<DOC>
[110th Congress House Hearings]
[From the U.S. Government Printing Office via GPO Access]
[DOCID: f:38771.wais]

 
                       NEXT GENERATION BORDER AND 
                    MARITIME SECURITY TECHNOLOGIES: 
                               H.R. 3916 

=======================================================================

                                HEARING

                               BEFORE THE

               SUBCOMMITTEE ON TECHNOLOGY AND INNOVATION

                  COMMITTEE ON SCIENCE AND TECHNOLOGY
                        HOUSE OF REPRESENTATIVES

                       ONE HUNDRED TENTH CONGRESS

                             FIRST SESSION

                               __________

                           NOVEMBER 15, 2007

                               __________

                           Serial No. 110-73

                               __________

     Printed for the use of the Committee on Science and Technology


     Available via the World Wide Web: http://www.house.gov/science

                                 ______

                     U.S. GOVERNMENT PRINTING OFFICE

38-771 PDF                 WASHINGTON DC:  2008
---------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office  Internet: bookstore.gpo.gov Phone: toll free (866)512-1800
DC area (202)512-1800  Fax: (202) 512-2250 Mail Stop SSOP, 
Washington, DC 20402-0001

















































                  COMMITTEE ON SCIENCE AND TECHNOLOGY

                 HON. BART GORDON, Tennessee, Chairman
JERRY F. COSTELLO, Illinois          RALPH M. HALL, Texas
EDDIE BERNICE JOHNSON, Texas         F. JAMES SENSENBRENNER JR., 
LYNN C. WOOLSEY, California              Wisconsin
MARK UDALL, Colorado                 LAMAR S. SMITH, Texas
DAVID WU, Oregon                     DANA ROHRABACHER, California
BRIAN BAIRD, Washington              ROSCOE G. BARTLETT, Maryland
BRAD MILLER, North Carolina          VERNON J. EHLERS, Michigan
DANIEL LIPINSKI, Illinois            FRANK D. LUCAS, Oklahoma
NICK LAMPSON, Texas                  JUDY BIGGERT, Illinois
GABRIELLE GIFFORDS, Arizona          W. TODD AKIN, Missouri
JERRY MCNERNEY, California           JO BONNER, Alabama
LAURA RICHARDSON, California         TOM FEENEY, Florida
PAUL KANJORSKI, Pennsylvania         RANDY NEUGEBAUER, Texas
DARLENE HOOLEY, Oregon               BOB INGLIS, South Carolina
STEVEN R. ROTHMAN, New Jersey        DAVID G. REICHERT, Washington
JIM MATHESON, Utah                   MICHAEL T. MCCAUL, Texas
MIKE ROSS, Arkansas                  MARIO DIAZ-BALART, Florida
BEN CHANDLER, Kentucky               PHIL GINGREY, Georgia
RUSS CARNAHAN, Missouri              BRIAN P. BILBRAY, California
CHARLIE MELANCON, Louisiana          ADRIAN SMITH, Nebraska
BARON P. HILL, Indiana               PAUL C. BROUN, Georgia
HARRY E. MITCHELL, Arizona
CHARLES A. WILSON, Ohio
                                 ------                                

               Subcommittee on Technology and Innovation

                    HON. DAVID WU, Oregon, Chairman
JIM MATHESON, Utah                   PHIL GINGREY, Georgia
HARRY E. MITCHELL, Arizona           VERNON J. EHLERS, Michigan
CHARLIE A. WILSON, Ohio              JUDY BIGGERT, Illinois
BEN CHANDLER, Kentucky               ADRIAN SMITH, Nebraska
MIKE ROSS, Arizona                   PAUL C. BROUN, Georgia
LAURA RICHARDSON, California           
BART GORDON, Tennessee               RALPH M. HALL, Texas
                 MIKE QUEAR Subcommittee Staff Director
      RACHEL JAGODA BRUNETTE Democratic Professional Staff Member
          COLIN MCCORMICK Democratic Professional Staff Member
         TIND SHEPPER RYEN Republican Professional Staff Member
           PIPER LARGENT Republican Professional Staff Member
                 MEGHAN HOUSEWRIGHT Research Assistant


























                            C O N T E N T S

                           November 15, 2007

                                                                   Page
Witness List.....................................................     2

Hearing Charter..................................................     3

                           Opening Statements

Statement by Representative Bart Gordon, Chairman, Committee on 
  Science and Technology, U.S. House of Representatives..........     8
    Written Statement............................................     9

Statement by Representative Ralph M. Hall, Ranking Minority 
  Member, Committee on Science and Technology, U.S. House of 
  Representatives................................................    10
    Written Statement............................................    11

Prepared Statement by Representative David Wu, Chairman, 
  Subcommittee on Technology and Innovation, Committee on Science 
  and Technology, U.S. House of Representatives..................    12

Statement by Representative Phil Gingrey, Ranking Minority 
  Member, Subcommittee on Technology and Innovation, Committee on 
  Science and Technology, U.S. House of Representatives..........     9
    Written Statement............................................     9

Statement by Representative Harry E. Mitchell, Member, 
  Subcommittee on Technology and Innovation, Committee on Science 
  and Technology, U.S. House of Representatives..................    13

                               Witnesses:

Mr. Robert R. Hooks, Director of Transition, Science and 
  Technology Directorate, Department of Homeland Security
    Oral Statement...............................................    14
    Written Statement............................................    17
    Biography....................................................    20

Mr. Ervin Kapos, Director, Operations Analysis, Science and 
  Technology Directorate, Department of Homeland Security; 
  Executive Director, Homeland Security Science and Technology 
  Advisory Committee (HSSTAC)
    Oral Statement...............................................    21
    Written Statement............................................    22
    Biography....................................................    22

Dr. Brian A. Jackson, Associate Director, Homeland Security 
  Research Program, The RAND Corporation
    Oral Statement...............................................    24
    Written Statement............................................    26
    Biography....................................................    32

Chief Jeff Self, Division Chief, U.S. Border Patrol
    Oral Statement...............................................    32
    Written Statement............................................    34

Discussion.......................................................    36

             Appendix 1: Answers to Post-Hearing Questions

Mr. Robert R. Hooks, Director of Transition, Science and 
  Technology Directorate, Department of Homeland Security........    46

Mr. Ervin Kapos, Director, Operations Analysis, Science and 
  Technology Directorate, Department of Homeland Security; 
  Executive Director, Homeland Security Science and Technology 
  Advisory Committee (HSSTAC)....................................    52

Dr. Brian A. Jackson, Associate Director, Homeland Security 
  Research Program, The RAND Corporation.........................    53

Chief Jeff Self, Division Chief, U.S. Border Patrol..............    55

             Appendix 2: Additional Material for the Record

H.R. 3916, To provide for the next generation of border and 
  maritime security technologies.................................    60


  NEXT GENERATION BORDER AND MARITIME SECURITY TECHNOLOGIES: H.R. 3916

                              ----------                              


                      THURSDAY, NOVEMBER 15, 2007

                  House of Representatives,
         Subcommittee on Technology and Innovation,
                       Committee on Science and Technology,
                                                    Washington, DC.

    The Subcommittee met, pursuant to call, at 10:10 a.m., in 
Room 2318 of the Rayburn House Office Building, Hon. Bart 
Gordon (Chairman of the Committee) presiding.

[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]

                            hearing charter

               SUBCOMMITTEE ON TECHNOLOGY AND INNOVATION

                  COMMITTEE ON SCIENCE AND TECHNOLOGY

                     U.S. HOUSE OF REPRESENTATIVES

                       Next Generation Border and

                    Maritime Security Technologies:

                               H.R. 3916

                      thursday, november 15, 2007
                         10:00 a.m.-12:00 p.m.
                   2318 rayburn house office building

1. Purpose

    On Thursday, November 15, 2007, the Committee on Science and 
Technology's Subcommittee on Technology and Innovation will hold a 
hearing to discuss H.R. 3916 and examine the current and future 
priorities in border and maritime security research, development, and 
technology for the Department of Homeland Security's Science and 
Technology Directorate (DHS S&T).

2. Witnesses

Dr. Robert Hooks is the Director of Transition for the Department of 
Homeland Security's Science and Technology Directorate.

Mr. Ervin Kapos is the Director of Operations Analysis for the 
Department of Homeland Security's Science and Technology Directorate. 
He acts as the Executive Director of the Homeland Security Science and 
Technology Advisory Committee (HSSTAC).

Dr. Brian Jackson is an Associate Physical Scientist for the Science 
and Technology Policy Institute at the RAND Corporation.

Mr. Jeff Self is Division Chief of the U.S. Border Patrol.

3. Brief Overview

        <bullet>  The U.S. Customs and Border Protection (CBP) 
        processes approximately 1.18 million people entering the United 
        States through established ports of entry every day. CBP is 
        also responsible for monitoring between legal entry points 
        along the Northern and Southern borders and intercepting 
        individuals attempting to cross the border. Border patrol 
        officers also act as first responders, rescuing individuals in 
        danger from extreme weather or violent situations at illegal 
        entry points.

        <bullet>  Surveillance technology acts as a ``force 
        multiplier,'' which allows border patrol agents to augment 
        their patrols with ground based and aerial observation 
        capabilities. Examples of currently in-use security 
        technologies include infrared sensors, automated cameras, and 
        seismic sensors to detect motion, as well as air based 
        observational equipment to monitor a large area.

        <bullet>  Many promising technologies are still not feasible 
        for full implementation along the border because of numerous 
        barriers: high cost, lack of robustness in harsh conditions, 
        lack of personnel trained to properly use high-tech equipment, 
        and technical problems. DHS S&T has primary responsibility for 
        bringing new technologies to full readiness, with support from 
        other agencies such as the National Institute of Standards and 
        Technology, which provides testing and validation services.

        <bullet>  Additionally, many capability gaps, including 
        situational awareness and officer safety, have been identified 
        by end-users that require further basic and applied research to 
        meet existing or anticipated challenges. DHS S&T has several 
        mechanisms to receive advice on R&D priorities, including 
        Integrated Product Teams (IPTs), which bring together 
        stakeholders from other components of DHS, including CBP, in a 
        regular, formal process to determine short-term technology 
        needs. Advice on longer-term research priorities comes from a 
        number of sources, including the Homeland Security Science and 
        Technology Advisory Committee (HSSTAC), the Homeland Security 
        Institute (HSI), and the National Academies.

        <bullet>  The Border and Maritime Security Division of the DHS 
        S&T Directorate has ongoing research projects focusing on 
        advanced sensing capabilities, decision-making software tools, 
        non-intrusive search capabilities, and other priorities. 
        Additionally, the U.S. Coast Guard (USCG) and National 
        Institute of Standards and Technology (NIST) carry out some 
        border and maritime security technology research. USCG research 
        includes officer protection, boarding, and suspect apprehension 
        tools such as net guns for trapping fleeing boats. NIST has 
        been conducting research on facial recognition technologies and 
        fingerprint analysis, and technical tests of the RFID 
        technology being incorporated into new electronic passports 
        being issued by the State Department to prevent document 
        counterfeiting.

4. Issues and Concerns

How does the DHS Science and Technology Directorate (DHS S&T) set 
overall research and development priorities? Under Secretary Jay Cohen, 
who took over leadership of DHS S&T in 2006, has established six 
research divisions that focus on specific technical areas. These 
divisions are Explosives, Chemical/Biological, Human Factors, Border/
Maritime, Infrastructure/Geophysical, and Command, Control, and Inter-
operability. Funding for each division is determined by the Under 
Secretary.
    Short-term technology research priorities within each division are 
established by a formal mechanism based on a program at the Naval 
Research Laboratory (NRL). Integrated Product Teams (IPTs) bring 
together stakeholders from the mission components of DHS, such as the 
Transportation Security Administration (TSA) or Customs and Border 
Protection (CBP). The IPTs are organized by theme, and stakeholders 
first determine outstanding capability gaps and then rank research 
projects by order of urgency. Of the 11 IPTs, three deal with issues 
related to H.R. 3916: Border Security, Maritime Security, and Cargo 
Security.
    Short-term projects determined through the IPT process account for 
roughly seventy percent of the DHS S&T budget and are managed by the 
Transition Portfolio Director. Longer-term basic research currently 
accounts for approximately thirteen percent with an announced goal of 
increasing this share to twenty percent over the next few years.
    Currently, there is no strategic plan guiding longer-term research 
priorities. The agency turns to a number of resources for advice on 
long-term planning, including internal groups such as the Homeland 
Security Science and Technology Advisory Committee (HSSTAC) and the 
Homeland Security Institute (HSI) as well as outside think tanks and 
advisory bodies such as the National Academies. However, there is no 
mechanism to coordinate the efforts of the various advisory groups. The 
results of the efforts of these groups are unclear, however, as DHS S&T 
has not released a strategic plan outlining specific long-term research 
priorities.

[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]


What are the current short- and long-term priorities in border and 
maritime security technology R&D? Is ongoing R&D helping to overcome 
some of the barriers to implementing specific border security 
technologies, such as unmanned aerial vehicles? Border and Maritime 
Security research is run through the Border and Maritime Division of 
DHS S&T, currently headed by Acting Director Captain Dave Newton 
(USCG). Additional border security research is carried out by other 
divisions within the S&T Directorate, most notably the Command, Control 
and Inter-operability (C2I) and Human Factors (HF) divisions as well as 
other agencies including the U.S. Coast Guard (USCG) and National 
Institute of Standards and Technology (NIST). Because of the many 
players in the border security technology realm, there are not 
consistent priorities across the many agencies and divisions. However, 
within DHS S&T, the divisions involved in border security research work 
to coordinate their efforts through the IPT process.
    Currently, DHS S&T efforts are focused on situational awareness 
(the collection and harmonization of information about a situation from 
numerous sources), officer safety, and cargo security. The associated 
research projects span a variety of fields, including sensor 
technologies, command and control systems and software, connectivity 
tools, modeling and simulation, non-intrusive search tools, and cargo 
monitoring tools.

How will H.R. 3916 affect ongoing and future R&D at DHS S&T? H.R. 3916, 
introduced by Ranking Member Hall on October 22, 2007, strives to 
provide guidance to DHS S&T on the process of setting research 
priorities, ensuring that technology meets the needs of end-users, and 
on specific border security research priorities.

5. Background

    This hearing will examine H.R. 3916, a bill introduced by Ranking 
Member Ralph Hall with the goal of improving long-term planning for 
research and development at the Department of Homeland Security, 
especially in the area of border and maritime security technology. The 
bill authorizes specific border security technology programs, and 
instructs DHS S&T to improve processes for setting research priorities 
and serving the needs of technology end-users.

Section-by-Section Discussion

Section 1: Requires the Department of Homeland Security Science and 
Technology Directorate (DHS S&T) to clearly define the operational 
requirements of technologies they are developing for Customs and Border 
Patrol and other end-users. These one to three-year product development 
projects are part of the Transition portfolio at DHS S&T and comprise 
the bulk of research and development spending (approximately 70 
percent).

    This section is intended to ensure that both DHS S&T and the DHS 
customer component that will eventually own and operate the equipment 
developed have agreed to baseline requirements for operational as well 
as technical objectives. This requirement can be met through the 
Technology Transition Agreements (TTAs) that S&T currently negotiates 
for development work.

Section 2: Extends the S&T Advisory Committee, which was last extended 
through December 31st, 2008 in the SAFE Ports Act of 2006. Currently 
S&T is appointing new members and has recently begun new meetings. The 
Committee briefly lapsed in November 2005. Further extends the Advisory 
Committee through December 31, 2012.

    The HSSTAC was created with the original Homeland Security Act, but 
lapsed once and has produced little for the Department. Since coming 
on-board last year, Under Secretary Cohen has reconstituted the 
committee and begun seeking their advice on specific topics. However, 
the committee will lapse again in December of 2008 without 
congressional action. The usefulness of the HSSTAC is largely 
determined by the Under Secretary's willingness to engage them in his 
decision-making, but letting them lapse would remove the only 
independent, S&T-focused advisory body immediately available to the 
department.

Section 3: Calls for an NRC study to provide a roadmap for research 
activities in the border/maritime division.

    One of the primary gaps in DHS S&T's planning is the lack of a 
long-term research strategy. In 2002 the National Academies completed a 
90-day study titled ``Making the Nation Safer'' that gave a general 
overview of how DHS S&T could support the then-fledgling Department. 
However, DHS S&T has failed to set specific long-term strategic 
priorities to guide research and development decisions. This section 
would allow the NAS to look specifically at one division of DHS S&T. 
The document produced by the NRC would give program managers at DHS a 
longer-term perspective than is provided through the one to three-year 
IPT process. If successful, similar reports could be commissioned for 
the other major DHS S&T divisions, such as Explosives or C2I.

Section 4: Reminds DHS of their role as a potential operator of 
Unmanned Aerial Vehicles (UAVs) in the national airspace and directs 
them to continue their work in the Joint Planning and Development 
Office accordingly. Currently, operation of UAVs in national airspace 
requires considerable advance planning and approval from the Federal 
Aviation Administration. Requires DHS to seek the ability to routinely 
and safely operate UAVs for border and maritime security missions. 
Authorizes DHS to take part in pilot projects to obtain whatever data 
is necessary to make an informed decision about how UAVs can be safely 
included in the airspace.

    Several laws enacted in the 108th and 109th Congresses instructed 
DHS to work towards implementing a UAV surveillance program for border 
security. Numerous challenges have prevented DHS from launching a broad 
UAV program, including safety concerns. UAVs currently have an accident 
rate 100 times greater than that of manned aircraft. They are also more 
susceptible to adverse weather conditions than manned aircraft. These 
safety issues can likely be solved through further research, but flight 
tests will be an integral part of improving UAV technology. However, 
under current FAA regulations, UAVs cannot fly in the U.S. without 
special permission.
    DHS is involved in an inter-agency planning group, the Joint 
Planning and Development Office (JPDO), to design the Nation's next 
generation air traffic control system, including UAV use. However, 
DHS's involvement to date is principally through the TSA. Given the 
high likelihood that DHS components would operate UAVs in the U.S., the 
Department should take a more active role now in planning for their 
introduction.

Section 5: Requires DHS to create a formal research program in the area 
of tunnel detection, and to coordinate with similar DOD activities. 
Calls for priority to be given to technologies that would allow real-
time detection of tunnels and would allow for immediate action by 
Customs and Border Protection (CBP) officers.

    Various advanced fencing and surveillance technologies are 
currently being tested as part of the Secure Border Initiative. 
However, in San Diego, where the double-layer Sandia fencing has been 
constructed, smugglers have dug numerous tunnels underneath the border 
fence, including one concrete-reinforced, kilometer-long tunnel. This 
is just one example of the systemic challenges that face border patrol 
agents. With time and resources, committed individuals can avoid most 
border surveillance by simply digging right past them. Furthermore, 
detecting tunnels is remarkably difficult and solutions in the one to 
three-year time-frame are not likely. This has led DHS S&T and CBP to 
focus on other near-term priorities. This section asserts Congressional 
interest in a long-term tunnel detection program.

Section 6: Requires the Under Secretary for S&T and Director of NIST to 
begin a joint R&D project of anti-counterfeit technologies and 
standards. Furthermore, this designee is charged with coordinating 
research activities with other federal agencies engaged in related 
research. Requires a report to Congress on the research programs 
undertaken under this section one year after enactment.

    Counterfeit documents are a major problem at legal ports of entry, 
with individuals attempting to enter the U.S. using fraudulent 
passports, identification, or birth certificates. CBP intercepts over 
200 fake documents daily at the Nation's borders, but technology for 
creating counterfeit documents is growing increasingly sophisticated 
and fraud is increasingly difficult to detect. The Federal Government 
has begun to support research activities to development technology for 
verifying documents, but currently activity in this area is broadly 
distributed with DOD, Treasury, Immigrations and Customs Enforcement, 
State, and Justice all pursuing various aspects. DHS S&T, however, has 
not been actively involved despite the clear impact on agencies such at 
ICE and CBP.
    Chairman Gordon. Good morning, everyone, to today's hearing 
on Next Generation Border and Maritime Security Technologies.
    Now, the mission of U.S. Customs and Border Protection is 
one of the most difficult within the Department of Homeland 
Security. CBP officials are responsible for securing the 
movement of people and goods by air, land, sea, across our 
nation's borders. That job is part law enforcement, part first 
responder, part diplomat, and part detective, and the scope of 
CBP's job is enormous. Nearly 1.2 million people come through 
our legal ports of entry every day. In addition, illegal 
activity, including unlawful border crossing, drug smuggling, 
and human trafficking is persistent.
    The State Department estimates that nearly 18,000 people 
are smuggled into the U.S. every year for the purpose of forced 
labor. They also report that nearly 90 percent of the cocaine 
and the majority of the heroin in the U.S. comes from our 
southern borders. It is clear that these agents need the help 
of new technology to do their jobs better, and to make our 
borders more secure.
    Technology acts as additional eyes and ears for Border 
Patrol agents, allowing for observation of border areas 24 
hours a day. The Department of Homeland Security's Science and 
Technology Directorate supports R&D to meet technology needs of 
the Department's components, including CBP. There are some 
promising technologies that have been deployed, but the 
enormous scope of the border security challenge requires a 
long-term strategic plan that has not yet been developed. 
Without a specific plan for border security technology 
research, long-term basic research will be disconnected from 
the real-life challenges of coming years and decades.
    Additionally, short-term priorities must be more responsive 
to the needs of end-users. When he appeared before the 
Technology and Innovation Subcommittee in March, Under 
Secretary Cohen outlined measures that DHS S&T is taking to 
involve end-users in setting research priorities, including 
integrated product teams and Web-based means for soliciting 
end-user opinions on technical needs. But DHS must do more than 
simply identify capability gaps. End-users should be able to 
provide feedback on cost, robustness, and other characteristics 
that determine whether a technology will be adopted or whether 
it will sit on the shelf. This is especially true for border 
security technologies, which are often used by agents without 
significant technical training in harsh environments.
    I would like to commend Ranking Member Hall on his bill, 
H.R. 3916, which takes important steps toward improving the 
capabilities of the Border Patrol to prevent criminal 
activities at and around our nation's borders. Mr. Hall's bill 
authorizes important programs to enhance Border Patrol's 
ability to carry out its mission by supporting short- and long-
term research priorities. Additionally, it ensures that new 
technologies will be useful to Border Patrol agents by 
mandating that DHS work to meet cost and training needs of end-
users when developing these technologies. This bill is a 
concrete step toward solving a complex issue now, on how to 
secure our nation's borders against those who would do us harm. 
I look forward to working with Ranking Member Hall on this bill 
as we move forward.
    I now recognize Dr. Gingrey, the Ranking Member, for his 
opening statement.
    [The prepared statement of Chairman Gordon follows:]
               Prepared Statement of Chairman Bart Gordon
    I'd like to thank Chairman Wu for calling today's hearing and 
commend Ranking Member Hall on his bill, which takes important steps 
towards improving the capabilities of the Border Patrol to prevent 
criminal activity at and around our nation's borders.
    Border Patrol agents are responsible for securing nearly seven 
thousand miles of land borders to the North and South, as well as 
ninety-five thousand miles of shoreline. While our current corps of 
border patrol agents is doing a commendable job, their job is daunting.
    Technology can play a vital role in extending observational 
capabilities, helping border patrol agents locate suspects and monitor 
the border more effectively.
    Mr. Hall's bill authorizes important programs to enhance the border 
patrols ability to carry out its mission by supporting short- and long-
term research priorities.
    Additionally, it ensures that new technologies will be useful to 
border patrol agents by mandating that DHS work to meet cost and 
training needs of end-users when developing these technologies.
    This bill is a concrete step towards solving a complex issue: how 
to secure our nation's borders against those who would do us harm.
    I look forward to working with Ranking Member Hall on this bill as 
we move forward.

