[House Hearing, 109 Congress]
[From the U.S. Government Publishing Office]



                   BUILDING THE INFORMATION ANALYSIS
                    CAPABILITY OF THE DEPARTMENT OF
                           HOMELAND SECURITY

=======================================================================

                                HEARING

                               before the

               SUBCOMMITTEE ON INTELLIGENCE, INFORMATION
                 SHARING, AND TERRORISM RISK ASSESSMENT

                                 of the

                     COMMITTEE ON HOMELAND SECURITY
                        HOUSE OF REPRESENTATIVES

                       ONE HUNDRED NINTH CONGRESS

                             FIRST SESSION

                               __________

                           FEBRUARY 16, 2005

                               __________

                            Serial No. 109-2

                               __________

       Printed for the use of the Committee on Homeland Security
                                     
[GRAPHIC] [TIFF OMITTED] TONGRESS.#13

                                     
 Available via the World Wide Web: http://www.access.gpo.gov/congress/
                                 house


                               __________

                    U.S. GOVERNMENT PRINTING OFFICE
20-542                      WASHINGTON : 2005
_____________________________________________________________________________
For Sale by the Superintendent of Documents, U.S. Government Printing Office
Internet: bookstore.gpo.gov  Phone: toll free (866) 512-1800; (202) 512�091800  
Fax: (202) 512�092250 Mail: Stop SSOP, Washington, DC 20402�0900012005


                     COMMITTEE ON HOMELAND SECURITY

                 Christopher Cox, California, Chairman

Don Young, Alaska                    Bennie G. Thompson, Mississippi
Lamar S. Smith, Texas                Loretta Sanchez, California
Curt Weldon, Pennsylvania, Vice      Edward J. Markey, Massachusetts
Chairman                             Norman D. Dicks, Washington
Christopher Shays, Connecticut       Jane Harman, California
Peter T. King, New York              Peter A. DeFazio, Oregon
John Linder, Georgia                 Nita M. Lowey, New York
Mark E. Souder, Indiana              Eleanor Holmes Norton, District of 
Tom Davis, Virginia                  Columbia
Daniel E. Lungren, California        Zoe Lofgren, California
Jim Gibbons, Nevada                  Sheila Jackson-Lee, Texas
Rob Simmons, Connecticut             Bill Pascrell, Jr., New Jersey
Mike Rogers, Alabama                 Donna M. Christensen, U.S. Virgin 
Stevan Pearce, New Mexico            Islands
Katherine Harris, Florida            Bob Etheridge, North Carolina
Bobby Jindal, Louisiana              James R. Langevin, Rhode Island
Dave G. Reichert, Washington         Kendrick B. Meek, Florida
Michael McCaul, Texas
Charlie Dent, Pennsylvania

                                 ______

 Subcommittee on Intelligence, Information Sharing, and Terrorism Risk 
                               Assessment

                   ROB SIMMONS, Connecticut, Chairman

CURT WELDON, Pennsylvania            ZOE LOFGREN, California
PETER T. KING, New York              LORETTA SANCHEZ, California
MARK E. SOUDER, Indiana              JANE HARMAN, California
DANIEL E. LUNGREN, California        NITA M. LOWEY, New York
JIM GIBBONS, Nevada                  SHEILA JACKSON-LEE, Texas
STEVAN PEARCE, New Mexico            BOB ETHERIDGE, North Carolina
BOBBY JINDAL, Louisiana              JAMES R. LANGEVIN, Rhode Island
DAVE G. REICHERT, Washington         KENDRICK B. MEEK, Florida
CHARLIE DENT, Pennsylvania           BENNIE G. THOMPSON, Mississippi 
CHRISTOPHER COX, California (Ex      (Ex Officio)
Officio)

                                  (II)


                            C O N T E N T S

                              ----------                              
                                                                   Page

                               STATEMENTS

The Honorable Rob Simmons, a Representative in Congress From the 
  State of Connecticut, and Chairman, Subcommittee on 
  Intelligence, Information Sharing, and Terrorism Risk 
  Assessment.....................................................     1
The Honorable Zoe Lofgren, a Representative in Congress From the 
  State of California, and Ranking Member, Subcommittee on 
  Intelligence, Information Sharing, and Terrorism Risk 
  Assessment.....................................................     2
The Honorable Christopher Cox, a Representative in Congress From 
  the State of California, and Chairman, Committee on Homeland 
  Security.......................................................     4
The Honorable Bennie G. Thompson, a Representative in Congress 
  From the State of Mississippi, and Ranking Member, Committee on 
  Homeland Committee.............................................     5
The Honorable Charlie Dent, a Representative in Congress From the 
  State of Pennsylvania..........................................    19
The Honorable Bob Etheridge, a Representative in Congress From 
  the State of North Carolina....................................    17
The Honorable Peter T. King, a Representative in Congress From 
  the State of New York..........................................    16
The Honorable James R. Langevin, a Representative in Congress 
  From the State of Rhode Island.................................    20
The Honorable Sheila Jackson-Lee, a Representative in Congress 
  From the State of Texas........................................    25
The Honorable Daniel E. Lungren, a Representative in Congress 
  From the State of California...................................    22

                                WITNESS

Lieutenant General Pat Hughes, (Retired), Acting Under Secretary, 
  Information Analysis and Infrastructure Protection, Department 
  of Homeland Security
  Oral Statement.................................................     6
  Prepared Statement.............................................     7

                                APPENDIX
                   Material Submitted for the Record

Questions and Responses submitted by the Honorable Bennie 
  Thompson.......................................................    31

