, I understand apprehensions were up 25 percent. Secretary Johnson. The numbers, beginning October 1, were creeping up in October, November, December. They decreased pretty significantly in January, February. Mr. Smith. Is 25 percent accurate generally? Secretary Johnson. Over the prior fiscal year, that is probably right, because of that increase we saw in the fall. Mr. Smith. Right. Also, with the corresponding same period of time, were apprehensions for unaccompanied children up about 100 percent? Secretary Johnson. I don't know whether that is true or not. I don't know about that number. Mr. Smith. Okay. That is my understanding as well: Apprehensions overall, 25 percent; unaccompanied children, 100 percent. No surprise, except that is not an encouraging trend. Secretary Johnson. The trend has been back down again in January/February to the levels it was this time last year. Mr. Smith. Right. There is still, regardless, over the last year, the 100 percent over the corresponding same time I understand. But you can get back to me maybe even by the time we are finished today. The other subject I wanted to bring up was I was down recently at the border in Texas and some individuals told us that the administration's catch-and-release program was being expanded. By catch-and-release, I mean individuals were apprehended and not put in to proceedings but just turned around and released and sometimes returned across the border. Is that catch-and-release process being expanded in your opinion? Secretary Johnson. No. I would have to disagree with that, sir. As I think you know, we have expanded our capability for family resident centers. Mr. Smith. Right. Secretary Johnson. In several locations in Texas. We have-- -- Mr. Smith. Agents are not being told just to not put individuals in proceedings; they are not being told just to release them. Secretary Johnson. No, that is not my understanding, and that is not my expectation at all. We have just this fiscal year, we have sent back either by the Border Patrol or ICE something like 128,000 Mexicans. Mr. Smith. But I am talking about something different. I am sure individuals have been returned. I am talking about--and it sounds to me--I would like to have you confirm it--that if an individual is apprehended, they are put in proceedings, not just released. Secretary Johnson. If an individual is apprehended, if they are not detained, they should be given a notice to appear and put in immigration proceedings. Once they are ordered removed and they are a priority removal, they should be removed. Mr. Smith. Okay. Good. Last, and you probably anticipate this question because I ask it every time you are before this committee: How many thousands of individuals has the administration released who are criminal immigrants? In other words, every year, it is around 28,000. Every year, you say it is wrong; we are not going to do it anymore. We seem to continue that policy, but how many criminal immigrants are being released? Secretary Johnson. Congressman, since you and I have been having this conversation, in fiscal year 2013, the number was 36,000. Mr. Smith. Okay. Secretary Johnson. Last year or the year before, I put in some reforms to the process to tighten up that decision-making process. Mr. Smith. Right. Secretary Johnson. In fiscal year 2014, the number went down to about 30,000. In fiscal year 2015, the number is I think around 19,000. Mr. Smith. Okay. Why is it 1,000? Why are we releasing any criminal immigrant back into our neighborhoods? Secretary Johnson. As you know, a lot of the decisions are made by an immigration judge, which is part of the Department of Justice, and because of the Supreme Court's decision in Zadvydas, which after a removal order gives us limited ability to hold people. Mr. Smith. Those cases amount to about 2,000 of the 20,000. I am talking about the other 18,000, which the administration, if they wanted to continue to incarcerate, they could, and they still continue to release thousands of people. As you know, the figures came out a few days ago where over the last several years, hundreds of individuals have committed capital crimes who had been released, who didn't need to be released. So when is the figure going to get down to zero and not 19,000 or whatever it might be? Secretary Johnson. Well, I am constrained by the decision of an immigration judge, and I am constrained by the law. I will tell you that a decreasing percentage of those released are released as the result of the exercise of discretion by an immigration officer. I would like to see that continue in that direction. I too would like to see that number continue to go down, and it has gone down significantly in the last 2 years. Mr. Smith. Thank you, Mr. Chairman. Chairman McCaul. I thank you. The Chair recognizes Mrs. Watson Coleman. Mrs. Watson Coleman. Thank you, Mr. Chairman. Good morning, Mr. Secretary. It is good to see you again. Secretary Johnson. Good morning. Mrs. Watson Coleman. I want to ask you a question about the Department's decision to up the number of individuals that it plans to house at the headquarters from 12,800 employees to 18,000 employees and from 230 square feet per person to 155 square feet per person. The reason I am asking you this is because we have had many hearings here where the issue of chronic low morale has been raised. It would seem to me that reducing this sort of personal work space and increasing the number of people in that area might have a negative impact also on morale. So I am wondering why that decision was made and what went into making that decision. Secretary Johnson. Well, first of all, we have an aggressive campaign to improve the levels of employee satisfaction. I believe we will see an improvement in the levels of employee satisfaction this year because of the efforts we are making over the last 2. We are building, with the support of this Congress, a new headquarters in southeast Washington. It will be a really nice headquarters, much nicer than the temporary space we are in now, which, irrespective of the square footage, is not optimal for our headquarters personnel. I believe, aside from whatever square footage there is, that once we get to a new consolidated headquarters, that will also improve levels of employee satisfaction. Just being in a new modernized headquarters space where we are all better able to have secure communications, more conference space and the like, is going to go a long way. So I don't know about--I heard you mention those numbers. I am not familiar with those square footage numbers, but I do believe and I am convinced that when we move to the new headquarters, that is going to do a lot for morale. Mrs. Watson Coleman. Way back when, when I was in school and studying issues of this nature, this whole issue of personal space and how you felt about your work environment kind of went hand-in-hand. So I was just sort-of interested in how one decided that this 75-square-feet reduction wouldn't have a negative impact on an already sort-of fragile work environment. I do understand and appreciate that you have been doing a lot to try to lift morale and make people happy about working in the important work that they do. Secretary Johnson. I think moving to a sparkling new headquarters is going to do a lot for that. Mrs. Watson Coleman. That will help. That will help, truly, yes. I wanted to talk to you a little bit more. We talked about the Secret Service and its role at these Presidential debates and who it is supposed to protect. But I wanted to go a little bit beyond that because these are major large events, and I know you speak to maintaining situational awareness at these major events. So as we are moving forward, not only in this primary season but even in the general election season, even up to the various conventions, what is it that the Department will be doing to maintain situational awareness and coordinate with State and local law enforcement during this whole campaign season up to and including? Secretary Johnson. Well, the Secret Service is in large part a law enforcement agency, so a lot of what the Secret Service does is investigative in nature. So a lot of protection mission is in investigative in nature. The Secret Service I know for a fact works well with State and local law enforcement on a variety of things, including the protection mission. State and local law enforcement supports the protection mission in every place a protectee goes. I have seen that first-hand. This election year, that is an expanded mission. So I anticipate, particularly as we move toward the National political conventions, that we are going to spend a lot of time working with local law enforcement in Cleveland, working with local law enforcement in Philadelphia. Those are two NSSEs that we coordinate the security for every 4 years, and I anticipate that again happening this year. Mrs. Watson Coleman. So will there be other personnel, other than Secret Service personnel, from your Department that are engaged? Secretary Johnson. Yes, yes. Like the General Assembly last year, our HSI personnel, our TSA personnel, our Coast Guard are all devoted toward the security of the event and other components of my Department. So I anticipate that happening going forward with the conventions and with the campaign. Mrs. Watson Coleman. So will some of those personnel be involved in tamping down, calming down episodes at these events like we have seen at some already? Secretary Johnson. No, I would not put it that way. I think that what our personnel do to support the Secret Service is, say, magnetometer screening at events to ensure that no prohibited items are brought in. But in terms of dealing with demonstrators and the like, that is largely a private security function and a local law enforcement function. Mrs. Watson Coleman. I have one other quick question, and it regards border agents, the problem you are having with recruitment and with retention. There was some information about one of the problems with this is that a lot of these border agent applicants couldn't pass the polygraph test. So I am wondering, are you doing a broad recruitment, or is this a narrow--what is the problem here in being able to retain the workforce as you state you need and as you are asking for here? Secretary Johnson. We simply have not been able to hire to the levels that we want to hire to. So the Commissioner of CBP, with my encouragement has been very focused on an intense campaign to move--get people through that process faster. We now have a hiring and recruitment command at CBP. We have things called Hiring Hubs. We are doing a number of things to get through the polygraph and the vetting process quicker. This is a top priority of the Commissioner, and I know he is focused on it. Mrs. Watson Coleman. This is not an issue of not enough candidates. This is an issue of the system not being able to move---- Secretary Johnson. I think that is a fair statement. Mrs. Watson Coleman. Thank you, Mr. Secretary. My time is up. Chairman McCaul. The Chair recognizes Mr. Duncan. Mr. Duncan. Thank you, Mr. Chairman. Mr. Secretary, a lot of statistics we hear about visa overstays are that 49 percent of all illegals in this country are people that overstayed their visa. I want to thank you for putting together this entry-exit overstay report put out in January. I read it with some interest, because it looks like you all have left out some of the visa overstay categories. For instance, this report is limited to foreign nationals who entered the United States as nonimmigrant visa visitors for business, IAB-1 and WB visas, or pleasure, IAB-2 and WT visas, through ARC ports of entry. You left out F-1 student visas, which is a large category of these overstays. Can we expect a report from your office on the anticipated number of visa overstays that are F-1 visa holders? Secretary Johnson. Yes, we should and we must get there. The reason that the visa overstay that you have is limited to B-1, B-2 visas is because that was the place where we could provide you with reliable information. It is based on biographic exit. With regard to nonimmigrant B-1, B-2 visas, we are now in a place where we can get that data on a reliable basis. The problem with student visas is we don't always know how long the validity period is because it varies with student visas. But when somebody is issued a visa for tourism for a defined period and so that is more readily-available information. So this is, as you know, this has been a long-term effort. We finally got to the place where we could provide visa overstay information with regard to B-1, B-2, but I agree with you that it needs to be a work in progress. We are going to keep at this. Mr. Duncan. Absolutely, I think you would agree with me that we need to continue our efforts on an entry-exit visa system--entry-exit system biometrics so we know when someone enters and leaves the country. I notice the Visa Waiver Program numbers are not included in here either. You mention the challenge, and I understand that. I just hope that we will continue working on that. That was not the thrust of my intention this morning, but I read this with some interest and I applaud you for at least taking a first step on that. The Department of Defense recently released its plan for closing the prison at Guantanamo Bay and relocating those terrorists to U.S. soil. DOD visited a site in South Carolina, the Charleston Naval Brig, among other sites within the United States. Housing terrorists in the United States could potentially increase the threat to our homeland, including Charleston in my home State. So a two-part question: Has the Department conducted any analysis into the security threat that would be posed to the homeland in bringing these terrorists into the United States? Specifically, has there been any analysis conducted into the potential increased threat posed to communities that would house these terrorists? Secretary Johnson. With regard to that last question, I would have to refer you to the Department of Defense. From my Homeland Security perspective--I certainly support the closing of the facility at Guantanamo, but from my Homeland Security perspective, I would want to know 2 things. I would want to see a threat assessment done with respect to the surrounding community for wherever we select to send some of these people in the United States. I would want to be sure, from a legal perspective, that the laws that provide for various immigration protections do not apply to these people. Mr. Duncan. I agree with you on that part, that our civil liberties and Constitutional rights should not apply to terrorists just because they are brought to United States soil in captivity. I agree with you on that. Secretary Johnson. Well, I have seen legal analysis that the immigration laws, immigration benefits would not apply to a law of war detainee in the United States. I would want to be sure that is true. Mr. Duncan. Okay. The brig in Charleston has an elementary school a mile or less from the brig. It is a security concern. I think it does absolutely fall under your umbrella of jurisdiction, because if you bring these terrorists to U.S. soil and we are holding them there--right now, they are on an island. It is very hard for ISIS or al-Qaeda to attack that prison. But if they come to United States soil--and we have already seen San Bernardino and other terrorist attacks happen. A lot of folks believe that those cities themselves where those terrorists are housed could be targets themselves for an act of terror just because. Now, it could be an attempted breakout. We saw a helicopter land at a local prison in upstate South Carolina in a prison break. So these are legitimate concerns. The administration, this week, just yesterday, reversed course on a 5-year plan for oil and gas leasing in the Atlantic Ocean. They said in their statement they did so because of input from stakeholders, the local community and whatnot. Do you believe or would you not agree that it is appropriate to include the State Governors in the talks of moving the terrorists into their State? Secretary Johnson. Yes. Mr. Duncan. Thank you. Because I think the administration, if you use precedence of oil and gas leasing in the Atlantic using stakeholder input, they absolutely ought to listen to the Governors in the State. So Governors have written letters to the administration voicing their concerns in opposition to not only bringing terrorists onto U.S. soil but into their individual States. Governor Haley in my State ought to be commended for being one of those Governors that say we don't want these terrorists in our State. I think the administration should listen to the Governors, just like they listen to the environmentalists with regard to oil and gas leases. So thanks for your comments. Mr. Chairman, I appreciate it and yield back. Secretary Johnson. If I may, I know from my experience years ago as General Counsel of the Department of Defense that when we were looking at this question we would consult Governors and Members of Congress that represent potential locations. Mr. Duncan. I don't know that the administration is listening at this point to the Governors or the Members of Congress on this particular issue at this time. I yield back. Chairman McCaul. The Chair recognizes Mr. Keating. Mr. Keating. Thank you, Mr. Chairman. Thank you, Mr. Secretary, for being here. Let me just throw out some questions and see if time permits you to answer them here or if you will have to follow up in writing. First of all, I want to touch base on, again, emphasizing what the Chairman said in his opening remarks about the UASI grants, the Urban Area Security Initiative grants. Those cuts, as well as cuts to State Homeland Security grant moneys, we are concerned about those. At Boston, we saw the value of those UASI grants first-hand, and we continue to utilize those effectively. Also, last September, you announced the Office for Community Partnerships initiative. The cuts in these State and local programs could indeed hurt the effectiveness of that effort as well. That is No. 1. No. 2, the long wait lines that so many airports are experiencing right now--we have experienced them. We are among the many who have experienced them, at Logan Airport, particularly with the influx of summertime vacations and the warm weather that is coming. It is my understanding from some of the airports that passenger-screening K-9s could help expedite this. In fact, in Logan Airport, they said that 2 to 4 dogs, an increase, with their efforts assisting with explosive detection, would greatly reduce passenger times. No. 2, I want to see if there could be something to address that as well as, if you could, the long-term solution for some of the staffing shortages. The third thing is a component, a bill that I put in with the Chair dealing with detection and identification and seizures of cultural properties, artifacts that are there, which fuel terrorist activities. Part of that was signed into law in February. How are you doing progressing with that in terms of staffing up to deal with that detection program? I will leave it with that, although I do want to--in writing, I will talk about some of the more local issues in New Bedford Airport and Hyannis Harbor with CBP people, as well as give you a thank you. Your staff is helping us to expedite the H-2B visa issue which, because of the Department of Labor concerns, is being slowed up, but your people have been helping us to in the overall process shorten that, so thank you. I know I gave you a lot. I apologize. Secretary Johnson. With regard to the last question about the artifacts law, I believe we are doing what we have to do to meet that law. We support that law. I agree with you about the effectiveness of K-9s. It is my assessment that use of K-9s--a dog's nose is about as good a technology as there is. We are addressing wait times at the airports, but part of it is due to increased travel volume. We want to reverse the trend to downsize TSOs. Part of added wait times is simply more security. We have, both the TSA administrator and myself, embarked upon a plan to bring about more aviation security at domestic airports. So that is an intended--it is not an unforeseen consequence that we are having longer wait times, but a lot of it is due to the increased travel volume. I do agree with the importance of UASI grants. I have seen the effectiveness of it myself. Given the evolution of the global terrorist threat, I think supporting State and local law enforcement is important. The submission you have before you for fiscal year 2017 does reflect hard choices to fit within the budget caps. Mr. Keating. Maybe we can address some of those here, hopefully. The Office for Community Partnerships, how is that going? Secretary Johnson. I think it is going well. Mr. Keating. It is an important program. Secretary Johnson. Countering violent extremism, given the current threat environment, is, in my judgment, as important as any of our homeland security missions. Under the leadership of George Selim, we are building bridges. We are building bridges to the tech sector for help there. We are building bridges to philanthropies. I am very supportive and appreciative of the Congress' efforts to help us out with grant money to do all this. There is bipartisan support in Congress for our CVE efforts, and I am glad to see that. Mr. Keating. Great. Thank you, Mr. Secretary. I yield back. Chairman McCaul. The Chair recognizes Mr. Barletta. Mr. Barletta. Thank you, Mr. Chairman. I happen to Chair the subcommittee that oversees Federal buildings. The first Federal building I went into, they had 1,500 square feet per employee. That is a little bit more than a cubicle. So it has been my request and the request of the President to reduce the Federal footprint of Federal properties. We have done that so far. The agencies have complied, and, to date, we have saved $2.9 billion in the agencies that have now moved into spaces that are 180 square feet or less per employee. So I appreciate Homeland Security working with us. It is going to be a beautiful facility. At the same time, there will be more money for your mission, rather than wasted space that most Americans don't have in their day-to-day jobs. So that is a sidebar, and, again, I appreciate your working with the committee. Mr. Secretary, the 9/11 Commission taught us that, to terrorists, travel documents are just as important as weapons. It is the preferred method of entry into the country for terrorists. They come here legally and then just stay, disappear into the mainland. Nevertheless, our Government continues to fail at keeping track of who has entered our country and whether they have left or not. If you are home to an international airport, your State, you essentially live in a border State. This is a point I have consistently raised since joining this committee, and that is why I have again introduced legislation that makes a simple tweak to our laws. As we all know, if someone illegally crosses the Southern Border, they are unlawfully present in the United States. If someone comes in on a visa and then overstays their visa, they are unlawfully present in the United States. In fact, over 40 percent of the people that are here illegally didn't cross the border illegally; they come on a visa, and they don't go home. Yet the penalty is very different, even though both people in this situation have the same legal status, unlawfully present. Their status is the same, so why is the penalty different? Why doesn't it make sense for the penalty to be the same, a criminal and not a civil offense? Just last month, we saw a reason why this isn't a debate club argument but an issue that impacts my constituents at home. A Ukrainian national most likely lied to get into this country. Authorities say he came to the United States on a 3- month work visa, then got a tourist visa that expired in March 2013. He then enrolled as a freshman at a Harrisburg school just 6 months later. He took on a false identity, a fake name. He lied about his age. He started school as a freshman, a 20-year- old freshman, in our schools. His ``surrogate parents,'' Stephanye McClure-Potts and Michael Potts, helped enroll him with fake documents. The criminal complaint said that they also helped him get a Pennsylvania driver's license under the name of Asher Potts in 2014. He is being charged with multiple offenses, including theft, identity theft, tampering with public records, conspiracy, and statutory rape. Now, his surrogate parents say he talked about attacking students at his high school. Nothing could be more chilling than the thought of terrorists enrolling as students. Previously, we have heard of terrorists taking flying lessons, but imagine them sitting next to your kids in algebra class. The fact that this has happened in central Pennsylvania shows how serious this is. Imagine if, instead of being a 23- year-old Ukrainian national named Artur Samarin posing with the name of Asher Potts, this man had an Arabic or Hispanic last name. That sure would get everyone's attention--and this is the same thing, no matter what his name is--if they heard that someone overstayed their visa, had created false documents, joined the ROTC and talked about wanting to join NASA, and had allegedly made threats to attack students. Now, we have seen concrete evidence in Harrisburg. Where else is this happening? How many more Asher Potts are there Nation-wide? My question is: How many individuals have overstayed their visas, falsified their identities, lied about their age, and are sitting in school classes today? Secretary Johnson. Congressman, a couple things. First, the visa overstay report that was recently released reveals that, with regard to those who entered on B-1, B-2 visas, year to year, the population of those who overstayed at any one time--that could be a day or a year--is somewhere around 400,000. I don't have the exact number, but it is reflected in the report. I am going to agree with the spirit of your question. I think that, in this current environment, in this current threat environment, the potential for fraudulent travel documents is a big concern. So I have done a lot to support DHS's fraudulent documents lab which we have. We have the capability to detect fraudulent documents. I also have asked our folks to, now that we have some better clarity on visa overstays, develop priorities for enforcement with regard to visa overstays. Right now, priority 3 in my policy reflects those who--I can't remember the exact words--commit fraud of the system, but I have told our folks we need to develop priorities within the visa overstay population to get at this population. I think there is a concern we should all have