    Mr. Gingrey. Good morning, Chairman Gordon, and I want to 
thank you for, of course, holding this hearing on H.R. 3916, 
the border security bill that was introduced by the 
distinguished Ranking Member of the Full Committee, Mr. Hall, 
of Texas.
    As an original co-sponsor of H.R. 3916, I am pleased to see 
that the Science Committee and specifically this subcommittee, 
which I am Ranking Member of, the Subcommittee on Technology 
and Innovation, is taking an active role in securing our 
borders, and I believe it is one of the most important issues 
facing this Congress and the country as a whole.
    Mr. Chairman, I commend both you and Chairman Wu for co-
sponsoring the legislation that does improve long-term planning 
for R&D at the Department of Homeland Security and border and 
maritime security technology. As a Member of the Congressional 
Immigration Reform Caucus, I support and I have authored 
legislation that will help secure our borders and discourage 
illegal immigration. I believe that H.R. 3916 will assist the 
Department of Homeland Security and U.S. Customs and Border 
Protection Agency in long-term utilization of technologies to 
help us secure our border from threats that face our nation.
    Mr. Chairman, I am indeed, as I say, proud to support this 
legislation, and at this time, I will yield back to you.
    [The prepared statement of Mr. Gingrey follows:]
           Prepared Statement of Representative Phil Gingrey
    Good Morning Chairman Wu. I want to first thank you for holding 
this hearing on H.R. 3916 the border security bill introduced by the 
distinguished Ranking Member of the Full Committee, Mr. Hall of Texas. 
As an original co-sponsor of H.R. 3916, I am pleased to see that the 
Science Committee--and specifically the Subcommittee on Technology and 
Innovation--is taking an active role in securing our borders, which I 
believe is one of the most important issues facing this Congress and 
our country as a whole.
    Mr. Chairman, I commend both you and Chairman Gordon for co-
sponsoring this legislation that improves long-term planning for R&D at 
the Department of Homeland Security in border and maritime security 
technology. As a Member of the Congressional Immigration Reform Caucus, 
I support and have authored legislation that will secure our borders 
and discourage illegal immigration. I believe that H.R. 3916 will 
assist the DHS and the U.S. Customs and Border Protection agency in 
long-term utilization of technology to help us secure our border from 
threats that face our nation.
    Mr. Chairman, I look forward to hearing today's testimony from our 
panel on this vital issue of border security and the solutions they 
have that will enable us to plan for the use of emerging technologies 
in the future. With that Mr. Chairman, I yield back.

    Chairman Gordon. With no objections, I would like to yield 
to Mr. Hall for whatever time he might consume.
    Mr. Hall. Mr. Chairman, thank you, and I join Dr. Gingrey 
in his accolades for your cooperation and assistance in holding 
a hearing on border security and House Bill 3916, that I 
introduced just a few weeks ago, and I think it is a crucial 
issue for the Committee to discuss, and I would like to thank 
you and the Full Committee, Chairman Gordon. I thank you 
personally for co-sponsoring this legislation and bringing this 
very capable panel before us today. I would also like to thank 
Mr. McCaul for the substantial contribution he made to the 
bill.
    Border security is a concern of all Members of Congress, 
and we have nearly 7,500 miles of border, land border with 
Canada and Mexico, over which half a billion people and 2.5 
million rail cars pass each year. In addition, we have over 300 
ports that see over nine million cargo containers each year. 
Now, we have a myriad of reasons for wanting strict control 
over this traffic. For instance, according to Department of 
Justice statistics, over 30,000 kilograms of cocaine, heroin, 
and meth were seized within 150 miles of the U.S.-Mexico border 
in 2006.
    I know many Members of this committee have worked 
tirelessly and hard to end the meth problems in our nation, yet 
success at restricting access to meth ingredients here in the 
States has led drug dealers to import more across our borders. 
Stopping the flow of narcotics across our borders remains, I 
think, key to our efforts to curb illegal drug use.
    The threat of terrorism also compels us to re-examine our 
borders. Whether we are talking about foreign groups trying to 
infiltrate our country, or homegrown terrorists seeking weapons 
and supplies, our borders remain a critical element of our 
defenses. Our enemies, however, are adaptive and guileful. One 
of our witnesses today, Dr. Jackson, has tracked a number of 
terrorist groups and has sage advice about our need for a 
multi-layered defense.
    Finally, in Fiscal Year 2005, U.S. Border Patrol agents 
apprehended 1.19 million people attempting to enter the country 
illegally. While I understand the concerns many Members have 
regarding comprehensive immigration reform, we should not allow 
that issue to stymie progress deterring terrorists, drug 
smugglers, and human traffickers.
    I believe this committee is ideally positioned to 
strengthen control of our nation's borders through bipartisan 
legislation supporting effective, efficient, and evolving 
defenses. H.R. 3916 begins this effort. The sections in this 
bill reflect a single underlying theme. The Science and 
Technology Directorate at DHS needs to establish long-term 
goals and objectives for border security and broaden science 
and technology community involvement. The bill highlights three 
long-term research areas: unmanned aerial vehicles, tunnel 
detection, and anti-counterfeit technologies that promise to 
significantly improve border security across all the threats 
and against all the threats that we currently face.
    I have a longer statement for the record that includes 
additional background on H.R. 3916, but in the interests of 
time, I will yield following one parting thought, and that is 
that border security is one of the most difficult problems 
faced by scientists and engineers. It is a complex system of--
it is just a system of systems, that will require concerted 
interdisciplinary attention over many years, and I urge this 
committee to take the lead in Congress to push a long-term, 
adaptable, science-enabled border security policy.
    And I yield back my time, and I thank the Chair.
    [The prepared statement of Mr. Hall follows:]
           Prepared Statement of Representative Ralph M. Hall
    Chairman Wu, thank you for holding this hearing on border security 
and the bill H.R. 3916 that I introduced just a few weeks ago. I 
believe this is a crucial issue for this committee to discuss. And I 
would like to thank you and Full Committee Chairman Gordon for co-
sponsoring this legislation and bringing this capable panel before us 
today. I'd also like to thank Mr. McCaul for the substantial 
contribution he made to the bill.
    Border security is a concern of all Members of Congress. We have 
nearly 7,500 miles of land border with Canada and Mexico, over which 
half a billion people and 2.5 million rail cars pass per year. In 
addition we have over 300 ports that see over nine million cargo 
containers each year. Meanwhile, the Government Accountability Office 
estimates that one in ten serious drug and weapon violators and illegal 
immigrants pass through airports and land borders undetected.
    We have a myriad of reasons for wanting strict control over this 
traffic. For instance, according to Department of Justice statistics, 
over 26,000 kilograms of marijuana were seized in northern border 
states in 2005 while over 30,000 kilograms of cocaine, heroine, and 
methamphetamine were seized within 150 miles of the U.S./Mexico border 
in 2006. Stopping the flow of narcotics across our border remains key 
to our efforts to curb illegal drug use. I know many Members of this 
committee have worked tirelessly to end the scourge of methamphetamine 
in our nation. Yet, success at restricting access to meth ingredients 
here in the States has led drug dealers to import more across our 
borders.
    The threat of terrorism also compels us to re-examine our borders. 
Whether we're talking about foreign groups trying to infiltrate our 
country or home-grown terrorists seeking weapons and supplies, our 
borders remain a critical element of our defenses. Major efforts in 
this area are well underway. With the help of the Science and 
Technology Directorate, Customs and Border Protection has created a 
massive screening program to detect nuclear material that might be 
smuggled in via cargo containers. Our enemies, however, are adaptive 
and guileful. One of our witnesses today, Dr. Jackson, has tracked a 
number of terrorist groups and has sage advice about our need for a 
multi-layered defense.
    Finally, in fiscal year 2005, U.S. Border Patrol agents apprehended 
1.19 million people attempting to enter the country illegally. While I 
understand the concerns many Members have regarding comprehensive 
immigration reform, we should not allow that issue to stymie progress 
deterring terrorists, drug smugglers, and human traffickers.
    I believe this committee is ideally positioned to strengthen 
control of our nation's borders through bipartisan legislation 
supporting effective, efficient, and evolving defenses. H.R. 3916 
begins this effort. The sections in this bill reflect a single 
underlying theme: the Science and Technology Directorate at DHS needs 
to establish long-term goals and objectives for border security and 
broaden science and technology community involvement. The bill 
highlights three long-term research areas, unmanned aerial vehicles, 
tunnel detection, and anti-counterfeit technologies, that promise to 
significantly improve border security across all the threats we 
currently face.
    Section 1 requires S&T to include cost and operational objectives 
in any near-term application development. This section is meant to 
ensure that both S&T and the DHS component that will eventually own and 
operate the equipment developed have agreed to baseline requirements 
for operational as well as technical objectives. This requirement can 
easily be met through the Technology Transfer Agreements (TTAs) that 
S&T currently negotiates for development work.
    Section 2 extends the S&T Directorate's advisory committee through 
2012. The HSSTAC was created with the original Homeland Security Act, 
but lapsed once in that time. Under Secretary Cohen has reconstituted 
the committee and begun seeking their advice on specific topics. 
However, the committee will lapse again in December of 2008 without 
Congressional action.
    Section 3 specifically addresses long-term planning in the border 
security realm by tasking the National Research Council with a needs 
assessment and road-mapping request. In 2002 the National Academies 
completed a 90-day study titled ``Making the Nation Safer'' that gave a 
general overview of how S&T could support the fledgling DHS. This 
section would allow the NAS to look specifically at one sector of DHS 
S&T. The document produced by the NRC would give program managers at 
DHS a longer-term perspective than is provided through the one to 
three-year IPT planning process. If successful, similar reports could 
be commissioned for the other major DHS S&T divisions, such as 
Explosives, Chem/Bio, or Cyber Security.
    Section 4 directs the Secretary of DHS to take an active role in 
safely incorporating unmanned aerial vehicles into the national 
airspace. UAV's cannot currently fly in the U.S. without special 
permission from the FAA. DHS is involved in an interagency planning 
group, the JPDO, to design the Nation's next generation air traffic 
control system, including UAV use. Given the high likelihood that DHS 
components would operate UAVs in the U.S., the Department should take a 
more active role now in planning for their introduction.
    The tunnel detection program described in Section 5 aims at solving 
a persistent smuggling problem. Organized crime has the time and 
resources to avoid most border surveillance by simply digging right 
past them. However, detecting tunnels is remarkably difficult and 
solutions in the one to three-year timeframe are not likely.
    Similarly Section 6 asserts Congressional interest in a sustained 
program to defeat counterfeiting. Activity in this area is broadly 
distributed in the Federal Government with DOD, Treasury, Immigrations 
and Customs Enforcement, State, and Justice all pursuing various 
aspects. DHS S&T, however, does not have a devoted office or program in 
this area despite the clear impact on agencies such at ICE and CBP.
    Border security is one of the most difficult problems faced by 
scientists and engineers. It is a complex system of systems that will 
require concerted, interdisciplinary attention over many years. I urge 
this committee to take the lead in Congress to push a long-term, 
adaptable, science-enabled border security policy.

    Chairman Gordon. Thank you, Mr. Hall. Your full remarks 
will be made a part of the record. As a Texan, you have first-
hand knowledge of this, and I can assure you that the Majority 
looks very forward to working with you and Dr. Gingrey and your 
staff and other Members of this committee on this important 
issue. It will be fast tracked, and we will, again, be as 
accommodating as you would like.
    [The prepared statement of Chairman Wu follows:]
                Prepared Statement of Chairman David Wu
    I want to thank everyone for attending today's hearing on Next 
Generation Border and Maritime Security Technologies.
    The mission of the U.S. Customs and Border Protection is one of the 
most difficult within the Department of Homeland Security. CBP 
officials are responsible for securing the movement of people and goods 
by air, land, and sea across our nation's borders. That job is part law 
enforcement, part first responder, part diplomat, and part detective. 
And the scope of its job is enormous. Nearly 1.2 million people come 
through legal ports of entry every day. In addition, illegal activity--
including unlawful border crossings, drug smuggling, and human 
trafficking--is persistent. The State Department estimates that nearly 
18 thousand people are smuggled into the U.S. every year for the 
purpose of forced labor. They also report that nearly 90 percent of 
cocaine and a majority of the heroin in the U.S. comes across our 
Southern border.
    The House has voted to increase the number of Border Patrol 
officers by 3000, and it is clear that these agents need the help of 
new technology to do their jobs better and to make our borders more 
secure. Technology acts as additional eyes and ears for Border Patrol 
agents, allowing for observation of broad areas 24 hours a day. 
Innovative technologies such as unmanned aerial vehicles, infrared 
sensors, and motion detectors help border agents identify where illegal 
activity might be taking place, multiplying the effectiveness of 
existing and added CBP staff.
    The Department of Homeland Security's Science and Technology 
Directorate supports R&D to meet the technology needs of the 
Department's components, including CBP. There are some promising 
technologies that have been deployed, but the enormous scope of the 
border security challenge requires a long-term strategic plan that has 
not yet been developed. Without a specific plan for border security 
technology research, long-term basic research will be disconnected from 
the real life challenges of coming years and decades.
    Additionally, short-term priorities must be more responsive to the 
needs of end-users. When he appeared before this subcommittee in March, 
Under Secretary Cohen outlined measures that DHS S&T is taking to 
involve end-users in setting research priorities, including Integrated 
Product Teams and web-based means of soliciting opinions.
    But DHS must do more than simply identify capability gaps that need 
to be filled with technology. End-users should be able to provide 
feedback on cost, robustness and other characteristics that determine 
whether a technology will be adopted or whether it will sit on the 
shelf. This is especially true for border security technologies, which 
are often used by agents without significant technical training in 
harsh environments.
    I want to thank the Ranking Member of the Full Committee, Mr. Hall, 
for introducing H.R. 3916, which we will be discussing today. That 
legislation addresses these crucial issues and brings up some important 
questions. Do we have the technology we need to help CBP do its job? Do 
the new technologies developed by DHS meet the needs of end-users in 
terms of cost and ease of use, and other important parameters? And, 
more generally, how is the DHS Science and Technology Directorate 
determining priorities for R&D?
    I'm eager to hear our witnesses' thoughts on the answers to these 
questions. I am especially interested to hear our DHS witnesses' 
comments on how they will work to meet the technology needs of the 
border patrol in the short- and long-term. We need to do a better job 
of aligning research to the needs of end-users, and I'm looking forward 
to working with my colleagues to promote innovative technology to 
support our nation's hardworking border patrol.

    [The prepared statement of Mr. Mitchell follows:]
         Prepared Statement of Representative Harry E. Mitchell
    Border security is an issue that truly hits home. Illegal 
immigration affects Arizona more than any other state-more than half of 
illegal crossings over the U.S.-Mexico border happen in Arizona.
    When the Federal Government fails to live up to its responsibility, 
Arizona pays a hefty price. Illegal immigration fosters violent drug 
and human smuggling crimes, and burdens our local law enforcement and 
emergency rooms.
    These illegal crossings threaten our national security. We must do 
better.
    We can start by ensuring that these border agents have all the 
tools necessary to protect our borders. Stopping people from crossing 
the border is not as simple as building a fence. These people sneak 
across the border daily by going to under-patrolled areas, jumping over 
fences, and building underground tunnels.
    I am proud to co-sponsor Chairman Hall's legislation, H.R. 3916, 
which will help provide our border guards with technologically advanced 
equipment to monitor the borders. Significantly, this bill will improve 
border security by advancing technology for tunnel detection as well as 
aerial monitoring of the border.
    I look forward to hearing from our witnesses on how this 
legislation will help secure our borders.
    I yield back.

    Chairman Gordon. Let me also say, this is a very 
distinguished panel. I want to thank you for taking your time 
to be here. We have Members that are in both parties, who have 
conferences and meetings this morning getting started, so we 
are going to have some folks coming in. This hearing is 
televised. Staff are watching it both from the anteroom and 
back in the offices, and Members are watching it there, too, so 
your testimony falls on a large audience, and we want to have 
that input from all.
    So now let me introduce our distinguished panel. First, Mr. 
Robert Hooks is the Director of Transition at the Department of 
Homeland Security Science and Technology Directorate, also 
known as DHS S&T. Mr. Ervin Kapos is the Director of Operations 
Analysis at the DHS S&T and coordinates the Homeland Security 
Science and Technology Advisory Committee, called HSSTAC. And 
Dr. Brian Jackson is the Associate Director of the Homeland 
Security Research Program at the RAND Corporation. And Mr. Jeff 
Self is the Division Chief for the U.S. Border Patrol, for some 
real-world information here today. Thank you, Chief, for being 
here.
    And as our witnesses should know, the spoken testimony is, 
we try to limit it to five, but we don't want you to feel 
uncomfortable. If you--we really want your information, if you 
take what you need, and the remainder of your testimony will 
certainly be in the record.
    And we will now start with Mr. Hooks.

   STATEMENT OF MR. ROBERT R. HOOKS, DIRECTOR OF TRANSITION, 
  SCIENCE AND TECHNOLOGY DIRECTORATE, DEPARTMENT OF HOMELAND 
                            SECURITY

    Mr. Hooks. Good morning, Chairman Gordon, Ranking Members 
Hall and Gingrey, and distinguished Members of this 
subcommittee. I am Robert Hooks, and I should clarify, I am not 
a doctor. I wish I was, but I am not.
    I am the Director of Transition Portfolio for the Science 
and Technology Directorate of the Department of Homeland 
Security, and I am pleased to appear before you today to 
discuss the successes that the Department of Homeland 
Security's Science and Technology Directorate have achieved 
with respect to technology solutions on our borders, both land 
and sea. Under Secretary Cohen asked me to express his 
appreciation and thanks to this committee, your staffs, and the 
entire Congress for the strong bipartisan leadership and 
support you have given him and the men and women of the Science 
and Technology Directorate as we work to make the Nation safer.
    Nearly 14 months ago, with Congress' support, Under 
Secretary Cohen implemented a new organizational structure for 
the Science and Technology Directorate, to make it customer 
focused and output oriented. Our customers are the operating 
components and directorates of DHS, and their stakeholders are 
the State, local, tribal governments, first responders, and the 
private-sector entities. Our Science and Technology effort to 
deliver technology is primarily organized into three 
portfolios: transition, innovation, and basic research.
    The Product Transition Portfolio, for which I am the 
Director, is centered on 11 functional DHS customer-led, 
Capstone Integrated Product Teams, three of which are Maritime 
Security, Cargo Security, and Border Security. In the Capstone 
IPTs, DHS operational components, and directorates are the 
chairs or co-chairs. They define and prioritize the capability 
gaps, then S&T offers technical solutions, where the customer 
is then the final approval on if the offered technical solution 
is appropriate for them.
    While we have identified the principal customers within the 
Capstone IPTs, as the chairs or co-chairs, they are not the 
only representatives at these IPTs. All of the DHS operational 
components and directorates are invited as customers to any 
Capstone IPT relevant to their mission. As an example, because 
of the interrelationship within their respective geographic 
areas of responsibility, Coast Guard has representation at the 
Borders IPT, and CBP is represented at the Border Security IPT.
    Directed by the priorities of the Border, Cargo, and 
Maritime Security Capstone IPTs, S&T is developing technologies 
that can be delivered to components in the near-term, usually 
less than three years, to assist in securing our maritime land 
borders and protecting CBP and Coast Guard law enforcement 
officers, and you see some of those displayed on the placards 
and also at the table.
    We are pursuing efforts to deliver advanced detection, 
identification, apprehension, and enforcement capabilities 
along land and maritime borders, and provide advanced 
technology, spiral development injections into DHS component 
program areas, such as SBInet, Command 21, the Secure Freight 
Initiative, Container Security Initiative, and Customs Trade 
Partnership Against Terrorism, CTPAT.
    Specifically in the border security area, a number of our 
near-term product transition programs focus on developing 
detection, classification, and localization sensor technology 
to monitor illegal border activity with a wider range and 
greater accuracy than present-day technologies and command-and-
control systems that deliver a much broader amount of 
information about current events to different levels of law 
enforcement, communication systems that provide connectivity 
for law enforcement officers working in remote locations, as 
well as modeling and simulation tools to help border 
enforcement agencies make informed improvements in immigration 
and border security policy and operations, and appropriate 
investments in technology, complex systems, and infrastructure. 
These technologies and systems will help to ensure that 
maritime and border security assets are used effectively and 
efficiently, and enable law enforcement to have access to 
robust and reliable intelligence when they need it.
    S&T is also developing and delivering technologies that 
will enable border security and Coast Guard members to perform 
their current tasks more efficiently, effectively, and with a 
higher level of safety. Development of these tools, in many 
cases, is leveraged from the initial investment of other 
government agencies, such as the Department of Defense and the 
National Institutes of Justice, and then adapt it to fit the 
operational environment and functions of the several DHS 
security components.
    We are also developing near-term technologies to improve 
supply chain security and thus decrease screening frequency and 
simultaneously increasing our probability of detection against 
dangerous contraband. Using a system-of-systems approach, we 
are developing advanced sensor and communication technologies 
within a security architecture that encompasses the world's 
supply chain. Some of the technologies developed in this 
program will enable CBP officers to identify tampering events, 
their location, track the shipping containers, and ensure that 
alarm data is communicated reliably and securely.
    Consistent with H.R. 3916, we recognize that our technology 
effort needs to account for the affordability, life cycle 
costs, and the training costs. This way, if the procurement 
based on our new technology would be too expensive for the 
component or the operating costs too prohibitive, the decision 
to look for a new technology solution can be made early, before 
large acquisition buy programs are initiated, and before the 
federal, State, local, and tribal entities expend their 
precious resources.
    The basic research portfolio addresses long-term research 
and development needs in support of the DHS mission areas that 
will provide the Nation with an enduring capability in homeland 
security. The basic research program is focused on research 
projects that clearly contribute to the goals of S&T's DHS 
customers and is informed by the customer capability gaps 
identified in the Capstone IPTs.
    This type of focused, long-term research investment has the 
potential to lead to paradigm shifts in the Nation's homeland 
security capabilities. An example is in tunnel detection. This 
is a type of long-term, focused research effort that would be 
tackled in the basic research area. As you are probably aware, 
the threats posed by clandestine, underground tunneling along 
the border in order to smuggle persons and goods into the 
United States is a serious and growing concern. Tunnel 
detection was a priority capability gap identified in our 
Border Security IPT as well, and needing a technical solution. 
However, there are currently no promising near-term 
technologies to detect underground tunnels efficiently that 
supports the Border Patrol's operations. The detection of 
smuggling in these tunnels requires a combination of both 
direct and indirect methods to determine the shape, size, 
position of the tunnel, geophysical characteristics, and 
understanding of the various detection methods.
    The basic research area intends to study and characterize 
the geophysical characteristics of key border regions, examine 
the limitations of current detection methods, assist in 
advancing those detection methods, and examine the potential 
for new, complementary detection methods. This research and 
other new discovery is necessary so that future technology 
development of an effective tunnel detector will be possible. 
So, you can see how the basic research tunnel investment will 
directly support and be complementary to our transition and 
innovation R&D efforts.
    Our innovation portfolio supports a key goal to put 
advanced capabilities into the hands of our customers as soon 
as possible as well. This is a high-risk research area, as 
compared to the low-risk product transition area, but if 
successful can be a game changer and provide new and improved 
operational capability to our component customers. An example 
is another tunnel detection effort. We are exploring 
additional, novel approaches to tunnel detection, including 
experimenting with UAV-mounted digital, electromagnetic, and 
gravity gradiometers, to determine their effectiveness and 
reliability. If successful, this will provide a wide-area 
search capability for rapid tunnel detection, potentially 
suitable to the Border Patrol. This demonstration may fail, but 
if successful will be a great game changer in our ability to 
protect the border.
    Another innovative program includes DHS partnering with DOD 
and the ongoing global observer Joint Concept Technology 
Demonstrator, JCTD, which offers the potential for DHS to 
provide persistent, airborne, wide-area surveillance along our 
borders and coasts. In cooperation with CBP and the Coast 
Guard, S&T is planning a demonstration for employing maritime 
radar on an unmanned aircraft to detect and help prosecute 
drug-running boats off the Florida coast, for example--
    Mr. Mitchell. Could you wrap it up, Mr. Hooks?
    Mr. Hooks. Yes, sir. Sorry.
    In summary, DHS is dedicated to being a customer-focused, 
output-oriented organization. Thank you.
    Mr. Mitchell. Thank you. Mr. Kapos.
    [The prepared statement of Mr. Hooks follows:]
                 Prepared Statement of Robert R. Hooks
    Good morning, Chairman Wu, Congressman Gingrey and distinguished 
Members of the Subcommittee. I am Robert Hooks, and I am the Director 
of the Transition Portfolio for the Science and Technology Directorate 
of the Department of Homeland Security, and I am pleased to appear 
before you today to discuss successes that the Department of Homeland 
Security's Science and Technology Directorate has achieved with respect 
to technology solutions on our borders.
    As you are aware, Under Secretary Cohen is on travel and I am 
honored to appear before you in his place. Under Secretary Cohen asked 
me to express his appreciation and thanks to this committee, your 
staff, and the entire Congress, for the strong, bipartisan leadership 
and support you have given him and the men and women of the Science and 
Technology Directorate as we work to make the Nation safer.