 
                   BUILDING THE INFORMATION ANALYSIS
           CAPABILITY OF THE DEPARTMENT OF HOMELAND SECURITY

                              ----------                              


                      WEDNESDAY, FEBRUARY 16, 2005

                     U.S. House of Representatives,
          Subcommittee on Intelligence, Information
            Sharing, and Terrorism Risk Assessment,
                            Committee on Homeland Security,
                                                     Washington, DC
    The subcommittee met, pursuant to call, at 2:06 p.m., in 
Room 1334, Longworth House Office Building, Hon. Rob Simmons 
[chairman of the subcommittee] presiding.
    Present: Representatives Simmons, King, Lungren, Pearce, 
Dent, Cox, Lofgren, Etheridge, Langevin, Thompson, and Jackson-
Lee.
    Mr. Simmons. [Presiding.] The Subcommittee on Intelligence, 
Information Sharing, and Terrorism Risk Assessment will come to 
order.
    The subcommittee is meeting today to hear testimony on how 
the fiscal year 2006 Department of Homeland Security budget 
request helps further the information sharing and analysis 
capabilities of the Department of Homeland Security. I am told 
that we only have this room until 4:00 p.m., 1600 hours, today, 
so I will be short in my comments, and then we will try to 
extend to all members the opportunity to ask questions, but 
also remind them that the room will be made available to 
another group at 4 p.m.
    I would like to recognize myself for an opening statement. 
As we begin this first hearing of the Committee on Homeland 
Security, Subcommittee on Intelligence, Information Sharing and 
Terrorism Risk Assessment, I would like to start by thanking 
the Chairman, Chairman Cox, for his leadership in helping to 
establish the full committee as a standing committee of 
Congress. I look forward very much to working with my 
colleague, Representative Lofgren from California, as the 
Ranking Member of the subcommittee, and also the Ranking Member 
of the full committee, Representative Thompson, who is with us 
here today.
    I represent the Second District of Connecticut. On 
September 11, we lost 12 friends and neighbors. On September 
11, we all failed in our constitutional responsibility to 
provide for the common defense. This subcommittee has a vital 
role to build our capabilities in intelligence, information 
sharing and risk assessment to help prevent another terrorist 
attack.
    I would also like to make a second point. I believe in 
bipartisanship when it comes to national security and homeland 
security. When I joined the U.S. Army almost 40 years ago, I 
put these dog tags around my neck. I wore them until I retired 
from the U.S. Army Reserve in the year 2003. These dog tags 
have my name on them, my serial number, my blood type and my 
religion, but there is no mention of party affiliation. During 
my years of public service, I have tried to be bipartisan. I 
look forward to conducting the work of this subcommittee in a 
bipartisan fashion.
    Information analysis and warning is perhaps the most 
important capability of the Department of Homeland Security. 
Intelligence must drive our protection decisions, resource 
allocations, and homeland security priorities. Since its 
inception in March 2003, the Department of Homeland Security 
has worked to construct a robust analytical capability and has 
dedicated itself to fulfilling the broad statutory functions 
outlined in the Homeland Security Act. The committee is 
encouraged by the progress to date, but there is a lot more 
work to do, and the responsibility for that work falls on us.
    General Hughes, you have some challenges and opportunities 
ahead of you. The Intelligence Reform and Terrorist Prevention 
Act of 2004 created a Director of National Intelligence and a 
National Counterterrorism Center. This new reality will require 
the office of Information Analysis of DHS to adjust to a new 
operating environment. IA must take this opportunity to 
continue to build on its initial progress and construct a fully 
functioning and operational Intelligence Community component, 
while ensuring that DHS maintains the vital link to its state 
and local partners, and also ensuring that as we work to 
protect the freedom and security of our homeland, we also 
continue to protect and preserve our civil liberties.
    The partnerships that you have engaged in have led to 
central communications links between the federal government and 
state, local, tribal and private sector officials. These links 
help to ensure that the men and women on the frontlines in the 
fight to protect our homeland have the essential information 
they need to help prevent another terrorist attack. I hope your 
testimony today will address how these links and partnerships 
are being strengthened and refined to help keep America safe.
    I welcome you, General Hughes, to the subcommittee today. I 
also want to thank you, as somebody who has also worn the 
uniform for, in my case, 37 years, 7 months, and 24 days, but 
who is counting. When you are having a good time, you do not 
count it all up. But I want to thank you for your very 
distinguished service to our country. I look forward to hearing 
your testimony.
    I would like now to recognizing the Ranking Minority Member 
of the subcommittee for any statement that she may wish to 
make.
    Ms. Lofgren. Thank you, Mr. Chairman. Thank you for calling 
this hearing to discuss the proposed fiscal year 2006 budget, 
building the information analysis capability of the Department 
of Homeland Security.
    Mr. Chairman, I look forward to working with you. I hope to 
be able to have a good, productive and professional 
relationship on this subcommittee, as I enjoyed in the last 
Congress with Chairman Thornberry. That was a very rewarding 
experience for me, and I think for Chairman Thornberry.
    We worked together as a team. We developed our hearings 
together. We decided our witnesses together. We wrote bills 
together. In the end of the Congress, we issued not a majority 
report and a minority report, but we issued one report from our 
committee. I hope that we will have that same level of success 
in standing up for our country and making sure that we are 
facing.
    General Hughes, I welcome you and I look forward to hearing 
your testimony, as we work with you as we seek to empower the 
critical exchange of information within the Department of 
Homeland Security. You have a difficult task, and I hope that 
the subcommittee will be able to help you as you work to 
enhance the department's capability to collect, aggregate, 
analyze and share information.
    I understand your office is responsible for four specific 
tasks: analyzing and mapping terrorism threat intelligence to 
vulnerabilities in the nation's critical infrastructure; 
sharing information with state and local governments and at 
times with the private sector on the public information 
concerning terrorist threats; meeting operational efforts 
regarding the homeland security advisory system; and providing 
intelligence analysis to senior DHS officials.
    As you may know, I served for 14 years on the Board of 
Supervisors for in Santa Clara County, so I have a very keen 
interest in how information is shared with local governments so 
that they can take appropriate action. I am also very 
interested in how we have assessed what is vulnerable so that 
we can effectively map the threats that we discover.
    Finally, I do not want to be a nag, but I am going to raise 
it anyhow. This is your first meeting before us and so I am 
going to cut a little slack to the department, but there is a 
Committee Rule, rule 11(j), that requires witnesses to have 
their statements to the committee in advance of the actual 
hearing. It is 48 hours that testimony is to be submitted, and 
we received your testimony just 4 hours ago.
    So this is not a senseless rule. I like to read the 
testimony before I come to a hearing and have the staff analyze 
it, and receiving it 4 hours in advance of a hearing just does 
not permit that. If we are going to do our job well, you need 
to help us by complying with that rule. So I hope I will never 
have to refer to that rule again, and I look forward to your 
testimony.
    Thank you, Mr. Chairman.
    Mr. Simmons. Thank you. That is a good and a useful comment 
to make.
    I would now like to recognize the Chairman of the full 
committee, the gentleman from California, Mr. Cox, who I just 
mentioned a few minutes ago has played an historic role, a 
truly historic role, in bringing about a full Committee on 
Homeland Security.
    I believe the reorganization of our government over the 
last several years is the largest reorganization we have 
encountered since World War II, with the National Security Act 
of 1947 and the creation of the Department of Defense. With 
that massive reorganization goes a requirement to oversee the 
Department of Homeland Security.
    Chairman Cox has been a critical component in making sure 
that the Congress lives up to its obligations in these 
difficult, historic times.
    Mr. Chairman?
    Mr. Cox. Thank you, Mr. Chairman.
    I want to begin by welcoming Chairman Simmons to this 
subcommittee. We are picking up the work that was carried on in 
the Select Committee on Homeland Security during the last 
Congress. I do not think there is any question that by 
background, Congressman Simmons is well suited to chair this 
subcommittee. I do not think there is any question either that 
Zoe Lofgren of California is very able and equipped to serve as 
our Ranking Member on this subcommittee.
    General Hughes, as you know, we have been on this 
committee, at least as it was constituted in the last Congress, 
aggressive supporters of your responsibilities in the 
Department of Homeland Security. Since the last Congress, we 
have enacted legislation creating a national Intelligence 
Director and creating the NCTC that will have profound impacts 
on the Information Analysis responsibility within the 
Department of Homeland Security.
    I note that this is not a packed hearing room and it is in 
some senses ironic because I do not believe we will ever focus 
on anything that is more central to the government's 
responsibility in protecting Americans from terrorism than what 
we are going to be talking about today. So to those of you are 
here, you are involved in a very important undertaking on 
behalf of our country.
    The Homeland Security Act of 2002 gave the department a new 
overriding counterterrorist mission that had not previously 
been the job of any part of the federal government. It sought 
to enable to department's success in this new mission through a 
Directorate of Information Analysis and Infrastructure 
Protection. The information analysis portion of that 
directorate is the intelligence piece overview with prevention, 
particularly when it comes to the eventual threat of terrorists 
armed with nuclear weapons, not dirty bombs, but real nuclear 
weapons, or terrorists armed with bio-weapons, particularly 
bio-engineered weapons that are designed to be resistant to 
antidotes and vaccines that we might have stockpiled. There can 
be no overstating the importance of prevention. That is what 
this is all about.
    During the Cold War, I think we understood that dealing 
with the response and recovery from a nuclear exchange was not 
plan A, plan B, or plan C. We were very much focused on 
avoiding that nuclear exchange. Likewise, the prospect that 
terrorists might apply weapons of mass destruction now or in 
the future has to cause us to focus enormous attention on 
prevention. That is what we hope, notwithstanding the passage 
of the 9/11 Commission Recommendations Implementation Act, we 
can continue to do under the legal mandate of the Homeland 
Security Act.
    The memorandum of understanding on information sharing of 
March 2003 was a truly unprecedented undertaking between the 
Attorney General, the Director of Central Intelligence, and the 
Secretary of Homeland Security. Its purpose is to move 
information along and through these three communities free of 
the longstanding constraints that existed prior. There are some 
signs that are less encouraging or convey a mixed message about 
our potential to achieve what we envisioned when we wrote the 
Homeland Security Act and in passing the law in 2002, and when 
this memorandum was agreed to in 2003.
    I hope today, General Hughes, that we have the opportunity 
to understand from you exactly where we are headed and whether 
we have the resources to get there.
    I thank you, Mr. Chairman.
    Mr. Simmons. I thank you for your comments.
    Now, the Chair would like to recognize the Ranking Member 
of the full committee, Mr. Thompson from Mississippi.
    Mr. Thompson. Thank you, Mr. Chairman. I am appreciative of 
you calling this hearing at this time. Even though we cannot 
discuss the numbers for this department in open session, I 
think there are some issues that we need to get on the table 
real quick for the sake of the public.
    I guess about 2 months ago, Ms. Lofgren and I had an 
opportunity to look at the vulnerabilities of our 
infrastructure by state. We were somewhat dismayed, Mr. 
Chairman, at how inconsistent that list was by state, and we 
are really concerned that somehow we have to have some 
standardization associated with that infrastructure list. As I 
understand it, there are some 85,000 vulnerabilities identified 
from miniature golf courses to shopping centers and what have 
you. But I am concerned about it, and I want to make sure that 
we address it this year so that we all, as members of this 
committee, can feel comfortable that those critical 
infrastructures in our districts clearly are being identified 
so that they can be protected.
    In addition to that, I am concerned about this information 
sharing across the board, whether or not we have satisfactorily 
changed the culture of the department so that they are actually 
talking to each other. We hear comments all along about 
departments being territorial with their information, and if we 
are indeed protecting the homeland. We ought to make sure that 
all those agencies involved in protecting us are communicating 
with each other. So I look forward to this hearing and many 
more around this subject. Obviously, I look forward to your 
testimony, General Hughes.
    Thank you very much.
    Mr. Simmons. I thank the gentleman for his comments. As 
somebody who worked for the CIA for 10 years, and then finally 
in military intelligence for over 30 years, sharing information 
is a hugely important issue. Security is important, but a 
perfectly secure piece of information which is not disseminated 
is of no use. So what we have to do is come up with a balancing 
act. We have to balance the needs for security with the needs 
for sharing so that we can better protect the American 
homeland. So that is a very good point.
    General Hughes, thank you again for coming before the 
subcommittee today. I will apologize to you in advance. I will 
have to vacate myself from the chair in a few moments to meet 
with the Secretary of the Navy in a prior commitment. I trust 
that our distinguished full committee Chairman will be able to 
carry on in my absence. I will be back as soon as possible. 
Thank you for being here today, and we look forward to hearing 
your testimony.

   STATEMENT OF LIEUTENANT GENERAL PATRICK HUGHES (RETIRED), 
     ACTING UNDER SECRETARY FOR INFORMATION ANALYSIS, AND 
    INFRASTRUCTURE PROTECTION, AND ASSISTANT SECRETARY FOR 
                      INFORMATION ANALYSIS

    Lieutenant General Hughes. Thank you very much. I am glad 
to be here today, too. I may have been the victim of a 
biological attack before coming here. I am a little ill.
    Mr. Simmons. Spread it around.
    Lieutenant General Hughes. I am trying not to. I hope you 
will forgive me if I have to cough or blow my nose or 
something. My apologies.
    I liked your opening comments very much. I, too, have worn 
a set of dog tags around for a long time, and have the same 
frame of reference. I note that this is quite different, 
however. I did not realize, I don't think, before I came to the 
Department of Homeland Security how different it is to come 
into my office in the morning and find myself examining a map 
of the United States and operating in the construct of our 
national values and civil liberties and rights of American 
citizens, as compared to the military application of force in 
an overseas environment. It is quite interesting to me, and has 
caused me to have to shift to some degree my mind set.
    I think I would like to apologize to the Congresswoman for 
the delay in our testimony getting here. I would merely say we 
did submit it on time, but the clearance process did not 
respond. We will do our best, though, and your point is not 
only well taken, but understood. So thank you very much.
    I believe from your comments and Ms. Lofgren's comments and 
others that I have to clear the air here. Otherwise, I will 
proceed in this hearing under false pretenses. My last day on 
this job will be March 15. You are speaking to someone who will 
not be carrying out for the most part many of the hopes and 
dreams that you have as a federal official, but in my future I 
will continue to support the Department of Homeland Security, 
and I will do everything I can to support the government in the 
future. I would just like you to know that, because it sounded 
like in your comments you did not know that, and you expected 
me to be continuing in this job. I hope that is not too much of 
a surprise to you.
    Mr. Simmons. Well, you are on the hot seat right now, so 
let's just keep you there until you disappear.
    Lieutenant General Hughes. That is fine. I am not trying to 
avoid anything. I merely want you to know my tenure here is 
relatively short. I would be glad to answer questions about 
that, if you would like me to include any ideas I might have 
about my replacement.
    The last comment I would like to make to you all is that I 
have lived through the last year and a few months with you. I 
have come before you on a few previous occasions formally and 
several times informally. I have appreciated every opportunity 
I have had to talk with you and interact with you. I can look 
you directly in the eye and tell you that we have made 
progress. We have made a lot of progress. In some cases, it is 
not smooth or very attractive, but it is real. We are 
continuing that progress. The dedication and devotion of the 
people who are carrying out the work of the Department of 
Homeland Security, if you have that in your mind, you can never 
be in doubt.
    We do require guidance and direction and we do require 
measuring and rating at times, and we do require a steward and 
admonition and wisdom from others. But the heart, the spirit, 
the devotion and the dedication to duty is present in all of 
those who serve in this department.
    Thank you very much. I will be happy to answer questions 
you ask.
    [The statement of Lieutenant General Hughes follows:]