about fraudulent travel documents. Mr. Barletta. Especially if they can get into our schools, lie about their age. You know, there wouldn't be a more horrific crime here than if you can use your imagination of what could happen. Don't you think the penalties should be the same? If you cross the border or you overstay your visa, your status is the same, you are unlawfully present here. Shouldn't the penalties at least be the same? Secretary Johnson. I would have to think about that a bit more. I am concerned about the fraudulent travel document problem because of the migration crisis we have, primarily. I understand the spirit of your question too. But that is my concern. Mr. Barletta. Thank you. Thank you, Mr. Chairman. Chairman McCaul. Thanks. The Chair recognizes Mr. Payne. Mr. Payne. Thank you, Mr. Chairman. Secretary, it is good to see you again. As you know, my district, your home, takes in the Port of Newark and Newark Liberty International Airport. The Customs and Border Protection Agricultural Specialists at the airport clear up to 20,000 passengers every day. You know, the port is one of the busiest on the east coast, and the CBP Agricultural Specialists inspect all types of items that could harm domestic agriculture. Now, I am concerned that our understaffed ports lead to delays in our commercial lanes, as cargo waits to enter the U.S. commerce, but also creates a significant hardship for CBP Officers. There is a severe shortage of Agricultural Specialists at Newark ports of entry, in the neighborhood of 30 members. What is the strategy in terms of working on these issues with the lack of personnel? Secretary Johnson. The strategy is an aggressive plan to make for a more efficient hiring process through aggressive recruitment, a recruitment hiring command within CBP, hiring hubs, and a more expedited way to get through the polygraphs. We do have shortages in person power that are reflected around the country, including in northern New Jersey, and I have told the Commissioner that this has got to be a top priority this year to address. I believe he is addressing it. He is acutely aware of the shortages that you refer to. Mr. Payne. Okay. Thank you. Also, you know, in November 2012, DHS OIG found that, although the Department has spent $430 million on developing interoperable communications capabilities, radio users from different jurisdictions could not communicate. The DHS Inoperable Communications Act, which I reintroduced this Congress, was the first bill of 2015 out of this committee and signed into law last July. But the Department has failed to issue the mandated strategy by the January 2016 deadline and has rebuffed many requests to provide status briefings on this. When could this committee expect to receive the Department's strategy to achieve interoperability? Why has it been delayed? Secretary Johnson. Well, Congressman, first of all, if we are not being responsive to Congress, that is something that I will address. I know from a briefing I had recently that we are in a better place than we were certainly in 2012 with regard to interoperability. Day to day, we are functioning much better now. There are still areas of needed improvement, without a doubt, but I think interoperability, both within DHS and across law enforcement agencies, is key. I will address the question of getting back to you with regard to your outstanding request, make sure that that is met. Mr. Payne. Absolutely. I mean, we all understand how crucial interoperability is in the event of a catastrophe or a terrorist attack or a natural disaster, that agencies on the ground need to be able to communicate with each other and also within the Department specifically. Let's see. Well, I am running out of time, so I will yield back. But I hope that you, if you are going to be in Washington, that you vote by mail and vote for your Congressman again. Thank you. Chairman McCaul. Wow. The Chair recognizes Mr. Perry. Secretary Johnson. That is a new one at a hearing. Chairman McCaul. Yeah. Secretary Johnson. I will accept the challenge. Mr. Perry. Thank you, Mr. Chairman. Thank you, Secretary, for being here. Next week, the President is making a legacy trip to Cuba. Last October, Deputy Secretary Mayorkas traveled to Cuba to meet with senior Cuban government officials, and, according to your press release, or DHS's press release, the discussion focused on enhancing cooperation in Customs and Border Protection and exploring new areas of collaboration. Secretary Johnson. Uh-huh. Mr. Perry. Now, given the Cuban government's past activities related to human rights violations, counterintelligence activities, and subversive actions towards America, as well as the fact that they have lifted the visa requirement and we are seeing Cuban refugees coming through Central America and walking across the land border into Mexico, there are some serious questions that remain as to how DHS plans to coordinate with Cuba. Yet when the Oversight Committee that I chair requested information, an informational briefing, from DHS to Members on the DHS activities related to Cuba, DHS headquarters and CBP refused to provide briefers, saying that they have to have State Department present for such a briefing. Of course, as you can imagine, State Department saying, well, we have to have DHS present for such a briefing. So we are getting the runaround here. Is there some secrecy here or something I am missing? I mean, is there something that the Department can't tell us autonomously, and if we have to verify it with the State Department, we'll do that if they refuse to come, or deal with them separately? Or what is happening here? Secretary Johnson. Congressman, I will look into that for you---- Mr. Perry. Okay. Secretary Johnson [continuing]. Now that you have put that on my radar. I can tell you that, in general, we are making an effort to build a greater degree of law enforcement cooperation with the Cuban government. I think that is in our public safety interest to do. Mr. Perry. Absolutely. Secretary Johnson. In terms of maritime security, law enforcement, port security, I think that is in our interest. We have been having those discussions. Mr. Perry. The Department has always been cooperative. So I am concerned about this, and Members of the committee are, as well. Of course, this is an emerging and changing policy, and we want to make sure that we are involved in it, as Representatives---- Secretary Johnson. I do know that we are pretty focused right now on the President's visit, which is coming next week. But I will look into this, and, as I hope you know by now, I believe in responsiveness to Congress. Mr. Perry. I appreciate that. I do know that, so thank you. Recently, or at least previously, you stated in this committee that your position, it is your goal to get DHS off the GAO high-risk list. Secretary Johnson. Yes. Mr. Perry. I am assuming that is the same thing. I suspect your staff has informed you of the Subcommittee on Oversight and Management Efficiency's findings and our hearings that we have had where literally every single thing we have examined has shown gross mismanagement, whether it is in the human resources information--HR IT technology system, the vehicle fleet management, and other areas, where we just see hundreds of millions of taxpayer dollars wasted. I am just wondering--I know you have requested $225 million for St. Elizabeths. I have been out there. It is going to take a lot of resources, without a doubt. But you also manage the second-largest civilian fleet in the Federal Government at a cost of over $460 million to operate. I found some unimaginable things occurring there. I am just wondering if getting off the high-risk list, GAO's high-risk list, you know, even--there is not much asked for in improving your acquisition process, which was another point of contention, and only a minuscule fraction is devoted to that. So I am just wondering, as you weigh everything and try and prioritize with St. Elizabeths, et cetera, and the mission that you have got to complete, the President's visit to Cuba, how does this fit in? Secretary Johnson. Well, as I indicated in my opening remarks, management reform is my top overall priority. We continue to make good progress with GAO. In fact, GAO has told us that they consider us a model agency for how you get off the high-risk list. Mr. Perry. If I may interject, when they told you that, did they tell you that in writing? Because I don't get that sense-- no disrespect intended, but I don't get that sense when they come to testify. Secretary Johnson. I believe that they did. Because when I was told that verbally, I said, ``Get me the piece of paper that says that.'' Mr. Perry. Great. As long as you are working on the hearing, if you can find that, as well. Secretary Johnson. Congressman, I don't know how recent your last briefing from us was on our reforms that we have applied for HR and acquisition. If you haven't already, I would encourage you to sit down with our new Under Secretary for Management, Russ Deyo, who is a retired Johnson & Johnson executive, who has done a lot already in his year to reform our HR process, our acquisition process. I don't know when the last briefing you got was, but I think we are moving in the right direction. Mr. Perry. All right. We will look forward to that. Thank you, Mr. Secretary. Chairman McCaul. The Chair recognizes Mrs. Torres. Mrs. Torres. Thank you so much. Good morning. Secretary Johnson. Good morning. Mrs. Torres. It is nice to see you again. In the Consolidated Appropriations Act of 2016, the Office of Community Partnership was appropriated $10 million for grants to extend to outside stakeholders to further its mission to counter violent extremists. Last week, Department of Homeland Security, the FBI, along with my police departments, fire departments, all got together with key community stakeholders. Is $10 million enough money to ensure that these grants are available for all communities across the United States? If not, I want to know how I can get my community in the front of the line. Secretary Johnson. Frankly, no, it is not. We originally thought we had 50, and when we looked at the report language, we saw that it was 10 for CVE and 39 for preparedness for complex attack situations. But the same language, which I have read myself, says that if you want to make a reprogramming request, make a reprogramming request. So I would like to see us fund our grants across the country. Ten million dollars doesn't go very far, given where I think the needs are. So I can make a reprogramming request, which I hope Congress would honor, if I believe I need more, and I may need more. Mrs. Torres. I hope that you would ask for more. Communities like San Bernardino that have suffered so much, it hasn't been because of the lack of interest from the community to want to work and participate in being the solution to threats to our homeland. But, certainly, this funding, I don't think it is enough. On the issue of interoperability within the radio system, you heard the radio conversations with our first responders as they were responding to San Bernardino, to the incident in San Bernardino. I have a big concern that a lot of our agencies have not upgraded their radio systems and have no way to encrypt their communications directing first responders to critical incidents such as the one in San Bernardino. What is the plan to address this critical issue? Secretary Johnson. Congresswoman, interoperability is a work in progress. I think we have made significant progress over the last couple years. But interoperability is, in my law enforcement experience, crucial, and we have to be able to talk to each other within DHS and across law enforcement agencies. The active-shooter training exercise I attended in New York City in November was devoted--funded by DHS--was devoted principally to interoperability of communications. That is the level of importance that we and I attach to that. So we are moving in the right direction. Mrs. Torres. Right. It is important for them to be able to talk to each other, but it is critically important for them to be able to encrypt those communications. Secretary Johnson. Understood. Mrs. Torres. Thank you. I yield back. Chairman McCaul. I thank you. The Chair recognizes Mr. Carter. Mr. Carter. Thank you, Mr. Chairman. Mr. Secretary, thank you for being here. Mr. Secretary, in my district, my constituents, as you can imagine, are most concerned about securing our borders. They are most concerned about making certain that the people who are coming in here, that we know who they are and that we know whether they are coming here to hurt us or not. I trust, Mr. Secretary, after having interacted and gotten to know you for the past 16 months, that you have the same concern and share the same concern. So my question is this. You have expressed support of the budget during the time that you have been here, but the budget includes funding for 300 fewer Border Patrol Agents than was mandated in the fiscal year 2016 budget. I am just wondering, if indeed, as I believe, you share that same concern about securing our borders, how can you be satisfied with this budget if it includes 300 fewer Border Patrol Agents than what was mandated in the fiscal year 2016 budget? Secretary Johnson. Two things. The budget submitted to you reflects hard choices to fit within the legally-mandated caps. The request reflects a considered decision to focus on technology and surveillance equipment at the border, given the nature of what we are seeing and the changing character of those crossing the border. Very often, as I am sure you know, people, particularly people from Central America, anticipate that they are going to be caught. So the key is to know where they are crossing through technology, through surveillance equipment, and get our personnel there in place to meet that surge. Mr. Carter. Mr. Secretary, I appreciate that and understand that, but, you know, we had the opportunity on this committee to visit the border, and the Border Patrol Agents were telling us we need more boots on the ground. That is what we were hearing from them. Now, granted, you are correct, we do need the technology. I am not arguing that fact. It will and has helped us. But, again, they are crying out for more boots on the ground. If I could shift gears for just a second, a couple weeks ago, on March 2, we had the administrator of TSA, Mr. Neffenger here. At that time, we talked about the Screening Partnership Program, something that I am very interested in. I am from Georgia, of course. As you are aware, the administrator for Hartsfield-Jackson International Airport has expressed concerns about the long waits and the long lines and has actually talked about perhaps utilizing this program. What I wanted to ask you--Mr. Neffenger had told us that we were getting cost estimates from GAO. When can we expect those cost estimates to be in? Secretary Johnson. Let me get back to you on that, sir. Mr. Carter. Okay. Secretary Johnson. I have spent a lot of time at Hartsfield myself. Sixty-three thousand people work at Atlanta Hartsfield Airport. One of the things that I am sure you know we are focused on there is airport security. So the administrator has issued directives for self-assessments and the like. It is the busiest airport in the country, so any best practice we could bring there--but I will look into that issue of the report for you. Mr. Carter. Okay. Well, one other thing, and that is I noticed in your budget you requested over $900 million in air passenger and airline fees. Secretary Johnson. Yes. Mr. Carter. This is a 43 percent increase. I mean, this is significant, a significant increase. You requested to allow TSA to increase the Passenger Security Fee $1 to $6.60? I mean, that is a big jump. Now, what we are told is that the Screening Partnership Program can potentially save up to 17 percent. Why are we not pushing this more? I mean, if it is going to save us money and you are still going to have oversight over it, why aren't we pushing this? When we push it, why aren't we getting more creative? As I suggested to Mr. Neffenger, perhaps you offer half of that savings to the airport. You still are going to realize 8.5 percent savings in your budget. Secretary Johnson. Well, first of all, aviation security is not just simply a matter of dollars and cents, as I am sure you appreciate. First and foremost, it is the protection of the American people. I want to know that whatever force we are providing to that mission is the best we have. The proposed increase is from $5.60 to $6.60. As I am sure you are aware, in 2013 Congress increased it from $5 to $5.60. We are asking for another increase. My view is that, rather than ask the American taxpayer in general to pay for aviation security, maybe we ought to ask a little more from those who actually use the system. Mr. Carter. I understand. But I certainly hope that you look very carefully at the Screening Partnership Program. To me, you know, I want to privatize as much as we can. You are still going to have oversight on it. If it can save us money and still do the job--and I appreciate your concern for safety. We are all concerned for that. But, at the same time, if it can provide the safety and be safe and effective and save money, that is what we ought to be going toward. Thank you, Mr. Secretary. I yield back, Mr. Chairman. Chairman McCaul. Thank you. The Chair recognizes Mr. Walker. Mr. Walker. Thank you, Mr. Chairman. Secretary Johnson, thank you again for being here today. At the lower table. So, appreciate your acknowledgment there. Secretary Johnson. I am down here with you. Mr. Walker. Okay. All right. You mentioned the term ``migration problem'' a little earlier in your testimony. That is where I would like to focus a little bit. I have a couple questions. The 2017 budget request proposes to cut funding for ICE detention and removal operations, including a reduction in detention beds. With reduced detention capacity, what does the Department intend to do if there is a surge in illegal migration numbers? Before you answer that, I want to get this second question because I believe probably one answer would suffice both of them. The second question is a little bit longer, but it has a little background with question No. 1. The budget request recognizes that administration policies may continue to encourage thousands of Unaccompanied Alien Children to attempt to cross the border, as it requests base funding for 75,000 UACs. According to our records, that would be a record number. This is a result of failures in removal of the UAC population to date. In 2014, there were a little over 1,900 that were repatriated, and I believe in 2014, 1,882 was the number that were sent back. This is a small fraction when compared to 83,337 that ICE transferred to Department of Health and Human Resources' custody in the same years. Do you agree that the incentives established by this administration are helping to fuel potentially another surge? So can you speak to that as well as the surge in the illegal migration numbers from question No. 1? Secretary Johnson. I disagree. First, let me start with the detention bed issue. The request we have is for approximately 31,000 beds across adult space, family unit space. At the time we submitted the request last year, I think we were at about 28,000. So we don't want to ask you for more than we think we need. At present--and I haven't checked this in a while, but at present, I think we are at about 31,000, which is what we are asking for. There is a possibility of a reprogramming request if there is another surge. I disagree that our policies encourage UACs to migrate here. I have been very public about, if you come here and you are apprehended at the border, we will send you back, consistent with our laws. Just the other day, I put out a public statement about Operation Border Guardian that focuses on the return of those who came here as children. I said in that statement, this fiscal year we have sent back to Central America 28,000 people and we have sent back to Mexico 128,000 people. My consistent message, since I have been in office almost, is if you come here illegally we will send you back, consistent with our laws and our values. Mr. Walker. Thank you, Secretary Johnson. That is fair. I hope the administration continues to augment that clear message there. For this fiscal year, the budget requests $49 million for countering violent extremism, including grants and efforts to prevent, prepare for, and respond to emergent threats from violent extremism and complex, coordinated terrorist attacks. Specifically looking at San Bernardino, can you draw a distinct line as far as how that $49 million would impact these communities in making sure they are more properly prepared for such attacks? Secretary Johnson. We are in the implementation phase now, but I think that the intent of Congress was that communities be better prepared for complex attacks of the San Bernardino type. So we are in the implementation phase. It is a worthwhile mission. As I mentioned to Congresswoman Torres, I also think that the CVE grant money is important for even earlier in the process, in case somebody is heading in the wrong direction, to encourage communities to let law enforcement know. So, between the 10 and the 39, I think those are two very good objectives. I wish we had a little more to work with. Mr. Walker. Thank you, Secretary. One last question. Do you feel like DHS, when it comes to examining social media, are we doing a more accurate, thorough job? Can you just take a few seconds to address that? Secretary Johnson. Yes. Under my watch as Secretary, we have stepped up our use of social media in connection with immigration benefits. We have, in addition to that, something like over 30 uses of social media for intelligence and law enforcement purposes. We have had pilot programs. In response to a task force report that came to me, I said we need to expand upon this and amplify this and make this a regular part of our practice. So that is what we are moving toward and that is what we are doing. Mr. Walker. Thank you, Secretary Johnson. I yield back, Mr. Chairman. Chairman McCaul. The Chair recognizes Ms. Sanchez. Ms. Sanchez. Thank you, Mr. Secretary, for being with us today. I have a question about the countering violent extremism. So, in the Consolidated Appropriations Act of Fiscal Year 2016, the Office of Community Partnerships was appropriated $10 million for grants to extend to outside stakeholders to further the CVE mission. It is still unclear how those grants are going to be administered. Can you fill us in on, if any, of the nuts and bolts of that? Secretary Johnson. My vision for that, Congresswoman, is that we have a grant application process where community organizations have the opportunity to come forward, apply for a grant, we scrub it carefully like we do lots of other grants, and the money be used for messaging in communities at the local level, for programs at the local level to prevent people from heading in the direction of violence, to give people an alternative way to channel their energy. In my numerous CVE engagements around the country, in places like Minneapolis, California, Texas, I have heard over and over again from communities, ``We need help, ourselves, in dealing with this issue, dealing with this problem.'' I think it should be a National Federal Government effort to support that. So I want to see a competitive, efficient process for evaluating grant applications and supporting that. Ms. Sanchez. Well, again, it is only $10 million, so I would hope it would be efficient. Who knows who will ask for it. Secretary Johnson. As I said earlier, I would like to see more. Ms. Sanchez. My biggest concern is, you know, there are 2 types of things going on, at least in my arena back in California. For example, I have a very large Muslim population in Orange County. So what would you see--let's say somebody wins a grant. What kind of programs would you see would help that? That is a place that maybe people will come and get to, you know, because there is bigger numbers and possibilities, for example, if something is happening, versus something like this whole, you know, lone-wolf kind of radicalization coming from the internet thing that happened to us in San Bernardino, which is also just, like, 30 minutes away from me. Secretary Johnson. Right. Ms. Sanchez. So when you say nonprofits, competitive, let's say they get a grant, what kind of programs to steer people in a different direction? What would that look like, in your opinion? Secretary Johnson. Could be some form of counseling program. Could be some form of competition, like we are supporting now in colleges, for counter messages, where you encourage people to develop counter messages to focus on young people, to steer them away from the appeal of the Islamic State's messages. It could be a variety of things, so I want to encourage a certain level of creativity. As the Federal Government, I don't necessarily have all the answers, so I want to see these applications and see what kind of ideas we generate. Ms. Sanchez. Can you give me--what is the time line that you would see for something like that, a time line of where the grant applications might be out and---- Secretary Johnson. Well, we have money this fiscal year, 2016, so I want to see applications this fiscal year. Ms. Sanchez. Okay. Secretary Johnson. Hopefully this is a program that will continue in 2017 and 2018 and beyond. Ms. Sanchez. Thank you. My last question. Your Department has established an insider threat program designed to mitigate the threat resulting from employees and contractors who purposefully or inadvertently commit security breaches. Can you give me an overview of that program, how it works? Is that program limited to the detection of abnormalities in data usage? Or how are you monitoring what is going on? To the extent you can in public, obviously. Secretary Johnson. Yes. I am not sure whether you are referring to TSA at airport security or a broader program. I would have to--if you would allow me, I would like to take that question for the record and get back to you in a more informed way. Ms. Sanchez. That would be great, because I am sure that some of it might be something you might not want to air in public. Thank you. Secretary Johnson. Thank you. Ms. Sanchez. Thank you, Mr. Chairman. Chairman McCaul. Thank you. The Chair recognizes Mr. Loudermilk. Mr. Loudermilk. Thank you, Mr. Chair. Mr. Secretary, it is a pleasure to have you here again. Difficult times. We are looking at a growing debt of nearly $20 trillion, so we know that we have to address that. We know that we have to cut spending in