PDF Version



                                                         S. Hrg. 109-61

  CURRENT AND PROJECTED NATIONAL SECURITY THREATS TO THE UNITED STATES

=======================================================================

                                HEARING

                               BEFORE THE

                    SELECT COMMITTEE ON INTELLIGENCE
                          UNITED STATES SENATE

                       ONE HUNDRED NINTH CONGRESS

                             FIRST SESSION

                               __________

                           FEBRUARY 16, 2005

                               __________

      Printed for the use of the Select Committee on Intelligence


 Available via the World Wide Web: http://www.access.gpo.gov/congress/
                                 senate


                                 ______

                    U.S. GOVERNMENT PRINTING OFFICE
22-379                      WASHINGTON : 2005
_____________________________________________________________________________
For Sale by the Superintendent of Documents, U.S. Government Printing Office
Internet: bookstore.gpo.gov  Phone: toll free (866) 512-1800; (202) 512ÿ091800  
Fax: (202) 512ÿ092250 Mail: Stop SSOP, Washington, DC 20402ÿ090001

                    SELECT COMMITTEE ON INTELLIGENCE

           [Established by S. Res. 400, 94th Cong., 2d Sess.]

                     PAT ROBERTS, Kansas, Chairman
          JOHN D. ROCKEFELLER IV, West Virginia, Vice Chairman
ORRIN G. HATCH, Utah                 CARL LEVIN, Michigan
MIKE DeWINE, Ohio                    DIANNE FEINSTEIN, California
CHRISTOPHER S. BOND, Missouri        RON WYDEN, Oregon
TRENT LOTT, Mississippi              EVAN BAYH, Indiana
OLYMPIA J. SNOWE, Maine              BARBARA A. MIKULSKI, Maryland
CHUCK HAGEL, Nebraska                JON S. CORZINE, New Jersey
SAXBY CHAMBLISS, Georgia
                   BILL FRIST, Tennessee, Ex Officio
                     HARRY REID, Nevada, Ex Officio
                   JOHN WARNER, Virginia, Ex Officio


                              ----------                              


             Bill Duhnke, Staff Director and Chief Counsel
               Andrew W. Johnson, Minority Staff Director
                    Kathleen P. McGhee, Chief Clerk


                                CONTENTS

                              ----------                              


                                                                   Page

Hearing held in Washington, DC:
    February 16, 2005............................................     1

Witness Statements:

    Goss, Hon. Porter J., Director of Central Intelligence.......     7
        Prepared statement.......................................    14
    Jacoby, Vice Admiral Lowell, USN, Director, Defense 
      Intelligence Agency........................................    45
        Prepared statement.......................................    46
    Loy, Admiral James, Deputy Secretary, Department of Homeland 
      Security...................................................    36
        Prepared statement.......................................    39
    Mueller, Hon. Robert S. III, Director, Federal Bureau of 
      Investigation..............................................    18
        Prepared statement.......................................    23
    Rodley, Carol, Principal Deputy Assistant Secretary of State 
      for 
      Intelligence and Research..................................    59

Supplemental Materials:

    Prepared Statement for the Record from Hon. Thomas Fingar, 
      Assistant Secretary of State for Intelligence and Research.    59
    Prepared Statement for the Record from Senator Olympia J. 
      Snowe......................................................    69

 
  CURRENT AND PROJECTED NATIONAL SECURITY THREATS TO THE UNITED STATES

                              ----------                              


                      WEDNESDAY, FEBRUARY 16, 2005

                      United States Senate,
           Senate Select Committee on Intelligence,
                                                    Washington, DC.
    The Committee met, pursuant to notice, at 10:03 a.m., in 
room SH-216, Hart Senate Office Building, the Honorable Pat 
Roberts, Chairman of the Committee, presiding.
    Committee Members Present: Senators Roberts, Hatch, Bond, 
Lot, Snowe, Chambliss, Warner, Rockefeller, Levin, Feinstein, 
Wyden, Bayh, and Mikulski.