                PREPARED STATEMENT OF PATRICK M. HUGHES

    Good morning Chairman Simmons, Congresswoman Lofgren and 
distinguished Members of the Committee. It is a pleasure to appear 
before you today to discuss the Information Analysis (IA) capability of 
the Department of Homeland Security (DHS). This time of year marks the 
two-year anniversary of the actual ``stand up'' of the Department. We 
have really been able to support the intelligence and information needs 
of the Department for about 13 months. As we transition much of the 
senior leadership of the Department and as we anticipate the arrival of 
our new Secretary, we clearly intend to work to improve our 
capabilities, but it is important to acknowledge the tremendous efforts 
of the many individuals who have worked tirelessly to bring together a 
functional and effective intelligence support organization. I want to 
specifically mention the extraordinary men and women of the Information 
Analysis and Information Protection Directorate (IAIP) with whom I am 
so proud to have served. These superb professionals, laboring often in 
the background, are focused on the business of the Department and the 
Nation because they are 100 percent committed to our mission and our 
Nation's security. Judging from the feedback I have personally 
received, and according to my professional judgment, we--they--are 
making a difference with our effort to provide accurate, timely, 
actionable, and cogent information to the customers we serve.
    It is also important to recognize the impressive strides made in 
the area of information sharing, collaboration and cooperation at the 
Federal level. We have worked hard to develop more robust and 
deliberate interaction with our Federal partners, particularly with the 
Federal Bureau of Investigation. Our joint efforts with the National 
Counterterrorism Center (NCTC), our relationships with DOD and the 
Central Intelligence Agency (CIA) and other key departments, such as 
Justice, State, and Energy, have greatly advanced our collective 
capabilities and relationships. Our current information sharing and 
collaboration environment within the government is far superior to that 
which existed before the establishment of DHS and has notably improved 
during the past year. We look forward to the advent of the Director of 
National Intelligence and continuing progress throughout the 
intelligence community.
    Our efforts to build a DHS intelligence capability are oriented 
around three overarching imperatives. These are: building and expanding 
capacity within the Department; furthering our coordination and liaison 
efforts with all of our stakeholders, domestic and foreign, government 
and non-government; and, creating and distributing the work products 
that will ensure we all have the right information, at the right time, 
in the right way. . . to protect and preserve. In short, we are doing 
our job supporting the Department of Homeland Security and in my view 
doing it well.
    As we evaluate and assess the roles and mission of the Office of 
Information Analysis (IA), I believe we must acknowledge IA's role 
within the broader construct of DHS. IA should be considered the Office 
of Intelligence for the Department. This essential function will 
include building out the intelligence infrastructure for DHS 
Headquarters and ensuring the establishment of common Intelligence 
Community (IC) standards that apply to the ``intelligence elements'' of 
the ``components'' of DHS. The 9/11 Commission Report specifically 
cited the continuing need to assimilate and analyze information from 
DHS' own components. IA needs to better integrate, coordinate, 
correlate and fuse these activities and the intelligence information 
they produce, in partnership with all component intelligence elements. 
IA, acting as the Departmental intelligence office, is developing a 
plan for the integration and collective application of all DHS 
component intelligence organizations in a way that will achieve greater 
synergy in this mission area. IA is and will continue to develop as the 
Departmental intelligence support element, while continuing to pursue 
its statutory obligations under the Homeland Security Act. As you know, 
IA is a part of the Intelligence Community and its funding is provided 
by the Intelligence Authorization Act, the specifics of which are 
classified. While I cannot go into classified specifics in this open 
forum, I am more than ready to discuss IA's budget with you in an 
appropriately classified session at your convenience.
    We have a dynamic vision of how intelligence and information will 
be analyzed, how the analytic elements of the Department will be 
managed to achieve optimum benefit, and how to develop a budgetary 
strategy that will unify the programs related to intelligence 
activities and information analysis across DHS. A major collaborative 
study is currently under way within the DHS to establish the baseline 
for this effort. In addition, we seek to reshape the Department's 
efforts consistent with the Intelligence Reform and Terrorism 
Prevention Act of 2004 (IRTPA) and the new authorities of the Director 
of National Intelligence (DNI).
    No less important is the need for adequate facilities, analysts, 
and program resources to assure that the complex and difficult process 
for obtaining and analyzing intelligence is managed, operated and 
sustained. It is not sufficient to simply create authorization for 
fully funded U.S. Government employees without also providing the 
resources to properly house these intelligence professionals in 
facilities that are designed and constructed to facilitate the receipt, 
handling, analysis, and storage of highly classified material in order 
to protect and preserve our security. To that end, the 2006 budget 
request includes $38 million to allow IAIP to fit out facilities that 
meet security and information technology requirements and allow IAIP to 
access and analyze intelligence, collaborate with our partners and 
execute the mission we have been given. IAIP came into the Department 
with no legacy facilities and no predetermined permanent housing. We 
now have a plan to occupy both swing and permanent facilities that fit 
our needs, and this funding request will enable us to complete that 
plan.
    As we work toward building IA's capability, we have framed our 
thinking around a new paradigm that seeks to encompass ``all 
information necessary to protect and preserve the homeland.'' Within 
that environment are subsets of information such as defense or military 
information, intelligence information, law enforcement information, 
homeland security information, and critical infrastructure information 
as well as public and private sector information. All of these types of 
information make up the vast array of intelligence that DHS needs to do 
its job.
    DHS is a fully vested member of the IC and the Office of the 
Assistant Secretary for Information Analysis represents the Department 
in all IC venues, ensuring that DHS interests and requirements are 
fully represented and considered among the community. IA analysts have 
access to the most sensitive national intelligence regarding 
international and domestic terrorist threats, and the interaction with 
their peers throughout the IC continues to develop and improve. Much of 
the information we receive comes to us from IA analysts' connections to 
the Joint Worldwide Intelligence Communications Systems (JWICS), NCTC 
Online, the IA Automated Message Handling System (AMHS), the Homeland 
Security Information Network (HSIN), the Open Source Information System 
(OSIS), and a variety of other formal and informal (i.e., analyst-to-
analyst) mechanisms. These information streams from external sources 
are augmented by our own internal reporting from DHS components. We are 
increasingly well informed, but not yet satisfied with this endeavor.
    The range of intelligence and information coordinated by IA from 
the IC, and our state, local, tribal, municipal and private sector 
partners; as well as from all DHS entities with intelligence and 
operational capabilities, is both impressive and daunting. These 
entities--and their products--continue to be an important part of how 
IA does its work.
    IA's relationship with our colleagues in the Infrastructure 
Protection (IP) Directorate is critical to our success. Jointly we are 
able to deliver threat-informed vulnerability analysis and data-
supported risk assessments regarding our critical infrastructure to our 
constituents and customers--notably the private sector, which owns the 
vast majority of our nation's critical infrastructure.
    IA is an integral part of the Homeland Security Operations Center 
(HSOC) effort to monitor and communicate on all matters of homeland 
security interest 24x7. Intelligence from DHS components that IA 
correlates and analyzes provides invaluable perspectives and insight 
for the entire Federal government. From a citizen providing a Patriot 
Report on suspicious activity, to Border and Transportation Security 
(BTS) reports regarding individuals of interest trying to enter the 
United States illegally, or US Coast Guard reports regarding suspicious 
activity near critical infrastructure. Such information is provided to 
IA through the same methods the larger IC uses: the physical presence 
of DHS component and IC element liaison officers within both IA and the 
Homeland Security Operations Center (HSOC), strong linkage between the 
HSOC and our constituents, and communication between analysts and 
leadership. In fact, the presence of representatives of 30 separate 
Federal and local representatives within the HSOC provides a 
perspective and collaboration capability that is virtually unique. 
Additionally, coordination within DHS is aided by regular meetings of 
the intelligence chiefs of each entity, led by the Assistant Secretary 
for Information Analysis.
    It is not sufficient to just produce information. In order to be 
effective, information must be shared. DHS has developed this 
capability and in cooperation with our Federal partners and is 
coordinating information sharing among previously unconnected systems. 
For example, DHS has collaborated with the Justice Department on the 
DOJ Law Enforcement Sharing Plan. Further, the Homeland Security 
Information Network (HSIN) is a ``system of systems'' that provides 
discrete communities of interest for Law Enforcement, Counter 
Terrorism, Analysts, Emergency Management, and Critical Infrastructure 
groups to collaborate and share critical information in real time. In 
addition, the DHS network provides the ability to pull together 
participants from all of these communities, into a shared space to 
collaborate, during any period when the threat creates the need. 
Further, as a direct result of the Department's Information Sharing and 
Collaboration (ISC) initiative to cooperate and work jointly with other 
Federal partners, DHS and DOJ/FBI have established the first ever 
capability to share information between our respective communications 
and automation networks. Specifically, we were able to connect the 
Homeland Security Information Network with the Regional Information 
Sharing Systems (RISS) and Law Enforcement Online (LEO). More needs to 
be achieved but we are on the right track
    Already, the DHS ISC Program has engaged other Federal, State, 
local, and Tribal, information sharing programs in an effort to create 
synergy by fostering mutual awareness of their key programs and 
capabilities, and creating a forum to garner feedback on policies and 
procedures under development at the Federal level. Additionally, this 
effort has resulted in the first ever capability to share information 
among the State, local, and tribal information sharing systems.
    IAIP's fiscal year 2006 budget request includes $7,482,000 for ISC. 
The Department is budgeting an additional $5,000,000 from the Chief 
Information Officer and $4,000,000 from the Working Capital Fund to 
bring the total funding for ISC in fiscal year 2006 to $16,482,000.
    In addition to receiving information from these entities, IA is 
routinely sharing information and collaborating at all levels--from the 
Federal Government and the IC to State and local officials. DHS 
component organizations also serve as a conduit through which 
information and warnings can pass to government at all levels. Thus, 
IA's continuous information sharing and collaboration with the HSOC, 
BTS, USCG, and other DHS entities, provides valuable information to all 
of the men and women responsible for protecting the homeland.
    It is IA's specific focus on the protection of the American 
homeland against terrorist attack that is unique among its IC partners. 
This focus provides invaluable information and assistance not only to 
State, territorial, tribal, local, and private sector officials that 
receive accumulated threat information, but also to DHS components that 
use the information, trends, and indicators to inform and prepare 
operators and decision makers on the front line. The relationship IA 
has with the HSOC, BTS, and other DHS entities translates into 
continuous information sharing and collaboration that provides a unique 
threat picture and actionable information to those who are vital to 
protecting the homeland.
    The Department of Homeland Security is a prime example of how 
changes have been made within the Intelligence Community, the 
counterterrorism community, the law enforcement community and the 
response community to work more cohesively as well as more 
collaboratively, and to assure information is shared as fully and 
completely as possible. This represents a dramatic change from 
conditions as they existed before September 11th, 2001 and an very 
impressive change from even one year ago. DHS plays a central role in 
the counter-terrorism and homeland security effort as we continue the 
work of communicating intelligence and information to our partners in 
the federal government as well as with the State, territorial, tribal, 
local, major city and private sector officials charged with protecting 
the people and infrastructure of the United States.
    We are proud of our work and our place in the larger national 
defensive network and we look forward to a safe and secure future for 
our nation. Mr. Chairman and Members of the Committee, this concludes 
my prepared statement. I would be happy to answer any questions you may 
have at this time.