Introduction to the DHS S&T Organization

    Nearly 14 months ago, with Congress' support, Under Secretary Cohen 
implemented a new organizational structure for the Science and 
Technology Directorate to make it customer focused and output oriented. 
Our customers are the operating components and directorates of DHS, and 
their stakeholders are the State, local and tribal governments, first 
responders and private sector entities. Our Science and Technology 
effort to deliver technology is primarily organized into three 
portfolios: Basic Research, Innovation, and Product Transition.

Introduction to the Basic Research Portfolio

    The Basic Research portfolio addresses long-term research and 
development needs in support of DHS mission areas that will provide the 
Nation with an enduring capability in homeland security. This type of 
focused, long-term research investment has the potential to lead to 
paradigm shifts in the Nation's homeland security capabilities.
    In support of this objective for long-term research and 
development, we are in the process of establishing additional 
university-based Centers of Excellence in critical homeland security 
mission areas, including a Center for Excellence for Border Security 
and Immigration and a Center of Excellence for Maritime, Island, and 
Extreme/Remote Environment Security. These centers will provide 
fundamental research to support the DHS goals of strengthening border 
security, maritime security, and interior immigration enforcement. 
These centers will also establish education programs in homeland 
security relevant to their specific mission areas. This will provide 
learning opportunities to support the development of the next 
generation of homeland security leaders. We are currently in the 
selection phase and expect to announce the institutions for the new 
Centers of Excellence this month.
    Tunnel Detection is an example of the type of focused, long-term 
research effort that we would tackle in the basic research area. As you 
are probably aware, the threats posed by clandestine underground 
tunneling along the border in order to smuggle persons and goods into 
the United States are a serious and growing concern. Detection of these 
smuggling tunnels requires a combination of both direct and indirect 
methods to determine the shape, size, and position of the tunnel, 
geophysical characteristics, and understanding of the various detection 
methods. If funded in fiscal year 2009, we intend to study and 
characterize the geophysical characteristics of key border regions, 
examine the limitations of current detection methods, assist in 
advancing those detection methods, and examine the potential for new 
complementary detection methods. The basic research tunnel investment 
will directly support and be complementary to our Transition and 
Innovation efforts.

Introduction to the Innovation Portfolio

    The Innovation portfolio--Homeland Security Advanced Research 
Project Agency (HSARPA)--supports a key goal of Under Secretary Cohen's 
to put advanced capabilities into the hands of our customers as soon as 
possible. Within the Innovation Portfolio, we have two overarching 
programs: High Impact Technology Solutions or HITS, and Homeland 
Innovative Prototypical Solutions or HIPS.
    HITS are designed to provide proof-of-concept solutions within one 
to three years that could result in high-payoff technology 
breakthroughs. An example of a HITS is the tunnel detection effort. 
While we are in the process of awarding a contract as a result of a 
Broad Agency Announcement soliciting additional novel approaches to 
tunnel detection, we are also experimenting with UAV mounted digital 
electromagnetic gradiometers to determine effectiveness and 
reliability. If successful, this would provide a wide area search 
capability for rapid tunnel detection. This is high risk research, but 
if successful, can be a game-changer of new operational capability to 
our component customers and will complement our Transition and 
Innovation efforts.
    HIPS are designed to deliver prototype-level demonstrations of 
game-changing technologies within two to five years. An example within 
the HIPS portfolio is the SAFECON project which is focused on 
developing an advanced screening capability at ports of entry. Sensors 
mounted on a crane interrogate shipping containers as the crane engages 
and lifts the container off of the ship. The sensors detect and 
identify dangerous cargo without impact to the normal flow of commerce. 
Our goal is to detect and identify dangerous cargo within 45 seconds or 
less.

Introduction to the Product Transition Portfolio

    The Product Transition Portfolio, for which I am the Director, is 
centered on 11, functional, customer led, Capstone Integrated Product 
Teams (IPTs), three of which are Maritime Security, Cargo Security, and 
Border Security. In the Capstone IPTs, DHS operational components and 
directorates are the chairs or co-chairs and they define and prioritize 
capability gaps, then S&T offers technical solutions, and the customers 
are the final approval on if the offered technical solution is 
appropriate.
    Specific to border security, our Border Security Capstone IPT is 
co-chaired by David Aguilar, Chief of the Border Patrol, and Luke 
McCormack, Chief Information Officer of Immigration and Customs 
Enforcement (ICE). For Cargo Security, Jayson Ahern, Former Assistant 
Commissioner for CBP's Office of Field Operations (OFO), was the 
original chair. His successor is Tom Winkowski, CBP's New Assistant 
Commissioner for Office of Field Operations. For Maritime Security, 
Rear Admiral Ron Hewitt, USCG, was the original chair. His successor is 
Rear Admiral Robert Parker, USCG, Assistant Commandant for Capability 
(CG-7).
    While we have identified the principal stakeholders within the 
Capstone IPTs as chairs or co-chairs, they are not the only customer 
representatives to the IPTs. All DHS operational components and 
directorates are invited as customers to any Capstone IPT relevant to 
their mission. As an example, because of the inter-relationship within 
their respective geographic areas of responsibility, Coast Guard has 
representation on the Borders IPT, TSA, and DHS Policy office have 
representation on the Cargo IPT, and, CBP and ICE have representation 
on the Maritime Security IPT. Directed by the priorities of the Border, 
Cargo, and Maritime Security Capstone IPTs, we are developing 
technologies that can be delivered to the components in three years or 
less to assist in securing our maritime and land borders, and protect 
our Customs and Border Protection and Coast Guard law enforcement 
officers.

Introduction to the Borders and Maritime Security Division

    The Borders and Maritime Security Division oversees the delivery of 
technologies to provide advanced detection, identification, 
apprehension and enforcement capabilities along land and maritime 
borders, and provide advanced technology spiral-development 
``injections'' into the following program areas: Secure Border 
Initiative Network (SBI Net), Command 21, Secure Freight Initiative, 
Container Security Initiative, and Customs Trade Partnership Against 
Terrorism (C-TPAT).

Borders and Maritime Technologies Programs

    A number of our programs focus on developing Detection, 
Classification, and Localization (DCL) sensor technologies to monitor 
illegal border activity with a wider range and greater accuracy than 
present-day technologies; command and control systems that deliver a 
much broader amount of information about current events to different 
levels of law enforcement; communications systems that provide 
connectivity to law enforcement officers working in remote locations; 
and modeling and simulation tools to help border enforcement agencies 
make informed improvements in immigration and border security policy 
and operations, as well as investments in technology, complex systems 
and infrastructure. These technologies and systems will help to ensure 
that maritime and border security assets are used efficiently and 
effectively and enable law enforcement to have access to robust and 
reliable intelligence when they need it.

Unmanned Aircraft for Border and Maritime Security Missions

    We are continuing to actively develop technologies that will permit 
routine operation of UAVs for border and maritime security missions 
within the National Airspace System. In conjunction with the FAA and 
the DOD, we are developing an FAA-validated simulation that will be 
used, starting in FY09, to evaluate automated sense and avoid systems, 
the key enabler for safe and routine unmanned aircraft flight. DHS S&T 
is also partnering with DOD in the ongoing Global Observer Joint 
Concept and Technology Demonstration (JCTD), which offers the potential 
for DHS to provide persistent, airborne, wide area surveillance along 
our borders and coasts.
    In cooperation with Customs and Border Protection and the Coast 
Guard, S&T is planning a demonstration for employing maritime radar on 
an unmanned aircraft to detect and help prosecute drug running boats 
off the Florida coast. We are actively pursuing, both outside DHS with 
the Departments of Commerce, Defense, and Transportation and inside DHS 
with CBP and the Coast Guard, the increased use of unmanned aircraft to 
secure our nation's borders and provide airborne capabilities for 
requirements that require extended station times.

Border Officer Tools Program

    The officer tools and safety effort is developing and delivering 
technologies that will enable border security and Coast Guard members 
to perform their current tasks more efficiency, effectively, and with a 
higher level of safety. Development of these tools in many cases is 
leveraged from the initial investments of other government agencies, 
and then adapted to fit the operational environment and functions of 
several DHS security components. Where possible, technology is 
leveraged to support multiple DHS components. For example, the program 
will provide Coast Guard boarding officers with tools they carry onto 
vessels to perform inspections, which could be applied to CBP searches 
of over-the-road transportation. We are also developing tools that can 
be used by multiple DHS components to rapidly search vessels or 
vehicles, locate any hidden compartments, discriminate legitimate cargo 
from contraband, and remotely attain a positive identification of a 
person. We have recently developed and are not testing a pre-
acquisition prototype of a repeater-based communications system that 
permits communication among boarding team members, no matter where they 
are in a ship. Repeaters are small transmission devices that are 
deployed like breadcrumbs as boarding officers enter and search a ship. 
The repeaters provide 100 percent connectivity between boarding team 
members in areas that previously allowed less than 50 percent 
connectivity without repeaters. In the future, we plan to make 
available a deployable communications repeater for boarding teams.

Cargo Security Efforts and Programs

    Through our SAFECON (safe container) HIPS project, we are 
researching ways to quickly screen cargo at ports of entry. As a 
complement, we are also looking to improve supply chain security and 
thus decrease screening frequency and simultaneously increasing our 
probability of detection of dangerous contraband. Using a system-of-
systems approach, we are developing advanced sensor and communication 
technologies within a security architecture that encompasses the 
world's supply chain. Some technologies developed in this program will 
enable CBP officers to identify tampering events and their location, 
track shipping containers, and ensure that alarm data is communicated 
reliably and securely. Most of these technologies will be 
commercialized, purchased by industry and adopted as an international 
standard that will meet DHS's core security requirements. Current 
project activities include the Advanced Container Security Device 
(ACSD), an in-container sensor to detect and warn of intrusion on any 
six sides, door openings or the presence of human cargo; Container 
Security Device (CSD), a small, low-cost sensor mounted within a 
container to detect and warn of the opening or removal of a container 
door; Marine Asset Tag Tracking System (MATTS), a remote and adaptive 
multi-modal global communications and tracking tag for transmitting 
security alert information from ISO shipping containers; Hybrid 
Composite Container, a potential next-generation, ISO approved, 
shipping container with embedded security sensors to detect intrusions 
that is more than 15 percent lighter than existing ISO steel containers 
and more durable; Advanced Screening and Targeting, a project that 
develops computer algorithms and software that will automatically 
collect, combine, analyze and find suspicious patterns in the shipping 
information of containers; and Supply Chain Security Architecture 
(SCSA), a framework for how near-term and future container-security 
technologies that will be incorporated by industry into supply chain 
security operations and how information can be communicated securely to 
CBP officer.

Technology Transition Process: Customer Focused and Output Oriented

    As we develop these technologies, we recognize we need a 
disciplined process to ensure the technology is turned into widely 
distributed and utilized products and capabilities. Once the Capstone 
IPTs approve technical solutions, project level IPTs--S&T program 
managers working with component-customer program managers--are 
established to turn the proposed technical solutions into deliverable 
technology that is affordable and meets the customer's schedule and 
performance requirements. Through signed Technology Transition 
Agreements, S&T and our customers define and agree on schedule, 
performance requirements, transition paths, organizational 
responsibilities, integration strategy, technology transition readiness 
level, and estimated procurement, operating and support cost up front. 
This way, if initial procurement is too expensive, or operating costs 
are prohibitive, the decision to look for a new technology solution can 
be made early--before large buy acquisition programs are initiated and 
before federal, State, local, and tribal entities expend their precious 
resources.

Conclusion

    In summary, DHS S&T is dedicated to being a customer focused, 
output oriented organization. Through the Capstone IPT process, our 
customers prioritize and decide on the incremental technology 
improvements most important to them. Informed by the Capstone IPTs, our 
basic research and innovation efforts provide the focused, protracted 
research and high impact advanced research for longer-term game 
changing technology solutions. We are dedicated to providing our 
customers--the DHS components and directorates, State, local and tribal 
governments, first responders and private sector entities--the 
technology necessary to succeed at their mission and protect our 
nation. That concludes my statement for the record. On behalf of Under 
Secretary Cohen, thank you for your support of the Science and 
Technology Directorate, and I welcome your questions. Thank you.

                     Biography for Robert R. Hooks
    Robert Hooks serves as the Director of Transition, in the Science 
and Technology Directorate of the Department of Homeland Security. In 
this role, Mr. Hooks is responsible for delivering near-term advanced 
technologies to the operational components of the Department to address 
their priority mission capability gap areas. Mr. Hooks communicates 
regularly with the component agencies of the Department to understand 
capability gaps and propose appropriate technology solutions that can 
transition into future component acquisition programs. Mr. Hooks then 
shares these desired technology solutions with other U.S. Government 
agencies, the private sector and International partners to identify the 
most appropriate providers. In addition, Mr. Hooks oversees the 
Department's SAFETY Act program which provides important legal 
liability protection to qualified Anti-Terrorism technologies, whether 
they are products or services.
    Previously, Mr. Hooks served as the Chief of Staff for the Science 
and Technology Directorate and was responsible for the day-to-day 
management of the Directorate. He has also served as the Deputy 
Director in the Office of Research and Development where he oversaw the 
research, development, test and evaluation programs that were executed 
at the DHS federal laboratories, including the National Biological 
Analysis and Countermeasures Center, the Plum Island Animal Disease 
Center, the Transportation Security Lab, as well as within the Homeland 
Security elements of the DOE national laboratories. He oversaw the 
Homeland Security Stewardship Initiative, which included facilities 
construction and recapitalization, strategic partnerships with other 
government agencies, and Homeland Security focused workforce 
development and education programs that included a Scholars/Fellows 
Program and an integrated network of Homeland Security University 
Centers of Excellence.
    Prior to joining the Department of Homeland Security in July 2003, 
Mr. Hooks served 20 years in the U.S. Navy in a variety of positions as 
a submarine officer, financial analyst, intelligence analyst, and 
personnel specialist. Mr. Hooks was the Contingency Budget Analyst in 
the Navy Budget Office where he was responsible for the Department of 
Navy's funding of military readiness and operations following the 
September 11th attacks and the wars against Afghanistan and Iraq. His 
sea tours were on both fast attack and ballistic missile submarines and 
included overseas deployments, special missions, and six Trident 
strategic deterrent patrols during the Cold War. He also served as an 
intelligence analyst for special programs at the National Security 
Agency where he authored several strategic intelligence assessments.
    Mr. Hooks graduated from Cornell University with a Bachelor's of 
Science degree in Agricultural Engineering. He also holds a Master's of 
Administrative Science in Financial Management from The Johns Hopkins 
University. He was selected to the Senior Executive Service in 
September 2005.

 STATEMENT OF MR. ERVIN KAPOS, DIRECTOR, OPERATIONS ANALYSIS, 
  SCIENCE AND TECHNOLOGY DIRECTORATE, DEPARTMENT OF HOMELAND 
  SECURITY; EXECUTIVE DIRECTOR, HOMELAND SECURITY SCIENCE AND 
             TECHNOLOGY ADVISORY COMMITTEE (HSSTAC)

    Mr. Kapos. Good morning, Chairman Mitchell, Congressmen 
Gingrey and Hall, and other Members of the Committee. I am 
Ervin Kapos, Director of Operations Analysis for the Science 
and Technology Directorate of the Department of Homeland 
Security, and I am pleased to appear before you today to 
discuss my responsibilities concerning the oversight of the 
Homeland Security's Science and Technology Advisory Committee. 
And I must express my gratitude for somebody having introduced 
into the record its informal name, the HSSTAC, so I don't have 
to trip over its full name.
    The HSSTAC was originally authorized in Section 311 of the 
Homeland Security Act for a period of three years, expiring on 
November 25, 2005. In October 2006, Section 302 of the Safe 
Port Act, and under Section 311 of the Homeland Security Act, 
reauthorizing the HSSTAC until December 31, 2008. The HSSTAC is 
chartered to be a source of independent scientific and 
technical planning advice for the Under Secretary for Science 
and Technology, with several objectives.
    First, the committee advises the Under Secretary for S&T on 
organization of the Nation's scientific and technological 
resources, to prevent or mitigate the effects of catastrophic 
terrorism against the United States, and of catastrophic 
natural events. Second, it identifies research areas of 
potential importance to the security of the Nation, including 
matters relating to science, technology, research, engineering, 
new product development, including demonstration and 
deployment, business processes, emergency response, cargo 
security, technology, and other matters of special interest to 
the Department of Homeland Security.
    Third, the HSSTAC assists the Under Secretary in 
establishing mission goals for the future. It advises on 
whether the policies, actions, management processes, and 
organizational constructs of the Science and Technology 
Directorate are focused on mission objectives. It advises on 
whether the research, development, test evaluation, and systems 
engineering activities are properly resourced to accomplish the 
objectives. It also identifies outreach activities and reviews 
the technical quality and relevance of the Directorate's 
programs.
    Finally, upon request, the HSSTAC provides scientifically- 
and technically-based advice to the Homeland Security Advisory 
Council. Conversely, the committee draws, when needed, on the 
expertise of outside advisory groups for independent advice on 
specific technical and policy matters.
    The HSSTAC has changed its modus operandi in the past year. 
It is now focused predominantly on certain high-priority issues 
that the Under Secretary has identified for it. At present, the 
HSSTAC is tasked with reviewing the threat that is expected 
from improvised explosive devices, IEDs, in the United States 
in the next five and more years, and recommending Science and 
Technology investments to counter this threat in the future.
    I believe, as does Mr. Cohen, that the HSSTAC provides the 
S&T Directorate valuable, independent, scientific and technical 
planning advice. We appreciate and support your efforts to 
extend the HSSTAC authority to 2012. Under Secretary Cohen 
appreciates your support of the S&T Directorate.
    I shall welcome your questions. Thank you very much.
    Mr. Mitchell. Thank you. Dr. Jackson.
    [The prepared statement of Mr. Kapos follows:]
                   Prepared Statement of Ervin Kapos
    Good morning, Chairman Wu, Congressman Gingrey and distinguished 
Members of the Subcommittee. I am Ervin Kapos, Director of the 
Operations and Analysis Division for the Science and Technology (S&T) 
Directorate of the Department of Homeland Security, and I am pleased to 
appear before you today to discuss my responsibilities concerning the 
oversight of the Homeland Security Science and Technology Advisory 
Committee (HSSTAC).
    The HSSTAC was originally authorized in Section 311 of the Homeland 
Security Act (P.L. 107-296) for a period of three years, expiring on 
November 25, 2005. In October 2006, Section 302 of the SAFE Port Act 
(P.L. 109-347) amended section 311 of the Homeland Security Act 
reauthorizing the HSSTAC until December 31, 2008.
    The HSSTAC is chartered to be a source of independent scientific 
and technical planning advice for the Under Secretary for S&T with 
several objectives. First, the Committee advises the Under Secretary 
for S&T on organizing the Nation's scientific and technological 
resources to prevent or mitigate the effects of catastrophic terrorism 
against the United States, and of catastrophic natural events.
    Second, it identifies research areas of potential importance to the 
security of the Nation, including matters relating to science, 
technology, research, engineering, new product development (including 
demonstration and deployment), business processes, emergency response, 
cargo security technology, and other matters of special interest to the 
Department of Homeland Security.
    Third, the HSSTAC assists the Under Secretary in establishing 
mission goals for the future. It advises on whether the policies, 
actions, management processes, and organization constructs of the 
Science and Technology Directorate are focused on mission objectives. 
It advises on whether the research, development, test, evaluation, and 
systems engineering activities are properly resourced to accomplish the 
objectives. It also identifies outreach activities and reviews the 
technical quality and relevance of the Directorate's programs.
    Finally, upon request the HSSTAC provides scientifically- and 
technically-based advice to the Homeland Security Advisory Council. 
Conversely, the Committee draws, when needed, on the expertise of 
outside advisory groups for independent advice on specific technical 
and policy matters.
    At present, the HSSTAC is tasked with reviewing the threat that is 
expected from Improvised Explosive Devices (IED) in the United States 
in the next five and more years, and recommending Science and 
Technology investments to counter this threat in the future. I believe, 
as does Mr. Cohen, that the HSSTAC provides the S&T Directorate 
valuable, independent scientific and technical planning advice. We 
appreciate and support your efforts to extend the HSSTAC Authority to 
2012. Under Secretary Cohen appreciates your support of the S&T 
Directorate, and I welcome your questions. Thank you.

                       Biography for Ervin Kapos

Introduction

    Mr. Kapos was born in Transylvania (Romania) in 1931, and lived in 
Cyprus from 1938 to 1950. He then came to the United States and 
attended Indiana University, studying mathematics at both the 
undergraduate and graduate levels for eight years, before moving to the 
Washington, D.C. area. He now lives in McLean, Virginia, with his wife 
June, a professional potter; their daughter Valerie, a tropical 
botanist, lives in Cambridge, England, with her husband and two 
daughters. Mr. Kapos was a Founding Director of MORS in 1966, Vice 
President and a member of the Council on Military Operations Research 
Symposia, and was a Chartering Officer for MAS, the Military 
Applications Section (now a Society).