        OPENING STATEMENT OF THE HONORABLE PAT ROBERTS, 
                            CHAIRMAN

    Chairman Roberts. The hearing will come to order.
    Today, the Senate Committee on Intelligence meets in open 
session to conduct its annual worldwide threat hearing. I would 
like to inform Members that traditionally we have a closed 
hearing in the afternoon, but Secretary of State Rice is coming 
to the Senate to brief all Members this afternoon.
    We will follow up with individuals at our weekly 
intelligence hearings, and then, obviously, a hearing or 
briefing at any Member's request. So we will see all of these 
people back again in a classified session at another time.
    The Committee traditionally begins its annual oversight of 
the U.S. intelligence community with an open hearing, so that 
the public will have the benefit of the intelligence 
community's best assessment of the current and projected 
national security threats to the United States.
    Our witnesses today are Mr. Porter Goss, the Director of 
Central Intelligence. Welcome back, Mr. Director.
    Director Goss.  Thank you, Mr. Chairman.
    Chairman Roberts. Mr. Robert Mueller, the Director of the 
Federal Bureau of Investigation; Admiral James Loy, the Deputy 
Secretary of the Department of Homeland Security; Vice Admiral 
Lowell Jacoby, the Director of the Defense Intelligence Agency; 
and Ms. Carol Rodley, the Principal Deputy Assistant Secretary 
of State for Intelligence and Research. The acronym for that, 
by the way, is INR.
    The Committee thanks all of our distinguished witnesses for 
being here today. We thank you for your commitment, for your 
perseverance on your job, and for helping to keep America safe.
    Before we begin the testimony, I would like to take this 
opportunity to discuss an issue that has concerned and 
frustrated me since I joined this Committee over 8 year ago, 
and all Members of this Committee from time to time.
    While we meet today in open session, the Members of this 
Committee and our witnesses will be limited in what they can 
say because the vast majority of the information with which 
this Committee and our witnesses deal is classified. The issues 
which we cover are not necessarily secret, but the details that 
surround them generally are.
    Our goal today is to have as open a discussion as possible, 
recognizing that there are simply some things that we cannot 
and must not discuss publicly. The dynamics surrounding what we 
can and cannot say represents one of the most frustrating 
aspects of membership on this Committee, especially when secret 
intelligence activities find their way into public discourse.
    How do we as a Committee assure the American people that we 
are even aware of something when we cannot discuss it publicly? 
How, without confirming or denying a particular story, do we 
explain that concerns are misplaced, on point or off point? 
Where do we draw the line between the public's right to know 
and our Nation's security interests in keeping something 
secret? These remain very difficult questions.
    In 1976, the U.S. Senate established this Committee to 
conduct vigorous oversight of the intelligence activities of 
the United States government. And that is exactly what we do, 
day in and day out--with, I might add--what the Vice Chairman 
and I consider to be an outstanding and most capable staff.
    Unfortunately, but necessarily, the Members of this 
Committee are rarely at liberty to respond to public stories or 
to inquiries. This does not mean, however, that we are not 
aware of or deeply involved in the issue that is being 
discussed.
    Much of this Committee's work gets done behind closed doors 
with little fanfare. And open public discussion about all of 
the issues on which our Committee works is just not possible. 
If we were to discuss some of the ingenious ways this Nation 
does collect intelligence and protects our citizens, our 
adversaries would and could develop simple countermeasures that 
would eliminate these advantages, which were developed at great 
cost or high risk. This secrecy does protect lives and helps us 
to keep safe.
    The Vice Chairman and I will, however, continue to work 
together to keep the American people as informed as possible. 
And when we can, we will do our best to clarify any 
misconceptions that may exist. With that in mind, I will now 
briefly discuss some of our plans for this Committee's 
oversight in the coming months.
    First, we look forward to the naming of a Director of 
National Intelligence. As soon as the President nominates this 
individual, we will schedule a confirmation hearing as soon as 
practicable.
    Second, we will monitor closely the implementation of the 
Intelligence reform bill. We will focus a great deal of 
attention on how this Committee can support the new DNI in the 
exercise of his or her authorities. And, because no legislation 
is perfect, we will also look at whether any legislative fixes 
are necessary.
    Third, in the area of oversight, we will focus on the 
intelligence community's collection and analytical 
capabilities, especially in regard to our capabilities. Do we 
have the adequate collection? Do we have the adequate analysis? 
Do we have the information access to make a consensus threat 
analysis that is both credible and helpful to the policymakers 
and the Congress?
    This Committee learned from our Iraq WMD inquiry that we 
cannot and should not always take the intelligence community's 
assessments at face value. The Vice Chairman and I have 
therefore decided to change the way the Senate Intelligence 
Committee does our work.
    We haven't launched anything. We haven't really begun an 
investigation or an inquiry. Nor have we ruled them out. We 
have simply adjusted our approach based on the lessons we 
learned while reviewing the assessment by the community on 
Iraq's WMD programs.
    Applying the methodologies that we used in that review, we 
will now look deeper into the intelligence community's work on 
the very critical threats that face our Nation. Instead of 
examining these issues after the fact, as we did on the Iraq 
WMD question and many other matters in the past, we are going 
to be more proactive, to try to identify our strengths and our 
weaknesses ahead of time. We have already begun to examine our 
intelligence capabilities with respect to nuclear terrorism and 
also the country of Iran.
    In closing, I want to say something about the limitations 
of intelligence. Even the best intelligence will not be 
absolutely precise and tell us what to do. However, 
intelligence is a necessary and crucial tool used by 
policymakers to make very difficult decisions that do directly 
affect those who defend our freedoms and our national security.
    With that said, I look forward to the testimony of our 
witnesses, and also the questions by our Members. I now turn to 
the distinguished Vice Chairman for any comment he may wish to 
make.
    Senator Rockefeller.