    Mr. Simmons. I thank you for your testimony. What we will 
do is I will ask a question and then I will go to my left and 
right by order of appearance at the time of the gavel and 
thereafter, after of course our Chairman and Ranking Member 
have had their opportunities.
    I commanded a military intelligence unit in the mid-1990s 
that created a handbook for open source intelligence that was 
eventually adopted by the U.S. Army as doctrine. I have had a 
personal interest in open source intelligence ever since. I 
have traveled to Special Operations Command in my capacity as a 
member of the Armed Services Committee. I have gone to open 
source conferences. I have met with officials from around the 
world who have an interest in this capability.
    It seems to me that open source acquisition or open source 
intelligence, that is intelligence that is created from the 
collection and analysis of open sources of information, lends 
itself particularly to the intelligence challenges of the 
Department of Homeland Security for two reasons. One, in some 
respects the information that we are relying on or looking for 
may come from that small municipal county sheriff's department, 
for all we know. It needs to be transmitted quickly, and it 
does not need to be classified in and of itself. Two, products 
that are derived from open source acquisition and analysis 
often do not have to have the same level of classification as 
those that are collected through other venues, so it is more 
readily available to share with the American people.
    Cost is also a factor. Where are we in the development of 
this capability in support of the mission of the Department of 
Homeland Security, and where would you like to see us go?
    Lieutenant General Hughes. We have explored a number of 
avenues with regard to open source information. I have been a 
proponent of it for a long period of time. I have to tell you 
that I have discovered along the pathway that I have taken, 
anyway, that there are some problems with it. A lot of 
information from open sources, much of it is erroneous, wrong. 
When we use it exclusively without cross-checking it with 
something else, we have found, I have found, it has been my 
experience, that it usually gets us in trouble.
    So I think while I think there is great power in this 
source of information, I also think we need to tread carefully 
in using it, and understand the context in which it can be 
used. We have on our computers now in the IA element the OSIS. 
It stands for the Open Source Intelligence System that the 
intelligence community is the proponent for and now provides 
numerous search engines, databases, media files, download 
capabilities of all kinds, including photographs, pictures of 
the ambient culture and environment around the world. We have 
all that at our fingertips right now. We have had guest 
speakers on this topic we have tried to inculcate in the 
homeland security intelligence analysis the power of, the idea 
of open source intelligence.
    I do not know whether you are familiar with a gentleman 
named Robert Steele.
    Mr. Simmons. I am intimately familiar.
    Lieutenant General Hughes. Okay.
    Mr. Simmons. I think you know what that means.
    [Laughter.]
    Lieutenant General Hughes. Yes, I do. I do. Robert Steele, 
for all of his many interesting characteristics, has been 
something of a pioneer in this field. We have had him come and 
talk to us. It was a very interesting talk and very 
deliberative and engendered a lot of discussion. I think that 
with Robert Steele's views as something on the far end of the 
utility spectrum, you may think of never using open source 
information as the other end of that spectrum. We are trying to 
find utility and balance along that spectrum.
    Once again, I think it has great potential and we are very 
knowledgeable about it and using it.
    Mr. Simmons. Thank you for that response.
    I would like to recognize the gentlewoman from California, 
Ms. Lofgren.
    Ms. Lofgren. Thank you very much.
    I am concerned about the number of contractors that are in 
the department, instead of full-time employees, not just in IA, 
but throughout the department. One question I have, without 
getting into the numbers, which we cannot, is whether you are 
confident that we have sufficient budget authority to actually 
have staff, as opposed to contractors, in the upcoming fiscal 
year.
    Lieutenant General Hughes. Yes, ma'am. I believe that the 
budget authority is not in question here. Finding the expertise 
is a problem. And accompanying this, to the best of my ability 
to characterize the truth here, it is true that the contractors 
have offered us and we have taken advantage of their offer, 
some very fine people with some tremendous technical expertise 
that we were not able to acquire in any other way.
    Back to the fiscal realities of this, those people are 
costing us more money than a federal employee would. However, 
you cannot get them. We have not been able to get them by 
hiring them off the street. They are a limited supply and high 
demand.
    Ms. Lofgren. I know we cannot go into the numbers in this 
open session, but I would be interested in a secure setting to 
take a look at where that balance is so we can get a handle. I 
know in some of the other aspects of DHS, I have a better 
handle on the contractor-to-employee ratio and how it is 
working. I would like to do that if I could arrange that with 
you.
    Lieutenant General Hughes. I would be happy to do it. In 
lieu of reading, which might take a longer time, I can get an 
information paper back to you that has the details at either 
the unclassified level or at the level of classification that 
we have.
    Ms. Lofgren. Why don't you do that, and then if I have 
further questions, we can follow up further.
    Lieutenant General Hughes. I am happy to do so.
    Ms. Lofgren. I appreciate that.
    In thinking about the task that you face, is it fair to say 
that the largest part of the IA job is to map the intelligence 
collected by other agencies to the critical infrastructure 
information maintained by IP? If that is the case, I am 
wondering what influence you have, if any, on the state of the 
critical infrastructure listing and analysis, and how much that 
is impairing your task?
    Lieutenant General Hughes. First, the answer to the first 
part of your question, is that our primary or most critical 
function, my answer to that, I am sorry to say, is no. Our 
primary task and our most critical function has become, and I 
think it is logical for this to happen, departmental support 
across the board, working as an all-source intelligence 
producer for the department. That is really our work in its 
primary form.
    The most important part of that work is to continue that 
interface between IA, the intelligence part, and IT that does 
the risk analysis and vulnerability assessment, but I will have 
to tell you that it is a little bit hard for all of us to 
understand, the risk analysis and vulnerability assessments are 
not done strictly on the basis of threat. They are done with 
civil characteristics in mind. One of them is apparent 
vulnerability to possible attack using means of attack. Another 
idea that is applied here is whether or not a particular kind 
of infrastructure has proven to be attackable if gaps are not 
closed and if vulnerabilities are not reduced.
    Another idea behind it is the value of the infrastructure, 
whether it has ever been attacked or not. That is kind of a 
strategic assessment. As an example, I think Mr. Thompson 
mentioned miniature golf courses or something like that. 
Obviously, when you are using good common sense, not high-
faluting intelligence, and you are weighting the importance of 
a miniature golf course against a nuclear storage site, 
hopefully most people would choose the nuclear storage site. 
That does not mean, however, that something in between those 
two extremes does not need some kind of protection.
    Ms. Lofgren. I know my time is up, but the concern I had 
with the latter question is that in fact the miniature golf 
site is on the list and the nuclear power plant is not. So if 
part of your job is to map the threats to the listing of the 
critical infrastructure, and the critical infrastructure is 
just random, how do you do that job?
    Lieutenant General Hughes. That should not be the case. I 
am not familiar with the specific part of the list that you are 
telling me the nuclear power plan is not on there, but let's 
suppose that that is accurate. That is a mistake and we need to 
fix that.
    Ms. Lofgren. Okay. Thank you.
    Lieutenant General Hughes. You are welcome.
    Mr. Cox. [Presiding.] General, I would like to go into some 
of the numbers in this open session, and I do not see any 
reason that we cannot discuss the programmatic figures here. My 
understanding with staff is that these are all open. I would 
like to talk about threat determination and assessment, 
evaluation and studies, the homeland security operations 
center, and the new account for information sharing and 
collaboration.
    I wonder if, just to set the stage for discussion of this, 
if you could describe for the subcommittee what each of these 
programs is in chief focused upon, starting with TDA.
    Lieutenant General Hughes. I hope I can do this right, but 
it is not a classification issue. It is a knowledge issue, so I 
am going to have to refer to a book. The first one you wanted 
to talk about, sir, was?
    Mr. Cox. Threat determination and assessment. Do you know 
what I can do also, I mean, we are sort of constrained to go 
through this program by program in order to talk about it in 
this open session, but I would like to get into what is the nub 
of your work. The figures that I have before me include the 
programs for threat determination and assessment, evaluation 
and studies, homeland security operations center, and 
information sharing and collaboration. I wonder if you could 
begin with whichever of these is closest to the core function 
of IA to do all source intelligence fusions?
    Lieutenant General Hughes. Obviously, threat determination 
and analysis is a primary factor. I am not sure exactly what 
you want to know, but if you want to know if our budget is 
adequate, the answer I believe is yes.
    Mr. Cox. To the extent that threat determination and 
assessment is central to your mission, it would disturb me, 
then, that we are cutting its budget.
    Lieutenant General Hughes. I do not know if you should be 
disturbed about that, sir. We are not cutting it too much. The 
issue here is the threat determination, after you initially 
make it on a piece of fixed infrastructure, does not really 
need too much work after that if nothing changes. So once you 
lay down a baseline, you may not need quite the same level of 
effort that you did in the past. You do not have to re-do that 
baseline.
    Mr. Cox. Over time, we have been working with the 
department and with you directly to make sure that you acquire 
the number and quality of analysts necessary to perform IA's 
function. To what extent do these programmatic figures for TDA, 
for evaluation and studies, for the operations center and for 
information sharing and collaboration reflect the number of 
analysts that you have at your disposal?
    Lieutenant General Hughes. In the case of the operations 
center, there is no parallel at all. The operations center 
generally has people in it who are doing what I would refer to 
as information transfer. They are getting information in from 
any source at all. They do not analyze the information. They 
put it in the right bins. They alert people to the fact of the 
information. They pass it to others. They do any analytic 
endeavor.
    Mr. Cox. I note that the operations center is getting a big 
plus-up of, it looks to eyeball it, of about 40 percent. 
Likewise, evaluation and studies is getting a healthy increase. 
The threat determination and assessment account, on the other 
hand, is being reduced, and the explanation that has been 
provided to committee staff is that it is due in large part to 
a decrease in purchasing from government accounts and a 
decrease in advisory services needed for this account.
    To be perfectly honest with you, I do not have any idea 
what that means. So I do not know whether or not I need to be 
concerned. I know what our chief programmatic concerns are, and 
that is that we continue to help you build a core of talented 
analysts who can carry the full statutory mission forward of 
all source intelligence analysis, and make sure that even post-
9/11 Act, that the Homeland Security Department is a major 
participant in the intelligence community at the NCTC.
    Lieutenant General Hughes. I think your concern is well 
founded. If I could try it from a macro level, our overall 
budget I think is about 2 percent reduced, but money has been 
shifted around inside the structure of the IAIP to meet needs 
that we believe are present. Part of the plus-up in the HSOC is 
to handle COOP requirements and to meet the needs of the 
information flow that we anticipate is going to come into the 
department from greater feeding of information. This is raw 
information from the state and local sectors. In other words, 
we think after fielding homeland security information network, 
and that is JRIES with a new name on it, and after upgrading it 
to the secret level, we will be getting a lot more raw 
information.
    Handling that, processing it, is part of the plus-up that 
you see there. The idea of whether or not I can characterize 
what this set of words or phrases means exactly is kind of a 
mystery to me, too. In fact, I do not know if I could explain 
it. But I think the idea here is to get the information into 
not only the operational channel, but the intelligence channel 
for analysis concurrently. Lots of information that comes, 
especially the state and local and private sector, does not 
require much analysis in its initial form. It is a spot report, 
a patriot report, a person's call-in of suspicious activity.
    That may indeed be a piece of information that has to be 
put into the analytic environment, but standing alone it can 
also be passed to operators and actors for their initial 
appraisal of the information. To use the phrase, the phrase has 
become so unpopular, to connect the dots, the connection of the 
dots still goes on, but it kind of rests in the background for 
some of this information. The foreground is the initial use of 
the information in an operational setting, but we have shifted 
money around to do that.
    Mr. Cox. My time has expired.
    The gentleman from Mississippi, the Ranking Member of the 
full committee, Mr. Thompson.
    Mr. Thompson. Thank you, Mr. Cox.
    General Hughes, can you provide this committee with a 
breakdown of those contractor services that we are paying for 
over and above normal personnel costs, as information that you 
get back to us? You do not have to comment on it. Just provide 
to us.
    Lieutenant General Hughes. Yes, sir.
    Mr. Thompson. To your knowledge, are you aware of any 
problems with any of those contracting services as of this 
date?
    Lieutenant General Hughes. I am aware of some problems.
    Mr. Thompson. You are?
    Lieutenant General Hughes. Yes.