Education

    Mr. Kapos completed a B.A. in Mathematics at Indiana University in 
1954 and completed Ph.D. course work in Mathematics, also at Indiana 
University. At Indiana University, Mr. Kapos was a Teaching Associate 
in the Department of Mathematics and a Research Associate in the 
Institute of Educational Research.

Experience

    Mr. Kapos joined the Navy's Operations Evaluation Group (OEG) 
(later an element of the Center for Naval Analysis) in 1958, 
immediately after leaving graduate school and remained there for almost 
15 years. He served several tours as an analyst in the fleet, mainly 
with Pacific Fleet Commands, including OPTEVFORPAC, First Fleet, and 
CINCPACFLT. He also established and directed first-of-their-kind 
operations analysis programs in Command and Control and in Operational 
Intelligence. During the period from 1967 to 1972, he was successively 
Director of CNA's Southeast Asia Combat Analysis Division, Marine Corps 
Operations Analysis Group, and Operations Evaluation Group.
    Mr. Kapos was senior OEG Representative on the staff of the 
Commander-in-Chief, Pacific Fleet, Commander, First Fleet, and the 
Commander, Operational Test and Evaluation Force. He conducted 
extensive analyses of combat operations in Southeast Asia, 
concentrating on the effectiveness of air and surface interdiction and 
on techniques of defense suppression. Other efforts involved test and 
exercise design, reconstruction and analysis in a variety of naval 
warfare and support areas, but with particularly heavy emphasis on 
communications, command and control. Mr. Kapos also developed a unique 
concept of intelligence analysis that culminated in a major Navy-
supported study program know as ``Red Side Operations Analysis.''
    Mr. Kapos was Director of the Marine Corps Operations Analysis 
Group, CNA. He managed the principal operational and systems analysis 
organization supporting the Commandant, U.S. Marine Corps and the Fleet 
Marine Forces. Earlier, Mr. Kapos was Director of the Southeast Asia 
Combat Analysis Division and directed analyses of the operations and 
effectiveness of Naval forces in Southeast Asia. Before that he was 
Leader of the Communications, Command and Control Team, where he 
pioneered the application of operations analysis in those areas.
    Mr. Kapos was Director of the OEG for three years. He managed 
almost 100 civilians and military analysts. Programs included a field 
organization of 40 professionals at about 30 Navy operating commands, 
and a headquarters analysis effort totaling about 60 professionals that 
covered the range of Navy warfare and support disciplines.
    Joining Ketron, Inc. in late 1972 as Vice President and Director of 
Washington Operations, Mr. Kapos became Executive Vice President in 
1976 and President in 1980. He was personally involved in many of the 
naval warfare and support studies carried out in Ketron. He was most 
heavily engaged in analytical support to planning studies affecting 
naval surface warfare and command support, evolving concepts and 
objectives for tactical development and evaluation in the Navy, new 
concepts for readiness evaluation, the application of operations 
analysis to problems in operational intelligence, and the development 
of new approaches to the use of gaming and simulation for command and 
management training.
    He was the founding principal and President of Kapos Associates 
Inc. (KAI) from 1984 to 2000. In KAI, Mr. Kapos evolved a complex, 
integrated program structure of policy studies, operational analysis 
and executive level gaming that, while initially focused on naval 
issues, also served clients up to Cabinet level, including various 
interagency bodies, executive departments, military services, and 
regional commands, as well as the private sector. In substantive 
content, the projects he pioneered and directed ran the gamut of 
interagency coordination, crisis response and consequence management; 
both counter- and anti-terrorism; modeling and simulation; maritime, 
land and aerospace warfare mission areas; special operations, weapons 
of mass destruction, military operations other than war; readiness 
assessment and reporting, command and control, operational logistics, 
manpower requirements, and war-gaming.
    Mr. Kapos has been Director of the Operations Analysis Program in 
the Office of Naval Research (ONR) since 2001. The program is intended 
both to establish OA as a tool for management decision-making in ONR 
and thus an internal service function, and to provide solutions to 
problems in analytical methodology that obstruct the application of OA 
in such key areas as readiness assessment, command and control, force 
protection, and experimentation.

Other Professional Experience, Honors

    He received the Secretary of the Navy's Meritorious Public Service 
Citation as well as numerous letters of commendation from the Naval 
Fleet and Force Commanders. Mr. Kapos has been an Associate Member of 
the Defense Science Board, serving on the Naval Surface Warfare Panel 
in 1974-76, and the Summer Study on Training and Training Technology in 
1982. In 1987-1988, he was a member of the DSB Task Force on Computer 
Applications to Training and War-gaming. He has been a member of the 
National Academy of Science/National Research Council Panel on Response 
to Casualties involving Ship-Borne Cargoes. Mr. Kapos also served on 
the National Security Agency Advisory Board in 1979-1982. He served on 
the Panel on Science and Technology and Center for Strategic and 
International Studies (CSIS), and was a member of the Panel on Crisis 
Management at CSIS.

STATEMENT OF DR. BRIAN A. JACKSON, ASSOCIATE DIRECTOR, HOMELAND 
        SECURITY RESEARCH PROGRAM, THE RAND CORPORATION

    Dr. Jackson. Thanks very much. Chairman and distinguished 
Members, I thank you for inviting me to participate in today's 
hearing.
    I was asked to testify specifically about a recently-
completed RAND research project that was supported by the 
Department of Homeland Security's Science and Technology 
Directorate that looked at how adversaries, terrorist groups in 
particular, can undermine the effectiveness of security 
technologies by altering their behavior. The way such groups 
have responded to defensive measures is similar to how others 
who seek to cross the border illegally can and have responded 
to security efforts, making the lessons that the terrorist 
groups can teach us very relevant to today's discussion about 
future border security technologies.
    The core message of my testimony today is that we must 
explicitly consider the risks that adversaries' adaptive 
behavior poses to the performance of our border security 
technologies when we craft our research and development plans. 
If we don't do so, we risk spending resources on defenses that 
ultimately will not deliver the protection that we expect them 
to.
    Looking across a variety of terrorist groups, we found that 
when challenged by security efforts, they responded with a set 
of four counterstrategies that limited the effects that the 
defenses had on the groups' operations. Specifically, they 
changed their operational practices in ways that made the 
defenses less effective. They used new technologies of their 
own to counter them. They moved to alter or to avoid the 
defensive measures, and they attacked the security technologies 
directly.
    My written testimony and the research underlying it 
document numerous examples of counter technology strategies 
that these groups put in place, but what we found overall is 
that, for most defensive measures, the groups could find ways 
to degrade their protective value. In some cases, the groups 
paid a significant price to get around defensive measures. For 
example, to evade border controls and the security fence being 
put around the Israeli border, Palestinian groups had to 
develop specialized ladders that could let them get over 
without triggering the detection technologies on top, or had to 
build elaborate tunnel systems to get under it, as we have 
heard is a challenge at our border. In other cases, the price 
to evade defensive measures was relatively small. For example, 
the Irish Republican Army determined that under some 
circumstances at least an expensive surveillance and facial 
recognition system could be defeated by having their operatives 
wear inexpensive baseball caps.
    Given what we found, we identified three principles that 
should be considered as next-generation measures are designed 
and implemented. The first is that there needs to be extensive 
testing of the robustness of new security measures before they 
are introduced. Focused red-teaming efforts, challenging the 
technologies with teams of capable individuals to see if we can 
discover new ways to penetrate them, is one way to do that 
assessment. Such red-teaming is accepted practice in many 
technology development efforts, but our study further 
emphasized how important it is. The need to assess new 
technologies' weaknesses also suggests that small-scale 
demonstration projects may be particularly valuable steps to 
include in technology programs whenever possible before 
expanding to large-scale demonstrations or technology 
deployment, particularly given the extensive border security 
protection challenge that we face in this country.
    A second principle is that we should preserve as much 
flexibility as we can in the technologies that we deploy. 
Systems that aren't locked into specific modes of operation 
preserve the ability of border security organizations to 
respond when adversaries change their behavior. Explicitly 
considering the value of this flexibility as we assess new 
technologies is important, since flexible technologies may cost 
more than systems that are locked into only one operational 
mode. If we don't consider the value of that flexibility, it 
may be inadvertently sacrificed to cut costs.
    The final principle is that the Nation should maintain a 
diverse and flexible border security research, development, 
tests, and evaluation portfolio. If we devote all our resources 
to optimizing a single line of defense, there may be no backup 
available if that line is breached. Even if multiple defensive 
options are not all deployed, a portfolio approach to 
developing measures can provide fallback options if an initial 
defense becomes obsolete.
    Depending on the level of the adaptive threat we face, the 
Nation might actually be better off having multiple defensive 
options of average effectiveness than concentrating on raising 
the performance of a single technology to the highest 
effectiveness possible, in terms of thinking about this as an 
overall system.
    When faced with an adaptive challenge, the bottom line from 
our work is that we need to be prepared to adapt in return. The 
potential that adversaries might break through a defense soon 
after its introduction must be carefully assessed and included 
in our decision-making. Not doing so risks making large 
investments whose eventual benefits may not justify their 
costs. In designing protective measures, it shouldn't be 
immediately assumed that the newest and most advanced 
technologies give us the best protection. Sort of going to our 
title of our report, drawing on the common metaphor for defense 
efforts of building a fortress, relying on formidable but 
static defensive measures is a rather fragile and tenuous 
strategy, because once a wall is breached, there may not be 
anything left to protect you.
    Depending on the adaptive capabilities of the adversary, a 
defensive model built on variety, where we have a number of 
security measures that can be adjusted and redeployed as their 
vulnerable points are discovered, is a superior approach.
    I would like to thank you again for the opportunity to 
address the committee, and look forward to your questions.
    Mr. Mitchell. Thank you. Chief Self.
    [The prepared statement of Dr. Jackson follows:]
               Prepared Statement of Brian A. Jackson\1\
---------------------------------------------------------------------------
    \1\ The opinions and conclusions expressed in this testimony are 
the author's alone and should not be interpreted as representing those 
of RAND or any of the sponsors of its research. This product is part of 
the RAND Corporation testimony series. The series records testimony 
presented by RAND associates to federal, State, or local legislative 
committees; government-appointed commissions and panels; and private 
review and oversight bodies. The RAND Corporation is a nonprofit 
research organization providing objective analysis and effective 
solutions that address the challenges facing the public and private 
sectors around the world. RAND's publications do not necessarily 
reflect the opinions of its research clients and sponsors.
---------------------------------------------------------------------------

   Developing Robust Border Security Technologies to Protect Against 
                    Diverse and Adaptive Threats\2\
---------------------------------------------------------------------------

    \2\ This testimony is available for free download at http://
www.rand.org/pubs/testimonies/294/
---------------------------------------------------------------------------
    Chairman and distinguished Members: Thank you for inviting me to 
speak on the issue of border security technology as the House Science 
and Technology Committee begins the process of considering legislation 
focused on developing the next generation of border and maritime 
security technologies. I was asked to provide testimony about a 
recently completed RAND research effort for the U.S. Department of 
Homeland Security, Science and Technology Directorate, Office of 
Comparative Studies, focusing on the role of technology in homeland 
security activities.\3\ As part of homeland security efforts, 
technology systems play a key role within a larger, integrated strategy 
to counter the efforts of violent and criminal organizations and to 
protect the public. Information and detection technologies gather data 
on individuals, vehicles, and behaviors; are used to monitor sites and 
areas of concern (including border information systems aimed at 
identifying individuals who should be not allowed to enter the 
country); help detect concealed weapons or contraband; and manage 
collected information so such information can be drawn on later to 
guide security decisions. Technologies such as barriers and setbacks 
harden targets or deny individuals access to the areas they want to 
enter or attack. Technologies such as communication systems coordinate 
response activities to increase the chances that terrorist or other 
illegal activities can be interdicted and stopped.
---------------------------------------------------------------------------
    \3\ The results of this research effort have been published in a 
series of RAND reports focusing on the use of technology by terrorist 
groups and security organizations combating terrorism: Breaching the 
Fortress Wall: Understanding Efforts to Overcome Defensive 
Technologies, Brian A. Jackson et al., RAND MG-481-DHS, 2007, available 
at http://www.rand.org/pubs/monographs/MG481/; Sharing the Dragon's 
Teeth: Terrorist Groups and the Exchange of New Technologies, Kim 
Cragin et al., RAND MG-485-DHS, 2007, available at http://www.rand.org/
pubs/monographs/MG485/; Stealing the Sword: Limiting Terrorist Use of 
Advanced Conventional Weapons, James Bonomo et al., RAND MG-510-DHS, 
2007, available at http://www.rand.org/pubs/monographs/MG510/; Network 
Technologies for Networked Terrorists: Assessing the Value of 
Information and Communication Technologies to Modern Terrorist 
Organizations, Bruce W. Don et al., RAND TR-454-DHS, 2007, available at 
http://www.rand.org/pubs/technical--reports/TR454/; Freedom and 
Information: Assessing Publicly Available Data Regarding U.S. 
Transportation Infrastructure Security, Eric Landree, et al., RAND TR-
360-DHS, 2007, available at http://www.rand.org/pubs/
technical<INF>-</INF>reports/TR360/
---------------------------------------------------------------------------
    Our work has examined security technologies in the context of long-
term conflicts between law enforcement and security organizations and 
terrorist groups. Much of this research focused on how the 
effectiveness of security technologies can degrade as our adversaries 
adapt and alter their behavior in response to the introduction of 
defensive measures.\4\ That adaptive behavior can pose a significant 
risk to the security benefits new defensive technologies are intended 
to provide and, therefore, must be considered in technology planning. 
The testimony provided today is drawn from this research and focuses on 
the parts of the study that specifically address technologies relevant 
to border security.\5\
---------------------------------------------------------------------------
    \4\ See Breaching the Fortress Wall: Understanding Efforts to 
Overcome Defensive Technologies, Brian A. Jackson, et al., RAND MG-481-
DHS, 2007, available at http://www.rand.org/pubs/monographs/MG481/
    \5\ While these remarks draw both on my work and that of my co-
authors and colleagues, the specific content of my testimony is my 
responsibility alone. Additional information on RAND's research 
relevant to border security challenges is included in Michael A. 
Wermuth and K. Jack Riley, ``The Strategic Challenge of Border 
Security,'' Testimony before the Committee on Homeland Security, 
Subcommittee on Border, Maritime and Global Counterterrorism, U.S. 
House of Representatives, March 8, 2007, available at http://
www.rand.org/pubs/testimonies/CT275/
---------------------------------------------------------------------------
    Although preventing a terrorist attack is one reason for the 
security measures at our nation's borders, it is not the only goal 
those measures are intended to achieve.\6\ It is estimated that several 
hundred thousand individuals enter the United States illegally each 
year.\7\ Most people seeking to cross the U.S. border illegally are not 
doing so to conduct terrorist activities. Rather, they are seeking to 
enter the country themselves, smuggle drugs, move other illicit goods, 
or engage in human trafficking. The shipping of illicit cargo through 
legitimate means--e.g., through the container shipping system--is also 
a concern. Although such individuals and groups are not motivated by 
the same factors as terrorist groups, they are nonetheless similarly 
determined to succeed and will respond to defensive measures placed in 
their path to hinder them. As a result, the broader lessons we 
identified about designing technologies that are robust to terrorist 
group adaptation are similarly relevant to the other challenges and 
threats that border protections are designed to address.
---------------------------------------------------------------------------
    \6\ U.S. Customs and Border Protection, Office of Border Patrol, 
``National Border Patrol Strategy,'' undated.
    \7\ See, for example, estimates in Government Accountability 
Office, ``Illegal Immigration: Border-Crossing Deaths Have Doubled 
Since 1995; Border Patrol's Efforts to Prevent Deaths Have Not Been 
Fully Evaluated,'' GAO-06-770, August 2006.
---------------------------------------------------------------------------
    The core message of my testimony today is that in our technology 
planning and development we must explicitly consider the risk to the 
performance of our border security technologies that is posed by the 
competitive, action-reaction dynamic that exists between our security 
efforts and the adversaries they target; if we do not do so, we risk 
spending resources on defenses that ultimately will not deliver the 
protection we expect. To do so we must

        <bullet>  include testing, red-teaming, and experimentation in 
        technology development efforts to ensure new security measures 
        are robust to adversary adaptation

        <bullet>  maintain flexibility in our security technologies to 
        the extent possible so we can respond to changes in the 
        behavior of our adversaries that degrade or eliminate the 
        protection the systems provide

        <bullet>  ensure defense in depth by developing portfolios of 
        defensive measures that provide ``fall back'' options if 
        adversaries learn how to avoid our primary defensive systems

    Finally, although the focus of today's hearing is on developing 
technology, we must also remember that security is ensured not by 
technical systems alone but also by the organizations and people who 
use them and the concepts of operation that guide how they are used.\8\ 
How we use technologies is a key determiner of how vulnerable or robust 
technologies are to our adversaries' adaptive efforts and helps to 
determine the net security effect of adversaries' efforts to break 
through our defenses. As a result, how technologies will be used in 
border security efforts should be considered during technology planning 
and research roadmapping to make sure we capture the full set of 
factors that will define their future security performance.
---------------------------------------------------------------------------
    \8\ See, for example, David Aguilar, Office of Border Patrol, 
``Border Security: Infrastructure, Technology and the Human Element,'' 
Testimony Before the Subcommittee on Border, Maritime and Global 
Counterterrorism, Committee on Homeland Security, U.S. House of 
Representatives, February 13, 2007; RADM David P. Pekoske, U.S. Coast 
Guard, ``Border Security: Infrastructure, Technology and the Human 
Element,'' Testimony Before the Subcommittee on Border, Maritime and 
Global Counterterrorism, Committee on Homeland Security, U.S. House of 
Representatives, February 13, 2007; and Jay Cohen and Gregory Giddens, 
Department of Homeland Security, ``How Can Technologies Help Secure Our 
Borders?'' Testimony Before the Committee on Science, U.S. House of 
Representatives, September 13, 2006.

How Can The Responses of Terrorist Groups or Other Adversaries Affect 
                    the Protective Value of Security Technologies?

    New security technologies are frequently costly, making it 
imperative that we ensure, to the extent possible, that they will 
produce enough benefits in improved security to justify the investments 
required to develop and deploy them. If there is a substantial risk 
that the security benefits of a particular technology will not be 
realized, that risk could make an otherwise promising technology a poor 
choice.
    In our research, we examined one such risk: How changes in behavior 
by terrorist groups could reduce or even eliminate the protective value 
of technological security measures. To identify how technologies were 
vulnerable to terrorist group adaptation, we looked at how a number of 
such organizations responded when they were challenged by new defensive 
measures. Because we were interested in lessons relevant to today's 
homeland security context, we examined four comparatively sophisticated 
terrorist groups that were in conflict with sophisticated states:

        <bullet>  Palestinian terrorist groups in Israel

        <bullet>  Jemaah Islamiyah (JI) and affiliated groups in 
        Southeast Asia

        <bullet>  Liberation Tigers of Tamil Eelam (LTTE) in Sri Lanka

        <bullet>  Provisional Irish Republican Army (PIRA) in the 
        United Kingdom

    We found that the groups responded to security measures put in 
place by states or across regions with a set of four counter-technology 
strategies to limit the effect of the defenses on their operations. 
Specifically, they changed their operational practices in ways that 
made the defenses less effective, used new technologies of their own to 
counter them, moved to avoid the defensive measures, and attacked the 
security technologies directly. U.S. experience with individuals and 
organizations seeking to cross our border illegally shows these same 
broad strategies are relevant to help design current efforts to secure 
the country and to develop the technological tools needed to do so.
    To illustrate the effect that groups changing their behavior has on 
the effectiveness of defensive measures, I discuss here a few of the 
ways the terrorist groups we studied reduced the effectiveness of 
protective technologies, circumvented the technologies entirely, and 
even attacked or corrupted the defensive measures that were getting in 
their way.
    In many cases, terrorist groups found ways to change their behavior 
to render protective measures less effective. For example, the majority 
of the four terrorist groups responded to weapons-detection 
technologies by breaking down their weapons materials into small 
quantities (such as smuggling explosives in toothpaste tubes or cookie 
tins) or otherwise shielding them from detection technologies to enable 
smuggling or attack operations. The various ways they did this included 
shipping explosives obscured by strong-smelling spices or hiding them 
in noxious cargoes like rotting fish to conceal their odor from dogs or 
confuse other detectors.
    PIRA spent considerable time conducting ``challenge-response'' 
studies to determine the limitations of surveillance systems in an 
effort to learn what the systems could and could not detect and to 
assess the areas they covered. The group then used that knowledge to 
operate in ways and at times that were less likely to be detected. For 
example, armed with the knowledge that specific weather and lighting 
conditions made some sensors less effective, PIRA planned its movements 
and operations accordingly.
    The strategies we discovered in our case studies are similarly 
relevant to the Nation's border security challenges. For example, in 
2004 testimony before the House Select Committee on Homeland Security, 
Lawrence Wein of Stanford University raised questions about whether 
terrorist groups could render the fingerprint biometric scanning done 
by the U.S. Visitor and Immigrant Status Indicator Technology (US-
VISIT) program less effective by selecting operatives whose 
fingerprints either will not scan well or have been deliberately 
altered to defeat the scanning.\9\ It is also well known that smugglers 
seeking to bring illegal narcotics and other materiel into the country 
frequently alter their operational practices to conceal their cargoes 
from search-and-detection approaches.
---------------------------------------------------------------------------
    \9\ Lawrence M. Wein, ``Disrupting Terrorist Travel: Safeguarding 
America's Borders Through Information Sharing,'' Testimony before the 
U.S. House of Representatives, Select Committee on Homeland Security, 
September 30, 2004.
---------------------------------------------------------------------------
    When they could do so, terrorist groups avoided defensive measures 
entirely, neutralizing their protective benefits. To avoid 
identification requirements and databases used to flag known or 
suspected operatives, most groups relied on false documents and 
identification credentials to hide the true history and identity of 
both people and vehicles. Some groups even took this strategy to the 
extreme, coercing innocent people with no connection to terrorism--by 
threatening their lives or the lives of their loved ones--to transport 
people or weapons through checkpoints with identity checks.
    Avoidance can work for surveillance systems as well: As part of 
Israeli security measures, overhead surveillance with unmanned aerial 
vehicles (UAVs) or helicopters were used to monitor areas near the 
border where attacks were staged. In rural areas, Palestinian groups 
used spotters on rooftops in the West Bank or Gaza Strip to watch for 
the vehicles and warn militants to stay out of sight when the 
surveillance systems were in the area.
    To avoid some defenses, groups had to make more drastic changes. In 
response to significantly strengthened border security at ports of 
entry in the nations where it operated, JI shifted its operations from 
seeking to move people and material through defended areas like 
airports to less monitored and defended maritime or land borders. In 
response to the security barrier erected around Israel, Palestinian 
groups reportedly deployed specially crafted ladders that enabled them 
to climb over the security fences without triggering the sensors at the 
top. In addition, the groups have also engaged in extensive tunneling 
to circumvent the barrier around Israel and border security between 
Egypt and Gaza, enabling weapons smuggling and infiltration. The 
Israeli Defense Force (IDF) notes that Palestinians have taken a number 
of measures to avoid having their tunneling operations detected, 
including building tunnels in residential areas (entrances are often 
through private homes and property), digging at night, transporting 
displaced dirt and sand out of the vicinity of the tunnels, and staging 
diversionary strikes against IDF outposts to conceal the sound of 
explosives.
    At our own border, individuals seeking to enter the United States 
illegally have responded to the deployment of border fencing in similar 
ways, for example by altering their routes and seeking to enter the 
country at more remote, unfenced locations. Drug smugglers have 
similarly shifted their routes and transport modes to avoid 
interdiction efforts.\10\ Tunneling under the barriers has also been 
observed.\11\
---------------------------------------------------------------------------
    \10\ See, for example, discussion in Office of National Drug 
Control Policy, ``Measuring the Deterrent Effect of Enforcement 
Operations on Drug Smuggling, 1991-1999,'' August 2001.
    \11\ See, for example, discussion in Blas Nunez-Neto and Stephen 
Vina, ``Border Security: Barriers Along the U.S. International 
Border,'' Congressional Research Service, RL33659, September 21, 2006.
---------------------------------------------------------------------------
    Finally, in some limited cases, terrorist groups simply attacked 
the defensive measures hindering their activities. In response to the 
extensive use of information systems in the counterterrorism effort 
against PIRA, the group sought to attack information systems directly 
to corrupt or steal information (at one point breaking into a police 
facility to steal files). The group also used information-gathering 
technologies such as the security organizations' own public tip line to 
inject false information into the system. The group also used hoax 
operations and triggered detection technologies to cause false alarms 
as ways to stress the capabilities of the security and response forces. 
In some cases, the groups we studied directly broke down barriers and 
defenses that got in their way, either by using larger bombs or by 
staging more complex operations to neutralize the defense before a 
larger attack took place. In response to the construction of fencing on 
the U.S. land border, similar efforts to damage or breach the barrier 
have been observed.\12\
---------------------------------------------------------------------------
    \12\ See, for example, discussion in Nunez-Neto and Vina, 2006.
---------------------------------------------------------------------------
    How important were terrorist efforts to ``learn their way around'' 
defensive measures? For most defensive measures, the groups could find 
ways to reduce their effectiveness and degrade their protective value. 
However, in some cases, terrorist groups paid a substantial price to 
neutralize a defense; for example, although a tunnel might make it 
possible to get under a security barrier, the effort the group had to 
spend to construct it was effort that could not be devoted to violent 
activities. When this was the case, even if the technology did not 
necessarily deliver the full protection it was expected to--or deliver 
it in the way that was expected when it was designed--its value could 
still be considerable.
    Then again, in other cases, the cost to the group to evade a 
defensive measure was relatively small; in one particularly dramatic 
case cited by a counterterrorism professional we interviewed, PIRA 
learned that a sophisticated surveillance system incorporating facial 
recognition technology could, under the right circumstances, be 
countered by simply wearing a baseball cap. In this case, it took the 
group very little effort to counter the technology.