      STATEMENT OF THE HONORABLE JOHN D. ROCKEFELLER IV, 
                         VICE CHAIRMAN

    Vice Chairman Rockefeller. Thank you, Mr. Chairman.
    It's customary at the beginning of our hearings to welcome 
everybody, and I certainly do so, and very much look forward to 
your testimony. I have to say, though, I think there is a 
significant absence or an empty spot at the table, at the 
witness table. And I want to talk about that.
    There should be another chair before us. And the little 
sign in front of it should read Director of National 
Intelligence, DNI. Last summer, the Congress made reforming the 
intelligence community its top legislative priority. We worked 
through our August recess. We came back in a lame duck session 
after the election.
    And we eventually passed landmark legislation fundamentally 
reforming the intelligence community for the first time in 50 
years. The Congress made this extraordinary effort because it 
believed that our Nation was at risk, and we take that 
seriously.
    More specifically, the Congress--eventually joined by the 
President--understood that without one individual in charge of 
the 15-agency intelligence community, America's war on 
terrorism would continue to be hampered by bureaucratic 
infighting and by budgetary tug-of-wars, that in turn inhibit 
the sharing of information--or, as we like to say, the access 
to information--and limit our ability to bring all of our 
resources to bear on what is a fairly ghastly threat on a 
worldwide basis.
    When the President signed the intelligence reform bill in 
December, I really expected that when this hearing came the new 
Director of National Intelligence would be here to talk about 
threats.
    It took 3 months for the Senate and the House to pass 
separate intelligence bills--that's not really very much time--
and then resolve a multitude of differences in conference and 
all kinds of back-and-forth in a way which was agreeable to the 
Administration.
    Two months have now passed since the bill-signing ceremony. 
And the position of Director of National Intelligence remains 
vacant--not even a person nominated. To me, this is 
unacceptable. It's unacceptable that the Administration has not 
shown the same urgency in dealing with that question that the 
Congress took the trouble to create. Some agree, some don't 
agree with the decision, but it was not a particularly close 
vote in either house.
    With absolutely no disrespect--and, in fact, a great deal 
of respect to Director Goss--or any of our other witnesses, it 
is unacceptable that we cannot hear from and question the one 
person under the new law that is supposed to be responsible for 
the overall management of how the intelligence community is 
responding to the national security threats that we will be 
discussing this morning.
    There are other troubling consequences to the 
Administration's lack of action. In recent weeks, I visited 
most of the principal agencies that comprise our intelligence 
community. The message I heard over and over, through words or 
body language, was that the senior leadership at these agencies 
was--that action on how best to carry out some key provisions 
on the intelligence reform bill was being held up pending the 
arrival of the new Director of National Intelligence. The delay 
in appointing a DNI has kept implementation of the reform bill, 
therefore, in my judgment, in idle.
    So, what are the practical consequences of this delay, in 
the context of today's threat hearing? I'll highlight three.
    The first and most obvious is that delaying the appointment 
of the DNI places that individual at a growing disadvantage in 
establishing his or her team--the new directorate--and 
selecting his or her supporting team of deputies within the 6 
months prescribed by law, 2 months already having gone by, or 
more. It's prescribed by law, has to have it done.
    The second consequence of delay pertains to the 
intelligence community's counterterrorism program. In addition 
to establishing the position of DNI, the intelligence reform 
bill mandated the creation of the National Counterterrorism 