    Mr. Thompson. Can you also provide this committee with a 
listing of those problems?
    Lieutenant General Hughes. I will.
    Mr. Thompson. Thank you.
    With respect to the mapping the threat to vulnerabilities, 
what is your opinion of those vulnerabilities that have been 
identified, just in general? Do you think in your opinion those 
vulnerabilities meet the test of mapping? Do you think it is 50 
percent complete? Just give me your honest opinion of it.
    Lieutenant General Hughes. My honest opinion is that we are 
far from finished. Indeed, we are now using a term called 
``complex urban environment.'' We are treating the major cities 
especially, but also the industrial outliers and some other 
parts of the United States that have a concentration of 
activity that is of interest to us, and we believe it might be 
of interest to the terrorists, as an organism, so that if you 
kick the shin of a large complex city, the city may also get a 
headache at the same time as the shin hurt, because the thing 
is so interconnected. It is very much like an animal or a 
human. The nervous system of the city may indeed be affected by 
a kinetic blow. That is an important concept. I know it sounds 
a little ethereal, perhaps, but it is not. It is a fact.
    So probably the most common example of this is the 
electricity. You turn off the electricity, you turn off a lot 
of capability. If you turn the electricity off for a short 
period of time, you can live with it, not a problem. If you 
turn it off hard for a long period of time, we would have 
difficulty performing some of the functions we now take for 
granted.
    So that is an example. The electricity itself is what you 
have to attack in order to do that, or the control mechanisms 
associated with it. That fact, that idea that a hospital, as an 
example, when it runs out of fuel and its alternate power 
source does not operate anymore, and the electricity is still 
off, means that that is a vulnerability you have to assess 
carefully.
    If you did not assess it properly and have enough vision to 
see that after 3 days you were going to run out of fuel, there 
may not be a way to get more fuel because the pumps at the fuel 
station do not work because the electricity is off.
    Mr. Thompson. Okay.
    Lieutenant General Hughes. More than you wanted to know 
about it.
    Mr. Thompson. Well, I just want to know if we identified 
the hospital as a potential target.
    Lieutenant General Hughes. Absolutely.
    Mr. Thompson. Yes, okay. With respect to your present 
position, have you any access to all intelligence available?
    Lieutenant General Hughes. Yes, I have, but I have to tell 
you that not everyone who works for me has.
    Mr. Thompson. What was the problem with others not having 
access to that information?
    Lieutenant General Hughes. There is in the intelligence 
committee, it remains to this day, a culture in which a known 
person with a certain track record, having been polygraphed and 
background investigations done repeatedly over time, and a 
certain amount of dependability built into that background, and 
perhaps maybe you could even call it familiarization, the old-
boy network, that culture has something to do with what level 
of trust and confidence others are willing to place in you.
    Mr. Thompson. Mr. Chairman, if I could. So if Congress 
passes an Act mandating agencies to share information, do I 
understand you to say that that is still subject to whether or 
not certain individuals want to share that information with 
other agencies?
    Lieutenant General Hughes. I probably would not put it 
quite like that. It is subject to the rules governing the 
information itself and who has access to it for what reasons.
    Mr. Thompson. Mr. Chairman, I guess my point is, if we pass 
an Act saying that these agencies have to share this 
information between them, I am now hearing that there is some 
other standard out there somewhere that prevents that 
information being shared.
    Lieutenant General Hughes. Let me just tell you, if I may 
respond to this, this always has been in the intelligence 
business in the government, something called the ``need to 
know.'' The ``need to know'' rule still applies, and for the 
most sensitive kinds of intelligence, about very specific 
activities, the ``need to know'' rule still is at work.
    My personal view, by the way, is it should be. You should 
not tell everyone every single thing every single day. You 
should make sure that the key persons who are involved in this 
work know the essential issues each and every day, and I 
believe that has been done in my case.
    Mr. Thompson. Well, I think we will probably have some more 
opportunities for discussion. Thank you.
    Mr. King. [Presiding.] All right, Mr. Thompson.
    General Hughes, let me thank you for your service, and I 
certainly wish you well after March 15.
    In a way, I will be following up on Congressman Thompson's 
question, or maybe expanding it a bit. Obviously, information 
analysis is a work in progress. You have described it that way 
yourself.
    How has the passage of the Intelligence Reform Act impacted 
on that, either positively or adversely? Do you feel that the 
sharing is working the way it should? Is it better than it was 
before? Do you feel constricted? Again, how does it impact on 
the Department of Homeland Security?
    Lieutenant General Hughes. The first part of the answer is 
it is a lot better than it was.
    Mr. King. Because of the legislation being passed, or just 
because of the evolving of time?
    Lieutenant General Hughes. To be very frank, sir, I have 
not personally seen or observed any change since the act was 
passed that could be attributed directly to the act. Any of the 
changes that have occurred were ongoing prior to the act being 
passed. The act is going to take some time to reach fruition, 
to have impact.
    I think it is a very good act. I fully support it. I think 
the advent of a Director of national Intelligence is an 
important piece of that act and will cause the sharing 
function, the interoperability and commonality among the 
information systems to occur so that sharing can be better 
facilitated, and numerous other functions that we all think are 
laudatory. That will happen. It is ongoing, and much of it was 
ongoing before the act was passed. That is just a fact.
    Over time, since September 11, I have seen a marked 
improvement. Indeed, in the past year, as I stated in my 
written testimony, there has been a distinct qualitative and 
quantitative improvement in the information that is being 
shared in the intelligence community. By the way, 
parenthetically, in what can be distinguished from the 
intelligence community, is the law enforcement community, which 
as we all know is the nexus that makes Americans nervous, but 
it is a nexus that has to occur in the battle against terrorism 
and the battle against destabilizing forces inside our culture. 
So that is working. We have a much better information 
relationship than we ever did with the FBI. Actually, it is 
improving right along. Every few days, we make some kind of 
improvement.
    Is it perfect? Is it everything we could wish for? No. But 
the improvement is so dramatic that I am loath to criticize it 
in any way. I am happy to characterize it as something that we 
ought to keep going.
    Mr. King. I have to ask you, is there anyone that you are 
willing to criticize? Are there any elements within the 
intelligence community, the law enforcement agencies, who you 
feel are not cooperating with the spirit of the post-9/11 world 
that we live in?
    Lieutenant General Hughes. I am not willing to criticize 
them.
    Mr. King. Could you question them? Could you enlighten us 
as to perhaps areas we should be looking at, where there is not 
full cooperation being given?
    Lieutenant General Hughes. I think you ought to do what you 
are doing now, which is continuing to press the entire 
intelligence community and the culture to the degree they 
possibly can to have broad and full information sharing. Just 
continue the pressure. It is working. I, for one, ascribe that 
success not to the practitioners of intelligence, but to you, 
the Congress. You have brought pressure to bear, and I thank 
you for it.
    Mr. King. If we were in closed session, could you direct us 
as to where we should apply more pressure, you know, in one 
place rather than another?
    Lieutenant General Hughes. No. I do not think so. I think I 
have given you an honest answer today.
    Mr. King. Okay. Also in your opening statement when you 
mentioned the fact that you would be leaving on March 15, you 
sort of enticed us with a statement that if we have any 
questions to ask you about suggestions that you might want to 
make, we should ask them.
    Let me ask you: Do you have any suggestions as to the 
future, regarding the department or regarding your specific 
position?
    Lieutenant General Hughes. I hope we can continue this 
work, strengthen it. We need the support of Congress and 
obviously we need the support of this committee and the 
subcommittees of the committee that are named after the work of 
securing the homeland. You need to be first for effectiveness, 
change, progress in the future here on the Hill. You also need 
to be our advocate to some degree.
    I certainly make a plea for that to continue. My view is 
that we did not have the same kind of supporting mechanism in 
Congress when we first started out at the so-called ``legacy'' 
or older agencies and departments did have. We are slowly 
building that. I see the permanence of this committee finally 
recognized, I think a year late at least, as a manifestation of 
that. I cannot see how you could view it any differently.
    Mr. King. Thank you, General.
    The gentleman from North Carolina, Mr. Etheridge.
    Mr. Etheridge. Thank you, Mr. Chairman. Let me join my 
colleagues and thank you for holding this hearing.
    General Hughes, thank you for being here. We are going to 
miss you.
    Lieutenant General Hughes. Thank you, sir.
    Mr. Etheridge. I wish you all the best.
    My State of North Carolina is a participant in the regional 
information sharing system or the RISS program. My question is, 
what is the status of linking the homeland security information 
network to RISS? How do you propose that we avoid duplication 
and confusion when we try to make these linkages so they will 
work best for the American people?
    Lieutenant General Hughes. RISS and LEO, the law 
enforcement side of that, can link now to JRIES. The names kind 
of run together here, but the homeland security information 
network is being empowered right now by the JRIES system which 
was an old Department of Defense system. That system was 
brought over to the Department of Homeland Security and put in 
place. Most people who have looked at it think it is an 
effective and efficient system. RISS and LEO both were able to 
link to it. It is not really hard to do.
    However, I believe that what we should have is a narrowing 
down of these systems and maybe even one system with one name, 
which can then be managed technically by one organizational 
entity. That is what I would like to see. That has proven to be 
an unpopular idea because of the investment that has been made 
in each of these separate systems. There are others besides 
RISS and LEO and JRIES out there.
    So I think another year or so of maturity and perhaps field 
evaluation may show, I am hoping it will show, that the power 
of combining these systems should be facilitated as rapidly as 
possible.
    Mr. Etheridge. General, let me follow that up, because it 
seems to me if we can get to that, and the sooner the better, 
because we save not only time, but we will save money. My 
personal view it would be a lot more effective for the American 
people and for those who use it. Would you agree or disagree 
with that statement?
    Lieutenant General Hughes. I completely agree.
    Mr. Etheridge. Is there some way, then, that this committee 
can help facilitate that movement and the maturity of that 
system?
    Lieutenant General Hughes. I think you can. I would like to 
invite you to have the proponents of the homeland security 
information network come here before this committee and give 
you their views and RISS and LEO also and others. I think that 
would be an excellent thing for you to do.
    Mr. Etheridge. Thank you, sir. I will encourage the 
leadership to take a look at that at some point. I think that 
is real cost savings, and would be very effective for the 
American people.
    I understand that DHS is attempting to provide useful 
intelligence to state and local first responders. How does IA 
handle the raw data and reports that you get from state and 
local officials coming in from the local?
    For example, what is the procedure for a police officer to 
report a suspicious activity that they may find, or any law 
enforcement officer, that ultimately could be used that may 
very well forestall a major problem that Homeland Security is 
responsible for?
    Lieutenant General Hughes. Right now, a police officer or a 
police organization will make a report through law enforcement 
channels to the Federal Bureau of Investigation, and either 
concurrently or separately to the Department of Homeland 
Security. These reports can be made verbally by telephone, or 
in some cases by the RISS network or the LEO network or some 
other way, a lot of which are terminated at the Homeland 
Security operations center.
    So the FBI gets them and we get them, generally speaking. 
There are cases where we have heard about, where reports do not 
come concurrently to one or the other. Usually, the report 
usually goes to the FBI first, and does not come to the 
Department of Homeland Security as a matter of routine. We are 
pressing to fix that by, first, advertising our role in the law 
enforcement community and asking them to follow this procedure.
    I might add that we have begun in the past year, and we now 
have something over 300 reports that are jointly filed with the 
Federal Bureau of Investigation. Those reports carry a message 
with them in the body of the report that says if you have any 
further information, or if you have any indication of activity 
associated with this report or in any other way, please report 
it to your local joint terrorism task force and the homeland 
security operations center.
    Mr. Etheridge. Thank you, General. I see my time has 
expired.
    It seems like this is another area that we could press a 
little more on, because if the FBI is not sending that 
information over, and it is not being shared, that is not what 
we had in mind when we set up Homeland Security.
    Lieutenant General Hughes. The FBI, I need to add this, I 
hope I did not characterize this wrongly, the FBI is not a 
problem in this regard. The FBI, at least as far as I know, is 
not preventing information from coming to the Department of 
Homeland Security. The local police, the law enforcement 
authorities out in the states and localities, sometimes do not 
report that information concurrently. But when the FBI gets it, 
in most cases they pass it to us, and we do the same.
    Mr. Etheridge. Thank you for that clarification.
    Thank you, Mr. Chairman.
    Mr. King. The gentleman from Pennsylvania, Mr. Dent.