Principles for Designing Defensive Technology Efforts

    Given the costs of designing and implementing novel border security 
technologies, it is important to consider the threat that adversary 
adaptation poses to their eventual effectiveness and value during 
research, development, test, and evaluation planning, and 
implementation.\13\ Looking across the terrorist groups we studied, we 
identified a number of principles that should be considered as next-
generation measures are designed and implemented. In some cases, what 
our review of historical terrorist group behavior had to teach us was 
``not news'': Some of the lessons merely reinforced the importance of 
principles already considered good practice in technology design and 
testing. However, in other cases, what they had to teach was less 
obvious. In all cases, the potential result of not learning the lessons 
is high: losing the opportunity to prevent terrorist attacks.
---------------------------------------------------------------------------
    \13\ Michael A. Wermuth and K. Jack Riley, ``The Strategic 
Challenge of Border Security,'' Testimony Before the Committee on 
Homeland Security, Subcommittee on Border, Maritime and Global 
Counterterrorism, U.S. House of Representatives, March 8, 2007, 
available at http://www.rand.org/pubs/testimonies/CT275/
---------------------------------------------------------------------------
The Importance of Testing and ``Red Teaming'' Technologies
    Terrorist groups' counter-technology efforts underscore the 
importance of extensively testing new security measures before they are 
introduced. To make sure new technologies will perform over time, 
designers need to assess what information adversaries would need to 
circumvent the technologies and identify how they might get access to 
that information. Can groups ``test'' a defense's capabilities by 
challenging it in different ways? If a measure's performance relies on 
keeping some details of its capabilities secret, how long can those 
secrets be kept? Furthermore, dedicated ``red teaming'' of new 
technologies--challenging them with teams of capable individuals to see 
if they can discover new ways to penetrate the security measures--is 
also critical. Such testing is established practice for many security 
technologies and measures. For example, when it comes to cyber 
security, companies routinely use ``hackers'' to challenge security 
measures the companies have put in place. The need to test new 
technologies and explore their possible weaknesses also suggests that 
small-scale technology demonstration projects and evaluation studies of 
promising technologies may be particularly valuable intermediate steps 
to include in technology programs whenever possible before they are 
expanded to larger-scale demonstration or technology-deployment 
efforts.

Maintaining Flexibility in Technology Design
    Given that adversaries will almost certainly find ways to degrade 
the performance of even the best security technologies, we should 
preserve as much flexibility as possible in the technologies we design 
and deploy. If the design of a defensive measure locks it in to a 
single configuration or operating mode, its benefits are vulnerable to 
changes in adversary behavior. If the security measure is static\14\, 
it will not be able to adjust to a dynamic threat. In contrast, if 
flexibility is built into the defense from the start--e.g., if, when a 
terrorist group ``breaks the code'' on how the defense functions, we 
can change the code and reconstitute performance--then the benefits 
provided by the defensive measure can be preserved. Just as the 
terrorists we studied were able to change their operational practices 
to get around defensive technologies--e.g., obscuring the signatures 
they were designed to detect, using deception, adjusting the speed or 
character of their operations--changes in operational practices could 
similarly provide a variety of strategies for altering the character of 
defensive systems. For example, maintaining the ability to redeploy 
surveillance systems or change how security forces respond to alarms 
from detection systems are ways that technological performance could be 
altered to respond to changes by adversaries.
---------------------------------------------------------------------------
    \14\ Depending on the security measure, the technological 
characteristics--e.g., the nature of a detection technology--could make 
it difficult or impossible to change in response to adaptation by an 
adversary. In other situations, the combination of technology and the 
way it is used-- e.g., including the concept of operations, etc.--could 
make it possible to respond to countermeasures.
---------------------------------------------------------------------------
    Systems that are flexible--that are not locked into specific modes 
of operation--preserve the opportunity for border security 
organizations to adapt their performance to respond to changes made by 
individuals and organizations seeking to enter the country illegally. 
Considering the value of this flexibility in the evaluation of 
potentially new technologies is important, since providing such 
flexibility may require additional expenditures up front when the 
defense is designed and implemented. If it is not considered, options 
that could provide robustness may be inadvertently sacrificed in an 
effort to reduce costs.
Developing Portfolios of Defensive Options for Defense in Depth
    The risk that adversaries will identify strategies to defeat or 
evade individual security measures also suggests that the United States 
should maintain a diverse and flexible border security research, 
development, test, and evaluation portfolio. If we devote all our 
resources to optimizing a single line of defense, there will be no 
backup available if that line is breached. This is one reason behind 
the idea of defense in depth--maintaining multiple lines of protection 
against high-risk threats.
    Security planners should consider a variety of defensive technology 
options, maintaining possibilities for alternative approaches if 
currently effective technologies are neutralized. Even if multiple 
defensive lines are not all deployed at the same time, a portfolio 
approach to developing defensive measures could provide ``fall back'' 
options if an initial defense becomes obsolete. Depending on the level 
of adaptive threat, the Nation could be better off having multiple 
defensive options of average effectiveness than a single highly 
effective option without a viable back-up. If decisions are made to 
pursue a specific path, the costs of maintaining other technologies in 
reserve--perhaps not fully developed, but at a stage at which they 
might be called on if needed--should be considered as well. Such an 
approach is analogous to maintaining a diversified portfolio of 
investments, containing a variety of options, where comparatively small 
investments provide various hedges against different shifts in 
circumstances. Small-scale technology demonstration projects and 
evaluation programs can also help to pursue this strategy, since they 
can provide a cost-effective way to explore multiple security options 
and assess their relative performance and robustness.

Conclusions

    When adversaries are successful in countering all or part of a 
defensive technology, the utility of the system may be significantly 
reduced or lost entirely. Such losses devalue the costs society pays to 
design, produce, field, use, and maintain the technology--where costs 
include not just financial and materiel costs but also less tangible 
costs such as reductions in privacy or the inconveniencing of 
individuals legitimately crossing U.S. borders, when such security 
measures are implemented. Given the scale of U.S. borders and the 
volume of individuals and goods that cross them everyday, those costs 
can be considerable.
    As a result, ``adaptive destruction'' is one more risk that must be 
managed by the science and technology programs charged with developing 
novel border security capabilities. The potential that adversaries 
might break through a defense soon after its introduction must be 
assessed and included in the cost-benefit analyses that provide the 
basis for going forward with large-scale technology testing and 
procurement. Not doing so may lead to major investments whose eventual 
benefits may not justify their costs. The robustness of new defensive 
technologies against adversary adaptation must be explicitly considered 
in crafting a technology roadmap for next-generation border security 
technologies and in efforts to deploy current technologies on the 
borders.
    Furthermore, although the focus of the discussion here is on 
technology, we must recognize how the technology choices we make affect 
the rest of the border security system and the how the interactions 
among the parts of that system shape the value of new technologies and 
defenses. Although an adversary's efforts to break through our defenses 
may be aimed at the technologies we use to protect ourselves, the 
impact of those efforts will be shaped by the concepts of operation 
around those technologies and the people charged with implementing 
them.
    For example, if a new detection technology produces many false 
alarms (magnified perhaps by individuals or smuggling organizations 
intentionally triggering the sensors to undermine the value of the 
system) can such false alarms be dealt with quickly or will responding 
to them consume human resources that could be put to better use in 
other ways? If migrants and smugglers respond to border fencing and 
surveillance by regularly damaging the fence and its associated 
systems, how will a constant stream of repair efforts affect DHS's 
security efforts? If the defenses we deploy simply result in 
displacement (e.g., individuals shift from crossing the border at one 
location to another) are we better off, worse off, or the same from a 
security perspective?\15\
---------------------------------------------------------------------------
    \15\ For example, diversion of illegal entry traffic from urban to 
rural areas has been characterized as beneficial from a security 
perspective, because individuals crossing the border in an urban area 
can vanish quickly into traffic, thus considerably reducing the time 
for apprehension. (David Aguilar, ``Border Security: Infrastructure, 
Technology and the Human Element,'' Testimony Before the Subcommittee 
on Border, Maritime and Global Counterterrorism, Committee on Homeland 
Security, U.S. House of Representatives, February 13, 2007.)
---------------------------------------------------------------------------
    The answers to these questions depend not just on technology but on 
how all the elements of the border system work together, and their 
answers will partly determine how much of a threat adversaries' 
counter-technology efforts pose to the country.
    Although technologies can provide an edge in protecting our 
borders, that edge can be dulled by adversaries' counter-technology 
efforts. An understanding of the way adversaries have responded to 
counter defensive technologies in the past underscores the complexity 
of designing new systems to protect society from the threat such 
adversaries pose. Our research suggests that, in designing protective 
measures, we should not immediately assume that the newest and most 
advanced technologies--the highest wall, the most sensitive 
surveillance--will provide the best protection. Drawing on common 
metaphors for defensive efforts, a fortress--relying on formidable but 
static defensive measures--is a limiting strategy. Once a wall is 
breached, the Nation is open to attack. Depending on the adaptive 
capabilities of the adversary, a defensive model built from a variety 
of security measures that can be adjusted and redeployed as their 
vulnerable points are discovered provides a superior approach. However, 
whatever combination of models and measures is chosen, it is only by 
exploring adversaries' potential counter-technology behaviors that 
vulnerabilities in current and potential future defensive measures can 
be discovered and addressed.
    I would like to thank you again for the opportunity to address the 
committee today on this important topic, and I look forward to 
answering any questions you might have.

                     Biography for Brian A. Jackson
    Brian A. Jackson is Associate Director of the Homeland Security 
research program at the RAND Corporation. His terrorism research has 
focused on tactical and operational learning by terrorist groups and 
terrorist groups' use of technology. Individual projects have developed 
approaches to assess the threat posed by potential terrorist use of 
specific weapons, examined of the strategies to respond to terrorist 
targeting of national economies, constructed terrorist attack scenarios 
to support policy analysis efforts, and examined emergency response 
strategies and incident management for responses to major disasters and 
terrorist attacks. Key publications in these areas include articles in 
Studies in Conflict and Terrorism and Military Review on technology 
adoption by terrorist organizations, terrorist organizational 
structures and behavior, and intelligence gathering for targeting 
terrorist and insurgent groups, as well as the RAND reports Aptitude 
for Destruction, Volumes 1 & 2, examining organizational learning in 
terrorist groups, Breaching the Fortress Wall: Understanding Terrorist 
Efforts to Overcome Defensive Technologies, and Volumes 1 and 3 of the 
RAND Protecting Emergency Responders series of publications. Brian 
holds a Ph.D. in bio-inorganic chemistry from the California Institute 
of Technology and a Master's degree from George Washington University 
in Science, Technology, and Public Policy.

   STATEMENT OF CHIEF JEFF SELF, DIVISION CHIEF, U.S. BORDER 
                             PATROL

    Mr. Self. Thank you, Chairman Gordon, for your opening 
remarks, Congressman Mitchell, Ranking Members Hall and 
Gingrey, and other distinguished Subcommittee Members.
    It is my honor to appear before you today to discuss the 
Office of Border Patrol's use of technology in securing the 
border. My name is Jeff Self. I am the Division Chief 
responsible for Southwest border operations for Customs and 
Border Protection's Office of Border Patrol.
    The United State's Border Patrol is a component of the 
Department of Homeland Security, DHS, U.S. Customs and Border 
Protection. I would like to begin by giving you a brief 
overview of agency and mission. Since 1924, the Border Patrol 
has grown from a handful of mounted agents patrolling desolate 
areas along the U.S. border to today's highly trained, dynamic 
workforce of almost 15,000 men and women supported by 
sophisticated technologies, vehicles, aircraft, and other 
equipment.
    Contributing to all this is the Border Patrol's time-
honored duty of interdicting those who illegally enter the 
United States or smuggle narcotics and contraband between ports 
of entry. The Border Patrol's national strategy is an all 
threat strategy with anti-terrorism as our main priority. We 
cannot protect against the entry of terrorists and the 
instruments of terror without also reducing the clutter that is 
caused by illegal migration across our borders. This strategy 
has increased the effectiveness of our agents by using a risk 
management approach to deploy our resources. This strategy 
recognizes that we cannot go it alone. Border awareness and 
cooperation with our law enforcement partners are critical to 
securing America's borders.
    We cannot control our borders by merely enforcing law at 
the line. Our strategy incorporates defense-in-depth 
components, including transportation checks away from the 
physical border. To carry out its mission, the Border Patrol 
has a clear strategic goal to establish and maintain effective 
control of the borders of the United States. Effective control 
is defined in the Border Patrol strategy as ability to detect, 
respond, and interdict border penetrations in the areas deemed 
a high priority for threat potential or other national security 
objectives.
    In order to establish effective control in a given 
geographical area, we must be able to consistently detect an 
illegal entry, identify and classify the entry, and determine 
the level of threat involved, respond to the entry, and bring 
the event to a satisfactory law enforcement resolution. 
Gaining, maintaining, and expanding a strong enforcement 
posture with sufficient flexibility to address potential 
exigent enforcement challenges is critical in bringing 
effective control to the borders. Guidance at the national 
level for planning and implementation ensures resources are 
initially targeted to gain and maintain effective control in 
the most vulnerable, high risk border areas, and then to expand 
this level of border control to all Border Patrol sectors.
    While the key is the right combination of personnel, 
infrastructure, and technology, it must be coupled with 
improved rapid response capability and organizational mobility. 
Each of these components is interdependent, and is critical to 
the success of the Border Patrol strategy. There is no stretch 
of the border in the United States that can be considered 
completely inaccessible or lacking in the potential to provide 
an entry point for a terrorist or terrorist weapon.
    Therefore, securing every mile of diverse terrain is an 
important and complex task that cannot be resolved by a single 
solution. To secure each unique mile of the border requires a 
balance of technology, infrastructure, and personnel that 
maximizes the government's return on investment, and is 
tailored to each specific environment.
    The Border Patrol operates in three basic geographical 
environments: urban, rural, and remote. Each of these 
environments requires a different mix of resources. In an urban 
environment, enforcement personnel generally have only minutes 
or sometimes seconds to identify an illegal entry and bring the 
situation to a successful law enforcement resolution. In rural 
and remote areas, where enforcement personnel have minutes to 
hours, or hours to days to detect, identify, classify, respond, 
and resolve, we expect to incorporate a comprehensive 
technological solution.
    Continued testing, acquisition, and deployment of sensing 
and monitoring platforms will be crucial in addressing these 
vast areas along America's borders. Nationally, the Border 
Patrol is tasked with a very complex, sensitive, and difficult 
job, which historically has presented immense challenges. We 
face those challenges every day with vigilance, dedication to 
service, and integrity, as we work to strengthen the national 
security and protect America and its citizens.
    I would like to thank both Chairman Wu and the subcommittee 
for the opportunity to present this testimony today, and for 
your support of CBP and DHS.
    I look forward to answering any questions that you may 
have.
    [The prepared statement of Chief Self follows:]
                    Prepared Statement of Jeff Self
    Chairman Wu, Ranking Member Gingrey, and distinguished Subcommittee 
Members, it is my honor to appear before you today to discuss the 
Office of Border Patrol's use of technology in securing the border. My 
name is Jeff Self, and I am the Division Chief over Southwest Border 
for Customs and Border Protection's Office of Border Patrol. The United 
States Border Patrol is a component of the Department of Homeland 
Security's (DHS) U.S. Customs and Border Protection (CBP). I would like 
to begin by giving you a brief overview of our agency and mission. As 
the guardian of the Nation's borders, CBP safeguards the homeland--
foremost, by protecting the American public against terrorists and the 
instruments of terror, while at the same time enforcing the laws of the 
United States and fostering the Nation's economic security through 
lawful travel and trade. Since 1924, the Border Patrol has grown from a 
handful of mounted agents patrolling desolate areas along U.S. borders 
to today's highly-trained, dynamic work force of almost 15,000 men and 
women supported by sophisticated technology, vehicles, aircraft, and 
other equipment. Contributing to all this is the Border Patrol's time-
honored duty of interdicting illegal aliens and narcotics and those who 
attempt to smuggle them across our borders. We cannot protect against 
the entry of terrorists and the instruments of terror without also 
reducing the clutter that is caused by illegal migration across our 
borders. For example, today we have to account for all who enter or 
attempt to enter the United States illegally. Last year we arrested 
over 870, 000 people who entered the United States illegally. Of those, 
we had over 18,000 major crime hits through biometric technology. These 
crime hits canvassed a litany of crimes to include murder, rape, sexual 
assaults, and kidnapping. It is imperative that we reduce the number of 
persons or clutter attempting to illegally enter the United States so 
that we can concentrate on terrorist or weapons of terror from entering 
the United States.
    The Border Patrol's national strategy is an ``all threats'' 
strategy with anti-terrorism as our main priority. This strategy has 
made the centralized chain of command a priority and has increased the 
effectiveness of our agents by using a risk-management approach to 
deploy our resources. The strategy recognizes that border awareness and 
cooperation with our law enforcement partners are critical. 
Partnerships with the Department of the Interior; Immigration and 
Customs Enforcement; Drug Enforcement Administration; Federal Bureau of 
Investigation; State, local, and tribal law enforcement agencies; and 
State Homeland Security offices plays a vital role in sharing and 
disseminating information and tactical intelligence that assists our 
ability to rapidly respond to an identified threat or intrusion, which 
is essential to mission success.
    Recognizing that we cannot control our borders by merely enforcing 
the law at the ``line,'' our strategy incorporates a ``defense in 
depth'' component, to include transportation checks away from the 
physical border. Traffic checkpoints are critical to our enforcement 
efforts because they deny major routes of egress from the borders to 
smugglers who are intent on delivering people, drugs, and other 
contraband into the interior of the United States. Permanent traffic 
checkpoints allow the Border Patrol to establish an important second 
layer of defense and help deter illegal entries through comprehensive 
enforcement. Border Patrol Agents often encounter fraudulent documents 
while conducting transportation check duties. Agents receive training 
at the Border Patrol Academy that enables the agent to identify key 
features and characteristics of valid immigration documents. This 
training, coupled with on the job training, allows agents to identify 
common tactics used by the criminal element in creating fraudulent 
documents. Our most valuable asset at the checkpoint in examining the 
validity of any document (birth certificate, driver's licenses, and 
immigration documents) is the agent's experience.
    To carry out its mission, the Border Patrol has a clear strategic 
goal: Establish and maintain effective control of the border of the 
United States. Effective control is defined in the Border Patrol's 
strategy as the ability to detect, respond, and interdict border 
penetrations in areas deemed a high priority for threat potential or 
other national security objectives. In order to establish effective 
control in a given geographical area, we must be able to consistently:

        <bullet>  Detect an illegal entry;

        <bullet>  Identify/Classify the entry and determine the level 
        of threat involved;

        <bullet>  Respond to the entry; and

        <bullet>  Bring the event to a satisfactory law enforcement 
        resolution.