Center, or NCTC. Initially created by Executive Order, the NCTC 
is chartered to be the primary organization in the U.S. 
Government responsible for analyzing and integrating all 
intelligence pertaining to terrorism and counterterrorism.
    As is the case with the DNI, the head of the NCTC is a 
Senate-confirmed position and the Administration has yet to 
nominate a person to carry out those crucial tasks. One could 
say one has to do the DNI before the NCTC, but let's get going.
    One of the primary missions of the NCTC--and I'm reading 
the law now--is to conduct strategic operational planning for 
counterterrorism activities, integrating all instruments of 
national power, including diplomatic, financial, military, 
intelligence activities, as well as homeland security and law 
enforcement activities, and to assign roles and 
responsibilities as part of its strategic operational planning.
    My understanding is that the operational planning mission 
at NCTC is not being undertaken, pending confirmation of the 
new DNI. We can discuss that. So when we talk about going after 
terrorists, after their organizations, where they plot and 
where they train and where they keep their money, the question 
is, who is carrying out this strategic operational planning 
mission on this day?
    In the wake of our war against the al-Qa'ida terrorist 
network and its operational bases in Afghanistan and Pakistan, 
the fundamentalist Islamic terrorist threat has splintered and 
decentralized its operations. We need a person in charge, we 
need an organization in place, that can coordinate 
counterterrorist operations across agencies against this 
multiplying terrorist threat.
    The third immediate consequence of not having a DNI in 
place is the area of proliferation of weapons of mass 
destruction. The proliferation activity of North Korea and 
Iran, along with the damage done by Pakistani scientist A.Q. 
Khan, has reduced any confidence that the nuclear genie is 
contained.
    The combination of these two threats--a decentralized, but 
determined terrorist threat and growing proliferation 
activity--present the intelligence community with a sobering 
challenge, now and for the foreseeable future.
    The Congress recognized the importance of this challenge in 
crafting the intelligence reform bill, by authorizing the 
establishment of a National Counterproliferation Center. The 
new intelligence center would generally follow the blueprint of 
the National Counterterrorism Center. Again, I am told and 
troubled by the fact that the decision on whether or not to 
establish the National Counterproliferation Center and, if so, 
in what form, is being held up pending the DNI's appointment.
    The proliferation activities of North Korea are a threat to 
our security and the security of our allies today, as well as 
down the road. And the same, of course, is true with Iran, and 
we discover others as we go along. Iran, as a nuclear aspirant 
and supporter of terrorism, is also center stage and very much 
needs to be pursued in this manner.
    Policymakers and, most importantly, the President, but also 
the Congress, need the best intelligence possible on North 
Korea, Iran and other hotspots around the world--Africa being 
one which I may ask a question about.
    The faulty intelligence used by the Administration to 
invade Iraq has harmed our credibility with our allies and has 
given Islamic jihadists a powerful recruiting tool around the 
world that is not to anybody's advantage. We must learn from 
these mistakes, as the Chairman has indicated, and get better 
in how we produce timely, objective and accurate intelligence 
for U.S. policymakers.
    The Chairman and I have directed that the Intelligence 
Committee undertake review of how intelligence on Iran is 
collected, analyzed and produced. The review will be similar to 
what we did before with weapons of mass destruction in Iraq. 
But it's going to be very proactive. The same sort of rigorous 
oversight ought to apply to North Korea also, and there are 
some other countries that come to mind.
    I am hopeful that the Committee can also focus the efforts 