certain areas. The taxpayers expect that. The taxpayers expect us to do these difficult things. They also expect us to protect them. This comes down to priorities and what we are going to do with the limited funds. I think that is where a lot of our differences lie, because I know your heart is to protect the American people, as your job has given you that, and I believe that is where your heart is. That is definitely where my heart is, to do with what we can. But, yesterday, the Subcommittee on Emergency Preparedness, Response, and Communications had a hearing regarding the $599 million cuts to the FEMA terrorism preparedness grants. We had quite an illustrious field of witnesses that were here, including Mr. Jim Butterworth, who is the head of Georgia Emergency Management Agency, and the chief of the Atlanta Police Department, who said that these cuts would cause significant damage in their ability to prepare not only against terrorist activities but the other threats along with those, from cyber threats, natural disasters, et cetera. Mr. Sena, who is with the Northern California Regional Intelligence Center, who was testifying on behalf of the National Fusion Center Association, when I asked him about it, he said that he believed that these cuts would actually cause them to have to shut down many of our fusion centers. That is of grave concern to me. Can you respond to what your thoughts are on that? Secretary Johnson. Congressman, our budget request reflects hard choices to fit within the caps. I will not disagree with you about the importance of our grant money--I have seen it myself--to support fusion centers, to support interoperability of communications, to support surveillance technology, to support the Atlanta police chief to pay his cops overtime, to support New York City, to support active-shooter training. Given the nature of the global terrorist threat right now, which must involve fusion centers, local law enforcement to help us detect the next terrorist attack on the country, I think our grant-making is important. I would have preferred a grant-making request for both State-level funding and UASI funding and the competitive grant programs at a higher level, but the budget request reflects hard choices, without a doubt. Mr. Loudermilk. Do you concur that this could cause fusion centers to actually have to close their doors? Secretary Johnson. I don't know whether that is true or not. It depends on the choices people would make with the money that they have. But I do concur with the importance of fusion centers and JTTFs in general, yes, sir. Mr. Loudermilk. But this would definitely have an impact on their operations? Secretary Johnson. A cut of that magnitude most likely would, yes, sir. Mr. Loudermilk. Just about 2 weeks ago, we passed on the House floor the ALERT Act, which, from a conversation earlier, I think you are aware of. It was a strong, bipartisan-supported bill I authored that actually removes some of the bureaucratic hurdles and obstacles that were in the way of coordinating more effectively between Federal agencies and local law enforcement as a force multiplier in the war on terror. Most of that was focused on these fusion centers. There was a strong CVE element as part of that, as well. Part of my concern is, if we shut down some of the fusion centers or if we take away enough of the funds to where they are ineffective, the impact that that is going to have on local law enforcement, which we are growing to a point where we see them as an extension of our ability to fight terror. With that in mind, is there anything that we can do within these budget caps to reduce the $599 million cut or move from other areas, other cost savings that we can find? Secretary Johnson. Well, I think that is an issue the appropriators are going to have to wrestle with. I do think the grant-making means public safety and homeland security. You know, separate and apart from the levels of grant- making--and I suspect you will agree with this, Congressman--I would encourage you to encourage law enforcement in the State of Georgia to continue training, active-shooter training, that is multijurisdictional and multidiscipline. In a place like Georgia, I think that is critical. In a place like the Atlanta metropolitan area, I think that is critical, given the threats that we face. But these are hard choices that the appropriators are going to have to wrestle with, sir. Mr. Loudermilk. Well, I appreciate that. I hope that you will work closely with us. Because when we look at this magnitude of cuts, on top of the Department of Justice suspending the revenue sharing through the Asset Forfeiture Program, which has already had an impact in my district, with the Federal and local law enforcement agencies cooperating together, now you have put on top a $599 million cut, so I think this could have a drastic impact. But I thank you. I hope we can work together to try to find a resolution for this. Secretary Johnson. Thank you. Chairman McCaul. The Chair recognizes Mr. Donovan. Mr. Donovan. Thank you, Chairman. Mr. Secretary, thank you again for being with us. Being the most junior Member of this committee, everyone asks your questions before it is time for you to actually ask a question. Chairman McCaul. I used to say that, a while ago. Mr. Donovan. It is still true. Mr. Loudermilk was at that hearing with me yesterday, and one of the things that we heard--and you and I have discussed this--is of course you wish you had more money and of course you wish you didn't have to make the cuts to the UASI money, the grant money. But we did hear testimony from Mayor de Blasio, who then went to speak with you afterward, and some of the gentlemen on the other panel, and the Chairman's fire commissioner from Austin, Texas, spoke--she heads the fire association for the entire country--about the effects there. One of the things that we were hearing, and it wasn't from you, but hearing from the administration of why the cuts were appropriate, one was that FEMA's efforts--the actual quote was, ``FEMA's successful investments in prior years made these appropriate.'' The other was that places like New York City was sitting on $600 million of unspent money, so they really didn't need it. The administrator for FEMA, Craig Fugate, stated that the capabilities built through these grants are perishable and they have to be maintained, so that whatever their successes were in the past will diminish as time goes on. They need to keep them fresh. As I am sure you are aware, the grants that were already allowed take time to be spent. In New York City, we certainly have to bid it out. We have to VENDEX vendors. We have to have--things like the fireboat that detects nuclear weapons in the harbor, it had to be designed, it had to be created, it had to be delivered. All of the moneys that were allocated in the last grant cycle, at least in New York, have already been obligated. So those answers to our questions that we got from other parts of the administration seem to be hollow at this point. Is it your opinion that these are just hard choices that had to be made? It seems like the spending level from fiscal year 2016 and 2017 are almost equal, or the request is almost equal. So I guess there have been increases in other parts of the budget that are making up the difference for the amount of moneys that were cut in this grant program. Secretary Johnson. Well, the requested appropriation from Congress this year is lower than the 2016 money. It is 40.6 versus 41. Plus, there are other places where we definitely are focused on. On the timing of the grant money, we had a policy in place that you had to spend it within 2 years. This was an issue with New York City, which I addressed with Mayor de Blasio and his emergency response people and others, a few Members of Congress too. But I expanded that to 3 years, it went from 2 to 3, to give jurisdictions more time to spend the money. That has meant that bleeding into fiscal year 2017, I believe, or maybe it is 2016, that is about $54 million total. So it is not a lot. So that certainly is not a justification for a cut of this magnitude. The reality is it is our best effort to make hard choices to fit within the budget caps. But it is the case that very often cities, metropolitan areas take a very long time to spend the money that we give them. So I would hope that, together, we can encourage your constituents and others can encourage their constituents, mayors, to spend the money fast, efficiently, and effectively so we don't have this problem with money basically turning into a pumpkin, which has happened from time to time. Mr. Donovan. Thank you, sir. Mr. Chairman, I yield back. Chairman McCaul. The Chair recognizes Mr. Hurd. Mr. Hurd. I would like to thank the Chairman and the Ranking Member for saving the best for last. Mr. Secretary, I appreciate you being here. You commented in your opening remarks on the desire to reorganize and restructure the National Protection and Programs Directorate, which, as we all know, leads the National effort to protect and enhance the resilience of our Nation's physical and cyber infrastructure. Can you expand on why you think that effort is necessary and give us a sense of what we can expect should this committee---- Secretary Johnson. Yes. Mr. Hurd [continuing]. Authorize NPPD to do so? Secretary Johnson. I think that we need an agency, not just a directorate, an agency. A directorate is like an office. We need an agency focused on cybersecurity and infrastructure protection. So our vision is to reform, rebuild the NPPD, which is a directorate, into a cyber and infrastructure protection agency. Given our current threats to cyber, to critical infrastructure, I think we need an agency that is focused on this. That is one thing. Within NPPD, I want to see us restructure it so that the NCCIC, which is our--I don't know if you have ever been there; it is our cybersecurity center--has stripped away from it some of the administrative functions, like acquisition, so that they are focused solely on their cybersecurity operational mission. But, in general, I want to see this DHS component with more of an operational focus in an agency like TSA, like the Coast Guard, like CBP, ICE. Certainly, the cybersecurity mission of the Federal Government warrants that, I would think. So that is the vision. I could give you a more detailed briefing on this restructuring, but that is the overall vision. Mr. Hurd. Do we have the time to pull this off? You know, because my fear is, if we don't do this sooner rather than later, that we are not going to--you know, all the experience and lessons learned that you and your team have gained may be lost in the next transition of Government. Do you think we have the time? Secretary Johnson. Well, I think that is an issue with our cyber talent and cyber experience generally. Below the political appointee level, we have some really talented, terrific people that I hope would stay in Government. As you know, recruiting good cyber talent is an issue. But this is a reorganization that does require Congressional authorization, and I hope Congress would respond. I think there is definitely a demand and a need for this Nation's cybersecurity mission that we have that agency. Mr. Hurd. Great. We have been talking about tough budget decisions. One I want to talk about and just get your perspective on, the National Center for Zoonotic and Animal Disease Defense. This is dealing with Zika. You know, if there were additional funds, is this something that you would think is important to continue if we didn't have to make that difficult budget decision? Secretary Johnson. Well, we are learning more about Zika every day. Within DHS, we are focused on making sure our Customs personnel know how to detect this disease at a port of entry. We are focused on the possibility of the Zika virus in immigration detention. We are focused on protecting our own workforce. There is always the possibility with an unanticipated event for a reprogramming request. We have broken ground on our NBAF in Kansas, and that is, as far as I know, on schedule. That will be a good thing when it is completed. Mr. Hurd. Good copy. Thank you, sir. I yield back my time. Chairman McCaul. The Chair recognizes Mr. Ratcliffe. Mr. Ratcliffe. Thank you, Mr. Chairman. Mr. Secretary, I appreciate your being here with us today. I had unfortunately another hearing, and I had to step out. I caught the tail end of the Chairman asking you at the beginning of the hearing about Operation Phalanx. I wanted to follow up in that regard. Let me just ask you: I saw where you had a 50 percent reduction in the persistent aerial detection in this request versus your most recent prior request. Can you tell me why? Secretary Johnson. There was a 50 percent reduction in the level of support that DOD is providing in overall flight hours. Since we started that program with DOD support, DHS capability in this area has dramatically increased so that flight hours, Border Patrol capabilities have increased thanks to the support of this Congress dramatically the last 5, 10 years. So we are in a position to accept less from DOD because they needed their assets back, that has represented a reduction of about 5 percent overall in flight hours, but longer term, in the last couple of years, we have dramatically added to that capability ourselves. Mr. Ratcliffe. Okay. I was familiar with that. I knew that it resulted in a reduction. I was familiar with your testimony before the House Appropriations Committee in that regard. The reason I wanted to follow up with you is I know that my Governor, Governor Abbott and one of my colleagues on the Democratic side, wrote you a letter back in February expressing concern over this issue about, given the fact that our Southern Border is not secure, why would we be doing less and not more? I know you talked in the beginning about making hard choices, but would you agree with me that the aerial surveillance on our Southern Border is an area where we should be---- Secretary Johnson. In general, I think we need more of an investment in technology for surveillance. When I ask Border Patrol Agents, ``What do you need?'', they are always telling me about mobile surveillance, aerial surveillance, and the like. So, in general, I think we need investments in that technology, and I think this request reflects that. Mr. Ratcliffe. Can you just tell me, have you responded to the Governor and Congressman Cuellar? Secretary Johnson. I think I did. Mr. Ratcliffe. There was a request for some explanation about metrics and I---- Secretary Johnson. I think I did. I try to respond to every letter within 10 days or so. I think I did. When is that letter dated? Mr. Ratcliffe. February 1. Secretary Johnson. I hope I did. Mr. Ratcliffe. Okay. Would you mind looking into that for me? Secretary Johnson. Yes, okay. Certainly Henry and I talked about the issue too. Mr. Ratcliffe. Again, I think that expresses that this is a bipartisan concern here. I am not making this a partisan issue. So I appreciate if you would follow up in that regard. Let me turn to a conversation that I had with Director Rodriguez earlier in a hearing, Director Rodriguez over at U.S. Citizenship and Immigration Services, about the Syrian refugee issue. In that exchange that I had with him, the topic related to the issue of social media as part of the vetting process, and he related that social media vetting was only done in cases where a red flag had been raised. My concern there is I think that social media vetting should be part of the base level of scrutiny with regard to vetting of refugees as opposed to a secondary level of scrutiny only when a red flag is raised, and I wanted your perspective on that. Secretary Johnson. Social media right now is done manually by an examiner, by a CIS officer. That is a time-consuming process. We do right now have a protocol for the use of social media. You used the phrase ``red flags'' if there are certain indicators, but that does not preclude the possibility that an officer in the first instance could consult social media, and I would not discourage that. Mr. Ratcliffe. Okay. Secretary Johnson. But it is something that--the use of social media generally is something we are expanding upon in my 2 years as Secretary. Mr. Ratcliffe. I know you can appreciate the point because you have testified about this is the expression from groups like ISIS that they intend to use the program to cause harm to Americans and to America through that, and social media being a treasure trove of information in some cases with regard to some of these individuals. I would really like to see it as part of our base-level scrutiny, especially when you have folks coming from countries where we would suspect those individuals---- Secretary Johnson. It is also true that the more and more we focus on this publicly, the more they are going to take their communications off-line. Mr. Ratcliffe. Well, my time has expired. I look forward to continuing this conversation with you at a later date. Again, I thank you for your service and for being here today. Secretary Johnson. Thank you. Mr. Ratcliffe. I yield back. Chairman McCaul. The Chair recognizes Ms. McSally. Ms. McSally. Thank you, Mr. Chairman. Thank you, Secretary Johnson. I know some others talked about manning at the ports of entry. I want to follow up on that, both manning at the ports and then also in between the ports and Border Patrol. At our ports of entry, we are seeing a constant decline in the manning of--we were on the verge. We literally had to kind-of meet together with the business community and the local port director a few weeks ago. They were thinking about shutting down service on Saturdays at Douglas, and they are just seeing this bleeding in their manning, and it is impacting wait times. It is impacting potentially, obviously security. It is impacting economic opportunity, people coming over to shop, just giving up. We are hearing anecdotes about individuals going through the process to be hired, it taking 18 months, the vetting process, which we all agree we want to make sure our people are vetted, some of our constituents have been very concerned about their experience in that. My first bill passed into law was the Border Jobs Veterans Act, trying to fast-track our veterans, many of whom have already been through security clearances and background checks, to fill these positions. So can you just speak a little bit more about what you are doing? I mean, insanity is doing the same thing over and over again expecting a different result. This backlog is something that is going on now. We increased the authorization of the ports of entry by 2,000 a couple of years ago. You are still under that and I think asking for another 2,000 more. But if we can't fill the positions, then we still have a problem. So what are we doing about that specifically? If a veteran is taking advantage of the Border Jobs for Veterans Act how are you implementing that? If somebody has had background check and has had a clearance in the military, please don't tell me you are going through the same process of going through all the polygraphing if they have already had a background check. Secretary Johnson. Congresswoman, as I am sure you know this is something the Commissioner is focused on. I have heard enough about this and I have heard enough concern about this that it has now become a priority of mine. Within CBP, the Commissioner has put in place a separate command for hiring and recruitment to expedite this process. At the DHS headquarters level, we have reformed our acquisition--our HR process to institute policies to make this more expedited. It should not take 18 months, because in that 18 months, my guess is somebody will get another job. Ms. McSally. Get another job, exactly. Secretary Johnson. We have instituted the creation of Hiring Hubs to expedite the process. I agree with your point if somebody is a military veteran and they have gone through the process of getting there, which probably includes a security clearance, there ought to be some way we abbreviate this process. So I am acutely aware of the shortages in personnel at ports of entry and on the border. So, before I leave office this year, I want to fix this problem. Ms. McSally. Thank you. This also impacted--I mean, we have had a Congressionally-mandated floor of 21,370 Border Patrol Agents. At the end of last year, you guys were 1,208 below that. This budget request you are asking for a 300-position cut. I mean, border security you said earlier is a high priority. Is that because you just can't fill these positions so you don't want to have positions authorized? Why? Secretary Johnson. We are seeking 300 fewer less because we think that the money should be invested in technology. But we are also determined to hire to whatever level Congress authorizes us. So we still need more work to hire to the requested level of, I think, 21,000 or 20,070 as I recall. Ms. McSally. Thanks. Just shifting gears, I am now the Subcommittee on Border and Maritime Security Chair. We had our first hearing last week. One of the challenges and frustrations that we have is how we measure border security. In the old days, it used to be operational control. The last time we used that, it was at about 44 percent. Then we shifted to number of apprehensions, which you don't know whether that is good or bad if apprehensions have gone up or down, especially if you don't know what the denominator is. You are currently reporting your effectiveness, which is based on apprehensions over the number of people that you caught plus got away that you knew about. But we still don't know the ones that we don't know about. Clearly, the price of drugs on the streets would tell you there is probably a lot we don't know about. When I finally asked the acting chief, ``What percentage of the border do you think you have situational awareness of?'', he said 56 percent. So can you work using better measures of effectiveness and measures of reporting to us and the American people? We don't need to be hyperbolizing. We don't need to be over- or under-addressing this. It needs to be based on facts. But I look at it as a fighter pilot: We need to know situational awareness. We need to know operational control, like, of what we can see, what can we intercept, and then how much can we just not see? These seemed like--I mean, it is not that complex, but will you work with us on coming up with better measurements to build transparency. Secretary Johnson. Yes. I agree. Within DHS, we have an initiative called Border Stat, where we are working with a Federally-funded research center to develop more concrete metrics to measure a border security. I agree with you. Ms. McSally. Great. Thank you. My time has expired. Thank you, Mr. Secretary. Chairman McCaul. The Chair recognizes Mr. Clawson. Mr. Clawson. Following up on the Congresswoman's comments, in my office, we have been going back a year, a year-and-a- half, asking for some data on this border. Staff has been told by your people that they would give it, and we never see it at any level. You referred me to outside studies, so on and so forth. But any kind of summary data on how you are doing and what the return on investment for the American taxpayer would be wonderful. With your background, I know you know what that means, but the next set of summary data on performance from your group will be the first that I have seen. I just want to let you know. I wasn't even going to bring that up today. I just kind of gave up after asking so many times. If you went back and looked at the clips, we would just like to see some border data on how you are doing with all the people, particularly since you asked for more money on capital expenditures. We get requests for capital expenditures and no operational data on how you are doing. We could probably ask until you are gone, and we still won't see it. So if you will send us data--we don't have anything to criticize, because we don't get to see anything. We would just like to see it, just some data, please, for the American taxpayer. In my district, after 9/11, we were told by TSA to spend money on EDS inline inspection equipment, as you all know about. So we did that. We did that with the promise from TSA that we would be repaid. I know you know about this, Mr. Johnson, Honorable Mr. Johnson. So, to my knowledge, 20 airports around the country are owed $400 million. In my district, it is $40 million just for the Fort Myers airport in south Florida. We would like to get our money back. You all are killing us. You are killing us. You told us--we got it in writing. You told us to get the equipment for safety after 9/ 11. We bought the equipment. TSA told us they would reimburse us, and we never got our money. There are always requests for committee hearings and everything else. You all are killing us. I mean, don't double-cross people. This is $40 million that we paid locally with the promise in writing explicit from TSA that it would be paid back. We would like our money back. We would really like our money back. We see Honorable Mr. Johnson that you all asked for almost $200 million for transportation screening technology for your current budget. I am saying: My God, you owe me my money, and you are spending new money without paying people for what you told them you were going to pay them. So we want to be polite, and we want to be respectable, but how long does it take to get our money back? So if you could let us know, we just want the money you all told us you would give us when we bought the equipment. Secretary Johnson. I just asked my CFO. Mr. Clawson. If I am missing something, you all tell me. Secretary Johnson. I just asked my CFO: What is the story? We need to get you a better-informed answer. I think you deserve an answer to your question, sir. Mr. Clawson. Yeah, I mean, we always say that the role of Government and this administration likes to say that the role of Government, this, that, and the other; it is not to double- cross folks at the local level. So we would really--I don't want to make a problem out of this, but every time I fly home, I go through that airport, and the guys are saying: Where is our $40 million, Mr. Congressman? We want our $40 million. It was local money that was supposed to--you know, we don't want to be you all's infinite credit bank. Time costs money after over 10 years, you get what I am saying. Secretary Johnson. What year was this investment made? Mr. Clawson. Well, it was mandated or a directive right after 9/11. So you are going back over 10 years now. So if my folks in my district are getting a little prickly on the issue, I think we have a right to do so. So you all give us our money back. We