    Mr. Dent. Thank you, Mr. Chairman.
    General thank you for your service.
    My question deals with the credibility of threats. 
Obviously, the 9/11 report talked a lot about the need to know 
versus need to share, and how do you strike that proper 
balance. When information, before it is going to be shared, 
obviously you have to determine whether it is credible. What is 
the process for determining the credibility of these types of 
threats before you can disseminate that information out in a 
timely manner to the people who need to know?
    Lieutenant General Hughes. That is a wonderful question 
because we live each and every day, and it is what I would 
refer to as Hobson choice.
    Mr. Dent. A what?
    Lieutenant General Hughes. A Hobson choice--a ``damned if 
you do, damned if you don't'' kind of choice. If we send 
information that we get out rapidly without taking some time 
with it, it is apt to be wrong. But if we take some time to 
clarify it, too much time, it loses its importance and its 
value over time. We never know. We cannot know whether it is 
accurate or not immediately.
    So our choice has been to report it as rapidly as we can, 
knowing that that is going to lead to much information going 
out in the field which is wrong. We know that, but we are 
hoping that all the professionals that receive this information 
will somehow understand that and be able to live with it.
    Mr. Dent. Just to follow up, we spend a lot of time around 
here trying to determine answers to questions, and thank you 
for your service.
    Lieutenant General Hughes. Thank you very much.
    Mr. King. The gentleman from Rhode Island is recognized, 
Mr. Langevin.
    Mr. Langevin. Thank you, Mr. Chairman.
    General I want to thank you for being here and for your 
testimony. Thank you for your service to the country, 
particularly in your latest role at the Department of Homeland 
Security. You have made a great contribution.
    Lieutenant General Hughes. Thank you.
    Mr. Langevin. If I could just begin with IA's role in the 
intelligence community. The Senate report on the intelligence 
leading up to Iraq brought to light a tendency toward group-
think. The information basically stressed the worst-case 
scenario, and a failure to question assumptions, if you will.
    The question I have is, has IA institutionalized measures 
to ensure that a similar type of intelligence failure does not 
occur here, and if so, what measures are in place and are they 
effective?
    Second, there is a truism in the intelligence business that 
to get included in the right meetings, that you have to be able 
to bring something to the table. So what products or expertise 
does IA currently bring to the rest of the intelligence 
community such that it is seen as a valuable contributor to the 
intelligence process?
    Lieutenant General Hughes. Thank you very much.
    In the first case, we think there is a problem consistently 
over time in the intelligence building, and you have to guard 
against it at all times. One of the things that it is up to 
leaders to do is to develop an environment in which any 
question could be asked, any premise can be challenged, any 
idea can be called to account. We just have to do that. We have 
to tell people the truth as directly and as clearly as 
possible.
    I would place the burden for avoiding group-think not on a 
process or procedure, but on leaders, specifically the leaders 
in the intelligence community, not merely at the highest level, 
and I would certainly hold them accountable, but also down to 
the mid-grade, middle-management level. They have to let 
analysts reign in their intellectual space and be able to think 
beyond some kind of artificial limit, to be able to deal in 
concepts in their own context without some kind of constraint 
or restriction.
    If we do not have that kind of environment in the 
intelligence community, then group-think will absolutely occur, 
you can depend upon it. I had a friend when I was in the 
military, an Israeli intelligence general. He happened to be a 
lieutenant colonel at the time of the 1973 invasion by the 
Egyptians across the Suez Canal. A captain came to him and 
said, those Egyptians are testing us each and every time we 
carry out war games, and we are not doing anything about it. 
The lieutenant colonel said, they are just war games. The 
captain said, they are not just war games; they are practicing. 
One of these days, they are going to continue. You know the 
rest of the story.
    The lieutenant colonel later regretted his failure in this 
function, and the picture of the dead from the front there was 
an intelligence analyst with chains and a big heavy locks 
around his head. That is the issue. We just have to somehow 
generate an environment that never allows that to happen in the 
United States.
    Mr. Langevin. General, if I could be clear in the 
understanding that you in particular in your department have 
things in place to make sure that consciously you have made 
sure that group-think is not going to be a problem?
    Lieutenant General Hughes. I have done the best I could to 
generate an environment in which any idea is welcome, any 
thought is fine. At some point, however, decision-makers have 
to make decisions. If your decisions over time prove to be 
flawed or faulty, then you obviously have a problem.
    The second part of your question, would you repeat it?
    Mr. Langevin. I want to know if it is true that in the 
intelligence business, to get included at the right meetings, 
you have to bring something to the table. So I wanted to ask 
what IA currently brings to the rest of the intelligence 
community such that you are seen as a valuable contributor to 
the intelligence process.
    Lieutenant General Hughes. I think that is right, that you 
do have to contribute. I think we are beginning to contribute 
something that is somewhat unique. I refer to it as domestic 
information. In the situation here in the United States, we are 
in partnership with the FBI that involves the concept of law 
enforcement information and intelligence all together to inform 
decision-makers and responsible parties about the context in 
which things are happening, and about potential events. This is 
not spying on the American people in any way, but it is 
understanding that there are persons inside our society and 
coming towards us who would do us great harm. We have to know 
where those people are, who they are, what their capabilities 
are, and what the potentialities are.
    The Department of Homeland Security represents unique 
capabilities in that regard. We are the people who inhabit and 
control the borders. We are the people who inhabit and control 
the borders. We are the people who take care of the brown water 
on the shores of our nation. We are the people who sense the 
environment to protect important persons from harm. We are the 
people who administer the safety of our transportation system.
    No one else does these things. I believe we are being 
recognized as bringing unique and very valuable, not only 
information, but skills and capabilities to the table. I will 
have to tell you that I still detect some resistance, among 
others, to mention of those ideas in the context of the 
Department of Homeland Security.
    There is still sort of a default mechanism out there that 
when you talk about transportation security, and you might say 
TSA. If you talk about the Coast Guard, you talk about the 
Coast Guard. But over time, some development of the concept of 
an umbrella organization is gaining strength and will come to 
fruition. That would be the development of a very valuable 
concept for the Department of Homeland Security, which can 
achieve intra-component synergy among all of these 
capabilities.
    The simple answer is, yes, we bring something to the table, 
now and more in the future.
    Mr. Langevin. I see my time has expired. Thank you for your 
answer to the questions, and again thank you for your service.
    Lieutenant General Hughes. Thank you.
    Mr. Simmons. [Presiding.] I thank the gentleman for his 
questions. If he refers to the bipartisan Senate Intelligence 
Committee report of last year, the first eight conclusions deal 
with issues of group-think, and a contributing factor to group-
think is a lack of information.
    The gentleman from California is recognized, Mr. Lungren.
    Mr. Lungren. Thank you very much, Mr. Chairman.
    Thank you for your testimony, General, and thank you, more 
importantly, for your lifetime of service. We all appreciate 
that.
    Could you give us an idea of where you think your 
department's information analysis capability is right now? That 
is, if you have to say that complete success would be a 10, and 
we know we could never get to a 10; maybe 9 is what we can 
achieve because we are always changing for that last one. As 
you leave, where do you think it is?
    Lieutenant General Hughes. Five to six.
    Mr. Lungren. If it were five to six, for us to get up to 
nine, what are the very specific two or three priorities that 
you would have the department emphasize with your successor?
    Lieutenant General Hughes. The kind of experienced, 
analytic workforce, public employees that we can depend upon 
over time, that will stay in this occupational field and 
continue to do this work for a long period of time. This is not 
conventional or routine intelligence work. It is different.
    Second, improvement on facilities. The facilities are 
inadequate to the task. We need support in that area.
    Three, you need a full understanding of the remainder of 
the intelligence community about what it is that we are doing, 
why we are doing it, and how we are doing it. I think that is 
the third item on the list for a reason. That is the lowest 
priority. The first two are vital.
    I would mention that we need more time. Everyone keeps 
saying, and I heard the Chairman mention a ``two-year period.'' 
It is true that we have been in existence for over two years, 
but I can tell you that we were not functional when I arrived 
on 17 November, 2003, in the intelligence business. We had 27 
people; we could not do the job. Time period has to be measured 
in capability and effectiveness. We were not effective. We are 
not completely efficient and we are not as good as we should 
be. The progress is real. We just need some more time.
    We also need more people of the right kind, government 
employees, better facilities and structures, and we need 
understanding and support.
    Mr. Lungren. General, when I was Attorney General of 
California, one of my responsibilities was the head of WSIN, 
the Western States Information Network, one of the RISSes 
around the country. Are we utilizing the RISSes around the 
country effectively in information gathering and sharing?
    Lieutenant General Hughes. Probably not as effectively as 
we should. That is a process that we began this past summer by 
having people from all of the states come here to Washington. 
We began to inform them about the methods of information 
sharing at that time. We have a plan in place to have that same 
kind of gathering again this summer, and we are sending out 
mobile training teams who help people understand how things can 
be improved in that regard.
    Mr. Lungren. Let me ask the question this way: Are we 
utilizing the RISSes as a platform to provide information to 
you? Or are you duplicating or replicating that?
    Lieutenant General Hughes. We are using the RISS, the law 
enforcement network, and others to the degree that we can. It 
is a cooperative effort.
    Mr. Lungren. Okay. Sure. I know you are loath to criticize 
anybody, and I will not ask you to do that here, but I will 
just give you some insights I have received from some law 
enforcement people on the ground or in middle-management 
positions. They still find a reluctance to share information 
from the feds on down, specifically with the FBI. I would 
normally say, ``Well, you are always having grousing like 
that,'' but when I was Attorney General, frankly, I can tell 
you it was very serendipitous as to whether or not we got a 
spirit of cooperation from the feds, whose need to know seemed 
to be the feds need to know, but you do not need to know.
    Much information in the domestic arena, frankly, can be 
gathered as well and sometimes even better by the many more law 
enforcement officers we have at the local and state level than 
we do not the federal level. They are much closer to the 
street. They have more contacts. They may not have all the 
contacts in the specific terrorist organizations, but they have 
contacts with a lot of people that may come into contact with 
them. It is debilitating for them to be viewed as second-class 
citizens, and to have the feds say, we have the view, we have 
the mileage, we have the right to know, and you do not.
    I see it expressed in this way. That is, with the color 
code system we have and the alerts that they receive, they told 
me that oftentimes they would receive these alerts without 
really underlying information. So they were told generally 
speaking the threat assessment was higher, but they did not 
have real information therefore to respond to that. That, to 
me, suggests an underlying lack of trust of local and state 
government that still pervades the federal establishment. Can 
you tell me whether you have seen that, number one; and number 
two, if you have, what steps in particular has your department 
taken to try and break that down?
    Lieutenant General Hughes. First, everything you said I 
have heard. We may know the same people.
    [Laughter.]
    Mr. Lungren. We will not put that on the record.
    Lieutenant General Hughes. I have to tell you that I think 
it is absolutely accurate. The phenomenon of the arrogance of 
the federal establishment in relationship to the state and 
localities with regard to information is well known.
    Mr. Lungren. Well, members of Congress excepted, of course.
    [Laughter.]
    Lieutenant General Hughes. Sir, you can believe whatever 
you want. I have heard a lot about this.
    [Laughter.]
    Mr. Lungren. Better watch it, General. Be careful there.
    Lieutenant General Hughes. I have to tell you that I think 
it is an accurate portrayal. The local effort feels like they 
are second-class citizens because of the attitude that is 
conveyed to them by some federal officials.
    I do not think that is across the board. I think it is 
somewhat circumstantial, but nevertheless, it is a fact.
    What we have done is, first, we are sending out a lot more 
information; that is simply a fact. We can prove that by simply 
showing you the documents we now send routinely to the states 
and localities. We did assemble them here, and we are going to 
assemble then here again this year. It is a participative 
effort. Admittedly, it was not much of a dialogue. That is too 
bad, but in the first instance we had a lot of things to put 
out to them. And they actually thought it was very worthwhile.
    This summer, we have meetings here in Washington again over 
a three-to four-day period. We hope to make it more of a 
dialogue and we will hear from that more.
    By the way, we have this in August, so if there is any 
possible way we could get a Congressman or a Senator to come 
and meet before that group and give your views, we would really 