    Gaining, maintaining, and expanding a strong enforcement posture 
with sufficient flexibility to address potential exigent enforcement 
challenges is critical in bringing effective control to the borders. 
Guidance at the national level for planning and implementation ensures 
resources are initially targeted to gain and maintain effective control 
in the most vulnerable, highest-risk border areas, and then to expand 
this level of border control to all Border Patrol Sectors.
    While the key to mission success is the right combination of 
personnel, infrastructure, and technology, it must be coupled with 
improved rapid response capability and organizational mobility. Each of 
these components is inter-dependent and critical to the success of the 
Border Patrol's strategy. We are fully engaged with the DHS Science and 
Technology (S&T) Directorate in our efforts to identify, develop, and 
acquire technology to help us gain enhanced awareness and control of 
our borders. Our participation in S&T's Integrated Process Team on 
Border Security, for example, will help us use S&T resources to develop 
technology that will better secure our borders. Systems with the 
technological ability to predict, detect, and identify illegal entries 
and other criminal activity, but lacking the capacity for a rapid 
response or reaction, cannot complete the enforcement mission. 
Conversely, enforcement personnel with inadequate intelligence or poor 
technological support to provide situational awareness, access, and 
adequate transportation or equipment necessary to conduct enforcement 
activity are much less likely to be effective in today's dynamic border 
environment.
    There is no stretch of border in the United States that can be 
considered completely inaccessible or lacking in the potential to 
provide an entry point for a terrorist or terrorist weapon. Therefore, 
securing every mile of diverse terrain is an important and complex task 
that cannot be resolved by a single solution, such as installing fence. 
Securing each unique mile of the border requires a balance of 
technology, infrastructure, and personnel that maximizes the 
government's return on investment and is tailored to each specific 
environment. Some of the components utilized in evaluating tactical 
infrastructure needs are border access (the existence of all-weather 
roads), border barriers (vehicle and pedestrian), and the lack of non-
intrusive inspections equipment at checkpoint facilities.
    The proper mix of personnel, technology, and infrastructure will 
vary with differing border environments and enforcement challenges. The 
Border Patrol operates in three basic geographical environments: urban, 
rural, and remote. Each of these environments requires a different mix 
of resources. In an urban environment, enforcement personnel generally 
have only minutes, or sometimes seconds, to identify an illegal entry 
and bring the situation to resolution. This dynamic is a result of the 
fact that significant infrastructure exists to facilitate an illegal 
entrant's approach to the border and entry and to permit the violator 
to escape within moments of effecting the entry by blending in with the 
legitimate traffic in the community. New tactics are constantly 
developed by those attempting to avoid detection in such situations in 
order to combat increased border security. One of those new methods 
that we have seen is the discovery of tunnels. There have been over 70 
tunnels detected on the border. These tunnels were detected by various 
methods including sinking vehicles, collapsing roads, and by agents in 
the performance of their duties.
    On the Northern border, the vastness and remoteness of the area and 
the unique socioeconomic ties between the U.S. and Canada are 
significant factors in implementing the Border Patrol's national 
strategy. Severe weather conditions on the Northern border during 
winter intensify the need to expand ``force-multiplying'' technology to 
meet our enforcement needs. The number of actual illegal border 
penetrations along the U.S.-Canada border is small in comparison to the 
daily arrests along the U.S.-Mexico border. The threat along the 
Northern border results from the fact that over ninety percent of 
Canada's population of 30 million lives within one hundred miles of the 
U.S.-Canada border. It is most likely that potential threats to U.S. 
security posed by individuals or organizations present in Canada would 
also be located near the border. While manpower on the U.S.-Canada 
border has significantly increased since 9/11, the Border Patrol's 
ability to detect, respond to, and interdict illegal cross-border 
penetrations there remains limited. Continued testing, acquisition, and 
deployment of sensing and monitoring platforms will be crucial in 
addressing the Northern border threat situation.
    One tool that CBP uses to assist with border security is the 
Unmanned Aircraft System (UAS). The UAS provides CBP with a remotely 
piloted asset that allows for persistent, broad area surveillance. UAS 
operations are proactive responses to un-cued, cued, and intelligence 
based missions. The UAS Program focuses its capabilities on the CBP 
priority mission and enhances surveillance and reconnaissance 
requirements along the border. The UAS has the flexibility and 
endurance to fly long leg surveillance missions while conducting both 
scheduled and unscheduled searches. As a law enforcement force 
multiplier for CBP, the UAS allows CBP Air and Marine (A&M) to support 
other DHS entities, including the United States Coast Guard, the 
Federal Emergency Management Agency (FEMA), and U.S. Immigration and 
Customs Enforcement.
    Since 2004, CBP UASs have flown more than 2,000 hours, directly 
contributing to more than 4,000 arrests and the seizure of thousands of 
pounds of marijuana. In July 2007, CBP A&M added another UAS to the 
southwest border for a total of two. In FY 2008, one UAS will migrate 
to the northern border to support expanded northern border operations. 
Once additional personnel are trained to support UAS operations in the 
southwest, CBP A&M will be available to provide surveillance at the 
southwest border 24 hours a day, seven days a week.
    Nationally, the Border Patrol is tasked with a very complex, 
sensitive, and difficult job, which historically has presented immense 
challenges. We face those challenges every day with vigilance, 
dedication to service, and integrity as we work to strengthen national 
security and protect America and its citizens. I would like to thank 
both Chairman Wu, and the Subcommittee, for the opportunity to present 
this testimony today and for your support of CBP and DHS.

                               Discussion

    Mr. Mitchell. Thank you. At this point, we will open up for 
our first round of questions, and I will recognize myself for 
five minutes.
    Dr. Jackson, you specifically mentioned how adversaries 
have been able to detect the technologies identified as 
priorities in the bill: unmanned surveillance vehicles, tunnel 
detectors, anti-counterfeit technologies, and so on. How should 
these identified vulnerabilities affect how DHS proceeds in 
these research areas?
    Dr. Jackson. Well, any technology is vulnerable. It is a 
question of how easy or how hard it is for those 
vulnerabilities to be discovered by our adversaries, and how 
quickly they can exploit them.
    In thinking about--sort of dealing with that in research 
and development planning, one of the elements is to pursue 
different strategies simultaneously, so if they determine a way 
around a first line anti-counterfeiting technology, for 
example, there are ways that it can be modified to address that 
vulnerability.
    But the other piece of this, too, it is something that I 
included in my written testimony, but not my oral, is that the 
other piece of this is the technology's function within the 
overall system of our border defense, and so, there is also the 
human resources and the concepts of operation better used to 
reinforce the effectiveness of those technologies.
    And those can actually provide a way, by preserving 
flexibility in the way that we use the technologies, to 
preserve our ability to adapt in response as well. So it is 
sort of the two-pronged strategy of making sure that we have 
preserved variety in our technologies, but also, thought 
through how the way that we use those technologies can also 
counteract the adaptability of the folks who are trying to 
break through the border.
    Mr. Mitchell. Thank you. Chief Self, one of the things I 
would like to ask you--. First, how would you characterize DHS 
S&T's interaction with the CBP, and has DHS S&T been responsive 
to the CBP's short and long-term technology needs?
    Mr. Self. I would characterize it, sir, as a very close 
relationship. Within the Office of Border Patrol, we have an 
Enforcement and Information Technologies Division with the 
Division Chief responsible for the personnel. They work closely 
with CBP Office of Information Technology, and together, 
coordinate with S&T.
    There has been coordination on many efforts in research and 
development for operational technologies over the last couple 
of years.
    Mr. Mitchell. In your testimony, you say that our most 
valuable asset at the checkpoint in examining the validity of 
any document is the agent's experience. Does CBP currently 
employ anti-counterfeiting technology to help agents catch 
fraudulent documents? And if not, why, and in your opinion, 
what value does technology add to anti-counterfeit efforts?
    Mr. Self. As it now stands, sir, agents in the field 
basically rely on their training that they receive at the 
Academy. They receive 21 hours of training in fraudulent 
document identification. In addition, they are trained in how 
to look at the security features that are within the document, 
and after leaving the Academy, they have post-Academy, in which 
they receive additional training on fraudulent documents.
    Other than that, there--at the present time, there is no 
technology for them to utilize in running cards through to 
identify that they have been altered or they are a false card.
    Mr. Mitchell. You rely strictly on the agent's experience, 
and what they learned?
    Mr. Self. That is correct, sir.
    Mr. Mitchell. All right. You mentioned that the Border 
Patrol operates in three distinct environments: urban, rural, 
and remote. Yet, research priorities are weighed towards 
technologies intended to operate in remote environments. What 
type of technology gaps exist for CBP operations in urban and 
rural environments, and why have these technologies not been a 
priority?
    Mr. Self. In the urban and rural environments, sir, it is, 
in all three environments, it comes down to the proper mix, and 
the proper mix is, of course, personnel, it is infrastructure 
and technology. In urban and rural, we have minutes to seconds 
to respond, especially in the urban environment. The smuggling 
infrastructure in the urban environment is normally directly 
adjacent to the international fence or the international line. 
If we don't have the infrastructure, the fences, the 
individuals penetrating the border can come in and be within 
the smuggling infrastructure and heading into the interior of 
the United States within minutes to seconds. Therefore, we need 
the infrastructure.
    In addition to that, typically, in our urban environments, 
we do have technologies. We have RBSS cameras that survey the 
fence. In some areas, we have attended ground sensors that will 
pick up somebody walking into the United States. There is a mix 
of tactical infrastructure and technologies in our urban areas. 
For the most part, however, it is not clear across the border 
at this time.
    Mr. Mitchell. Thank you. I now recognize Mr. Hall for five 
minutes.
    Mr. Hall. Thank you, Mr. Chairman. Chief Self, I probably 
owe you an apology. I called you a general when I was out there 
earlier. I saw those two stars there. You have a lot heavier 
duty and more territory to cover than an average general does. 
You are the division guy out of a great area.
    Mr. Self. Yes, sir.
    Mr. Hall. Very valuable to us.
    Mr. Self. Thank you, sir.
    Mr. Hall. And I would like for you to hurry up with your 
testimony and get on back to doing what you are doing, because 
we need you.
    Mr. Self. I would rather be out there than here, sir.
    Mr. Hall. Yeah, I know you would. And I will correct 
something on you, Dr. Hooks. By golly, you are a doctor, 
because I looked in the dictionary, and it says a doctor is a 
learned person, and you taught me all about these exhibits 
here, that I know more now than most citizens do, and I can 
answer a lot of questions that I get asked.
    Mr. Hooks. Thank you, sir.
    Mr. Hall. I don't know how I am going to fully describe all 
that, but I am just going to tell them we have it, and they 
will have to take my word for it.
    I mentioned in my opening statement, Dr. Jackson, about the 
fact that you tracked a number of terrorist groups, and that 
you had some good advice about our need for a multi-layered 
defense. Do you want to enlarge on that a little?
    Dr. Jackson. Sure. I mean, in the work that we did, we 
looked across the whole world. So, we picked terrorist groups 
from--everyone from the LTTE in Sri Lanka, which is a very 
structured and well researched terrorist group, to Jemaah 
Islamiyah in Indonesia, and we did that because we wanted to 
cover the variety of the threat that technologies face from 
groups responding.
    And in looking across that, what struck us was the 
commonality in the ways that a lot of these groups sort of came 
at the defenses that were put in their way, because 
technologies can be--provide a very potent security role, they 
are something that are threatening to the interests that the 
terrorist groups are trying to advance, so they respond to 
them.
    And so, in thinking about a multi-layered defense, and one 
element of that is sort of the multi-layers that we have heard 
here, you know, talking about reinforcing the fence with 
sensing equipment, so you have, you know, multiple layers at 
the same time. But the other element of this multi-layer idea 
that came out in our research is this idea of making sure that 
we have a portfolio of technologies available, not that we are 
all using at the same time, to provide multi-layers right now, 
but also we have things on the bench, if you will, to roll out 
if the first layers are broken through. And so, it is a multi-
layered defense not just at the same time, but providing our 
ability to reconstitute the layers of our defense over time, 
because of course, as I am sure anyone who does this on a day 
to day basis knows, this is an ongoing, long-term contest 
between the people who are trying to break through the border, 
and the security organizations that are trying to keep that 
line.
    And so, as a result, we have to be prepared to think about 
what we are doing, and the benefits of what we do over the 
long-term.
    Mr. Hall. Getting back to you, Mr. Hooks--Dr. Hooks. In 
your testimony, you state that tunnel detection is an example 
of research the Directorate likes to tackle through the basic 
research portfolio for Fiscal Year 2009. What specific programs 
are you seeking funding for, for Fiscal Year 2009, and where 
would these be carried out?
    Mr. Hooks. Specifically related to tunnel research?
    Mr. Hall. Yes. Yes, and that's in this bill.
    Mr. Hooks. We are looking to pursue specific efforts in 
fiber optic technology and enhancements, so that they could 
detect when tunnels are being built, the vibrations of the 
tunnels being constructed, and/or the people passing through 
them.
    Mr. Hall. Just give us an idea about what kind of problem 
tunneling is.
    Mr. Hooks. Problem----
    Mr. Hall. Yeah.
    Mr. Hooks. Problem from a detection standpoint?
    Mr. Hall. Detection, prevention. The length of the tunnels. 
What is the longest tunnel you have ever seen?
    Mr. Hooks. I can't specifically comment on----
    Mr. Hall. But can you come close to it?
    Mr. Hooks.--on the details.
    Mr. Hall. I have heard that they have been, tunnels as far 
as a block.
    Mr. Hooks. Oh, at least a block. In different locations, 
and Chief Self can probably provide some specific details.
    Mr. Hall. I will ask the Chief about that.
    Mr. Self. That is correct, sir. We have had tunnels as far 
as several hundred yards, starting in Mexico, and tunneling 
into the United States.
    Mr. Hall. And how do you detect--how can you detect that? 
How far underground is the tunnel?
    Mr. Hooks. Tunnels aren't that deep, 20 yards or so. I am 
sure there are cases they have been deeper.
    Mr. Self. One problem they have in tunneling, sir, is they 
have to deal with the water level in certain areas of the 
Southwest border. Therefore, in some areas, you can have them 
as deep as 12, 15, 20 feet. In other areas, they are only 
anywhere from six to say, eight, 10 feet below the surface.
    Mr. Hall. Go ahead and answer the question I asked you a 
moment ago.
    Mr. Hooks. Yes, sir. And so, the challenge in tunnel 
detection is being able to detect it in near real time. 
Ideally, to support their operations in a nonobtrusive manner 
and quickly, using some kind of different detection scheme, 
whether that be looking at the vertical deflections, gravity 
deflections, electromagnetic deflections or whatnot, and right 
now, the equipment is just not sensitive enough, so that you 
could fairly rapidly, maybe using a truck at the border going 
10 miles an hour along the border, be able to detect a tunnel 
successfully, not receive a lot of false positives, so that the 
Border Patrol could then take, excuse me, corrective action 
accordingly.
    Mr. Hall. I think my time is up. Mr. Chairman, are we going 
to be allowed to send questions to them?
    Mr. Mitchell. Yes, we will.
    Mr. Hall. Okay. I thank you for my time, and I am sorry I 
went over the time.
    Mr. Mitchell. I thank you. At this time, I recognize Ms. 
Richardson for five minutes.
    Ms. Richardson. Thank you, Mr. Mitchell.
    First of all, I would like to take a moment to commend 
Congressman Hall for bringing forward this legislation, H.R. 
3916. I think nothing is more important when we talk about 
setting appropriate priorities, particularly having to do with 
research and funding, taxpayer funding that is going towards 
this, that it is done in the right way.
    So, congratulations, Congressman Hall, on your efforts 
today. I simply have one question for Mr. Hooks, and that is, 
when technology is developed by the Department of Homeland 
Security's Science and Technology group, how is it that a 
technology's performance is validated?
    And let me preface what I am saying to give you an example. 
I represent Southern California, and we recently had a spill in 
Northern California, where you know, a bridge was hit, and oil 
was dumped, and the Coast Guard was supposed to have been 
there, and you know, first of all, they shouldn't even have run 
into the bridge to begin with, then oil was dispersed into the 
water. No communication was made to the public for eight years. 
It was just a comedy of errors, and when I say comedy, I don't 
mean it in a humorous way. It was a disgraceful way, in my 
opinion.
    So, I am concerned with the tremendous amount of funding 
that we use to, you know, utilize these technologies to protect 
our borders, but sometimes actually validating the performance 
of all this work is where we have a shortfall.
    So, if you could tell us a little bit about what your 
department is doing in that aspect, and how you work with other 
groups or independent agencies to assist us in this effort?
    Mr. Hooks. Yes, ma'am. It is important, we totally agree, 
to effectively test the technologies before they are placed in 
an operational environment with the different components. To do 
that, we use several different means. Underneath each of the 
Capstone IPTs, we have created project IPTs, where program 
managers from the components, such as the Border Patrol, and 
program managers in S&T, are coming together with appropriate 
end-users, and defining the specifics of that equipment, the 
requirements that it needs to meet.
    Commensurate with that, they also need to define what are 
the appropriate test and evaluation procedures that should be 
followed, testing of that equipment both in the laboratory 
setting and out in an operational setting, so that by the time 
that equipment is transferred to the Border Patrol for 
procurement, they can be confident that it works correctly.
    So, we would encourage them, and surely, they would 
participate in that evaluation of the testing of the equipment 
as we go forward, so that they can feel confident at the point 
that they receive it that it works properly. One example is we 
have a test bed down at the Southwest Border at Douglas, where 
we take new technologies down there, we give them to the Border 
Patrol agents. Our Science and Technology people will be there, 
but they are using them in the background of their normal day-
to-day operations, giving us feedback on it, and helping us to 
evaluate the equipment, to make sure that it is operating 
effectively.
    Ms. Richardson. And when you say they give you feedback, 
are these the actual ground patrol officers who are providing 
you with the results?
    Mr. Hooks. Yes. Yes, down in the Tucson sector, either the 
Sector Chief, his specific agents, he has a component down at 
the Douglas Test Site that specifically engages with us. These 
are Border Patrol agents in that sector that are using the 
technology, and we get direct feedback from them.
    Ms. Richardson. Thank you, Mr. Hooks. I yield back my time, 
Mr. Mitchell.
    Mr. Mitchell. Thank you. I now recognize Dr. Gingrey for 
five minutes.
    Mr. Gingrey. Mr. Chairman Mitchell, thank you very much, 
and I want to thank all of the witnesses for being here this 
morning, and this is a hugely important issue. We all know 
that, and not only our ground borders, but maritime security, 
we haven't talked too much about maritime, but I have certainly 
had the opportunity to go to the Southwestern border. We are 
talking about 2,000 miles, aren't we, Chief Self?
    Of course, the Canadian border, it is a longer border, but 
I think our main focus, at least, on the Southern border, is 
paying great benefits. Chief, I commend you for your long 
service there. I actually went to Nogales, and we saw some of 
the work of your people on the ground in the heat of the day, 
and the dark of night, 24/7, doing their work, and I want to 
commend you and, of course, everybody else on the panel, for 
being here, and helping us understand a little bit better. I'm 
proud to be a co-sponsor of Mr. Hall's legislation.
    And I wanted an answer to a couple of specific questions, 
and actually, the first one, Mr. Kapos, is in regard to HSSTAC. 
I understand there was a lapse of authorization for HSSTAC back 
in 2006, and I want to know, did that adversely affect the S&T 
Directorate's ability, their organizational and planning 
capability, when that authorization was not forthcoming in 
2006?
    Could you comment on that for us?
    Mr. Kapos. Sure. I was not there, but all the same, I got 
to pick up the pieces. By the time the HSSTAC was reauthorized, 
we had only six members of the original 20.
    Mr. Gingrey. Of the original 20, did you say?
    Mr. Kapos. Yeah. Yeah.
    Mr. Gingrey. Describe these 20 people.
    Mr. Kapos. Well, they are representatives of scientific 
disciplines, and of the first responder community, who had an 
interest in--obviously, first responders have an interest in, 
but the scientists are specifically picked to be people who are 
eminent in their fields, and to have an interest in homeland 
security problems.
    As I said, by the time the HSSTAC was reauthorized, there 
were only six of them left, whose terms had not either lapsed--
--
    Mr. Gingrey. Six out of 20?
    Mr. Kapos. Yeah. Whose terms had not either lapsed or who 
had not resigned in order to accommodate other commitments. And 
actually, it turned out to be fairly straightforward to recruit 
14 people, because by and large, the people that I contacted 
came from lists that had been prepared previously of people who 
were interested. And by and large, they were very willing, but 
we have to face up to the fact that the HSSTAC didn't meet for 
the best part of a year, and it took us about two or three 
months to get the people recruited and screened and so on.
    We had our first meeting in late August in Newport, and we 
meet again in December in Arlington, and in between these two 
meetings, we have had a number of fact-finding meetings. We 
have been working pretty hard. As a result, while you would 
like not to lose any momentum, it turns out to be less 
problematic than it might be to regain it.
    Mr. Gingrey. Well, we appreciate your strong effort in 
restoring to that 20 number, and trying to replace those 14 who 
were so valuable. My five minutes went mighty quick, I guess, 
this slow, Southern way of talking. But let me just follow up. 
I have got a few seconds left and may as well stick with Mr. 
Kapos, in regard, how was the current task of IED threat 
assessment chosen, if you could discuss that with us in the 
brief time we have left?
    Mr. Kapos. Yes, indeed. The Under Secretary has been very 
concerned about the need to prepare for this threat. Now, IEDs, 
coming to a theater near you. And he was, in particular, 
concerned, that there was not a properly rounded program to 
address this. Running across the kill chain, from indication 
and warning, from prediction, from detection, all the way 
through to response. So, he simply asked the HSSTAC to look at 
it from that viewpoint, and I must say, since I get to sit 
through every endless meeting with the HSSTAC, that they are 
doing a very, very good job of considering the entire spectrum.
    Mr. Gingrey. Thank you very much, Mr. Kapos. Hopefully, we 
will have a second round, and I can address some questions to 
the other witnesses.
    Mr. Chairman, I yield back, and I thank you.
    Mr. Mitchell. Thank you. My understanding is we are going 
to be called to votes in about 10 minutes, so at this time, I 
would like to call on Mr. Wu, and then, we will call on Mr. 
Smith.
    Mr. Wu. Thank you, Mr. Chairman. And I am going to ask a 
question. I am going to ask two questions, and I will take the 
answers in writing. If we have time, we will take them here in 
the Committee, and then, I would like to focus on a third 
question.
    And the first piggybacks on Mr. Hall's question about 
tunneling, and also, gets at the issue of long-term versus 
short-term research. And with respect to tunnel detection 
research, it was pointed out that there are some basic research 
investments which are needed as a first step, and yet, the S&T 
Directorate is awarding a contract for shorter-term tunnel 
detection technology, and I am a little bit troubled that while 
the foundation might not have been laid, that we are charging 
ahead with short-term technology, and I am concerned that that 
would lead us to wasted research.
    And I would like the Department to justify awarding the 
short-term contracts, while the basic research hasn't been done 
yet. And maybe there is a good explanation for that, and maybe 
there isn't.
    Now, we will jump from underground to overhead, and I would 
like to know what the biggest technological challenges are in 
the UAV R&D area. Who is responsible for performance testing 
the UAVs? What criteria does the Department use to develop UAVs 
and define successful operation of UAVs, and I will take 
answers to both those questions in writing unless we can get 
back to it. This five minutes goes really fast.
    Now, Mr. Kapos, about HSSTAC, I am very concerned about 
long-term research versus short-term research, and laying the 
foundation in long-term research, so that, you know, we are not 
firefighting all the time, and you know, we do have to do a 
certain amount of firefighting in response to immediate 
threats. But you know, the challenge, and I think the challenge 
for the S&T Directorate, has always been that there is concern 
that you all are shortsighted. There has been too much focus on 
short-term stuff, and not enough foundational work, so that we 
have the flexibility to flex with the changing threat 
environment.
    And the concern is that the one tool, or a very important 
tool for setting long-term priorities is HSSTAC, and yet, that 
is a tool that has now been very strongly focused on IEDs, 
which is the threat of the day, and so, the problem is we have 
a problem with shortsightedness, and now, you have just taken 
the glasses off. We have gotten every more shortsighted, 
because HSSTAC has been focused on a near-term threat rather 
than looking out there, and appropriately setting priorities 
for the S&T Directorate's long-term research.
    Can you respond to what the S&T Directorate is doing about 
the long-term, while appropriately addressing the short-term, 
and whether HSSTAC has been hijacked to, you know--into short-
term projects?
    Mr. Kapos. Sure. First, let us address the IEDs, because 
the HSSTAC is looking explicitly at IEDs in the farther future, 
five and more years into the future, and----
    Mr. Wu. Now, what about non-IED threats? Shouldn't we be 
concerned about those also?
    Mr. Kapos. Most certainly, we should.
    Mr. Wu. I mean, you know, there are broad categories, you 
know, things like biosecurity, cyber security, et cetera. I 
mean, you know, folks don't just focus on one thing.
    Mr. Kapos. No, no. I agree. When we finish our 
consideration of IEDs in the five- to 10-year future, which 
will be about the 1st of February, then will be the time to 
pick another problem. And certainly, cyber security is begging 
for a look. Certainly, biosecurity is, too. But it is 
important, I think----
    Mr. Wu. HSSTAC is configured to just handle one thing at a 
time?
    Mr. Kapos. It is, pretty much. There is nothing that says 
that we cannot subdivide the HSSTAC and consider two problems 
or three problems, but remember, please, that the law allows 
for only 20 members, and so we have to worry about having a 
sufficient concentration of the various disciplines in order to 
provide a well-rounded consideration.
    Mr. Wu. Well, how many JASONs are there in the JASON 
program at DOD? I mean, aren't they supposed to look at a 
universe of defense threats, and that is sort of their task? 
And why is HSSTAC different from that?
    Mr. Kapos. I cannot answer why HSSTAC is different from 
that. I don't know how many JASONs there are, but I do know 
that the JASONs lay out a study program for themselves a year 
ahead, and they go from problem to problem to problem. And that 
is pretty much what we are trying to do with the HSSTAC.
    Mr. Wu. Except in this instance, HSSTAC didn't pick IEDs 
themselves, they were told to do so.
    Mr. Kapos. Well, there was considerable consultation 
between the Under Secretary and the Chairman of the HSSTAC 
before they settled on IEDs. And as I say, the IEDs are crying 
out for an integrated, broader spectrum program than they have 
had in the past. So, I guess I am saying that I don't quite 
agree that it has been hijacked by the immediacy of the 
problem.
    Mr. Mitchell. Thank you. I would like to now recognize Mr. 
Smith.
    Mr. Smith. Thank you, Mr. Chairman.
    Mr. Hooks, if you wouldn't mind answering this question. A 
2008 budget request for the Border and Maritime Division is 
only about three percent of the total S&T budget. Can you 
elaborate on why that would seem, at least on its face, to be 
such a small amount? As a percentage of the entire budget? Or 
of the Directorate's activities, at least?
    Mr. Hooks. Excuse me. I can say that within our S&T budget, 
in my particular area, in the transition area, we look at the 
11 different functional areas that we have broken down the DHS 
mission space to, and with the leads of the different 
components, they have identified what their highest priority 
gaps area that require technology solutions. We propose 
different technology programs and cost estimate them to provide 
those solutions.
    And then we have created a Technology Oversight Council 
that is led by the Deputy Secretary of the Department, where he 
looks, in an integrated fashion, across those 11 IPTs and the 
requirements of each of those 11 IPTs, and based on risk in 
those functional areas and his considerations, he is charged 
with the balancing of that effort to make sure that it is 
meeting across the spectrum of effort the highest-priority 
needs of the Department. And that is how that budget is formed.
    Mr. Smith. Okay. Thank you. I yield back.
    Mr. Mitchell. Thank you. Before we bring the hearing to a 
close, I want to thank our witnesses for testifying before us 
today.
    The record will remain open for additional statements from 
the Members, and for answers to any follow-up questions the 
Committee may ask of the witnesses.
    The witnesses are excused, and the hearing is now 
adjourned. Thank you.
    [Whereupon, at 11:16 a.m., the Subcommittee was adjourned.]