don't want another letter saying that this has to be-- the last letter we got from you all said: This has to compete with new investment. Why does my CAPEX from 10 years ago have to compete with new investment when you all told me you were going to pay me back? If I did that in the corporate world, everybody would kick me out as Chairman; I wouldn't last one board meeting. You all are double-crossing suppliers here. We want our money back. Secretary Johnson. I will get with TSA, and I will get you an answer. I would like to know the answer too. Mr. Clawson. Please do it. Look, we don't want a problem. We just want our money like you all told us you would give it to us. You all are the Federal Government. We believed you. People in my airport have been there forever; they believed you. We want to believe in the Government to get stuff done. Just help us out a little bit here. It is $40 million for my airport. That is not chump change to me, you all. Final thing I wanted to say is that the lines are getting bigger, as you all know. That is good news in Florida because it means we have more tourists. So to your previous conversation, our lifeblood is tourism, so anything you all do to shorten the lines, extend the pre-hours, and that sort of thing operationally so that our businesses can hire more people and do more business, we really appreciate that. I am glad it came up today, and I appreciate you looking into it. Secretary Johnson. I have family who flies through that airport, so I hear about this from them too. Mr. Clawson. It is a good--it is a great airport. It is a well-managed airport. We are just waiting on that bottleneck in TSA. That is my bottleneck. The airport runs well, and we like the inspectors that are there. We just need more. Thanks, thanks for taking a look at my question. Secretary Johnson. Thank you. Chairman McCaul. Mr. Secretary, let me just say thank you for being here today. Thank you for your service also in a very challenging and high-threat environment. Pursuant to the rules, the hearing record will be open for 10 days. Without objection, the committee stands adjourned. [Whereupon, at 12:25 p.m., the committee was adjourned.] A P P E N D I X ---------- Questions From Chairman Michael T. McCaul for Hon. Jeh C. Johnson Question 1. One of the stated goals of the Department's Joint Requirements Council is to support a more operationally-efficient organization through the creation of a component-driven joint requirements process. How will DHS ensure that its components are committed to investing in joint requirements to the greatest extent possible? Answer. The Department of Homeland Security (DHS) has recently promulgated 2 directives, DHS Joint Requirements Council (JRC) Directive (DHS Directive 071-02) and the Joint Requirements Integration and Management System (JRIMS) Directive (DHS Directive 107-01), which codify the JRC and the process by which the Department, through the JRC, reviews and validates capability requirements, associated gaps and needs, and proposed solution approaches to mitigate those gaps. In addition to these directives the JRC and the Office of Program Accountability and Risk Management have been working closely to ensure the new requirements process and the existing acquisition oversight process are complementary. Further, the requirements process has been integrated into the Department's Planning, Programming, Budgeting, and Execution (PPBE). As a result, the JRC and the requirements process are now integrated in the enterprise's main investment pillars. Question 2a. Since the Department's current acquisition management policy went into place in November 2008, GAO has found that several major acquisition programs lack required documentation such as acquisition program baselines, which contain critical cost estimates. What is the Department doing to ensure that all major acquisition programs complete this documentation in compliance with DHS policy? Question 2b. How has the Department managed these programs without such critical program information? Answer. As the Government Accountability Office (GAO) recently testified the Department of Homeland Security has made significant progress in overseeing the Department's acquisition portfolio. The GAO attributed that progress to Departmental leadership's commitment to improve all aspects of acquisition through the Secretary's Unity of Effort initiative. One of these major improvements has been the completion of acquisition documentation by the Department's programs. In 2015, then-acting deputy under secretary for management directed the Office of Program Accountability and Risk Management (PARM), the Component Acquisition Executives (CAE), and Department's program managers to have complete sets of acquisition documentation for the current phase each the program in accordance with Management Directive 102-01. The programs complied with this direction, and as of December 31, 2015, all active major acquisition programs had the complete set of acquisition documentation. Many of the Department's programs were initiated prior to the Department's acquisition policies being established in 2008. At the beginning of Management Directive 102-01's implementation, only those acquisition documents for the next Acquisition Decision Event were required. Programs were not expected to return to complete acquisition documentation for earlier phases. The Department has since taken a different view based on recommendations of the GAO, and as stated above, in accordance with Management Directive 102-01, all programs have completed the required acquisition documentation. Question 3. What is the status of the Department's efforts to track operations and maintenance costs for its acquisition programs? Answer. The Government Accountability Office recommended in its audit ``DHS Should Better Define Oversight Roles and Improve Program Reporting to Congress,'' (GAO 15-292) dated March 2015, that the Department produce operations and maintenance cost estimates for programs in sustainment and establish responsibility for tracking sustainment programs' adherence to those estimates. In response, the then-acting deputy under secretary for management, directed component heads to annually update operations and maintenance cost estimates and affirm the life span for each major acquisition program in sustainment. The chief financial officer (CFO), as part of the Department's Planning, Programming, Budgeting, and Execution (PPBE) process, was directed to assess the alignment of the estimates with spending patterns for current services. These actions were completed and funding levels are addressed in the Department's annual Future Years Homeland Security Program. Question 4a. GAO has found that many of DHS's major acquisition programs have experienced cost growth from their Department-approved cost estimates. What steps is DHS taking to ensure that programs have accurate, reliable, and timely cost estimates? Question 4b. What is the Department doing to control costs within individual programs and across its acquisition portfolio? Answer. The Department has taken a very active role in overseeing our major acquisition programs. Since the beginning of October 2014, we have conducted 40 action-oriented Acquisition Review Boards of major acquisition programs and have updated the Department's acquisition policies to incorporate best practices, recommendations from GAO and the DHS Inspector General, as well as new laws. We have enhanced cost estimation by realigning the cost estimation function from the Office of Program Accountability and Risk Management to a newly-established Cost Analysis Division (CAD) within the Office of the Chief Financial Officer (OCFO). As a result, there is a renewed emphasis in not only supporting the Acquisition Process but also to provide a closer link of cost estimates to the annual Program and Budget Review process in order to assess the affordability of our major acquisition programs. As of January 14, 2016, the Department has successfully closed the Acquisition Documentation gap. All major acquisition programs between Acquisition Decision Event (ADE) 2A and 3 have a CFO-approved Life Cycle Cost Estimate (LCCE), which will be updated annually by Component Program Management Offices. These updates will identify costs incurred to date and provide estimates to complete the remaining program as planned. With this information, the Department will have better insight into potential forecasted cost growth and the ability to intervene before costs are realized. In addition to the maintenance of cost estimates, the OCFO CAD has established a capability to develop independent cost estimates and assessments. This analysis provides DHS leadership with an unbiased assessment of a program's estimated cost and where inherent risks may exist within the program's LCCE. In addition to the progress the Department has made in overseeing our acquisition programs, the Department's Unity of Effort initiative is making important steps in improving our integration. We established the Joint Requirements Council (JRC) to provide oversight of the Department's requirements development processes. The goal of the JRC is to enhance operational effectiveness and inform the Department's main investment decisions during resource allocation and the acquisition review process. Question 5. DHS's major acquisition programs often take several years to complete, but the threats facing the homeland are constantly changing. What steps should DHS leadership take to help its major acquisition programs keep pace with these dynamic threats, particularly in the areas of aviation, border, and cybersecurity? Answer. DHS has undertaken a number of efforts under the Department's Unity of Effort initiative to establish new processes and strengthen business management to be more adaptable in responding to evolving homeland security threats. First, the new DHS Joint Requirements Council, and corresponding DHS requirements process, provides a structured way for the Department to develop and assess capability operational requirements needed to support DHS homeland security operations. The Department strongly believes that conducting rigorous, repeatable, up-front analysis of operational needs better ensures: Acquisition programs are aligned with strategic and policy priorities; potential solutions are technologically feasible and fiscally informed; and acquisition programs will meet cost-schedule- performance goals. Second, to reinforce the new DHS requirements effort, the DHS Science and Technology Directorate has established a new research and development prioritization process that uses input from the requirements process as supplemented by other emergent DHS component capability needs to ensure DHS research and development investment is closely tied to approved emerging operational needs. In addition, this effort will also provide Department decision makers with greater awareness of existing, mature technology and potentially less mature, but promising technology, as part of the requirements, resource allocation, and acquisition oversight processes. Finally, under the leadership of DHS management, significant strides have been made in greatly improving the oversight of DHS acquisition programs. These efforts have been lauded by OMB, which has recently recognized DHS as a standard bearer for its efforts to reduce acquisition program risk. In addition to ensuring the administrative records of all major acquisitions records are in order, that acquisition programs have traceable requirements documentation, and that programs in breach are either paused or canceled, the DHS Acquisition Executive has energized the Department's Acquisition Review Board to actively engage and hold accountable the Department's component acquisition executives for the health of the acquisition programs under their oversight. Question 6a. Last year, you outlined the creation of 3 new border security task forces. Two of them are geographically focused on the Southern Border and 1, based on investigations, ostensibly supports the other 2. Can you explain, in detail, how the Joint Task Forces have increased the ability of the Department to secure the border? Answer. The DHS Joint Task Forces (JTFs) have enhanced our ability to secure the border by establishing cross-component, unified operations with enhanced coordination across air, land, and maritime domains to address illicit flows and networks in designated joint operating areas. Specifically, the JTFs have improved the effectiveness of DHS border security operations by ensuring better coordination among the patrol, inspection, investigative, and regulatory elements of the Department at the operational and strategic level through coordinated joint operational activities such as JTF-W's OPERATION ALL-IN, JTF-E's JATT PARDESI, and JTF-I's HOMECORT investigations. These coordinated joint activities derive from JTF-established operational priorities approved by the Secretary with direct linkage to Department objectives and lines of effort established in the Campaign Plan. The geographic JTFs' ability to look across the various component activities to anticipate, identify, and fully describe challenges in their joint operating areas significantly enhances DHS's border security operating structure. Question 6b. Do you have metrics in place to help Congress determine whether or not this new organizational structure has merit? Answer. DHS has several measurement efforts under way related to our border security mission. In the short run, we are tracking output measures on the role of the JTFs. These measures include the fiscal year 2016-2017 Agency Priority Goal to decrease the ability of transnational criminal organizations to operate (CBP/ICE/USCG). Specifically, actions by the DHS Joint Task Forces via synchronized component operations are projected to result in the disruption and/or dismantlement of 15% of targeted transnational criminal organizations by September 30, 2017. In the long run, the most relevant way to assess the impact of the JTFs is to focus on border enforcement outcomes--including the estimated number of illegal inflows across the Southwest Border. As the committee knows, DHS has been working for years, with support from Congress, to develop more refined measures both of border enforcement outputs (i.e., the degree to which border enforcement makes it more difficult for migrants to cross the border illegally and deters illicit behavior) and outcomes (i.e., the number of migrants that attempt and/ or succeed in crossing the border illegally). The most mature of these metrics, in use since 2014, is the Interdiction Effectiveness Rate (IER). The IER is an observation-based estimate of the share of illegal border crossers detected by the U.S. Border Patrol that is either apprehended or compelled to retreat to Mexico. Thus, IER is calculated as the ratio of apprehensions and detected turnbacks to all detected activity (apprehensions, detected turnbacks, and detected got-aways). The IER measure provides insight into enforcement outputs, and CBP uses IER data to inform operational decisions across the Border Patrol sectors. Congress and the Department may also consider changes in the IER as one way to evaluate the impact of the JTFs. Beginning in 2015, DHS also initiated a comprehensive border security metrics effort with the goal of establishing a scientifically defensible approach, using available data, to develop additional outcome-focused estimates of illegal border crossing activity. This effort, which DHS calls BorderStat, includes several metrics that are similar to Congressional proposals such as the Border Security Results Act (H.R. 1417). The primary focus of the BorderStat analysis to date has been to develop an estimate of the total number of unauthorized immigrants successfully crossing into the United States between ports of entry along the Southwest Border. Future BorderStat research is expected to also focus on enforcement outcomes at ports of entry and in the maritime environment. DHS also has begun a related effort to use BorderStat data to examine the impact of specific enforcement strategies on illegal migration flows. The Department continues to refine the BorderStat methodology. When sufficiently mature, validated, and finalized, the BorderStat estimates will be a direct tool that Congress and the Department can use to track and evaluate border security and the impact of DHS enforcement programs, such as the JTFs. While the JTF structure is intended to improve DHS border security outcomes, they are one of many factors, both within DHS's control and external to the Department, that contribute to the level of border security. Question 7. The fiscal year 2017 budget requests $67 million in funds to purchase new CBP vehicle fleet assets. Given the problems that we have recently seen with vehicle fleet purchases--namely the gross mismanagement of the FPS vehicle fleet--how is the Department ensuring that CBP is purchasing the correct type and amount of vehicles to accommodate their needs? Answer. In fiscal year 2011, the Department of Homeland Security (DHS) established a fleet scorecard metric for incorporation into the DHS Chief Readiness Support Officer's (OCRSO) Component Scorecard. This metric is designed to evaluate component progress towards required fleet right-sizing efforts which require a 10 percent component fleet reduction by fiscal year 2019. Performance is measured on the percentage of reduction to a component's fleet size against their fiscal year 2011 baseline. The right-sizing cumulative target is derived from the DHS Fiscal Year 2011 Vehicle Allocation Methodology Study outcomes (formally finalized in early 2012) and uses the fiscal year 2011 Component Fleet Inventory as the baseline for its measurement. Further, the reduction targets were designed to be achieved through phased implementation. The phased implementation strategy was established and approved by former Deputy Secretary Lute to ensure operations were not negatively impacted as progress was achieved and to allow for vehicles to reach the end of their life cycles prior to disposal. DHS monitors component progress towards these targets on a quarterly basis and rates performance accordingly. To date, CBP has reduced fleet size by over 7 percent, exceeding the fiscal year 2017 target. As evidenced in the quarterly scorecard outcomes, from fiscal year 2011 through fiscal year 2015, CBP has reduced its operating motor vehicle fleet by 2,069 vehicles. In addition, CBP plans to reduce its vehicle fleet, at a minimum, an additional 1,109 vehicles by the close of fiscal year 2016. These reductions are incorporated into CBP's fleet replacement forecasts and planning. The reductions achieved to date result in a cost avoidance of approximately $74.5 million, since funding for the replacement of these retired assets will no longer be required. The referenced requested funding replaces only those assets remaining in the CBP motor vehicle fleet that have reached the end of their service time and are not targeted for reduction. In addition to fleet right-sizing, CBP improved the vehicle requirements development process to include an on-line module that directs operators to provide more detail related to expected vehicle mission activities. The information obtained through this tool is used to serve 3 primary functions. First, the on-line requirements gathering tool serves as an archive for electronic documentation as related to this process. Second, the on-line tool provides a formal approval workflow to ensure proper controls and authorities are exercised in the review of any submitted acquisition requirements. Third, the on-line tool ensures that submissions are focused on the intended mission- related use of a vehicle. Rather than offering the submitting party the option to select a make and model, the tool forces submitting parties to provide a series of mission requirements (number of passengers, canine capable, off-road capable, etc.). These attributes are then used to determine the most cost-effective vehicle acquisition solution to meet mission needs. The approved available vehicle solution options are held in a catalog of standardized platforms and packages. The catalog is reviewed annually to determine if further cost-saving opportunities can be identified and/or to make alterations in accordance with evolving mission requirements. These capabilities ensure headquarters oversight, approval, and program controls are institutional and effective. The fiscal year 2017 budget request of $67 million will be used to purchase approximately 1,673 replacement CBP vehicles. The acquisitions are intended to address a portion of the 9,841 vehicles that have met or will meet CBP replacement criteria through fiscal year 2017. The purchase of vehicles for CBP ensures personnel have the appropriate vehicle assets necessary to support on-going mission operations. Aging vehicles experience increased maintenance, repair, and operating costs while also realizing increased down time (time out of mission service for maintenance). Furthermore, agent/officer safety concerns may arise as vehicles become older and less reliable. Reductions in vehicle performance and/or reliability may result in stranding agents in remote and/or hostile locations while awaiting assistance. Awaiting vehicle assistance may leave them vulnerable to severe weather and/or violent action by criminal actors along the border. Additionally, in fiscal year 2016, DHS is strengthening management, oversight, and visibility into vehicle acquisitions across the Department through updated fleet policy, improved data capture, acquisition plan reviews, and formal fleet management/assessment review cycles. CBP is participating in these efforts to ensure fleet management receives the appropriate attention and scrutiny commensurate with the investment. As part of this effort, CBP has evaluated their current agency fleet management practices, metrics, accomplishments, and on-going evolutionary steps towards furthering enhanced fleet management capabilities. Question 8a. DHS is in the process of developing a Classified screening system that allows them to better utilize the law enforcement data DHS component agencies collect to more effectively identify travelers and cargo of concern. Knowing that the specific budget details are Classified, what is the status of the DHS Data Framework initiative and when do you expect it to be complete? How will the data enhancement improve foreign fighter identification? Will the enhanced screening efforts be duplicative of NCTC or other intelligence community efforts? Answer. DHS is developing a system that will allow DHS components to identify where a person or entity has been previously encountered by another DHS entity and enable DHS to share information with other U.S. Government entities while appropriately safeguarding and controlling the data, while ensuring the protection of privacy, civil rights, and civil liberties. This system will operate at Unclassified and Classified levels. The first phase is for screening and vetting of people. Question 8b. Knowing that the specific budget details are Classified, what is the status of the DHS Data Framework initiative and when do you expect it to be complete? Answer. Among the hundreds of data sets that exist across multiple systems, DHS is first focusing on 20 data sets identified to be a priority for people-screening and vetting functions. The Data Framework initially planned to ingest the 20 data sets by the end of fiscal year 2020, however, the time line was accelerated with a goal of getting the top 20 datasets across the Department that encompass travel and benefits into the Framework as quickly as possible and in a manner that assures access to comprehensive, quality data. Additional data sets are being prioritized for ingest into Data Framework in and future years. The Data Framework will continue to ingest DHS data sets as they are created and will make them credible--using dynamic policy-based access controls and privacy protections--to mission users in both the Classified and Unclassified environments. DHS will build protections into the system that will allow for the identification and protection, as appropriate, of sensitive data in the use and sharing of data, both within, and outside of DHS. Currently, 7 of the 20 data sets are available on the Top Secret/Sensitive Compartmented Information (TS/ SCI) network. Question 8c. How will the data enhancement improve foreign fighter identification? Answer. Currently, our border control and aviation security measures are enhanced by our ability to compare travel, immigration, and other information against disseminated and non-disseminated intelligence community (IC) information. DHS, through the Data Framework, is working to bring together DHS data--information that DHS gathers during its interactions with the public in the course of executing its homeland security responsibilities (e.g., benefits issuance, travel-related screening)--in both the Unclassified and Classified environments, while at the same time protecting the privacy and civil liberties of the public. The transfer and storage of DHS travel and immigration data on the Classified network via the Data Framework creates a screening and vetting capability that was not previously automated for the Department. Having DHS data on the TS/SCI network gives users the ability to conduct additional research and determine if applicants have connections to known or suspected terrorists via IC reporting. It can lead to the discovery of previously-unknown links to suspicious activity or individuals in illicit networks and enables analysts to proactively identify individuals associated with a threat who merit additional screening, investigation, or other operational actions. Question 8d. Will the enhanced screening efforts be duplicative of NCTC or other intelligence community efforts? Answer. The enhanced screening efforts are complementary. DHS routinely collaborates with NCTC and other IC agencies to ensure screening efforts are not duplicative and each agency's unique data accesses are exploited to minimize vulnerabilities. In the conduct of its law enforcement, immigration, border, and transportation security missions, DHS collects an enormous amount of data related to the facilitation of travel and trade. This data includes but is not limited to information on international and domestic air passenger manifests, visa application data, border crossing data, investigative data, and international imports and exports data. Unique DHS authorities allow for the analysis and sharing of this data, consistent with the purposes for which it was collected. The comparison of this data with