appreciate it, because this kind of interaction is vital.
    We have also established, and we are establishing over 
time, relationships with people. Some of these relationships 
are very circumstantial and short-lived. I did not meet the 
sheriff of Las Vegas, even though I had telephone conversations 
with him and talked to him on a couple of occasions. I never 
met with this gentleman personally face to face until a few 
days ago. Indeed, when I met with him, he had his share of 
complaints.
    But he is the guy in charge of Las Vegas. What do I know 
about Las Vegas? Nothing. I am completely dependent on him to 
know primarily what is going on in Las Vegas.
    However, he recognizes, I think as most localities do, that 
occasionally, especially in the world of terrorism, big 
problems can come toward specific towns and cities that the 
town and city do not know about. That is a fact. It is the 
nature of the larger world of intelligence and 
counterterrorism. They do not come and rest and stay in exactly 
the target place, so that everybody and their brother gets to 
know them. They project themselves into these environments and, 
usually relatively rapidly in the target area, take action.
    So we are trying to get a mutual understanding of the 
phenomenon. We do at the national level, at the federal level, 
have something to contribute, and we should contribute that by 
passing it to the states and local authorities, and we are 
trying hard to do that. We have made improvements, and if they 
were sitting here in this room, I think they would say that. I 
think they would say, yes, things are better than they used to 
be.
    Mr. Lungren. Thank you, General. Mr. Chairman, could we ask 
the staff to work with the General's staff for us to be able to 
see when threat assessments are made, the level of information 
that is given to local jurisdictions, so that we might be able 
to see what we are really talking about, because I have had 
these complaints from law enforcement saying they have 
inadequate information once a threat level is given to them. 
Maybe we just need to look at it ourselves.
    Mr. Simmons. I would be happy to do that. I began my 
political career as a police commissioner, and in the post-9/11 
environment, the new model is not local, state, federal each 
doing its own thing. The new model is communication between all 
levels. I know the Ranking Member has expressed to me her 
frustration over the same type of issue. My guess is that this 
is an important consideration for this subcommittee, and we 
will certainly look into it.
    Lieutenant General Hughes. If you do not mind, I must give 
you just another piece of information.
    Mr. Simmons. I do not want to deny you, but the 
distinguished lady from Texas, her questions, I know she has 
been here for a while, so make it brief, General.
    Lieutenant General Hughes. Okay, I will make it brief. The 
question you posed to me was in the context of the homeland 
security alert system, the changing of the colors. It is true 
that in the initial application of the changing of the colors, 
not much information was given. It is increasingly true, has 
been over time, since the Christmas 2003 and January, February, 
and March 2004 period, we have given more information. I will 
make sure you have the context of the question, there. But I 
think it is a very good thing to ask, to have us give you a 
better characterization of how much information we are giving 
out.
    Mr. Simmons. The distinguished lady from Texas, Ms. 
Jackson-Lee.
    Ms. Jackson-Lee. I thank the Chairman and the Ranking 
Member.
    General let me thank you for your service, and try to go 
quickly through my questions because of the time.
    I believe that one of the aspects of the IAIP's most 
important issues is the analyzing and integrating terrorist 
threat information and making sure that amongst any other 
agency that we relate to the homeland, I think of the FBI and 
the CIA as having their own constituency bases, even though we 
are trying to work very hard at the integration of those 
agencies, really in terms of fighting terrorism, the Department 
of Homeland Security signified to America that we are focused 
on their needs and providing them with the intelligence they 
need to understand the terrorist threat and to fight terrorism.
    As I look at the budget, and I know that this is 
particularly related to the intelligence needs, I think a point 
worth noting is that the President's budget indicates that 
government-wide spending for homeland security increases really 
overall by $1 billion. To put this in perspective, we all know 
that we are spending about $1 billion a week in Iraq and 
probably other added dollars in Afghanistan. In particular, I 
believe that there is an intent to hire an additional 73 more 
employees, and also to seek ways of improving our ability to 
analyze and integrate terrorist threat information, map threats 
against our vulnerabilities and implement actions to protect 
American lives.
    I know that we are going to lose your talent in March, and 
again let me thank you for your service, but how are we going 
to do that when we are looking at a potential cut of $20 
million? Might I add to that question a statement that you made 
in your speech when you were able to say that we were able to 
connect the homeland security information network with the 
regional information sharing system, and I think the previous 
question raised that question. You yourself said that one needs 
to be achieved, but we are on the right track. If you could 
expand on what you gave to Congressman Lungren, and talk 
specifically about the ability to hire employees and try to 
improve what we are trying to with this budget cuts.
    Lieutenant General Hughes. If I understand the question 
right, ma'am, the budget cut is not an assured thing. The 
Department of Homeland Security expects plus-up in our overall 
budget as you described, and we do not expect for the budget to 
be cut back. That is our hope.
    Ms. Jackson-Lee. But if it is cut back, then you will have 
difficulty fulfilling your mission. Is that correct?
    Lieutenant General Hughes. That is true. That is correct. I 
would certainly hope that that does not happen.
    With regard to the idea of whether or not we can do the job 
and how well we can do it, the connectivity that we have out 
there with the RISS system and the LEO system and others, this 
is an evolutionary thing. We just discovered not long ago a 
system that is run by the Federal Protective Service, which is 
part of the Department of Homeland Security, which is a portal 
into law enforcement information the Federal Protective Service 
holds. That is within our own department and we did not know it 
existed until not long ago.
    So we are learning. We are developing over time. A lot of 
these things, even though they may seem self-evident, they are 
not. We have had to ferret them out. I think we are continuing 
to make good progress.
    The answer I would give to you and to the person who asked 
the earlier question is, connectivity is almost everything. If 
we do not have that, and I think the Chairman is familiar, 
information not shared is worthless. That is it. That gets to 
the central idea here. We can get the information. The next 
imperative is to share it. That is what we are all about. So we 
have been trying to build and make this interconnected network 
a system of systems, whatever names you want to apply to it. We 
want to make sure it is interoperable, that it has enough 
elements of commonality so that we can pass information 
horizontally and vertically throughout the system. That is what 
we would like to do.
    Ms. Jackson-Lee. Mr. Chairman, I appreciate the General's 
views, and Ranking Member, sort of focusing on our questions, 
but let me just say that this exercise poses a very difficult 
challenge, because it is very difficult when you have 
overlapping committees of jurisdiction such as the Budget 
Committee. Your expertise and the Ranking Member's expertise on 
some of the aspects of this, still the time is not long enough 
to sort of probe General Hughes and the knowledge that he has.
    Two points I think are key to this, and I would start out 
by saying that homeland security connotes security of the 
homeland. People think of the FBI and CIA, so you have a great 
responsibility. I think that this one sentence that he has, the 
pages are not numbered, but when he talks of RISS and the law 
enforcement online, one needs to be achieved, I think in our 
work we need to focus in on whether we have appropriate 
resources to make sure that the communication is going on in 
the homeland with law enforcement.
    Another point is, and I think it is very important, is this 
right-to-know rule. We look forward to your expertise, but I 
wonder whether or not this committee will have oversight to be 
able to refine that in this new post-9/11 era. For example, and 
I will close on this note, General Hughes, there is something 
called OTMs at the border, the southern border, other than 
Mexican nationals coming across. That has taken a new life, 
that there are potential individuals coming across that border 
that may do us harm. The border patrol agents then become a 
greater force with respect to their need to know, and they need 
to know classified information or information at a very high 
level. I am not comfortable that even in this budget oversight 
we have focused on it.
    General Hughes, I thank you for the one very great point 
that you said, if we cut the budget and do not provide you with 
the resources, you are not going to be able to do the job. I 
think that is our responsibility.
    I yield back, and I thank the Chairman for the additional 
time on the clock. Thank you.
    Mr. Simmons. I thank you for your comments. I think we are 
all aware that this is the first hearing of the permanent 
subcommittee. It is historic in that regard. The opportunities 
for us are pretty dramatic, but the challenges are also great. 
It is an area where we have to work together and share together 
to be successful. I thank you for your comments. I think they 
are right on the dime.
    We will keep the record open for 10 days for any additional 
written comments that anyone may wish to submit. I have a few 
remarks to make as closing remarks, but I would like to 
recognize my Ranking Member, if she has remarks she would like 
to make.
    Ms. Lofgren. This is just the beginning, obviously, and 
General, we do appreciate your being here today, even though we 
will not be seeing much of you for long. I think certain 
questions have become more ripe in our minds as we listened to 
you. The connectivity of the system obviously is important, 
whether it is the Internet or whether it is intelligence. 
Therefore, we are dependent on agencies both within DHS, but 
also without. So we certainly cannot do it today, I am thinking 
about the FBI system that we had great promise for, but did not 
produce, and how that is going to impact DHS.
    I have spent 10 years on the Judiciary Committee paying 
attention to immigration, and I am very well aware of the 
deficiencies in the technology and that aspect, and the impact 
it has on the ability to gather information that then could be 
shared. So I am hopeful that as we move forward in this year 
that we will be able to look at those as they connect and maybe 
get some improvements that will make us all safer.
    I did want to just follow up very briefly in writing, but 
comment that I am concerned about the ``need to know'' 
information issue. Certainly, the Congress cannot micromanage 
an intelligence agency. It would not be proper, but I am 
concerned that if that is an ad hoc decision being made in the 
agency, then we have maybe failed to actually have the policy, 
the ``who voted for'' implemented. I think we have to explore 
that further, Mr. Chairman.
    Finally, my colleague from California mentioned the 
frustration that local agencies have. I think that has improved 
somewhat with Director Mueller and the FBI task force. At least 
the feedback I am getting from law enforcement is much 
different than I used to. But what I am hearing form local law 
enforcement is that they never hear from DHS. It is invisible 
to them. So I think we need to sort through and be parochial. 
There are more people living in Los Angeles County than there 
are in over 20 states, and how we are dealing with the gigantic 
nation-state of California and whether that system is going to 
work for that state or not, and how we might format it so we 
really do have a system that is slick and works and protects 
us.
    I thank the Chairman for recognizing me.
    Mr. Simmons. Thank you.
    Just very briefly, back in 1981, I became the staff 
director of the Senate Intelligence Committee, working for 
Senator Barry Goldwater as the Chairman and Senator Daniel 
Patrick Moynihan as the Vice Chairman. Try that one on for 
size, staff. The Chairman is Senator Goldwater. Well, you are 
too young to even remember who he is; and the Vice Chairman was 
Daniel Patrick Moynihan, a good Republican and a good Democrat. 
One from the west and one from the east; one conservative and 
one liberal. I sat and worked with them for 4 years as they 
initiated what I consider to be professional congressional 
oversight of the intelligence community.
    I learned about the value of bipartisanship, and I learned 
about the value of listening to others when it comes to the 
intelligence business. I learned that you can put those 
differences aside if you are focusing on a common goal, which 
in that case was to build the intelligence community to 
preserve and protect our values and our people and our country.
    Regrettably, on 9/11 we failed in that regard. So the 
mantle has been passed to another generation of members of 
Congress and another generation of members of the staff, to do 
what we can do to preserve and protect our homeland, while at 
the same time preserving and protecting our civil liberties. 
That is an awesome challenge. In those days 25 years ago, we 
did not have a hearing room or spaces that were ours. We 
occupied the auditorium in the Dirksen Building. Today, we do 
not have a hearing room, I do not believe. We are looking for 
one, although this is much better than the auditorium of the 
Dirksen Building, I can assure you.
    But we should not let these little logistical challenges 
get in the way of the important work of this subcommittee and 
of course the important work of the full committee.
    I will leave you with a final thought. For the 4 years that 
I have been a member of Congress, I have never changed the 
license plate on my car. I know some immediately go out with a 
screw driver and put on that lovely congressional plate. But 
the plate that I have on my car has the simple phrase ``kung 
ho,'' which conveys enthusiasm and excitement, but as we all 
know comes from the Chinese word ``kung ho,'' which means 
``work together.''
    I look forward to working together with the staff, with the 
members of this subcommittee, with the Administration and 
others, to pursue the important agenda that we have before us.
    Thank you all for being here today.
    And thank you, General, for your participation.
    [Whereupon, at 3:37 p.m., the subcommittee was adjourned.]