                              Appendix 1:

                              ----------                              


                   Answers to Post-Hearing Questions


<SKIP PAGES = 000>

                   Answers to Post-Hearing Questions
Responses by Robert R. Hooks, Director of Transition, Science and 
        Technology Directorate, Department of Homeland Security

Questions submitted by Chairman David Wu

Q1a.  What are the biggest technological challenges in the area of 
unmanned aerial vehicle (UAV) R&D? Who is responsible for performance 
testing for UAVs? What criteria does DHS use to define successful 
operations for UAVs?

A1a. The biggest technological challenges DHS faces today in Unmanned 
Aerial Vehicle (UAV) R&D involves: Fulfilling FAA requirements to 
operate within the National Airspace System (NAS), expanding sensor 
capabilities allowing DHS to discriminate criminal activities at 
medium- to high-altitude operating regimes, and maximizing the 
operational benefits of an unending stream of data information obtained 
by sophisticated UAV platforms.

        <bullet>  In order to have the FAA allow DHS unmanned aerial 
        systems (UAS) into the National Airspace System (NAS), they 
        currently require a lengthy approval process to fly in a very 
        controlled and confined environment. The FAA will become much 
        more flexible once they can be assured of collision avoidance 
        between UAS' and manned/other unmanned aircraft. To accommodate 
        this requirement, automated sense-and-avoid systems, capable of 
        detecting and sidestepping oncoming aircraft without a pilot's 
        intervention are required to assure collision avoidance. The 
        challenge to accommodate this provision lies in the fact that 
        the avoidance system must be fully automated without human 
        intervention as one would find in manned aircraft.

        <bullet>  In order to take full advantage of increased 
        surveillance opportunities found with advanced UAS 
        capabilities--altitudes from 18,000 to 65,000 feet and longer 
        station times of up to seven days--UAS payloads and sensors 
        need greater sensitivity and resolution to meet DHS 
        requirements. Requests for such complex UAS platforms have 
        pushed the envelope for producers of sensor equipment because 
        the demand for such high-resolution/high-sensitivity sensors 
        (i.e., sensors that can optically discriminate features of 
        illegal cargo and people engaged in illegal activities) is 
        relatively new. DHS' ultimate goal is a UAV platform that 
        yields a fully functional operating picture that highlights 
        areas of potential criminal activity.

Q1b.  Who is responsible for performance testing for UAVs?

A1b. DHS is exploring options for performance testing providers. Until 
a final determination can be made, DHS is working through cross-
organizational and cross-agency venues to conduct performance testing. 
For example, DHS partnered with DOD for one DOD UAS-related Joint 
Concept Technology Demonstration. DHS also has planned the UAS Gulf 
Coast Demonstration (GCD) to determine acceptable platform and sensor 
performance. This particular demonstration will combine the operational 
efforts of multiple DHS Agencies while using the test and evaluation 
capabilities of the Science and Technology Directorate.

Q1c.  What criteria does DHS use to define successful operations for 
UAVs?

A1c. The criteria that DHS uses to define successful unmanned aircraft 
systems (UAS) operations are availability, mean time between failure, 
mishap rate, etc. Customs and Border Protection (CBP) is the operator 
of UASs within the Department and establishes these criteria. CBP 
tracks statistics for law enforcement operations such as the number of 
apprehensions made or pounds of illegal drugs confiscated. UAV 
performance is measured against metrics based on these statistics.

Q2a.  With regards to tunnel detection research, you point out that 
basic research investments are needed as a first step towards 
developing effective tunnel detection technology. Yet you also say that 
DHS S&T is awarding a contract for a shorter-term tunnel detection 
technology effort. What is the goal for developing prototype detection 
technology, given that much of the important foundation research has 
not yet been conducted? How much is DHS S&T spending on this High 
Impact Technology Solution (HITS) project?

      How will DHS S&T test and validate any technology developed 
through this HITS project? If the technology is successful, what steps 
will DHS take to make this technology available to CBP? What criteria, 
outside of technological capabilities, will DHS use to measure success? 
Cost? Training requirements?

A2a. The Homeland Security Act of 2002 calls for the Homeland Security 
Advanced Research Projects Agency (HSARPA) to ``promote revolutionary 
changes in technologies. . .'' In the execution of that direction, the 
S&T Directorate's Innovation/HSARPA work pursues technologies that have 
potential to achieve results far sooner than the normal development 
process. The Tunnel Detection effort is one of the S&T Directorate's 
High Impact Technology Solutions (HITS) projects, where we invest a 
relatively small amount of money, accepting considerable risk of 
failure, in order to pursue a potential proof-of-concept answer within 
one to three years. This approach challenges industry to think outside-
of-the-box and to develop leap-ahead technologies. However, because of 
the potential risk of failure of this approach, it is important that 
this work takes place in parallel with more conservative approaches, 
including longer-term, basic research.

Q2b.  How much is DHS S&T spending on this High Impact Technology 
Solution (HITS) project?

A2b. The S&T Directorate FY 2007 budget for the tunnel detection HITS 
project is $2 million. The S&T Directorate's planned FY 2008 budget for 
the tunnel detection HITS project is $1 million.

Q3.  In your testimony, you discuss the S&T Directorate's plans for 
tunnel detection research. Specifically, you say you ``intend to study 
and characterize the geophysical characteristics of key border 
regions,'' beginning in FY 2009. Why do you believe DHS should carry 
out this research, as opposed to the U.S. Geological Survey? More 
generally, how do you determine whether DHS should carry out certain 
research as opposed to agencies with greater expertise in specific 
fields?

A3. The Customs and Border Protection (CBP) and Immigration and Customs 
Enforcement (ICE) agencies are partnered with the S&T Directorate to 
develop and demonstrate robust and reliable tunnel detection 
technologies. In support of this effort, we will review U.S. Geological 
Survey data to determine the existing geophysical characteristics of a 
region-of-interest. Such data is important to enabling the technology 
to detect anomalies or changes that would indicate the existence of a 
tunnel.

Q4.  In your testimony, you discuss current cargo security research 
efforts. How has DHS engaged with end-users of these technologies, such 
as shipping industry representatives, to develop performance 
requirements and standards for tracking and cargo identification 
technologies?

A4. The S&T Directorate's Borders and Maritime Security Division uses a 
variety of methods to engage industry on the development of performance 
requirements and standards for emerging tracking and cargo-
identification technologies. These include industry forums, requests 
for information, and one-on-one discussions with container and maritime 
industry representatives.
    For example, the S&T Directorate meets regularly with members of 
the shipping industry. Through dialogue with several ocean carriers, we 
found that two of the systems developed by our office, the Marine Asset 
Tag Tracking System (MATTS) and the Hybrid Composite Container, could 
provide broader commercial benefits in addition to our intended 
security objectives. MATTS can provide efficiencies from improved asset 
visibility, while the Hybrid Composite Container offers more durability 
and weight savings over existing containers. Industry could benefit 
commercially from the potential promulgation of cargo security 
standards such as these. Additionally, the S&T Directorate continues to 
seek and has received the cooperation of the shipping industry to test 
these technologies.
    The S&T Directorate also uses industry forums and invitational 
speaking engagements to ensure a broader outreach across carriers and 
shipping industry end-users. Recently, in November 2007, we addressed 
the annual world-wide Terminal Operators Conference (TOC) in Panama on 
the S&T Directorate's Cargo Security Program. During this review, we 
received positive feedback on our approach to solving complex security 
issues involving container shipping.
    The S&T Directorate has met with the World Shipping Council and 
members of the Department of Transportation (DOT) Supply Chain Security 
Working Group to discuss the role of standards in both industry and 
government related to cargo and shipping containers. The S&T 
Directorate is supporting the U.S. Customs and Border Protection (CBP) 
Working Group focused on cargo and container security standards. CBP is 
the United States' representative to the World Customs Organization 
(WCO). International standards would need to be promulgated through the 
WCO, as the end-user regulatory body, through their SAFE Framework of 
Standards.

Questions submitted by Representative Ralph M. Hall

Q1a.  During the hearing you described the process by which the Deputy 
Secretary looks across the 11 IPTs to determent funding priorities for 
the Directorate. What information does the Deputy Secretary use to 
determine the relative investment among the IPTs? Similarly, what 
metric does S&T use to determine what projects are funded in the high-
risk, Innovation portfolio?

A1a. The Deputy Secretary has established a Technology Oversight Group 
(TOG) to provide oversight of the S&T Directorate's Capstone IPT 
investments. The TOG is chaired by the Deputy Secretary and consists of 
the DHS Under Secretary for Management and the DHS Under Secretary for 
National Protection and Programs. The DHS CFO attends, and the DHS 
Under Secretary for Science and Technology is the Executive Secretary. 
Through the TOG, the Deputy Secretary provides oversight of the S&T 
Capstone IPT investment and ensures investment balance across the 
Capstone IPTs. In implementation, the DHS Under Secretary for Science 
and Technology provides the Capstone IPT-approved, -prioritized and -
recommended S&T Enabling Homeland Capabilities (EHC) to the TOG. The 
TOG validates the customer focus and ensures that proposed S&T 
Directorate programs support Department-wide strategies and concerns.
    The TOG prioritizes funding across S&T Directorate Divisions using 
specific criteria such as:

        <bullet>  Magnitude of Vulnerability/Risk--projects that would 
        significantly reduce the known vulnerability/risk to a known 
        threat;

        <bullet>  Projects that address one or more of the DHS 
        priorities identified;

        <bullet>  Cross-cutting Department priority--projects that 
        address high-priority capability gaps identified by multiple 
        IPTs;

        <bullet>  Ability to fill a major capability gap--projects that 
        have a high potential to fill a capability gap identified by 
        IPTs;

        <bullet>  Transition timing--projects that match transition 
        with a scheduled DHS acquisition program upgrade; and

        <bullet>  Expected delivery time.

Q1b.  Similarly, what metric does S&T use to determine what projects 
are funded in the high-risk, Innovation portfolio?

A1b. The initial (current) set of Homeland Innovative Prototype 
Solutions (HIPS) and High Impact Technical Solutions (HITS) projects 
were selected in early FY 2007, prior to the initial meeting of the S&T 
Directorate's Capstone Integrated Product Teams (IPTs). They were 
selected as a result of the Under Secretary for Science and 
Technology's participation in a two-day off-site with all Department 
leadership. The Under Secretary was able to identify the priority gaps 
in capability as described by leadership and those gaps became the 
initial HIPS and HITS. The list of HIPS and HITS projects has been 
extremely well received by our customers and has generated tremendous 
interest among industry. New HIPS and HITS will be selected from 
various inputs including the IPT process, unsolicited input from 
industry and laboratories, and from teaming opportunities with other 
agencies. The S&T Directorate's Corporate Board will review all 
potential candidates for HIPS and HITS categories and make final 
program decisions.

Q2.  In your testimony you describe a UAV simulation S&T is currently 
developing with the FAA. How will this simulation help ease the 
barriers to regular operations of UAVs in the National Airspace System? 
Will S&T also pursue flight tests of relevant safety hardware?

A2. Unmanned Aerial Vehicles (UAV) simulation between the S&T 
Directorate and the Federal Aviation Administration (FAA) will directly 
affect the relationship during regular operations of UAVs in the 
National Airspace System (NAS). By coordinating during the simulations, 
the process of putting more UAVs in the NAS will be much safer. 
Simulations will address issues such as the airspace during take-offs 
and landings as well as in-flight collision avoidance. Since many UAVs 
fly at the same altitude as manned aircraft, this is where most of the 
coordination is needed. By doing simulations that will practice take-
offs and landings and flying in the vicinity of manned aircraft, DHS 
organizations and the FAA will help ease the barriers during regular 
operations as well as last-minute disaster relief operations such as 
the recent wildfires in California. By preparing emergencies during 
simulations, DHS organizations as well as the FAA will be able to 
coordinate and manage the NAS much more efficiently.
    The S&T Directorate is working with the FAA and DOD to pursue 
flight tests of relevant safety hardware including collision avoidance 
systems. The fact that UAVs are unmanned makes safety in the NAS the 
highest concern to the S&T Directorate, and we intend on ensuring all 
relevant safety hardware has been properly tested and standardized.

Q3a.  Dr. Jackson's testimony highlighted the need for regular red-
teaming to ensure technological defenses cannot be immediately 
overcome. What role does red-teaming play in current testing and R&D 
activities of the Directorate? Dr. Jackson also spoke about the 
potential need for organizational changes to utilize new technology or 
adapt to opponents. Does the S&T Directorate have the expertise to 
advise DHS components on organizational or operational improvements or 
provide research in this area?

A3a. The S&T Directorate agrees with the importance of red teaming and 
is evolving an external red team capability. Within the S&T 
Directorate, we look to various laboratories to provide red teaming 
capability on selected technologies.

Q3b.  Dr. Jackson also spoke about the potential need for 
organizational changes to utilize new technology or adapt to opponents. 
Does the S&T Directorate have the expertise to advise DHS components on 
organizational or operational improvements or provide research in this 
area?

A3b. The DHS operational components are the experts in their operations 
and organizational structure. The S&T Directorate will closely 
coordinate with the operational components on the development of 
incremental and innovative technologies. Through this close 
coordination, the operational components will be better able to 
evaluate these technologies, evolve new concepts of operations if 
necessary, and determine the degree of operational improvement each 
technology provides. This close coordination manifests itself through 
the Capstone IPT process where the S&T Directorate develops a better 
understanding of operational requirements. Demonstrations and pilots of 
technologies allow operational components and end-users to better 
understand and evaluate the technology as it matures, and 
experimentation provides an environment for the operational components 
to test the edges of the technology and the underlying operational 
concepts. The S&T Directorate is a component of this important chain, 
but our operational customers are the experts and end-users.
    The S&T Directorate has developed various test beds to evaluate 
technology in actual operational environments. The test beds allow us 
to evaluate technology for survivability, operational efficacy, and 
susceptibility to counter-measures. Relevant to Border Security, our 
border test beds provide integrated system level test platforms for 
evaluating border security sensor and processing technologies and 
demonstrating their performance in an operational environment. 
Furthermore, the test beds mature those technologies for transition, 
reduce associated technology risk, and establish lessons learned for 
our operational components. For example, in FY 2006, the S&T 
Directorate installed a southern border test bed in the Tucson sector 
of Arizona, which tested Border Patrol officer's abilities to remotely 
access databases, sensor alerts, and geo-spatial information via 
vehicle-mounted computers and hand-held devices. In FY 2007, the S&T 
Directorate expanded the southern border test bed by extending access 
to multiple law enforcement databases; deploying an in-field, 10-
fingerprint reading system; improving radio direction finding of 
individuals conducting counter surveillance in support of illegal 
activity; and adding a law enforcement asset location tracking 
capability (blue force tracking). In FY 2008, the S&T Directorate will 
install a northern border test bed demonstration in the Swanton sector 
of Vermont, which will include a multi-sensor fusion function, field 
level scene awareness capability, and law enforcement data base query. 
This puts new technology in real-world environments against real-world 
adversaries and provides a measure against current operational 
technologies and capabilities.

Q4a.  In your testimony you describe the university-based Centers of 
Excellence (CoE) as an integral part of the Directorate's long-term 
research agenda. How much of the Directorate's basic research is 
performed through CoE's versus individual grants or national 
laboratories? Does the Directorate have a planning mechanism for long-
term research across all of the divisions?

A4a. About 50 percent of the S&T Directorate's basic research budget 
goes toward Centers of Excellence (CoE) research.

Q4b.  Does the Directorate have a planning mechanism for long-term 
research across all of the divisions?

A4b. Yes, the S&T Directorate develops long-term research programs with 
the divisions. Long-term research develops the fundamental or 
scientific technical basis or understanding that future systems and 
devices will be based on. Long-term research needs are derived mainly 
from three sources; basic or fundamental research issues that are 
identified in the IPT program planning process, priorities unique to 
Homeland Security solutions, and leveraging opportunities with our 
research partners that have strong Homeland Security applicability. The 
S&T Directorate coordinates basic research workshops between the 
divisions and DHS in-house labs, the National Laboratory networks, and 
the CoEs.

Q5a.  To the credit of Under Secretary Cohen and yourself, the 
Integrated Product Team (IPT) process has significantly improved S&T's 
responsiveness to the other components of DHS. Does the focus on 
technologies that can be delivered in three years or less, however, 
bias the Directorate towards modest changes of existing systems? Is the 
IPT review system capable of assessing long-term research goals?

A5a. No. The Capstone IPT process is only one pillar of the S&T 
Directorate's investment effort. We also recognize the need to invest 
in basic research and in higher risk innovative technologies. The three 
S&T Directorate investment pillars compliment each other by allowing 
S&T to address near-term capability gaps while investing in longer-term 
solutions. The focus of the Capstone IPT process is to connect with the 
customer, understand their operations and capability gaps, and deliver 
near-term improvements to protect the Nation. Our innovation effort is 
informed by the Capstone IPT process but is focused on longer-term, 
higher risk, game-changing technologies. Basic research invests in 
areas where there are capability gaps but no near-term or innovative 
solutions. Basic research invests in these areas so that in the long 
run, we develop the understanding of the relevant basic science that 
will eventually provide the technical solutions our customers' need. 
Presently, about 15 percent of the S&T Directorate's budget goes toward 
long-term research. Our goal is to direct 20 percent of the S&T 
Directorate's budget toward long-term research.

Q5b.  Is the IPT review system capable of assessing long-term research 
goals?

A5b. Yes, the S&T Directorate's IPT process provides the information 
that feeds long-term research planning. As our technical subject matter 
experts work with other DHS components, they identify many R&D needs. 
If a capability gap identified by the customer cannot be solved by a 
near-term technology solution, or an immature high-risk technology 
solution that is not evident, then basic research is necessary to 
advance the science and find breakthroughs that could result in future 
technology solutions. The S&T Directorate's subject matter experts 
(SMEs) work directly with DHS component representatives to determine 
which needs fit into the scope of the three-year target and through our 
innovation effort. Other long-term, high-priority needs identified 
during the process are handled through the office of the S&T 
Directorate's Director of Research.

Questions submitted by Representative Phil Gingrey

Q1.  What were some of the capability gaps identified in the planning 
process CBP and S&T undertook? Were there projects that fell ``below 
the line'' and could not be immediately funded by the Directorate? If 
so, what were these items?

A1. Customs and Border Protection (CBP), along with Immigration and 
Customs Enforcement (ICE), co-chair the Border Security Capstone 
Integrated Product Team (IPT). The Capstone IPTs are arranged along 
departmental function lines, and thus, address overall border security 
and interior enforcement issues and not just a single component's 
priorities. As the co-chairs of the Border Security Capstone IPT, CBP 
and ICE followed a structured process that identified and assessed 
capability gaps. The Capstone IPT quickly realized that the high 
priority gaps identified by CBP were also common to ICE and the U.S. 
Coast Guard. The Capstone IPT identified several major acquisition 
programs that would benefit from the S&T Directorate conducting risk 
mitigation including CBP's SBINet and the U.S. Coast Guard's Command 21 
programs. Additionally, capability gaps were identified in the 
following areas:

        <bullet>  Improved ballistic protection via personal protective 
        equipment;

        <bullet>  Improved detection, tracking, and identification of 
        all threats along the terrestrial and maritime border;

        <bullet>  Ability to access ICE databases in which voice 
        information is entered; provide analytical, reporting, and 
        automated case de-confliction; classify, and identify voice 
        samples;

        <bullet>  Non-lethal compliance measures for vehicles, vessels, 
        or aircraft allowing for safe interdiction by law enforcement 
        personnel;

        <bullet>  Non-destructive tools to inspect hidden or closed 
        compartments to find contraband or security threats;

        <bullet>  Improved analysis and decision-making tools that will 
        ensure the development/implementation of border security 
        initiatives;

        <bullet>  Ability to non-intrusively determine the intent of 
        subjects during questioning;

        <bullet>  Ability for law enforcement personnel to quickly 
        identify the origin of gunfire and classify the type of weapon 
        fired; and

        <bullet>  Ability for law enforcement officers to assure 
        compliance of lawful orders using non-lethal means.