other IC or U.S. Government data can lead to previously-unknown insights. Question 9a. The budget lists development and deployment of Advanced Imaging Technology (AIT)--Tier III detection capabilities as a priority of TSA's for the upcoming fiscal year to better identify non- metallic threats to the aviation system; however, the committee has learned that TSA has yet to even fully proliferate Tier II capabilities across the system. Is the budget overly optimistic for Tier III development? Answer. The Transportation Security Administration (TSA) has fully deployed Advanced Imaging Technology (AIT) Tier II capability. AIT-2s came enabled with Tier II, and TSA deployed the Tier II algorithm to the original AITs in 2014. The budget is correct in its description of Tier III development. On September 16, 2015, the TSA awarded a contract to L-3 Communications valued at $2,571,000 for the development of a Tier III detection algorithm. Under this contract, L-3 Communications will deliver the final version of the software for testing in early September 2016; they will provide 2 interim deliveries for TSA assessment of progress. Upon completion of Government testing and test report, TSA will make a decision regarding deployment of the AIT Tier III algorithm. Question 9b. Why has the advancement of AIT technology been so slow? Answer. AIT development is currently sole-sourced to one Original Equipment Manufacturer. TSA does not own AIT hardware and software data rights, and is solely dependent on the Original Equipment Manufacturer for the advancement of the technology. In addition, upgrades to AIT require successful completion of a rigorous testing and qualification process, which can take several rounds due to issues that result in schedule slips. TSA's Innovation Task Force is working with industry to establish innovation lanes that will further mature technology, write better requirements, and allow quicker procurement and deployment of emerging technologies. In parallel, TSA is also taking steps to establish a more open future system architecture that would allow for third-party vendor participation in AIT development. Question 9c. Will TSA shift its focus from AIT procurement to other methods of detecting nonmetallic explosives, such as canines and Explosive Trace Detection? Answer. Canines are a valuable asset deployed in cargo and passenger aviation, but AIT continues to be a viable option. TSA is working closely with the Department of Homeland Security Science and Technology's Apex Screening at Speed initiative to inform the next generation of technology, and has established an Innovation Task Force. The Innovation Task Force establishes a forum for collaboration with airports, airlines, and industry to demonstrate emerging capabilities in the airport environment. Question 10a. The budget requests funds for the development of new baggage screening at checkpoints. How will this new technology make a difference in the security of the checkpoint? Answer. The Transportation Security Administration (TSA) recently submitted a targeted Broad Agency Announcement to help in the development of new requirements for the next generation of baggage screening systems for the checkpoint. TSA should see gains in security effectiveness and operational efficiencies from next generation baggage screening due to increased detection and reduced false alarms. Question 10b. Would resources be better spent investing in another security capability? Answer. Once the reviews of industry proposals are complete, TSA will use the input to develop the TSA requirements for the next generation systems and determine the best path forward. TSA must invest in technologies that screen accessible property to address the threat. Question 11. How is DHS working with industry to ensure innovative approaches to aviation security? Answer. Many of the Transportation Security Administration's (TSA) offices collaborate with industry on innovative approaches to aviation security. TSA offices participate in working groups with industry associations and on committees such as the Aviation Security Advisory Committee and the Aviation Sector Coordinating Council, when working in conjunction with the Aviation Government Coordinating Council. Industry Engagement Managers with TSA's Office of Security Policy and Industry Engagement collaborate directly with industry representatives on the development of aviation security policy. TSA Principal Security Inspectors and International Industry Representatives engage directly with industry on issues related to compliance with policy and alternate measures to achieve aviation security policy requirements. TSA conducts regular intelligence briefings with industry to raise the intelligence awareness within the community. Some examples of innovative approaches to aviation security are the Department of Homeland Security Aviation Domain Intelligence Integration & Analysis Cell, which includes industry participation; feedback surveys by which industry can respond to the effectiveness of intelligence products that are provided; the policy development process, which includes industry engagement and Quarterly Airport Security Reviews with industry participation; and the Compliance Security Enhancement Through Testing program to enhance industry compliance through measures other than penalties. Further, TSA has established an Innovation Task Force. The Task Force establishes a forum for collaboration with airports, airlines, and industry to demonstrate emerging capabilities in the airport environment. Innovation lanes would provide an opportunity for industry to gather data in an operational setting to inform the evolution of technology, and understand the screening process and challenges of the screening environment in an effort to enhance detection, increase efficiencies, and improve passenger experience. Question 12a. The budget requests resources for the deployment of TSA canine teams, but does not create any new teams. How is DHS working to increase the use of explosives detection canine teams and what efforts are being done to streamline the Passenger Screening Canine program? Answer. The Transportation Security Administration (TSA) Explosives Detection Canine (EDC) teams are a proven reliable resource in explosives detection, and provide a timely and mobile response to threats involving our Nation's transportation systems. The National Explosives Detection Canine Team Program, includes both TSA-led teams (which are all being trained to do both traditional canine screening as well as passenger screening) and State and local law enforcement (LE)- led teams (who under an Other Transaction Agreement are required to spend 80 percent of their on-duty time securing the transportation facility(ies) within their area of responsibility. As of March 2016, TSA is funded for 322 TSA-led teams and 675 LE-led teams, for a total of 997 teams. TSA currently allocates 322 teams led by TSA employees that are deployed at 47 airports. By the end of 2017, all TSA-led teams will be certified to screen in all areas, including passengers and accessible property in queue. Question 12b. The committee has heard reports that TSA canine teams are struggling to meet certification standards. What is being done to ensure canines are able to meet the necessary standards for security? Answer. The current success rate for all TSA team evaluations for the Explosives Detection Canine teams and the Passenger Screening Canine teams is over 92 percent. If a team does not meet TSA standards, the team is de-certified and goes into remedial training until they are prepared for a re-evaluation. Question 13. The budget request supports new TSA Field Intelligence Officer positions at airports across the United States. How will these positions be used to connect the front-line workforce and stakeholders to the threats facing aviation and surface transportation? Answer. Field Intelligence Officers (FIOs) are assigned to major airports across the United States based on continuous risk evaluations. FIOs serve as Transportation Security Administration (TSA) assets in the field. FIOs draw from intelligence community partners to provide direct intelligence support, threat awareness briefings, and information sharing to all TSA operational field components, including the front-line workforce, and to transportation security stakeholders for all modes of transportation. FIOs provide intelligence briefings and training at the appropriate classification level regarding threats; terrorist tactics, techniques, and procedures; known or suspected terrorist travel encounters; and other relevant current intelligence to the TSA airport workforce. FIOs deliver Mission Essentials and Threat Mitigation training to the screening workforce on a quarterly basis, and will continue to provide ad-hoc intelligence briefings on emergent threat issues to field components. FIOs also share relevant Classified and Unclassified intelligence and threat information with local transportation security stakeholders, as permitted by dissemination limitations and stakeholder eligibility to access Classified material. These stakeholders include airport and/ or local law enforcement and/or security staff with jurisdiction at the airport, airline/carrier (passenger and cargo) security staff, rail security staff, pipeline security staff, and other transportation security staff (highways, etc.). Further, FIOs liaise and provide unique transportation security intelligence sharing with Federal and local partners; provide input to joint finished intelligence production in areas pertaining to transportation; participate in joint exercises and information-sharing events; and provide transportation threat briefs as needed. These partners include other components within Department of Homeland Security (DHS), Department of State, and Local Fusion Centers, DHS Intelligence Enterprise local partners, and intelligence community representatives. Question 14a. As we have learned in previous hearings, our Nation's surface transportation system remains a vulnerable target for attack. How is TSA measuring the effectiveness and deterrence value of its Visible Intermodal Prevention and Response (VIPR) teams? How has VIPR deployment changed to be more risk-based? Answer. The newly-updated Visible Intermodal Prevention and Response (VIPR) Concept of Operations (CONOPS) outlines the risk-based framework that is the basis for VIPR team deployment scheduling. Within the CONOPS framework, consideration is given to the risk-mitigation potential that the VIPR law enforcement and screening capabilities bring to each transportation mode and the visible presence that can be achieved when deploying to different locations within modes. Risk levels have been assigned to modes and locations and target ranges have been established for the percent of operations that are conducted within each risk level. Combined with scheduling principles to drive randomness and geographic dispersion, the framework seeks to optimize the value that the Transportation Security Administration (TSA) achieves with the VIPR Program. Question 14b. What contribution to security do Surface Transportation Inspectors make? Would those resources be better devoted to additional grant funding for surface transportation entities? Answer. Transportation Security Inspectors--Surface (TSI-S) provide subject-matter expertise for the planning and execution of effective VIPR operations in the surface transportation domain. TSI-S duties include helping local transit systems conduct vulnerability assessments, developing security plans to have a path forward to remediate vulnerabilities identified in the vulnerability assessments, and identifying resources that the Transportation Security Administration (TSA) (or other areas of the Federal Government) can provide to help transit systems raise their security baseline. The results of these assessments are analyzed to influence TSA policy to ensure that policies and programs are addressing the most critical vulnerabilities from a security perspective. Specific to the vulnerabilities identified from the assessments, Inspectors collaborate with industry on various risk mitigation activities including active-shooter training, improvised explosive devices awareness training, explosives mitigation training, and First Observer training. The TSI-S and grant funding are each valuable in their own specific way. Grants help the stakeholder to develop and implement programs and processes, while the Inspector force provides the continuity and oversight to the surface entities. However, once awarded and spent, the grant does not allow for flexibility, whereas Inspectors are able to shift from freight rail to mass transit to pipeline, based on emerging or confirmed threats. Additionally, grants do not have the ability to impact the number of entities that TSI-S impact each year. Question 15a. The President's budget request funds the acquisition of 4 new Fast Response Cutters (FRCs). In order to complete the FRC program before full-scale production of the Coast Guard's top acquisition priority, the Offshore Patrol Cutter, the Coast Guard should not be slowing its production of the FRC. Can the Coast Guard complete the FRC program before the planned full-scale production of OPCs if it only acquires 4 per year? Answer. The fiscal year 2017-2021 Capital Investment Plan, which reflects funding to acquire 6 Fast Response Cutters (FRCs) in fiscal year 2019 and fiscal year 2020, illustrates that the U.S. Coast Guard will have all remaining 26 FRCs on contract to complete the Program of Record (58 FRCs) by the end of fiscal year 2020. This is prior to full- scale production of the Offshore Patrol Cutter Program in fiscal year 2021. Question 15b. If it will require an increase to 6 FRCs in future years, why does the Coast Guard only want 4 in fiscal year 2017? Answer. As illustrated in the fiscal year 2017-2021 Capital Investment Plan, the 2017 request supports a full funding plan to put the remaining FRCs under contract by 2020. Question 15c. Is the Coast Guard not prepared logistically to accept more than 4 in fiscal year 2017? Answer. Per the FRC Phase I contract, WPCs 1120-1125 have contract delivery dates in fiscal year 2017 and the U.S. Coast Guard is prepared logistically to accept these cutters. The FRC Phase II contract is structured with options to acquire 4, 5, or 6 cutters in any given option year. Question 16a. This budget provides $150 million for multi-year funding to design a new heavy icebreaker and establish an icebreaker acquisition program. The Commandant has said that he believes the Coast Guard needs a fleet of 3 heavy icebreakers and 3 medium icebreakers. Understanding that the Coast Guard expects the cost of a single heavy icebreaker to be approximately $1 billion and the Coast Guard is looking to build 3 heavy icebreakers, how is the icebreaking mission a Homeland Security mission requirement? Answer. Icebreaking is one of several statutory missions of the U.S. Coast Guard classified as ``non-homeland security'' missions that were retained when the Coast Guard was transferred wholesale to DHS in 2003. In the Arctic, icebreakers may support the Coast Guard's statutory missions classified as ``homeland security'' including port, waterways, and coastal security operations and law enforcement operations. Question 16b. Would this mission be better suited for the U.S. Navy? Answer. The Navy transferred their wartime icebreaking fleet to the U.S. Coast Guard in 1965. Since that time the U.S. Coast Guard has maintained and operated all Federally-owned icebreakers. Question 17a. Since no United States shipyard has built a heavy icebreaker in over 40 years, what technical and contracting challenges do you anticipate in this acquisition project? Answer. The technical challenges for the Polar Icebreaker acquisition are primarily related to size, complexity of the vessel design, and the limited number of heavy icebreakers being produced in the world. Special skill sets are required to design and construct a heavy icebreaker as compared to other vessels. The heavy icebreaker envisioned by the Coast Guard must possess the endurance to travel to remote areas, break up to 21 feet of ice, and operate in the harsh and dynamic conditions of the Polar Regions while being able to support multiple missions. These requirements influence size and complexity. The design of the heavy icebreaker must include redundant, robust, winterized, and maintainable systems and components to facilitate the vessel's ability to operate independently in extreme environments and overcome the effects of high levels of vibration experienced during icebreaking. Through the pre-acquisition work underway, we are taking steps to develop a comprehensive ship specification and establish effective evaluation criteria to ensure the selection of the most capable shipbuilder. Question 17b. How is the Coast Guard going to mitigate these challenges? Answer. The U.S. Coast Guard will mitigate these challenges with the following best practices: Conduct frequent engagements with industry to ensure requirements are producible, feasible, measurable, and affordable; Employ an Active Risk Management process to identify issues with cost, schedule, and performance early in the acquisition process; Establish an effective acquisition strategy and contracting method to incentivize industry to provide the best ship at the best price; and Follow a structured and proven acquisition approach as outlined in the U.S. Coast Guard's Major Systems Acquisition Manual. Question 18a. The Coast Guard has said in the past that it believes it needs an Acquisition, Construction, and Improvements (AC&I) budget of about $1.5 billion per year. The President's budget, providing just over $1.1 billion for Coast Guard AC&I does not fully support the stated Coast Guard recapitalization needs and significantly decreases funding for acquisition from the fiscal year 2016 funded level of $1.95 billion. The committee fully supports the funding of the Coast Guard's recapitalization effort and is concerned that this decrease in funding will delay delivery in cutters and limit future recapitalization needs. How will you ensure the Coast Guard has the cutters and aircraft it needs to be effective in carrying out the homeland security missions of the Coast Guard? Answer. Requirements across DHS are considered through the annual Resource Planning Process. U.S. Coast Guard recapitalization remains a top Departmental priority. The fiscal year 2017-2021 Capital Investment Plan reflects the Department's commitment to the U.S. Coast Guard recapitalization, with funding programmed commensurate with increasing acquisition funding requirements over the next 5 years. The planned funding over this period fully supports critical acquisitions such as the Offshore Patrol Cutter and heavy polar icebreaker, and completes the Fast Response Cutter program of record. Question 18b. Although this budget indicates difficult choices, indicated by drastic cuts in several priority areas, in what ways is the Department helping the Coast Guard complete its recapitalization effort? Answer. The fiscal year 2017-2021 Capital Investment Plan reflects the Department's commitment to the U.S. Coast Guard recapitalization, with funding programmed commensurate with increasing acquisition funding requirements over the next 5 years. Based on the funding profile in that plan the U.S. Coast Guard will begin production on the Offshore Patrol Cutter, begin construction of the first new heavy polar icebreaker in more than 40 years, and complete the Fast Response Cutter program of record. Question 19a. Although the Coast Guard's program of record for the National Security Cutters (NSC) calls for only 8 NSCs, The Consolidated Appropriations Act, 2016, provided funding for the production of a ninth NSC. How will the acquisition of a ninth NSC affect the OPC program? Will 25 OPCs still be procured? Answer. The U.S. Coast Guard is currently conducting a Fleet Mix Analysis to better understand the performance impacts of the additional National Security Cutters (NSC). Question 19b. Given the ninth NSC, will the Coast Guard still be able to afford 2 Offshore Patrol Cutters (OPC) per year and accelerate the acquisition of a heavy icebreaker? Answer. Yes. The U.S. Coast Guard's fiscal year 2017-2021 Capital Investment Plan reflects the procurement of 2 OPCs per year beginning in fiscal year 2021, and includes funding for Polar Icebreaker up through the first phase of production funding in fiscal year 2021. The NSC, OPC, and Polar Icebreaker programs all remain on schedule at these funding levels. Question 19c. What challenges does the Coast Guard face with the addition of the ninth NSC? Specifically, how has the Coast Guard planned for the additional costs related to facilities, operations, crewing, and maintenance that will result from the acquisition of a ninth NSC? Answer. The ninth NSC will require out-year investments totaling $2.5 billion over a 30-year life: These include: $640 million for long lead time materials and production (funded in fiscal year 2016); $138 million for post-delivery activities and shore infrastructure development; $1.7 billion for operations and maintenance over 30 years of service life. The U.S. Coast Guard is in the process of conducting a full analysis of homeport options to include evaluation of: Mission needs, distance to primary operational area, work-life of crew, logistical support availability, infrastructure enhancement costs, and environmental impacts. Once that analysis is completed, we will have a much clearer picture of the cost of homeporting the ninth NSC. Question 19d. Does the Coast Guard plan on conducting a new Fleet Mix Analysis incorporating the ninth NSC into the analysis? Answer. The U.S. Coast Guard is in the process of conducting a Fleet Mix Analysis. The ninth NSC will be incorporated into this evaluation. Question 20. There have been funds requested to improving security at the White House, Vice President's Residence, and several other sites in response to recent security breaches. Will these funds be enough to improve Secret Service and address your Panel's recommendations to improve the Service? Are there strategies beyond funding that should be considered? Answer. The Secret Service is making steady progress in addressing known security requirements as well as emerging threats at the White House, Vice President's Residence, and other permanent and temporary protective sites. A majority of the funding requested to address the recommendations of the independent Protective Mission Panel involve personnel initiatives to address staffing challenges, training enhancements, White House and Vice President's Residence security infrastructure improvements, and protective technology upgrades. Some of these initiatives, particularly those involving construction, were granted multi-year funding and do not require additional funds in fiscal year 2017. Others have second year or sustainment needs that are included in the fiscal year 2017 President's Budget. Beyond funding, over the past year the Director of the Secret Service reformed the agency's command structure and implemented policies to increase transparency and communication between senior leaders, supervisors, and the rank-and-file across the agency to improve morale. By aligning operational and mission support functions under 2 different executives, the Deputy Director and the Chief Operating Officer, the Secret Service now has a structure in place that brings greater focus to the operational mission and business needs of the agency, recognizing the specialized skills needed to effectively manage each. The Secret Service also implemented the first ever Special Agent Career Progression policy, allowing employees to better plan and predict for themselves and their families when they should expect upcoming moves and transfers. Further, the agency published policies on promotions and implemented a new special agent promotion and reassignment bid process and schedule to increase transparency. Question 21a. For the past few years, the levels of both Uniformed Division Officers and Special Agents have been below acceptable levels. This understaffing has led to a litany of issues within the Service, including a lack of ample time for officer and agent training, excessive overtime, low morale, and high levels of attrition. In order to increase its staffing levels, the Secret Service took a series of steps, including the development of an aggressive human capital plan and the hiring of contractors to help with recruiting and facilitate the on-boarding of new hires. Ensuring the Secret Service is properly staffed is crucial, especially considering the additional strain the 2016 Presidential campaign is placing on the agency's resources. How does this budget request support the execution of the Secret Service's human capital plan? Answer. The fiscal year 2017 budget supports the Secret Service's aggressive accession plan for both Special Agent and Uniformed Division personnel, as well as administrative, professional, and technical staffing to achieve a net gain of 224 full-time equivalents over the fiscal year 2016 level. Achieving this staffing level will enable the Secret Service to make progress towards meeting the staffing goals outlined in the Secret Service's Human Capital Plan. Question 21b. How many additional Uniformed Division Officers and Special Agents does the Secret Service plan to hire and train in fiscal year 2017? Answer. The fiscal year 2017 budget supports 6,705 full-time equivalents (FTEs) and 6,772 positions, which is 224 FTEs and 58 positions higher than where the agency projected to end this fiscal year. Depending on the time it takes to on-board these new hires, the rate of attrition, and the impact of those factors on the budgeted FTEs, the fiscal year 2017 budget would allow the Secret Service to maximize its hiring efforts again next year as the agency works to keep pace with its 5-year Human Capital Plan. At a minimum, the Secret Service will hire 168 Special Agents and 192 Uniformed Division Officers in fiscal year 2017. Question 21c. What additional steps can the Secret Service take to increase its staffing to acceptable levels? Answer. While the Secret Service has made significant progress on its hiring goals, these achievements have been offset by increased attrition. As such, the retention of the existing workforce is a priority. The agency's biggest retention effort to date was directed at the Uniformed Division workforce with the implementation of the 2-year Uniformed Division Retention Bonus Program. At the same time, the Secret Service is implementing a more comprehensive retention program aimed at all