                            A P P E N D I X

                               ----------
                               --________

                   Material Submitted for the Record

  Questions and Responses Submitted for the Record by the Hon. Bennie 
Thompson for Acting Assistant Secretary for Information Analysis Karen 
                         Morr on behalf of DHS

    Question: 1. General Hughes, one theme the Department has repeated 
in describing the President's Fiscal Year 2006 budget is consolidation. 
I think we all recognize that the current organizational structure at 
DHS isn't necessarily the best one, and that moving offices or 
functions can improve performance or reduce cost.
    Some agencies, including the office that distributes billions of 
dollars to first responders, rely on IA for threat information. 
However, some parts of DHS have their own intelligence departments--
including the Coast Guard and Secret Service as part of the 
Intelligence Community, but also TSA, the Federal Air Marshals, CBP, 
and ICE. Thankfully, many of these programs are unclassified, so we can 
talk about their budgets in public. TSA, for example, is requesting $21 
million and 99 FTEs for Fiscal Year 2006.

    Question: 1. Given the trend within DHS for consolidation, for 
example the transfer of research and development activities to the 
Science and Technology Directorate, should IA have more control over 
all the intelligence operations in DHS?
    Intelligence is integral to the successful operations of the 
Department of Homeland Security (DHS). In our efforts to build a strong 
Department from its original 22 agencies, it is critical to coordinate 
DHS intelligence functions. The ability of the Department to conduct 
its mission is enhanced when components have synchronized intelligence 
activities. The Office of Information Analysis, in concert with the DHS 
components that have intelligence activities, is conducting a study 
with the intent of developing a plan to integrate key aspects of these 
activities. That study is reviewing several elements of the 
intelligence program, including mission areas and supporting functions. 
The results of this study will be presented to the senior leadership 
this spring. IAIP will continue to work to ensure the Department's 
intelligence activities are coordinated.

    Question: 2. With the first deadline on the ``Information Sharing 
Environment,'' as mandated by the recently enacted Intelligence Reform 
and Terrorism Prevention Act, occurring in less than two months, do you 
know what will be the role of DHS in operating or setting the rules for 
the ``environment''
    The first deadline related to the terrorism information sharing 
environment (ISE) was met. The President designated John Russack as the 
Program Manager responsible for planning for, overseeing the 
implementation of, and managing the ISE pursuant to section 1016 of 
P.L. 108-458. Per our statutory authorities and responsibilities, DHS 
has a critical role in the development of all aspects of the ISE, 
including the establishment of the business rules for the ISE. DHS has 
been actively engaged in the work to date toward developing the ISE and 
will continue to have an active role in relation to this Department, 
our stakeholders, and the community at large.
    In particular, DHS has a unique role, as defined under the Homeland 
Security Act, for sharing homeland security information with state, 
local, and tribal governments as well as the private sector in relation 
to critical infrastructure. Specifically, Executive Order 13311 
delegates to the DHS Secretary the responsibilities for procedures for 
prescribing and implementing information sharing as defined in Section 
892 of the Homeland Security Act (P.L. 107-296). Improving information 
sharing has been and continues to be a top strategic priority for DHS. 
The Information Sharing and Collaboration Office (ISCO) was established 
in DHS to provide focus and coordination for these statutory and 
Presidential mandates.
    DHS is currently a key link among State, tribal, and local 
government, as well as the private sector critical infrastructure 
entities. The Department is already operating in critical information 
spheres (defense, intelligence, homeland security, law enforcement, 
private sector) and is providing strategic guidance to oversee the 
development of their intersection and collaboration to produce all 
information necessary to govern and protect and will coordinate these 
activities with the Program Manager.

    Question: 3. After the 2004 elections, then-Secretary Ridge said 
that there had been a decrease in chatter and that the threat of 
terrorist attack was lower than it had been in some time. Is that still 
the case, and if so, how do you account for that?
    Beginning in Summer 2004, we began to see a decrease in incoming 
credible and/or specific information mentioning direct threats to the 
United States. The reasons for the quantitative and qualitative 
decrease--which lasted through late February 2005--remain unclear. 
Since then, we have tracked a number of threat streams deemed credible 
and/or specific to Homeland-related interests, however we do not know 
if this is related to the natural cycle of the intelligence collection 
process or other factors more related to actual terrorist operational 
planning.
    Despite this relative increase in credible and/or specific 
reporting since late February, we continue to lack information 
indicating an imminent threat to the United States, as well as the 
timing, targets, or methodology of any potential operation. While the 
Department of Homeland Security (DHS) and the rest of the Intelligence 
Community are still analyzing each particular threat stream, as well as 
those streams collectively, they do reinforce our perception regarding 
al-Qaida's ongoing strategic intent to conduct another dramatic attack 
in the United States. This intent and possible planning is reflected in 
all-source intelligence reporting, vice a single collection discipline.
    We note that the reporting level from vague, low-credibility, or 
undetermined sources (call-ins, write-ins, walk-ins, media 
pronouncements, etc.) regarding possible attacks on the Homeland 
remains relatively constant and numerically more significant than 
reports from ``credible'' sources.

    Question: 4. What changes are being considered for the Homeland 
Security Advisory System, and will the system continue to be used in 
its current structure?
    The Homeland Security Advisory System (HSAS) has evolved throughout 
the history of DHS and currently includes the flexibility to assign 
threat levels for the entire nation, or a particular geographic area or 
infrastructure sector, depending on the credibility and specificity of 
available threat information. The HSAS is a collaborative process which 
takes into account current threat information and incorporates the 
perspectives of other federal entities (both within and outside of 
DHS); state, local, and tribal partners; and private sector 
stakeholders. DHS learns new lessons and continues to improve the 
system each time HSAS level changes are considered.