    There were capability gaps which fell below the line for the Border 
Security Capstone IPT based on resource limitations. The S&T 
Directorate's Capstone IPT process is customer-focused with the goal to 
deliver incremental technology improvements within three years. The 
three-year turnover establishes an automatic refresh capability. Once 
the Capstone IPT Process matures, we expect that each year 30 percent 
of our technology efforts will complete and transition, which would 
make funds available for the next below-the-line priority or the next, 
new, Capstone IPT-identified threat. The first priority Border Security 
Capstone IPT ``below the line'' capability gaps would be addressed by 
accelerating the following technology efforts: Tunnel Detection, 
Advanced Ground Surveillance Radar, Pattern Discovery and Prediction as 
a Decision Support System, Sense and Avoid Systems for Unmanned Aerial 
Systems (UASs), Counter Surveillance, and Less-Lethal compliance 
measures for personnel to provide solutions sooner to our DHS component 
customers.

Question submitted by Representative Adrian Smith

Q1.  You mentioned in your testimony the Border Officer Tools program 
and explained how this program will enable border security and Coast 
Guard members to perform their current tasks more effectively and 
safely. Could you please explain in greater detail how these 
technologies are assisting border patrol officers on the U.S.-Mexico 
border?

A1. There are two main projects under the Border Officer Tools and 
Safety program in the Borders and Maritime Security Division: Border 
Officer Tools and Border Officer Safety. Border Officer Tools will 
improve law enforcement effectiveness and enhance officer/agent safety 
while searching vessels/vehicles. Many of these tools will leverage 
technology currently under development by either DHS or Department of 
Defense (DOD) for their purposes. One effort is developing tools that 
support secure communications (i.e., voice and data) between field 
operators as well as between field operators and their command centers. 
Another example is an effort to deliver intrusive (requiring contact) 
as well as non-intrusive, non-destructive technologies to aid in the 
identification of contraband. In FY 2009, the project will conduct a 
technology survey to identify documentation resolution versus bandwidth 
solutions to provide 24-hour, Real-Time Image Transmission of high-
definition images and documents. The Border Officer Safety project will 
integrate technologies to enable border security law enforcement agents 
to perform their mission with greater safety. These technologies 
include, but are not limited to: Enhanced Ballistic Protection, 
Automatic Facial Recognition, Hidden Compartment Inspection Devices, 
and less-lethal Pursuit Termination-Vehicle/Vessel Stopping. In FY 
2009, the project will develop and document ballistic vest performance 
requirements for border application, evaluate equipment/technologies 
and develop gun-fire location requirements for law enforcement agents.
                   Answers to Post-Hearing Questions
Responses by Ervin Kapos, Director, Operations Analysis, Science and 
        Technology Directorate, Department of Homeland Security; 
        Executive Director, Homeland Security Science and Technology 
        Advisory Committee (HSSTAC)

Questions submitted by Chairman David Wu

HSSTAC Format

Q1.  The format of the HSSTAC was changed for the most recent iteration 
of the Committee. Previously, HSSTAC had a broad focus and provided 
recommendations for research priorities across the many fields covered 
by DHS S&T. Now, HSSTAC zeros in on specific project recommendations in 
a particular field, currently focusing on improvised explosive devices 
(IEDs). Why did the format of HSSTAC change? Given that the Committee 
is composed of experts from a variety of fields, are you taking 
advantage of the members' expertise when you focus on fields that fall 
outside their backgrounds? How does this format affect HSSTAC's ability 
to establish mission goals for the long-term?

A1. There have been changes to HSSTAC, however the Committee still 
adheres to its established responsibilities of reviewing and providing 
recommendations for research priorities across the fields that are, or 
possibly might be, covered in the programs of the S&T Directorate. In 
fact, that will be one of the topics to be covered in the next cycle of 
HSSTAC studies. At the same time, the Directorate asked the Committee 
to take intensive looks at problems that are pervasive in their impact 
on the S&T Directorate. For example, the HSSTAC will review what 
science and technology projects need to be undertaken in the next 
several years to provide an adequate basis for a capability to respond 
to the threat of improvised explosive devices (IEDs) in the U.S. 
domestic environment. Members of the HSSTAC have worked on the various 
portions of this problem as their backgrounds and expertise have 
particularly qualified them to do. The Committee also meets as a whole 
to critique and integrate the partial answers to the problem which 
becomes broad ranging advice to the Under Secretary for S&T. Finally, 
members representing the various academic disciplines have integrated 
well with the members representing the various first-responder and 
related fields, and we have found that this mode of operation supports 
HSSTAC's capability to establish mission goals for the S&T Directorate.

HSSTAC Expertise

Q2.  Does the membership of the HSSTAC include operational expertise 
that would allow the Committee to inform the Directorate on tactical 
concerns such as concepts of operation or organizational issues within 
the Directorate or other DHS components?

A2. Yes, the membership of the HSSTAC includes the operational 
expertise required to allow it to advise the S&T Directorate on 
concepts of operation and organizational issues that arise. Nearly all 
of the members have broad ranging and deep experience in Homeland 
Security activities and in what has been found to work and not to work 
in these areas in the past. Also, the membership includes 
representatives of the first-responder communities, such as law 
enforcement, fire safety, emergency management, and health affairs. The 
interaction between these first responders and the representatives of 
the various scientific disciplines on the HSSTAC has been consistently 
productive of valuable insights in areas such as concepts of operation 
and organizational issues.
                   Answers to Post-Hearing Questions
Responses by Brian A. Jackson\1\, Associate Director, Homeland Security 
        Research Program, The RAND Corporation
---------------------------------------------------------------------------
    \1\ The opinions and conclusions expressed in this testimony are 
the author's alone and should not be interpreted as representing those 
of the RAND Corporation or any of the sponsors of its research. This 
product is part of the RAND Corporation testimony series. The series 
records testimony presented by RAND associates to federal, state, or 
local legislative committees; government-appointed commissions and 
panels; and private review and oversight bodies. The RAND Corporation 
is a nonprofit research organization providing objective analysis and 
effective solutions that address the challenges facing the public and 
private sectors around the world. RAND's publications do not 
necessarily reflect the opinions of its research clients and sponsors.

---------------------------------------------------------------------------
Questions submitted by Chairman David Wu

Q1.  In your testimony, you said, ``the effectiveness of security 
technologies can degrade as our adversaries adapt and alter their 
behavior in response to the introduction of defensive measures. That 
adaptive behavior can pose a significant risk to the security benefits 
new defensive technologies are intended to provide and, therefore, must 
be considered in technology planning.'' In your opinion, does DHS S&T 
recognize the need for adaptive, flexible technology planning? How do 
the contributions of various advisory groups, such as Integrated 
Product Teams and the HSSTAC affect DHS S&T's ability to adapt to new 
challenges?

A1. Our research on the effects of terrorist adaptive behaviors on the 
efficacy of defensive measures was sponsored by DHS S&T's Office of 
Comparative Studies to identify the implications for S&T planning for 
combating terrorism. Because RAND has not had the opportunity to 
examine DHS S&T's technology planning processes or the activities of 
groups like the Integrated Product Teams and the HSSTAC, I 
unfortunately cannot provide an informed answer on the extent the ideas 
developed in our or others' work on this topic are reflected in DHS 
planning efforts.

Q2.  You specifically mention how adversaries have been able to defeat 
the technologies identified as priorities in the bill: unmanned aerial 
vehicles (UAVs), tunnel detectors, and anti-counterfeit technology. How 
should these identified vulnerabilities affect how DHS proceeds in 
these research areas?

A2. Terrorist groups' past efforts to degrade the effectiveness of 
priority technologies like UAVs, tunnel detectors, and anti-
counterfeiting technologies can inform research planning in two ways.
    First, the ways that terrorist groups have found to do so provide 
lessons for improving future technologies that can be directly applied 
in current research activities. If approaches can be devised that 
render terrorists' past counter-technology strategies ineffective, our 
future defenses will be stronger as a result. Our research has shown 
that responding to terrorist adaptive behavior can involve 
modifications to the technical systems themselves, which would need to 
be an integral part of R&D programs, but frequently require changing 
the concepts of operation for how technologies are used as well. This 
emphasizes that in developing new defensive measures it is important to 
consider the ways those technologies will be used as part of the 
development process, since those concepts of operation may be critical 
to maintaining the technologies' effectiveness. It also underscores the 
importance of the transition efforts to move new technologies to end-
users and help shape their application.
    Second, in designing research programs for these priority 
technologies, the principles identified in our research and summarized 
in my testimony are important to ensure that the defensive measures we 
develop in these areas are robust to adversary adaptive efforts. 
Including testing, red teaming, and small scale technology pilot 
efforts in R&D programs is needed to identify and address 
vulnerabilities to their effectiveness. Furthermore, given that 
adversary groups have shown remarkable flexibility to respond to even 
sophisticated technologies, it is also critical to maintain reasonable 
flexibility in the technologies being developed and to build R&D 
portfolios in each of these areas (i.e., rather than focusing on only a 
single technology choice) to preserve ``fall back'' defensive options 
if the effectiveness of deployed technologies is compromised.

Questions submitted by Representative Ralph M. Hall

Q1.  What assessment technique would you suggest for determining the 
funding priorities among threats such as border security or 
radiological detection?

A1. In RAND's past research and testimony on homeland security, we have 
advocated that funding priorities should be informed by risk analysis--
an assessment of the threat of specific attacks, the vulnerability of 
targets of concern to those attack modes, and the consequences that 
would occur if an attack was successful. Use of risk analysis in policy 
planning ensures that priorities are defined not just by one these 
three factors in isolation but by all three together, providing a way 
of considering high probably, lower consequence events--such as 
``everyday'' illegal border crossings by individuals--with lower 
probability but potentially higher consequence events--such as 
radiological material being smuggled into the country.
    A risk-informed priority setting process for R&D would consider the 
seriousness of individual risks and select technology priorities and 
options based on their ability to reduce those risks. The results of 
our research on terrorist responses to defensive measures could 
contribute to such a process since those responses degrade the 
effectiveness of defensive technologies, thereby cutting their ability 
to reduce risk.

Q2.  What implications does your research have for the appropriate 
balance between short-term and long-term research projects? Are 
incremental changes to technological defenses enough to stay ahead of 
opponents' counter-efforts?

A2. It is difficult to provide a general answer to whether incremental, 
short-term technological changes are enough to stay ahead of adversary 
adaptive efforts. For some technologies, incremental efforts may make 
it possible to maintain a defense's efficacy for some time, though it 
is unlikely to do so forever. In other cases, depending in large part 
on the specific way the opponent has found to defeat the technology, 
incremental changes may provide little benefit. For example, if an 
adversary has found a way to avoid the functioning of the technology 
entirely (one of the four strategies our work identified that were 
highlighted in my testimony), incremental change is unlikely to be 
enough. The importance of both short-term and long-term research 
projects is therefore a part of the ``portfolio approach'' to 
developing defenses our work suggested, where it is longer-term work 
that may be the source of the ``fall back'' defensive options if 
today's technologies are breached. Focusing disproportionately on 
shorter-term efforts risks creating a defense that cannot respond to 
future changes in the threat.
    While it is easy to say that both short- and long-term focused work 
are needed, the resources available for supporting research and 
development are not infinite and resource constraints must limit the 
number and scale of activities that can be pursued simultaneously. As a 
result, in thinking about portfolios of defenses we are not suggesting 
that multiple ``full scale'' technology programs be pursued at once. 
Instead, what is needed is portfolios of smaller scale research, pilot, 
and technology evaluation efforts that maintain a group of options at 
differing levels of maturity that be then called on--and scaled up--if 
and when they are needed.
                   Answers to Post-Hearing Questions
Responses by Jeff Self, Division Chief, U.S. Border Patrol

Questions submitted by Chairman David Wu

All Threats

Q1.  You say in your testimony that Border Patrol has an `` `all 
threats' strategy with anti-terrorism as our main priority.'' In a 
conversation with a CBP officer at a major port, our staff learned that 
on-the-ground officers estimate that drug interdictions have decreased 
by approximately 90 percent since CBP's focus shifted to terrorism. In 
your opinion, is that estimate accurate? If so, how is CBP working with 
DHS S&T to identify promising technologies to improve the rate of drug 
interdictions?

A1. The Border Patrol, along with CBP, was an active partner with ONDCP 
and DOJ in the development of the National Southwest Border 
Counternarcotics Strategy, which was publicly released in October 2007. 
The Border Patrol is working diligently to implement the numerous 
strategy objectives that relate to combating all border threats, 
including narcotics. In FY 2007, the Border Patrol increased agent 
staffing along with complementary tactical infrastructure and 
surveillance technology to make gains in the number of miles under 
operational control between the ports of entry. These increases have 
contributed to the decrease in the number of arrests of aliens entering 
the United States illegally and the increase in the amount of marijuana 
and cocaine seizures nationwide. Border Patrol marijuana seizures 
(1,859,299 pounds) increased 36 percent; over 99 percent of that amount 
was seized on the southern border with Mexico. Border Patrol cocaine 
seizures (14,242 pounds) increased 11 percent; over 89 percent was 
seized on the southern border with Mexico, just over nine percent in 
the coastal border sectors and less than two percent along the northern 
border with Canada.
    CBP Border Patrol's area of responsibility (AOR) is focused between 
the official ports of entry, while CBP Office of Field Operations 
concentrates at the port of entry. The Border Patrol is unfamiliar with 
the CBP officer assertion regarding the reduction of drug interdiction. 
That being said, the U.S. Border Patrol is the Department's first line 
of defense in interdicting terrorists, terrorist weapons, including 
potential weapons of mass destruction--from entering the United States 
between the ports of entry. This complements the Border Patrol's 
traditional missions of interdicting illegal aliens and drugs and those 
who attempt to smuggle them across our borders between the ports of 
entry.
    To carry out its mission, Border Patrol has a clear strategic goal: 
to establish and maintain operational control of the border of the 
United States. All of our efforts are focused on this goal. The Border 
Patrol's strategy consists of five main objectives:

        <bullet>  Establish substantial probability of apprehending 
        terrorists and their weapons as they attempt to enter illegally 
        between the ports of entry;

        <bullet>  Deter illegal entries through improved enforcement;

        <bullet>  Detect, apprehend, and deter smugglers of humans, 
        drugs, and other contraband;

        <bullet>  Leverage ``Smart Border'' technology to multiply the 
        effect of enforcement personnel; and

        <bullet>  Reduce crime in border communities and consequently 
        improve quality of life and economic vitality of targeted 
        areas.

Reports/Recommendations

Q2.  Has the Homeland Security Science and Technology Advisory 
Committee or Homeland Security Institute prepared any reports or 
recommendations for U.S. Customs and Border Protection directly? If so, 
how did CBP use these recommendations?

A2. CBP has utilized the Homeland Security Institute (HSI) to conduct 
several studies. The first study was an analysis of CBP's apprehensions 
at the border, and the second was an operational assessment. Both of 
these studies, the outcomes and recommendations that followed, were 
intended to help CBP assess whether progress is being made in our 
border security mission. In short, HSI substantiated in their report 
that there has been a cumulative deterrent impact resulting from our 
regular operations and special initiatives such as Jump Start, 
Streamline, end of catch and release, and interior repatriation. CBP 
also utilized HSI to help determine the initial staffing requirements 
for the Secure Border Initiative (SBI) Program Executive Office (PEO), 
including the resources required to manage the SBInet procurement.

Questions submitted by Representative Ralph M. Hall

Tunnels

Q1.  What risk do tunnels pose to our border security?

A1. As the Border Patrol increases and expands its efforts along the 
border, there will always be methods that smugglers employ to try to 
penetrate and thwart our efforts. Cross-border tunnels have become one 
way of countering our success above ground. The success of the Border 
Patrol's mission above ground coincides with an increase in the amount 
of cross-border tunnel activity that has been found. It is more 
difficult and time consuming for smugglers to dig tunnels underground 
then to cross the border illegally above ground.
    Cross-border tunnels pose a threat to the Nation's border security. 
While those tunnels discovered thus far have primarily served as a way 
to smuggle drugs, clandestine tunnels could be used for illegal alien 
entry or to smuggle of weapons of mass destruction (WMD) or potential 
terrorists into the United States.
    The Border Patrol conducts below-ground sonar inspections in an 
attempt to find tunneling activity along the border, participates in 
multi-agency Tunnel Task Forces, and shares intelligence with partner 
agencies regarding this threat. The DHS Science and Technology (S&T) 
Directorate has an ongoing program which is looking for breakthrough 
technologies to improve our ability to detect cross-border tunnels/
tunneling activity. The goal is to develop a technology, or a 
combination of technologies that Border Patrol officers and other 
enforcement agencies can use to monitor the border for tunnel 
construction.
    As we gain effective control of the border, we expect to see 
smuggling organizations try other tactics, and we will adapt our 
efforts in order to shut those tactics down as well.

Red Tape

Q2.  What red tape must Customs and Border Protection or S&T overcome 
in order to use UAVs routinely? How has the Unmanned Aircraft System 
(UAS) program stacked up against helicopters and airplanes in 
effectiveness and cost as a tool for the Border Patrol?

A2. U.S. Customs and Border Protection (CBP) continues to work closely 
with the Federal Aviation Administration (FAA) and the Department of 
Defense on issues affecting the use of unmanned aircraft in the 
national air space. To date, the FAA has been very cooperative in 
meeting CBP's air space access requirements. Through the Office of CBP 
Air and Marine (A&M), the Agency's plans for expanded use of unmanned 
aircraft across all of the Nation's borders are being addressed with 
the FAA. In FY 2008, CBP A&M intends to conduct a maritime 
demonstration of UAS capabilities in conjunction with the U.S. Coast 
Guard, and to introduce a UAS to the northern border area of 
responsibility.
    The Predator B UAS provides CBP with a remotely piloted asset that 
allows for persistent, broad area surveillance with proactive responses 
that is driven by un-cued, cued, and intelligence based missions. With 
a maximum range of 3,000 miles and the potential for 30 hours of on-
station time, no other system in the CBP Air and Marine fleet provides 
the same capabilities as the Predator B. Instead of duplicating or 
replacing the capabilities of existing CBP assets, CBP A&M exploits the 
unique capabilities of the UAS to greatly enhance CBP's border security 
operations. The UAS will allow CBP A&M to support other DHS entities, 
including the U.S. Coast Guard, the Federal Emergency Management Agency 
(FEMA), and U.S. Immigration and Customs Enforcement (ICE). The FY 2008 
Appropriation requires CBP to submit a cost effectiveness report to 
Congress. Once that report is submitted to the committees on 
appropriations, CBP will share that cost effectiveness information with 
the Committee.

FAA Restrictions

Q3.  Currently the FAA requires that licensed pilots operate all 
aircraft in the National Airspace. The FAA does not allow fully 
autonomous aircraft to fly without special authorization. Would you 
expect a large increase in use of UAVs by the Border Patrol if these 
restrictions were lifted? Finally, has the Border Patrol gained benefit 
from early trials of remotely-piloted UAVs and would you consider 
participating in similar trials for autonomous drones?

A3. CBP A&M does not expect a large increase in the use of unmanned 
aircraft systems for homeland security if the FAA lifted their 
restrictions on pilot qualifications and system capabilities. The use 
of instrument-rated pilots for operations in the national air space is 
a safety of flight issue and CBP would retain the requirement even if 
the FAA lifted their restrictions. UAS operations across the southwest 
border have proven highly effective. In just over 1,500 hours of flight 
operations, CBP UASs have been credited with over 4,000 apprehensions 
and the seizure of about 15,000 lbs of illegal drugs. The Predator B 
UAS has the capabilities to meet all current CBP mission requirements. 
Should new requirements emerge that the Predator B could not 
accommodate, CBP A&M would investigate the use of other aviation assets 
to meet the new mission need.

Questions submitted by Representative Adrian Smith

Fences

Q1.  In your experience, where there are fences or physical barriers, 
are they singularly effective at preventing aliens from crossing the 
border illegally?

A1. Border infrastructure, in this case fences and physical barriers, 
is effective in certain areas. However, as experience and common sense 
suggests, fencing by itself cannot prevent all aliens from crossing the 
border illegally. There are stretches of fencing or barriers that are 
complemented by a presence of agents and technology to support the 
infrastructure, making the fencing and barriers operationally 
successful by preventing aliens from the crossing the border illegally. 
Technology allows the Border Patrol to identify and track illegal 
activity. Fencing helps deter illegal crossings and gives Border Patrol 
agents time they need to respond to illegal cross border activity. 
Fencing and barriers work hand in hand with manpower and technology to 
establish deterrence and increase the certainty of apprehension.

UAS

Q2.  As you stated in your testimony, the Unmanned Aircraft System 
(UAS) has assisted immensely in arrests and seizure of illegal drugs. 
In your opinion, are these types on technologies more capable and 
effective at preventing illegal entry into our country than physical 
barriers?

A2. CBP is building a border security system comprised of many 
components, and each component complements one or more of the others. 
UASs provide intelligence-gathering and surveillance capabilities as 
well as direct support to ground and maritime interdiction operations. 
But the UAS cannot meet all Agency border security requirements. In 
addition to Border Patrol agents on the ground, physical barriers and 
sensors are required to cover the vast areas threatened by illegal 
activities. Threat information must be processed and returned to the 
field as actionable intelligence. Only though an integrated network of 
ground systems, air and marine systems, sensors, communications, 
intelligence, and people can CBP accomplish its homeland security 
mission.

Documents

Q3.  How often do Border Patrol Agents come across fraudulent 
documents? What types of documents are most often tampered with? And 
how many documents must Border Patrol agents become familiar with?

A3. There have been fewer than 100 reported fraudulent documents 
encountered throughout the Border Patrol annually in the last five 
years.
    For encounters with tampered documents, agents generally come 
across the older plastic covered I-551, Lawfully Admitted Permanent 
Resident (LAPR) card and I-94, Arrival/Departure Record. The older I-
551 LAPR card was manipulated by photo substitutions and modifying the 
type within the card. The older I-551 LAPR card has been replaced with 
an updated holographic magnetic striped machine readable card with 
additional security features. The I-94 is a paper document that has 
computer type, ink stamping, an embossed seal and an attached photo. 
The I-94 is sometimes manipulated by photo substitutions and modifying 
the type and stamps.
    Agents must become familiar with immigration documents and other 
local governmental issued documents. Examples of immigration documents 
are the I-551 LAPR card, I-586 Border Crosser Card (BCC), I-94 and 
other foreign issued travel documents such as passports and visas. 
Other non immigration issued documents that Border Patrol Agents need 
to be familiar with are birth and marriage certificates, Social 
Security Cards and driver's licenses.















                              Appendix 2:

                              ----------                              


                   Additional Material for the Record


<SKIP PAGES = 000>

[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]