members of the workforce. Initiatives such as student loan payback, tuition assistance, and the reintroduction of the Senior Special Agent and Senior Resident Agent Programs were implemented in April 2016. The Secret Service also plans to implement a career progression plan for its administrative, professional, and technical employees, which would provide a clear road map for professional development and career advancement. This is in addition to the projected implementation of a child-care subsidy program which would apply to qualified employees with children 13 years old or younger, or 18 years old and younger if the child is disabled. Such initiatives, along with further steps currently under consideration, will allow the Secret Service to achieve staffing levels consistent with the agency's fiscal year 2015-2019 Human Capital Plan. Question 22a. In the fiscal year 2017 budget request, the Federal Protective Service (FPS) requests approximately $22.5 million for the creation of a Rapid Protection Force (RPF), which is designed to deploy around the country to ``heightened threat situations.'' In order to pay for this new force, FPS will be raising its basic security fee from 74 cents to 78 cents and will increase its oversight fee from 6 percent to 8 percent. In addition, FPS will add 121 full-time equivalents (FTE) to create the RPF. Why is this RPF is even needed? Answer. Federal facilities and tenants remain a target of international and domestic terrorist threats. Today FPS builds and deploys regional and National enhanced security teams by pulling available personnel from across the country. Regions are taking calculated risks to provide personnel in support of these operations. The RPF will help FPS better address the current threat environment by increasing responsiveness to rapidly provide enhanced security to Federal facilities and personnel. The RPF will increase operational flexibility, capacity, and capability, and will be more effective than the current system of ad hoc teams. Question 22b. Given the specialized training and equipment needed for the RPF, how much more will it cost to create this RPF versus just hiring the additional 121 FTEs? Answer. We utilized the DHS Modular Cost Standards to create the RPF, which is the same for all FPS activities. In essence, the creation of the RPF costs the same as hiring and equipping an additional 121 FTEs. A mixture of new and existing Law Enforcement Officers is being utilized to create the RPF. New hires will be sent to regions where the existing Law Enforcement Officers joined the RPF. Question 23. The fiscal year 2017 budget request includes $39.8 million to implement the first phase of the National Cybersecurity and Communications Integration Center (NCCIC) Staffing Plan. What is the long-term staffing plan for the NCCIC, and how will this plan address increased demands? Answer. The NCCIC Staffing Plan is a 5-year strategic resource document that reflects comprehensive planning and analysis efforts and increasing demand for the NCCIC's services. The plan identifies data- driven staffing requirements commensurate to the projected need for NCCIC products and services. The fiscal year 2017 request implements the first phase of the Staffing Plan, providing Federal and contractor personnel to support the growth in demand for NCCIC services. The first phase supports additional proactive assessments (``red team''), 247 operational staffing at both our Glebe and Pensacola locations, coverage, and funds to maintain readiness to execute National security/ emergency preparedness activities. The fiscal year 2017 request will also enable specialized cyber defense teams to apply capabilities from across the NCCIC, including incident response, ``red team'' penetration testing and cyber hunt capabilities, addressing the victim's specific risk management requirements and supporting the proactive identification of vulnerabilities and threats in agency networks. Question 24. The fiscal year 2017 request includes $8.25 million for Automated Indicator Sharing (AIS) Threat Dissemination to fulfill the information-sharing requirements of the Cybersecurity Act of 2015. As you know, this committee has been closely following the DHS implementation of the Cybersecurity Act. Can you give the committee an update on this status and how these funds will be used? Answer. DHS met the legislatively-mandated deadline to certify that the Automated Indicator Sharing is operational. As of April 13, 13 private-sector companies and 5 Federal agencies are connected to the AIS system. Over 70 non-Federal entities are in the process of connecting. DHS is planning a gradual increase in the number of participants over the next year to address any technology issues that inherently arise in any new IT system. In fiscal year 2017, DHS requested a programmatic increase of $8.25 million for AIS to support expanded indicator sharing capabilities, exercises focused on indicator sharing between Government and the private sector, and additional NCCIC analysts to ensure appropriate enrichment and privacy and civil liberties review as the volume of indicators increase. More specifically, funds will be used to: Improve the TAXII cyber threat indicator gateway, with a focus on the National Cybersecurity Protection System (NCPS) receipt and dissemination infrastructure; improve internal data management infrastructure, and capabilities to transmit information; and provide the ability to tag information and provide access to the appropriate customers (e.g. by masking or locking or other means). Funds will be used to allow additional redundancy as indicator sharing becomes increasingly integral to NCPS and to the NCCIC's efforts to secure Federal civilian agencies and help companies better secure their own networks. $3.75 million Conduct exercises focused on indicator sharing between Government and the private sector, intended to institutionalize procedures, improve information-sharing capabilities among various partners, and demonstrate the value proposition of indicator sharing. $3 million Support enrichment and privacy and civil liberties review processes. $1.5 million Question 25a. On February 11, the Subcommittee on Emergency Preparedness, Response, and Communications held a hearing on DHS's biosurveillance and biodetection capabilities where both Drs. Brinsfield and Brothers testified on the challenges facing BioWatch and the National Biosurveillance Integration Center. Recent reports from the Government Accountability Office and the Blue Ribbon Study Panel on Biodefense highlighted the need to prioritize this issue of biological preparedness capabilities. What will the Department do in fiscal year 2017 to ensure these programs are providing a return on investment? Answer. DHS investments in the BioWatch Program and the National Biosurveillance Integration Center help protect against, prepare for, and support the coordinated response and recovery for biological events. Ultimately, the return on these investments is the insurance of a safe, secure, and resilient homeland. With respect to BioWatch, the Department will continue to ensure that the currently-fielded technology is operated in accordance with established guidance and subject to a rigorous quality assurance program. Additionally, the program will work with interagency and DHS components involved in biodetection to leverage the expertise, experience, and investments of the entire community. Looking to the future, the program will benefit from the more robust acquisition policies and procedures developed by the Department in recent years. The establishment and continued development of the Joint Requirements Council serves as another example of processes put in place to make our investment decisions. Return on investment is a major consideration in making these decisions. The National Biosurveillance Integration Center (NBIC) has made great strides in recent years and the Department is committed to working with the Biosurveillance community, including those partners at the State, local, Tribal, and territorial level to further this work. In the coming year, NBIC will start work on the next iteration of its strategic plan. This process is expected to refine and hone how the program works with partners to evaluate needs and gaps and then works to develop or leverage available tools and data to enhance biosurveillance integration. As in years past, NBIC will work with the Department of Defense and others to leverage their investments in tools, technology, and data management to maximize value. Additionally, the Department will further explore how DHS data sets and intelligence community information can enhance and contextualize the biosurveillance picture. In fiscal year 2017, the Department will continue to evaluate and enhance BioWatch and NBIC to ensure these programs are contributing toward meeting the goals listed above. DHS will also continue to regularly assess BioWatch and NBIC through resource allocation decisions in its annual budget cycle. Question 25b. When you directed the cancellation of the BioWatch Gen-3 acquisition in April 2014, you tasked Dr. Brinsfield and Dr. Brothers to work together to come up with enhancements to the current BioWatch system and proposals for next generation technology. To date, it does not appear much progress has been made in this effort. What is the plan for BioWatch going forward? When can this committee expect to see outcomes from the Office of Health Affairs and Science and Technology Directorate? Answer. Since the April 2014 DHS Acquisition Decision Memorandum, DHS S&T and BioWatch have been collaborating to advance a plan for enhancing BioWatch technologies to increase coverage and speed of detection. These improvements are intended to advance the current ``detect to treat'' capability, which will further enable us to deploy medical countermeasures before the population is symptomatic. BioWatch and DHS S&T developed a Technology Road Map outlining near-term (1-3 years) and mid- to long-term (3+ years) BioWatch technology enhancements with an estimated deployment of near-term enhancements in fiscal year 2018, pending appropriate funding. To date, the collaboration between DHS S&T and BioWatch has resulted in: (1) A comprehensive needs analysis, (2) requirements development, (3) market survey and analysis of enhancement opportunities, (4) capability development planning, (5) programming, and (6) periodic programmatic reviews. In the late fall of 2014, DHS S&T released 5 Requests for Information (RFIs) on technologies that can address critical BioWatch capability gaps, and a total of 56 responses were received and subsequently reviewed. Additionally, in the spring/summer of 2015, Sandia National Laboratories completed a Market Survey on potential technologies that can address identified BioWatch capability gaps. The technologies identified through the Market Survey were reviewed during two Focus Group meetings held in September 2015 by 18 BioWatch stakeholders (representing BioWatch Laboratory and Field Operations and Public Health Preparedness). The results of the RFIs, Market Survey, and Focus Group meetings were documented by Sandia National Laboratories in a final report titled BioWatch Capability Enhancement Assessment Report in December 2015. Throughout fiscal year 2016, BioWatch has worked with DHS leadership, in accordance with Acquisition Management Instructions, to develop the required documentation for Acquisition Decision Event 1 (ADE-1), which is scheduled for the first quarter of fiscal year 2017. The required ADE-1 documents, including a Mission Needs Statement, a Capability Development Pan (CDP), and a Rough Order of Magnitude (ROM) Cost Estimate, will be completed prior to the passage through the ADE-1 gate. BioWatch stakeholders have been continuously engaged throughout the technology enhancement process, including participation in the above- mentioned Focus Group meetings, as well as webinar sessions and presentations at the Institute of Medicine. BioWatch stakeholders have also briefed the Nuclear, Biological, and Chemical Industry Group (NBC- IG) on 3 occasions to ensure the commercial sector is aware of BioWatch technology enhancement needs and that they are briefed on the status of acquisitions through OHA and/or Broad Agency Announcements from DHS S&T. In addition, in fiscal year 2016 BioWatch advanced the development of 2 tools contributing to situational awareness, Decision Support Tool (DST) and a Sample Tracking Tool (STT), with development of both tools planned in fiscal year 2017 to all jurisdictions, pending the availability of an appropriations act. Question 26. Secretary Johnson, the fiscal year 2017 budget request provides very little detail on the newly-proposed Regional Competitive Grant Program. Why would the Department propose to create a new program at the same time that it is proposing cuts to other seemingly similar and critical grant programs? Can you provide more detail to the committee about the new Regional Competitive Grant Program, who would be eligible, and how funding will be distributed? The fiscal year 2017 budget requests $100 million for a new Regional Competitive Grant Program, but the budget documents do not provide any detail about what the program would look like. Can you describe the program? Who would be eligible to apply and what activities would it support? Which regions would you expect to be the primary recipients of this funding? Areas with currently funded United Area Security Initiatives (UASIs)? Or would the funding support the sustainment of capabilities for areas that have not historically received significant grant funds? Answer. The administration is proposing to re-align $100 million from the Homeland Security Grant Program to a new Regional Competitive Grant Program which will target critical preparedness capability gaps at the regional level. This new program is responsive to specific National preparedness needs as identified through a variety of strategic assessments, including an analysis of State and regional Threat and Hazard Identification and Risk Assessments, the annual National Preparedness Report, the Strategic National Risk Assessment, and other assessments of National risk and capabilities. Funding under the program will be awarded on a competitive basis, applying risk mitigation and project effectiveness as the primary evaluation measures. States, localities, and urban areas, including current UASI grant recipients would be eligible to apply. The administration expects that the most competitive applicants will be those who propose to work on a regional basis to address critical capability shortfalls. As with the existing preparedness grant programs, funding under the regional competitive program would support activities to build and sustain the capabilities identified in the National Preparedness Goal. Question 27. The Integrated Product Teams (IPTs) are being used to help S&T and operational components identify capability gaps and eliminate redundant programs and projects. Can you provide more detail about the IPTs to date and how they are working to eliminate redundant projects? Answer. In response to the Secretary's August 2015 memo, S&T established a governance structure and operational process for the IPTs in fiscal year 2016. This included standing up 5 chartered IPTs that identified technological capability gaps in their respective mission areas. Based on inputs from the IPTs, the S&T Research Council (composed of the component IPT leads) identified the high-priority gaps determined to be most important for R&D investment across DHS. The fiscal year 2016 IPT process proved effective and produced results in a short time frame. These results are presented in a final report, which identifies 24 high-priority technological capability gaps that span all 5 IPTs. The fiscal year 2016 process also identified R&D efforts that address the highest-priority gaps. As part of this process, the IPTs and the S&T Research Council identified duplicative or overlapping R&D activities and recommended ways to mitigate duplication going forward. One way to resolve duplication is to consolidate similar or redundant R&D efforts into a unified or joint effort. An example of this occurred in the fiscal year 2016 IPT process. During the Biological Threat sub-IPT meetings on Detect, Identify, and/or Clarify, representatives from CBP, FEMA, and USSS identified the requirement for rapid warning, identification, and characterization of biological threats in support of the Nation's BioWatch program and other programmatic needs. While these components would field such technology for differing uses, including force protection, public safety, and decision support, the Bio Threat IPT chose to consolidate these otherwise independent requirements into joint projects. This resulted in improved communication among components and a more focused R&D acquisition profile. Question 28a. The S&T Embed Program embeds S&T program staff into operational components for both short- and long-term opportunities. What mechanisms are in place to ensure S&T program staff is effectively communicating about these experiences with S&T? Answer. In December 2015, the Embed Program manager worked in conjunction with human capital and legal offices to develop a report construct, implement formal policy, and deploy a permanent reporting mechanism for all embed staff to communicate their field experiences with S&T employees. In addition, the Embed Program is working in harmony with the newly-implemented Integrated Product Team program management to inject the embed reports into their capability gap business management process. Lastly, upon return from an Embed engagement, the embedded staff is given the opportunity to present their report to the S&T staff in an open forum setting. To enhance this presentation method, in most cases, S&T has invited component operators to participate in the presentation giving their perspective to the Embed experience. It is the Embed Program's vision to continue these venues in fiscal year 2017, with expectation of adding presentations at the participating component headquarters facilities. Question 28b. How many staff are currently embedded throughout the Department, how many more do you expect to utilize this program in fical year 2017? Answer. The Embed Program's fiscal year 2016 engagement: 1. DHS U.S. Immigration and Customs Enforcement (ICE) Technical Operations Center, Lorton, VA 1 October-30 December Mr. John Price, S&T's First Responders Group 2. DHS Federal Emergency Management Agency (FEMA) Headquarters, Washington, DC 15 February 2015-Current Dr. Keith Holtermann, S&T's R&D Partnerships Group 3. DHS Federal Law Enforcement Training Center, Training Research and Innovation Directorate, Glynco, GA 1 April-29 July Mr. James Grove, S&T's R&D Partnerships Group 4. Joint Interagency Task Force South, Innovation and Technology Directorate, Key West, FL 10 March-10 June Mr. James Odasso, S&T's Capability Development Support Group. The Embed Program currently has 3 staff members embedded with DHS operators serving in both internal and external DHS environments. The Embed Program manager expects to deploy 4 more staff in fiscal year 2016 for a total of 8 deployments. The Embed Program manager plans to deploy 8 to 10 staff members in fiscal year 2017. Question 29a. Can you provide us with additional details about the Science and Technology Directorate's Apex programs? I understand they range from border situational awareness to next generation first responders; can you share any outcomes thus far? Answer. Apex projects are cross-cutting, multi-disciplinary programs identified as highest priority, value, and impact programs developed based on priority needs of DHS components and customers. They are intended to solve problems of strategic operational importance to DHS. There are currently 8 Apex programs in various maturity states. The programs include Air Entry/Exit Re-Engineering (AEER), Border Enforcement Analytics Program (BEAP), Border Situational Awareness (BSA), Screening at Speed (SaS), Next Generation Cyber Infrastructure (NGCI), Real-Time Bio Threat Awareness (BSV), Next-Generation First Responder (NGFR), and Flood Awareness (Flood). Further information on these programs and outcomes to date is attached. Attachment program descriptions Air Entry/Exit Re-Engineering (AEER).--Identify, develop, test, and evaluate new concepts of operation to enhance and facilitate traveler-screening processes Border Enforcement Analytics Program (BEAP).--Provides advanced computing and analytical solutions that enable Immigration and Customs Enforcement's (ICE) Homeland Security Investigation (HSI) to effectively combine and analyze multiple, large disparate data sets to increase enforcement effectiveness Border Situational Awareness (BSA).--Improve situational awareness to more effectively and efficiently deploy resources Screening at Speed (SaS).--Seamless detection of threats while respecting privacy Next Generation Cyber Infrastructure (NGCI).--Develop and deliver advanced sensing technologies and network protections Real-Time Bio Threat Awareness (BSV).--Demonstrate detection capabilities that create timely awareness Next-Generation First Responder (NGFR).--Harnesses the best existing and emerging technologies and integrates them in a well-defined and standards-based open architecture enabling first responders to be protected, connected, and fully aware Flood Awareness (Flood).--Planned to reduce flood fatalities and property damage as well as increasing community resilience to flood disasters. apex outcomes Apex BEAP transitioned an initial ``Big Data'' solution that is now supporting live investigations for Homeland Security Investigation's counter-proliferation unit, including the Export Enforcement Coordination Center, formed under Executive Order 13558 in 2010. These technologies enable operational personnel to process large amounts of disparate data and perform analytics to gain insights that were previously unattainable with ICE's current tools and databases. The insights have led to reports, active investigations, lead packages sent to various field offices including overseas attaches, and seizures of illicit shipments. As a result of the Apex BEAP Program, ICE has engineered new business processes to take advantage of results from the system. BEAP is in the process of fully automating interfaces to DHS data flows and developing applications for additional ICE investigation domains. S&T's Apex AEER and CBP-resourced efforts to strengthen and improve operational efficiency of CBP Traveler Inspections upon arrival to the United States (Entry) as well develop cost- effecting Concepts of Operation to support a future CBP Biometric Air Exit Capability. To put this in perspective, DHS previously estimated Biometric Exit would cost between $3 billion-$10 billion to deploy. This represents less than 1 percent investment in S&T to accelerate and inform a multi- billion dollar DHS acquisition program. As a result, it has identified a number of new technically viable concepts of operation and biometric technologies that could be used to enable that acquisition. S&T asserts that the technology questions are now resolved. Improving current entry operations for CBP not only allows CBP to strengthen its inspections of international travelers, it also enables them to improve the efficiency and scalability of operations as the number of international travelers coming to the United States grows by approximately 5 percent per year. Greater efficiency also has significant benefit to the U.S. economy. The NGFR Apex worked with the Integrated Justice Information Systems Institute and the Open Geospatial Consortium to investigate, develop, and test candidate architectures, components, and relevant standards for an Internet of Things Pilot using lightweight sensors, and to develop new or enhanced open standards of profiles for interfacing with these sensors. This pilot has demonstrated the development of interoperable, open standards-based solutions that leveraged lightweight, low- cost, and networked sensors. The results demonstrated real- time, realistic actionable information in support of incident response and management. engines Apex Technology Engines represent a new approach to realizing the S&T Visionary Goals. The Engines identify and share subject-matter expertise, technical solutions and tools, best practices, lessons learned, and reusable products and solutions on behalf of Apex and other S&T projects. Teaming and collaboration to leverage knowledge from the DHS enterprise and external stakeholders are core components of the Engine approach. engine descriptions Behavioral, Economic, and Social Science Engine (BESS-E) provides analysis of the social and behavioral implications of new technologies, programs, and policies to support their research, implementation, and diffusion. Communication and Networking (CN-E) provides integrated communications and networking solutions that ensure operability and interoperability across all network platforms to ensure the efficient and effective exchange of voice, video, and data information. Data Analytics Engine (DA-E) provides expertise and tools for projects to leverage emerging storage, security, computation, and analytics technologies to create information and rapidly convert data to decisions for homeland security systems, missions, and operations. Identity Access and Management (IDAM-E) provides the capability to deliver individuals and systems a digital identity, credentials, authentication, and authorization to allow the right people to securely access the right data at the right time. Modeling and Simulation Engine (MS-E) provides expertise and a repository for mission-based models, as well as modeling and simulation tools. Situational Awareness and Decision Support (SANDS-E) provides Apex and other S&T projects with assured, secure access to databases, knowledge bases, modeling and simulation tools, and shared situational awareness products. engine outcomes DA-E completed 2 social media pilots for USCIS screening and vetting of K-1 Visa and Syrian/Iraqi refugee populations under the auspices of the Social Media Task Force. USCIS is now implementing the methodology developed with S&T in its social media screening and vetting operations. Two additional pilots are planned to start later in 2016. MS-E provided the USSS with subject-matter expertise and technical oversight for crowd ingress, egress, and emergency evaluation for the September 2015 Papal visit. The value of the MS-E work led the USSS to express interest in utilizing S&T to provide modeling and simulation support to enhance the safety of the Republican and Democratic National Conventions, as well as the 2017 U.S. Presidential Inauguration. The crowd analysis they will provide to the Presidential Inauguration will be based on an enhanced model with expanded capabilities. MS-E established the Modeling and Simulation Lab in February 2016. A first of its kind for S&T, the Lab enables the Modeling and Simulation team to work simultaneously with other stakeholders to provide time-sensitive solutions to real-time security challenges, enhancing the safety and well-being of first responders and citizens alike. CN-E has developed a game-changing technology. By dedicating 5 percent of the public TV's digital transmission's bandwidth to support a datacasting network, multiple video streams, text messaging, and digitized building blueprint files can now be securely sent wirelessly via advanced encryption to targeted public safety users. As a result, the City of Houston and its first responders used the datacasting network to securely communicate during the NCAA Men's Final Four Basketball Tournament in Houston, Texas on April 1-4 2016. CN-E restructured the P25 Compliance Assessment Program (CAP) that is on track to resolve a long-standing interoperability problem for the Nation's first responders. With compliant P25 Land Mobile Radios, first responders and U.S. Border Patrol Agents can be assured that they will be able to communicate no matter what brand of radio they are issued. Question 29b. Are metrics are being used to measure the effectiveness of each program? Answer. Numerous metrics are being used to measure Apex program success and effectiveness. These measures are program-specific and continue to be refined. Examples of some of the diverse Apex Program metrics include: Number of technologies transitioned to customers, improved situational awareness--i.e., ability to increase access to data and information (communications, sensors, etc.), time savings for specific events, the extent to which a solution provides regulatory compliance, improved screening time, cost savings, and reduction in false alarms. Question 30a. Of the 124 aliens charged with homicide-related crimes since 2010, how many were released as a result of a court order? Of those who were released as a result of a court order, how many were released as a result of the alien's home country not taking them back pursuant to the Zadvydas decision? Answer. Of the 124 aliens charged with homicide-related crimes subsequent to release since 2010, 28 were released based upon the requirements of the Zadvydas decision. Of the original population, 31 were released on bond pursuant to the order of a Department of Justice immigration judge. In the past fiscal year U.S. Immigration and Customs Enforcement (ICE) has significantly reduced both the number of criminal aliens released as well as the proportion released for discretionary reasons. Question 30b. Of the 124 aliens charged with homicide-related crimes since 2010, how many were released that did not meet ICE's criteria for deportation? Answer. ICE adheres to Board of Immigration Appeals and Federal court decisions to determine whether an individual alien is removable from the United States as a result of criminal conviction. It is important to note, however, that some homicide-related offenses (e.g., those where the offender acted negligently or recklessly rather than with intent to kill) may not themselves render individuals removable from the United States under the Immigration and Nationality Act. Please also note that because the 124 includes releases that took place both before and after the issuance of my November 20, 2014 memorandum concerning immigration enforcement priorities, ICE is unable to retroactively apply enforcement priorities in order to report on the number of those who did not meet the Department's enforcement priorities. Question 30c. Of the 124 aliens charged with homicide-related crimes since 2010, how many would fall within the Priority I or II categories under ICE's priorities for enforcement criteria? Answer. ICE is unable to statistically report on this information, and cannot retroactively apply to these cases the priorities outlined in the November 20, 2014 memorandum. Question 31a. In fiscal year 2014 and fiscal year 2015, how many recidivist criminal aliens have been released at ICE's discretion and rearrested (felony or misdemeanor) since their release? Answer. U.S. Immigration and Customs Enforcement (ICE) is currently analyzing the available data and will provide the information as soon as possible. Question 31b. In fiscal year 2014 and fiscal year 2015 how many recidivist criminal aliens have been released as a result of a court order? Answer. ICE is currently analyzing the available data and will provide the information as soon as possible. Questions From Ranking Member Bennie G. Thompson for Hon. Jeh C. Johnson Question 1a. It has been nearly 3 years since the Government Accountability Office (GAO) completed its report, ``TSA Should Limit Future Funding for Behavior Detection Activities.'' Within the report, GAO goes so far as to state that ``Congress should consider the absence of scientifically-validated evidence for using behavioral indicators to identify threats to aviation security when assessing the potential benefits and cost in making future funding decisions for aviation security.'' As I understand it, TSA has yet to come forth with scientifically-validated evidence showing the security effectiveness of the program. Given the recent headlines and reality that this travel season is going to be above and beyond any that we have seen in recent years, along with the fact that TSA is in need of more TSOs to staff underutilized lanes, will you commit to taking a serious look to determine whether these BDOs can reallocated to aid in screening functions outside of their current roles? Answer. Security experts have long argued that the most effective way to diminish threats to airports and other large public spaces involves a combination of tools, including greater use of surveillance cameras, bomb-sniffing dogs and, in particular, training more security personnel in the use of behavior-monitoring techniques. Therefore, TSA believes that behavior detection certified officers play an important part in an effective security screening system. Question 1b. In 2013, GAO conducted an investigation on TSA's SPOT program, which employs behavior detection officers to identify persons who may pose a risk to aviation security based on certain behavioral indicators. The report recommended that future funding for those activities be limited until TSA can scientifically prove that behavior detection activities have scientific validity. Please explain why TSA is requesting the same number of behavior detection officers as fiscal year 2016? Answer. TSA currently deploys 2,660 full-time BDOs at 87 airports. This is a reduction of 471 from fiscal year 2015. We took these cuts by re-examining our risk-based allocation and streamlining the airport management structure for BDOs. As history has shown, terrorists have employed a variety of means to attempt to inflict harm on an aircraft. TSA believes that Behavior Detection and Engagement, is a useful capability in light of adversaries' continually evolving weapons, and tactics, and plays an important role in observing the dynamics of the checkpoint. Question 1c. Has TSA completed an investigation to validate the usage of behavior detection officers? If so, what were the findings? Answer. The Transportation Security Administration (TSA) did complete an investigation to validate the usage of behavior detection officers. In August 2015, TSA delivered the ``Fiscal Year 2015 Scientific Substantiation of Behavioral Indicators'' report to Congress. The report provides evidence demonstrating that behavioral indicators can be used to identify passengers who may pose a threat to aviation security and discusses TSA's plans to continue collecting performance data on the effectiveness of the behavior detection program. The evidence includes 189 scientific and operational references, including the 2011 study, Screening of Passengers by Observation Techniques Referral Report Validation Study completed by the Department of Homeland Security's Science & Technology Directorate. In the fall of 2014, TSA began a final effort to pilot the updated indicator protocol at 3 airports. The goal of the pilot was to collect operational and observational data in order to determine whether: (1) The protocol negatively impacted the checkpoint, and (2) Behavior Detection Officers (BDOs) could successfully apply this new protocol in the field. TSA assessed relevant data such as behavior detection referral frequencies, knowledge quiz scores, on-the-job training results, and feedback from Transportation Security Officer (TSO) focus groups. Based on this information, TSA concluded the pilot objectives were met. A third test objective is scheduled to be conducted at a total of 10 airports, in 2 phases beginning in October 2016 and concluding in June 2017. The test is designed to assess the extent to which BDOs identify a subset of the substantiated indicators in a live environment and will use trained actors demonstrating the indicators. At the conclusion of the testing, TSA will evaluate the results and may consider National implementation of the new protocol in fiscal year 2018 or further testing. Question 1d. According to a 2013 GAO report that recommended TSA limit funding for behavior detection activities, in fiscal year 2012, the average salaries the lowest BDO pay band was $66,000, the highest averaging salary was around $97,000, yet TSA screeners, whose duties actually display tangible results are not making anything comparable. How can TSA justify these salaries on a program that hasn't been proven effective? Answer. In 2016, F Band BDOs on average make $63,881 while G Band BDOs make on average $76,675. By comparison, the similar bands of non- BDOs make on average $66,160 and $77,287. Based on the conclusions of TSA's report ``Fiscal Year 2015 Scientific Substantiation of Behavioral Indicators,'' described above, TSA believes the Behavioral Detection and Analysis program has been shown to be effective, and remains a valuable part of TSA's Aviation Security mission. Question 2a. In August 2015, TSA released its Strategic Five-Year Investment, which was required to make TSA procurement plans and process more transparent. In that plan, TSA stated 897 enhanced metal detectors would be procured with fiscal year 2016 funds, yet the budget request indicated that no enhanced metal detectors would be procured in fiscal year 2016. Please provide an explanation of the discrepancies between the Five-Year Plan and the budget justification and the Strategic Five-year acquisition plan. Answer. The planned procurement numbers provided in the Strategic Five-Year Technology Investment Plan for Aviation Security 2015 Report to Congress were based on the approved program documentation at the time of publication, specifically the Life-Cycle Cost estimate approved by the Department of Homeland Security (DHS) in May 2014. This documentation is in the process of being updated, and revised numbers will be published upon completion. Therefore, when developing the fiscal year 2017 budget request, the Transportation Security Administration (TSA) chose to reflect updated requirements per the latest spend plans, which resulted in TSA showing 0 units rather than 897 units being planned for procurement in fiscal year 2016. Question 2b. When--between the time this Five-Year Plan was released and the time the budget request was created--was it decided that 0 enhanced metal detectors would be procured? Answer. TSA continues to prioritize its resources and projects according to the strength of their contribution towards fulfilling the agency's mission to protect the Nation's transportation systems from evolving threats. Because these machines remain highly reliable, and increases in unit maintenance costs throughout the service life of the current enhanced metal detectors are not anticipated, TSA adjusted the planned procurements to better align with latest spend plan requirements. Furthermore, TSA is working with DHS to develop a strategic sourcing vehicle for all DHS Components to procure enhanced metal detectors. Question 3. We have seen a rise in domestic terrorism incidents throughout the country, marked most recently by the events during the 40-day standoff in Oregon, the killing of 3 people at a Planned Parenthood Clinic in Colorado, and the execution of 9 parishioners at the Emanuel African Methodist Episcopal church in South Carolina. These events demonstrate the marked rise in anti-Government militia and white supremacy groups in the United States. What CVE efforts has DHS implemented to address the threat of domestic terrorism? Answer. Recent events have highlighted the need for the Department's countering violent extremism (CVE) approach to include efforts related to countering domestic terrorism. As a part of its CVE efforts, the Department provides training for law enforcement; delivers briefings to fusion centers, law enforcement, and communities; conducts engagement events to inform community stakeholders of the threats posed by domestic terrorism and violent extremism; provides grant support to law enforcement and non-Governmental organizations; develops research to enhance DHS's understanding of the violent extremist threat, including domestic terrorism and violent extremism; and develops analysis on the spectrum of domestic-based threats. In particular, DHS Intelligence & Analysis (I&A) has a team of Domestic Terrorism (DT) analysts whose sole focus is domestic terrorism analysis. These analysts have expertise in all of the disparate categories of domestic terrorism, such as white supremacist extremists, sovereign citizen extremists, anarchist extremists, and environmental/animal rights extremists. The new DHS Office for Community Partnerships (OCP) is also increasing the DT work of the Department. OCP has placed a full-time Regional Director for Strategic Engagement in the U.S. Attorney's Office for Colorado (USACO) and partners with the U.S. Attorney to counter all forms of violent extremism, including domestic terrorism. Specifically, OCP and the USAO in Colorado are creating an intervention model that addresses all forms of violent extremism, using best practices from the BRAVE model, but also ensuring we address the gaps in research on the radicalization by domestic violent extremist groups. The intervention model will also overlap with existing gang intervention efforts in Denver to address white supremacist prison gang recruitment. Following the Planned Parenthood shooting in Colorado Springs, OCP and USAO are partnering with the Faith Security Working Group (a network of faith centers and law enforcement) to build awareness in churches and other faith centers, particularly with youth leaders, on how all violent extremist groups recruit. El Paso County Sheriff is also involved, as it has a robust rural engagement program. OCP and USAO are also partnering with the Aurora Police Department, which is piloting a program with its School Resource Officers, who will work to build curriculum that increases awareness with teachers, administrators, and students about how to be safe from recruitment by all violent extremist groups, as well as active shooters. Aurora has experienced the movie theater shooting, but also ISIL recruitment, so it supports an all threats approach to prevention. In regards to domestic terrorists and violent extremists, OCP and USACO are building upon existing relationships with sheriffs' offices to begin the process of exploring community engagement and resilience strategies focused on crime prevention. Further, OCP and the USACO plan to meet with the Colorado Department of Corrections to learn about how to support their efforts to prevent recruitment by the 211 Crew white supremacist gangs in prisons. Question 4. In the Consolidated Appropriations Act for fiscal year 2016, the Office of Community Partnerships was appropriated $10 million dollars for grants to extend to outside stakeholders to further its CVE mission. It is still unclear how these grants will be administered. What is your vision for this new office and the new grant program? Answer. In July 2016, DHS issued the notice of funding opportunity for the new grant program. DHS will utilize FEMA's Grants Program Directorate (GPD) infrastructure for awarding grants. Like the current Transit and Port Security Grant Program model, where FEMA GPD makes awards and conducts fiscal audits while the subject-matter expertise is provided by the Transportation Security Administration (TSA) and the United States Coast Guard (USCG), OCP is involved in all aspects of the grant program relating to the grants' subject matter, from designing the funding opportunity's purpose, goals, eligible activities, and evaluation criteria, to providing CVE subject-matter expertise in the evaluations of applicants and collecting the performance measures for incorporation into the Department's overall CVE activities. The overarching goal of the initiative is to prevent radicalization to violence. This will be accomplished by enhancing community resilience, developing non-law enforcement off-ramps for individuals being recruited or radicalized to violence; creating or amplifying counter messages to violent extremist narratives; and increasing the capacity of non-traditional partners. OCP will be heavily involved in evaluating applications and will specifically evaluate whether applicant proposed metrics are appropriate. The DHS CVE approach calls for several categories of metrics, including measuring the extent to which DHS activities spur CVE efforts outside of the Federal Government and measuring the reach of CVE activities and the increased resiliency of the communities reached both in person and on-line. Question 5. DHS has an established insider threat program designed to mitigate the threat resulting from employees and contractors who purposefully or inadvertently commit security breaches. Please give an overview of how the program currently works. Is the current insider threat program limited to the detection of abnormalities in data usage or does it monitor other factors? Answer. The DHS Insider Threat Program (ITP) receives information from various sources relevant to security violations, infractions, and data spills. Once this information is received, the Insider Threat Operations Center (ITOC) coordinates with the various DHS components-- both support and operational--that are involved, depending on the situation. Per standard operating procedures, the ITOC will conduct a thorough review of all relevant information associated with all potential insider threat incidents. If there is determined to be suspected nefarious activity, the ITOC will immediately refer the incident to the appropriate internal investigative entity for action. The ITOC retains records of both actions and coordination as required by the ITP-established Privacy Impact Assessment and System of Records Notice. The current Insider Threat Program is not limited to the detection of anomalies in data usage. The ITOC ingests other data sources into its business process beyond data collected via user activity monitoring, and plans are underway to expand beyond the current data ingests. Question 6. The Science and Technology Directorate (S&T) announced a program to study the effectiveness of insider threat programs. How far along is S&T in the study and are there any preliminary results that you are able to disclose? Answer. The S&T Cyber Security Division's Insider Threat project is supporting operational insider threat programs across Government and industry through 3 main approaches. First, CSD is pursuing research that will enhance and complement existing capabilities to provide a more complete operating environment for insider threat programs. Currently, there are gaps in existing tools in this area. Additional research will assist in developing tools that can be incorporated into an operating environment without disrupting current operations. Second, CSD is developing data sets for researchers to use so they may test their tools. Currently, data sets are not freely available for insider threat researchers working independently. Small businesses and academics have to spend time and resources to generate their own data against which they may test their tools. S&T CSD plans to provide data sets to researchers, thereby removing the need to spend time and resources and limiting the duplication of efforts for researchers. Finally, CSD provides support by reviewing closed insider threat investigation case files. This review will likely provide information to agencies on historical trends related to insider threats, as well as evaluating investigative best practices. Question 7. In the aftermath of terrorist acts at home and abroad, information sharing between the law enforcement community and private sector is imperative. While I understand and agree that the priority after U.S. attack secure areas and respond to victims, we have heard from our local, State, and private partners that the information that DHS provides in response to these terrorist attacks is neither timely nor particularly informative compared to information provided by other Federal agencies. Some, especially those in the private sector who manage soft targets, have told us they are getting first updates and information from DHS days and weeks after incidents. What can DHS do to ensure that relevant information is being provided in a timely manner to the appropriate authorities? Answer. The U.S. Department of Homeland Security (DHS) takes very seriously our mission to equip the Homeland Security Enterprise with timely intelligence and information to keep the homeland safe, secure, and resilient. DHS has responded to incidents at home and abroad, and provided critical intelligence to and information to protect the Nation and inform Federal, SLTT, and private-sector partners, including responding to incidents such as those in Chattanooga and San Bernardino. In the hours following the Paris, Brussels, Orlando, NY, and NJ attacks, I&A, in collaboration with the Federal Bureau of Investigation (FBI) and the DHS Office of Intergovernmental Affairs, hosted a conference call with SLTT partners, including fusion centers, law enforcement executives, and Homeland Security Advisors. The purpose of the calls was to provide an update regarding the attacks, including what was known regarding the time line of events, targeted locations, and tactics used. I&A and the FBI committed to providing additional updates for these partners as warranted, based upon new or updated information. We expect to continue this practice of informing SLTT partners within hours of significant terrorist events, foreign and domestic. We continuously work to overcome barriers to information sharing as we bring information into the IC, share IC information with our SLTT and private-sector partners, and facilitate the flow of information across the Department. We routinely share relevant information, via our field-based intelligence professionals and via Unclassified and Classified systems, as soon as it is available with our SLTT and private-sector partners, while remaining compliant with privacy and security laws and regulations. This information may include immediate situational awareness notifications, reports, and conference calls during and after incidents, as well as more strategic analytic products that look at tactics, techniques, and procedures used during or lessons learned from an incident. In fiscal year 2016, I&A field-based personnel delivered 1,069 threat/intelligence briefings at the Unclassified/For Official Use Only and Law Enforcement Sensitive levels; responded to 1,091 requests for information regarding emerging incidents across the country; participated in 2,723 engagements with Federal and/or SLTTP partners; and produced 1,404 Intelligence Information Reports. In fiscal year 2015, we launched the Field Analysis Report (FAR), a new product line that incorporates views and assessments from SLTT partners with a National-level perspective on State-wide, regional, and National strategic intelligence issues. In fiscal year 2016, we published 52 FARs. Our new data cloud initiative, the DHS Data Framework, will improve data sharing across DHS and the Intelligence Enterprise, and fill critical gaps across the IC. We continue to enhance our relationship with fusion center directors, and with our SLTT law enforcement partners through our support of the National Network of Fusion Centers with people, Classified systems access, training, Federal grants, and security clearances. Through enhancement of the Homeland Security Information Network (HSIN), DHS has worked with the fusion centers to create a request for information tool called HSIN Exchange. That tool effectively links all 78 fusion centers to one another and the Terrorist Screening Center which will vastly increase the speed of information exchange during critical incidents. Additionally, DHS continues to utilize the HSIN National Situational Awareness Room as a platform to exchange information in real time with SLTT partners during special events and following incidents such as the Orlando, FL shooting. DHS is also partnering with 4 fusion centers to conduct secure video teleconferences for private-sector partners to provide threat briefings and roundtable discussions on protective measures. Question 8a. The fiscal year 2016 refugee ceiling is 85,000, with at least 10,000 of those individuals being Syrian. How many refugees has the Federal Government admitted to date this fiscal year? Answer. As of March 31, 2016, 29,055 refugees have been admitted to the United States. Question 8b. How many of those are Syrian? Answer. As of March 31, 2016, 1,285 Syrian refugees have been admitted to the United States. Question 8c. Do you face impediments to meeting this goal? Answer. The nature and location of refugee processing activities often lead to unexpected delays or cancellations, as overseas processing locations may have volatile security situations, host country processing limitations, or disease outbreaks. In addition, security vetting processing delays may be a potential impediment to meeting the stated program goals. However, the Department is working with its interagency partners to meet this goal, and fully anticipates that will we will be able to. Question 8d. What, if anything, can be done to overcome them? Please explain. Answer. Initiatives are underway to streamline processing and increase admissions, without compromising the security and integrity of the program, including: (1) Launching 2 ``surge'' operations--1 in Amman, Jordan (February-April) and the other in Tanzania/Uganda (April- June)--to interview large numbers of refugees likely to travel in fiscal year 2016, if approved; (2) detailing officers from other parts of USCIS to conduct and support refugee interviews while working to double the size of the Refugee Corps by fiscal year 2017; (3) adopting technological and procedural efficiencies; and (4) detailing personnel to address backlogs in security checks pending at the vetting agencies and review cases on hold for potential National security issues pending at USCIS. USCIS has also resumed interviewing refugee applicants in Lebanon. Question 9. Congress passed Pub. L. 113-277, the Border Patrol Agent Pay Reform Act of 2014, which was the result of negotiations between the House and Senate to address important issues to assess how applicants are chosen and retained for cybersecurity purposes in the Department, that bill requires you to report on how the Department plans to fulfill the critical needs of the Government to recruit and retain employees in qualified positions. Can estimate when we will receive these required reports? Answer. These reports remain a priority of the Department and we hope to have a finalized deliverable to Congress in the near future. We apologize for the delay and appreciate your patience. Question 10. In 2014, we saw a rise in calls for attacks on the homeland, military and law enforcement personnel, and other Government officials by ISIS and other terrorist organizations. You responded by initiating Operation Blue Surge--an unprecedented deployment of Federal law enforcement officers to Federal facilities throughout the country. I understand that FPS has maintained that operational tempo since. Now, FPS is seeking authority to increase the fees it charges tenant agencies in order to fund a new force dedicated to these rapid deployments. Should we expect this surge capacity to be the ``new normal''? Answer. In response to these threats, FPS is building the Rapid Protection Force (RPF). Some of these surge tasks, along with others, will be executed by the RPF and dramatically reduce the stress on the current force. FPS's new normal is operating in an expanded capacity to protect Federal facilities, rapidly respond to credible threats and support the recovery from high-consequence events when and where it matters. As the threat environment changes, so must FPS. Question 11. Mr. Secretary, we have had conversations about the 16- year class action lawsuit against the Secret Service. As you know, the Secret Service cannot fully turn the page to a new chapter on its diversity and cultural issues with this lawsuit hanging over its head. Mr. Secretary will you give me your commitment that you will seek a resolution in this lawsuit? Answer. I have been and remain committed to working in good faith to reach a fair resolution in this matter. Question 12. One of the primary concerns with the USSS is low morale and upper management. Please describe for the committee your plan address morale within the Service. Has any changes been implemented directly as it relates to recruitment, retention, and oversight of USSS management personnel? Answer. As part of its efforts to improve morale, the Secret Service has been working steadily to develop a comprehensive retention program aimed at enhancing morale for all employees. The agency has already implemented a retention bonus program for Uniformed Division officers, Tuition Assistance Student Loan Payback, and the reintroduction of the Senior Special Agent and Senior Resident Agent Programs. Other initiatives are in development for the larger workforce as well, such as child care subsidies, expanded telework and alternative work schedules, and an administrative, professional, and technical career progression plan. Additionally, legislative steps are being taken to address an Annual Leave pay-out option, Uniform Division step compression, and raising the annual pay cap. In addition, for special agents, a new Special Agent Career Progression Guidelines policy was developed to create greater balance between employees' work/life needs and the critical impact personnel constraints are having on our protective mission. The policy, published on September 1, 2015, reflects numerous business changes designed to provide: Increased awareness and notification of expected transfer to a protective assignment; firm, standard time frames (6 years) for protective assignments; increased flexibility in post-protection assignments; opportunities to specialize post-protection; and a more transparent and defined career progression and schedule that is clearly articulated in policy. Question 13. Director Clancy noted in his Senate Appropriations Committee testimony late last year that the Mayorkas Report on the September 2014 White House incursion made clear that inadequate training of Secret Service personnel contributed to the failures evident in this incident, and that the Secret Service has implemented new training programs to address these gaps. Have USSS and/or DHS leadership assessed the effectiveness of these training programs? Answer. Immediately after the September 2014 incident, the Secret Service responded by designing and implementing several new courses, as well as modifying the existing 3-day Mission In-Service Course curriculum for Uniformed Division members to address issues specific to White House security. These new courses are provided in addition to the regular weekly scheduled courses, which include: Multiple Protective Operations Cycle Training offerings for the Presidential and Vice Presidential details, as well as canine, emergency services, special operations, and hazardous material personnel; protective detail training courses; firearms re-qualifications on a quarterly and semi- annual basis; special team candidate programs; and advanced skill courses. Additionally, a 2-week on-the-job training program has been formally implemented for special agents immediately following their graduation from basic training. This program provides new special agents with additional protective experience and integrated training with Uniformed Division members and Secret Service special operations teams (e.g., counter assault, counter sniper, emergency response, and hazardous materials teams). The Secret Service continually develops, assesses, modifies, and enhances operational training, to include the aforementioned courses. The USSS also trains with outside entities, to include joint training exercises and table-top exercises with Federal, State, and local law enforcement as well as military partners. Evaluations are conducted on all basic training courses as well as on several advanced courses related to protective operations to identify any gaps in the curricula. Based on after-action reviews of the above training and personnel performance since the September 2014 incident, the enhanced training has been effective in preparing Secret Service personnel to meet the demands of the mission. Question 14a. Over the past 4 years, employees have left DHS at a rate nearly twice as fast as in the Federal Government overall and this trend is expected continue accelerating. The continuing stream of departures has at times hampered the Department's ability to fill critical positions in areas such as cybersecurity. Answer. For the past 4 years, the DHS attrition rate has been between 2 to 4 percentage points below the Government-wide attrition rate. Attrition for cyber positions tracks with the DHS overall attrition rate. The chart below identifies the Department's attrition rate compared to the Government-wide attrition rate. Chief Human Capital Officer Angela Bailey would be pleased to discuss the DHS attrition rate and what we are doing to address morale and engagement. ---------------------------------------------------------------------------------------------------------------- DHS Overall Attrition Government ---------------------------------------------------------------------------------------------------------------- Year Percent Year Percent ---------------------------------------------------------------------------------------------------------------- 2012................................. 7.5%................... 2012................... 11.5% 2013................................. 8.6%................... 2013................... 11.1% 2014................................. 7.7%................... 2014................... 10.9% 2015................................. 7.8%................... 2015................... 11.0% ---------------------------------------------------------------------------------------------------------------- Question 14b. In your perspective, what is causing the Department to rank so poorly in both morale and retention? Answer. DHS's 2015 Federal Employee Viewpoint Survey scores indicate that leadership (38 percent positive), performance management (38 percent positive) and communications (44 percent positive) are key issues driving overall morale scores. Percent positive represents the percent of respondents who answered ``agree'' or ``strongly agree'' to questions related to these subject areas. We are undertaking a concerted effort to improve employee morale and are implementing an action plan focused on: 1. Selecting and empowering high-performing leaders: 2. Developing excellent leaders at all levels; and 3. Enhancing communication. Question 14c. Are you concerned with employees' views about the lack of management accountability? Answer. Yes. To address concerns about a lack of accountability for engagement, DHS enhanced the performance work plans of senior executives by adding an evaluation measure on engagement. I personally informed all SES of this and I am holding my direct reports accountable for efforts to improve employee engagement and morale. Question 14d. Please describe the Department's strategy to improve the morale, retention, and recruitment of top talent. Answer. As described above, DHS has been aggressively implementing a Department-level employee engagement action plan. In addition to Department-level action, all component heads have executed employee engagement action plans, based on a root cause analysis of their survey data, at the component level and below, since local solutions are the most powerful. With focused action at the Department, component, executive, supervisory, and employee levels, we are confident that over time morale and engagement will improve. The Deputy Secretary and I recently completed an employee engagement listening tour, during which we held Town Halls, roundtables, and personally met thousands of our employees in duty locations across the country. Throughout my tenure I have made meeting with employees a top priority in order to recognize their service, express appreciation for their hard work, and answer any questions they wish to pose to leadership. DHS is also improving training to ensure that everyone from employees to senior leaders understands the importance of creating conditions for engagement--empowering employees in the execution of the mission, rewarding outstanding performance, and supporting employee work-life balance. Question 15a. Secretary Johnson, Under Secretary Deyo and Deputy Under Secretary Chip Fulghum have made improved acquisition performance one of the Management Directorate's ``Integrated Priority Areas'' for 2015-16. Could you cite an example of an early-stage acquisition, i.e. a program which has not yet completed Acquisition Decision Event IIA, which has benefitted from this renewed emphasis in the Management Directorate? Answer. FEMA's Grants Management Modernization (GMM) Program and National Flood Insurance Program (NFIP) are excellent examples where DHS senior leadership's focus on improving acquisition performance has made a difference. Significant efforts were expended by the Office of Program Accountability and Risk Management (PARM), the Office of the Chief Information Officer, the Office of the Chief Financial Officer, the Office of the Chief Procurement Officer, the Joint Requirements Council, the Science and Technology Directorate and FEMA's Component Acquisition Executive (CAE) staff to support the program management offices during the Need phase of the acquisition. The primary goal of these early engagements was to prepare the program offices for Acquisition Decision Event 1 and beyond by increasing the program offices' attention to cost, schedule, and performance parameters, ensuring appropriate program office staffing, supporting the development of documentation, defining sound risk management and following thorough review processes, both within FEMA and at the Management Directorate level. This team approach to problem solving was beneficial in that it allowed for a quicker resolution of issues by all stakeholders and enabled the programs to successfully complete Acquisition Review Boards without any major issues and in a more timely fashion. The teams are continuing to work together to support the programs as they move toward Acquisition Decision Event 2. GMM and NFIP acquisition activities to date validate the importance of DHS senior leadership's emphasis on improved acquisition performance. Question 15b. Could you cite an example of a post-ADE IIA program which has similarly benefitted from Mr. Deyo's and Mr. Fulghum's efforts? Answer. The Transportation Security Administration's Technology Infrastructure Modernization is one example. This program reduces the probability of a terrorist attack on the transportation sector by replacing legacy vetting systems with a person-centric system. This eliminates exploitable gaps, improves enrollment and threat assessment methodologies, and enables the Transportation Security Administration (TSA) to vet and provide credentials to more transportation populations. The Technology Infrastructure Modernization (TIM) System provides an integrated, end-to-end solution to manage identities, credentials, and assessment results for millions of transportation workers, providing more accurate and timely identification of terrorist threats. TIM provides a service-oriented architecture framework, mission services, and service capabilities This program reported a schedule breach on September 4, 2014. The causal factors for the breach were: (1) Changes to the scope of the surface population; (2) late adoption of the TIM system in the adjudication center; and (3) challenges encountered during preparations for operational testing. Due to continuing technical challenges, the program was directed to stop all planning and development efforts related to the Surface and Aviation segments until notified by an ADM dated January 9, 2015, thereby pausing the program. Another ADM was issued on April 10, 2015, directing the program to perform all necessary work to re-baseline the program and brief the Acquisition Review Board (ARB) on the re-baseline plan. During the planning for the ARB on September 15, 2015, it was decided that the TIM DHS ARB would be postponed for approximately 30 days to allow the DHS Chief Information Officer (CIO) to assess the proposed TIM technical approach. In October 2015, the DHS CIO reported that he could not support the TIM program's technical approach to re-baseline the program and deliver the remaining capability. An ADM was then issued on November 30, 2015 directing the DHS CIO to form and lead an Integrated Project Team (IPT) to develop a new strategy and technical approach. This new strategy and technical approach will be captured in a detailed report that will be submitted to the Acquisition Decision Authority. DHS is addressing the above cost, schedule, and performance delays through an aggressive IPT. The results of this IPT and the recommended way ahead will be captured and subsequent direction provided through ARBs where ADMs will be issued to provide specific direction to the program and stakeholders that were designed to get the program back on track. The goal of this approach is the identification of a solution that will stay within the program's funding profile. Question 16. Secretary Johnson, please provide the committee with a ``Unity of Effort'' perspective on the Department's management of its real-property portfolio, from progress on the transition to St. Elizabeths, to any steps planned following the field-efficiency pilot studies, to how this year's budget will enable the Federal Protective Service to contribute to your plans for reorganization of the National Protective and Programs Directorate. Answer. A key initiative for Unity of Effort, Field Efficiencies entails the review of 10 regions where DHS has a large operational presence to identify opportunities for achieving mission requirements more efficiently. Representatives from components that operate in each of the regions collaboratively identify opportunities and make recommendations for how DHS can better utilize assets and share resources. These opportunities and recommendations are generated in regional integration meetings that are facilitated by the DHS Office of the Chief Readiness Support Officer. Following the regional meetings and data-gathering phase, a final report for the Field Efficiency recommendations will be completed in July 2016. As we have seen in our regional meetings thus far, we expect the recommendations will be very diverse. Some will be fairly easy to implement with minimal investment required, while some others may take several years and involve up-front investments. For recommendations regarding real property, we must consider the timing of lease expirations so we are working closely with General Services Administration to plan next steps. The Enhanced Headquarters Consolidation Plan also contributes to Unity of Effort by consolidating leadership, policy, management, and operations on the St. Elizabeths West Campus. The plan reduces our 50 scattered locations in the National Capital Region down to 6 to 8. Phase 1 of the St. Elizabeths development (USCG Headquarters) was completed on schedule/budget for the portions funded by Congress. Phase 2 (Renovation of the Center Building) was awarded on-budget, and construction is progressing on schedule for a late 2017 construction completion/early 2018 move-in for the Department's executive leadership and management. The Fiscal Year 2016 Consolidated Appropriations Act fully funds the next phases of development (Management Directorate, OHA, S&T, and DNDO). The full development of St. Elizabeths will save the Department $1.2 billion present value over 30 years, as compared to the best available commercial lease alternative. The Enhanced Plan delivers the goals of the original consolidation plan at a lower cost and in a shorter time frame than the original program of record by adopting more efficient space standards, implementing flexible workplace strategies and realigning the lease expirations to the development schedule. Question 17. Under current legal authorities and the Department's own Acquisition Management Directive (MD-102), do you and your Chief Acquisition Officer, Under Secretary Deyo, have the tools you need to ensure that acquisition executives and program offices throughout the Department follow best practices for active management of risks to timely and cost-effective acquisition of validated operational capabilities? Answer. The Chief Acquisition Officer (CAO) currently has the authorities necessary to ensure that acquisition executives and program offices follow Departmental policies. The Department has policies and procedures that limit cost overruns and schedule delays. First and foremost, the Department established Acquisition Management Directive (MD) 102-01, and most recently revised the directive in July 2015. MD 102-01 establishes the Acquisition Lifecycle Framework (ALF) and the Systems Engineering Lifecycle (SELC) by which the Department governs and oversees its acquisition programs. Further, it establishes the Acquisition Review Board, as well as the roles and responsibilities of its chair (the Chief Acquisition Officer/Under Secretary for Management), its members (Under Secretary for Science and Technology, General Counsel, Assistant Secretary for Policy, Chair of the Joint Requirements Council (JRC), the Executive Director of the Office of Program Accountability and Risk Management (PARM), and Management line of business chiefs), and other acquisition stakeholders (including Component Acquisition Executives (CAE) and Program Managers). The ARB reviews each program's planning and acquisition documentation in accordance with MD 102-01, at predefined milestones called Acquisition Decision Events (ADE). At each ADE, the CAO, supported by the ARB, determines the program's readiness to progress to the next phase of the acquisition life cycle. Each major program must have an Acquisition Program Baseline (APB)--approved Acquisition Decision Authority (ADA). The baseline is informed by: (1) A Chief Financial Officer approved life-cycle cost estimate, (2) JRC-validated operational requirements, and (3) the program's schedule. The APB establishes the cost, schedule, and performance threshold values of the program, which are monitored by the program, component, and headquarters through program Full Operating Capability delivery. The APB also contains a Program integrated master schedule, which is assessed for adequacy and realism during the ADE review and approval process. If a key schedule date is missed, this can trigger an inquiry into program status and if issues are identified, corrective action can be taken earlier to minimize the extent of schedule delays and cost overruns. Additionally, at each ADE, starting at ADE-2A, a memorandum certifying sufficiency of funding by the component's Senior Financial Officer is required. This certified assertion ensures the program is adequately funded as it moves through the acquisition process. Further, the Department implemented the Federal Information Technology Acquisition Reform Act (FITARA) through MD 102-01 requiring the Chief Information Officer to conduct an IT assessment and approve the IT aspects of the programs prior to ADE-2A approval. Inside the component-level are CAO-designated CAEs who support overseeing major acquisition programs. Each CAE is also responsible for component-level acquisition policy and serves as the Acquisition Decision Authority for component-level/non-major acquisitions. In September 2014, the Department further defined and clarified the roles and responsibilities of the CAEs in the memo, Unity of Effort Acquisition Review--Component Acquisition Executive Policy. In certain cases, the CAO has established Executive Steering Committees (ESC), made up of component and Headquarters executives, to provide additional support to programs between the ADEs. These ESCs do not hold ADEs, instead they provide guidance and support throughout the life of the acquisition program, especially when programs begin to deviate from the defined cost, schedule, and performance parameters. ESC actions minimize cost overruns and schedule delays. In addition to the acquisition policies and procedures, as part of the Secretary's Unity of Effort initiative, the Department established a Joint Requirements Council (JRC). The JRC provides oversight of the DHS requirements generation process, harmonizes efforts across the Department and supports prioritized funding recommendations. Sound, component-driven capability analysis and operational requirements generation is an extremely important first step in limiting cost overruns and schedule delays. The establishment of the JRC and improvements in the operational requirements development process is expected to provide a solid foundation on which to support follow on acquisition. The Department-approved JRC policy in February 2016. Through acquisition policies, oversight bodies, and review procedures DHS aggressively works to limit cost overruns and schedule delays. Question 18. In 2011, DHS completed a Human Capital Segment Architecture Blueprint as well as developed a Comprehensive Future State Plan that redefined the HRIT investment scope and implementation time frames. The blueprint also articulated 15 strategic improvement opportunity areas. The Department has fully implemented only 1 of these opportunity areas and has made limited progress in HRIT implementation. It appears these documents are merely paper exercises and do not have real meaning and merit. Please explain to the committee your intention to utilize these blueprints and plans and how you plan to fully implement the remaining 14 strategic improvement opportunity areas. Answer. The Strategic Improvement Opportunities (SIOs) from the 2011 architecture was a roadmap from which DHS could select projects as resources were available based on then-current priorities. The original plan was too expansive and included 80 potential SIOs. These SIOs have been re-baselined and evaluated. Current program milestones are the following: The Capability Analysis Study Plan (CASP) was approved by the JRC intake process in February. The draft HC Capability Analysis Report (CAR) was completed by the end of April. The CAR will outline future requirements for Human Capital and the final draft will update the HCSA Blueprint. The study was conducted by OCIO/Enterprise Architecture in conjunction with the HRIT Advisory Team and Human Capital subject-matter experts from OCHCO and the components. The HC CAR and HCSA Blueprint were approved by the HRIT Executive Steering Committee and the HC CAR was submitted to the Joint Requirements Council. The analysis undertaken with the CAR and the re-baselining of the existing HCSA resulted in a reduction to 9 SIOs. These SIOs belong with a prioritized time line for implementation have been approved by the HRIT ESC and the ARB by the April 30 time line. The top 9 SIOs that will be the focus of planning in fiscal year 2017 are as follows: 1. End-to-End Hiring--Talent Acquisition: Assess current systems for cost savings/features & benefits 2. End-to-End Hiring--Workforce Planning: Obtain systems improvements and capabilities 3. End-to-End Hiring--Security Classification/Background Investigation 4. Learning Management: Finish current planned implementations 5. Data Management & Sharing--Enterprise HC Reporting and Analysis: Automate the Time-to-Hire reporting 6. On-boarding Process & Off-boarding Process: Implement to include identity based Access Life-cycle Management integration into End-to-End hiring 7. Performance Management: Implement pilot in fiscal year 2016, hold full implementation until fiscal year 2017 pending results 8. HR Document Management: Identify requirements for case management vs. document management 9. Payroll Action Processing: Complete with the implementation CBP on WebTA. [all]