of its very talented staff on the growing controversy 
surrounding the collection of intelligence through the 
interrogation and rendition of detainees. We need to probe the 
fundamental legal, jurisdictional and operational questions, 
both retrospectively and prospectively, in my mind, at the 
heart of how the intelligence community collects such 
intelligence.
    It's undeniable that the intelligence community has made 
enormous strides in the past 3 years and that some reform has 
occurred. The tireless efforts of hardworking men and women at 
the CIA, FBI and other intelligence agencies, like the work of 
those in uniform, have been a linchpin in the effort to protect 
every American against the murderous intentions of terrorists.
    But there is an acknowledgement among the people I have 
spoken with that we can do better and that we must get better. 
The intelligence reform bill addressed that issue of 
authorities, resources and organization. But the promise of 
reform will not be realized without strong leadership and 
management acumen--the sort of skills the DNI must bring to the 
table.
    Challenges abound, as the Chairman knows, for the current 
and future leadership of the intelligence community. There's a 
lot of work to be done on how we collect intelligence, 
particularly in the arena of human intelligence, analytical 
workforce problems, language problems. Our intelligence 
community needs to establish a global presence that is not only 
capable, but lithe, for our adversaries are increasingly mobile 
and use much more sophisticated technology as they do their 
work.
    I know we're limited as to what we can discuss in an open 
hearing, but I hope to the extent possible that our witnesses 
will address some of the questions that I have raised.
    I thank the witnesses and I thank you, Mr. Chairman.
    Chairman Roberts. Before I recognize Director Goss, I would 
like to speak to the Vice Chairman's comments in regard to the 
appointment of a DNI. I think this is what we used to hear on 
``Perry Mason,'' with extenuating circumstances.
    The intelligence reform bill was passed on December 17. The 
bill says that a DNI will be appointed no later than 6 months--
that is, June 17. I think, or at least it is my opinion, that 
the Administration is also awaiting the report of the 
independent WMD commission, part of whose job or task is to 
take a look at the intelligence reform bill and make some 
recommendations.
    In addition, while I share the Vice Chairman's frustration 
that we wish we had here the Director of National Intelligence 
and that he or she was well down the road to implementing the 
reform bill, it is, I think, crucially important, not only in 
terms of timing, but to get the right person. And that person 
should have managerial experience, obviously, expertise in 
intelligence, obviously, expertise and experience perhaps in 
the military. As the Vice Chairman has pointed out, we have 
certainly people in the Washington area or, for that matter, 
within the United States, that certainly fit that description.
    So, I hope that the Administration will move in an 
expeditious fashion, but in a fashion that gets the right 
person for the job.
    Director Goss, you may proceed, sir.

          STATEMENT OF THE HONORABLE PORTER J. GOSS, 
                DIRECTOR OF CENTRAL INTELLIGENCE

    Director Goss. Thank you very much, Mr. Chairman. Good 
morning, Mr. Vice Chairman and Members of the Committee, and 
thank you for the hospitable welcome here.
    The challenges that you've mentioned in your opening 
remarks that face the United States of America and its citizens 
and our interests literally do span the globe. My intention 
today is to tell you what I believe are those challenges in 
terms of the most threatening and identify briefly where we 
think our service as intelligence professionals is needed most 
on behalf of the United States taxpayers.
    We need to make some tough decisions about which haystacks 
deserve to be scrutinized for the needles that can hurt us 
most. And we know in this information age that there are 
literally endless haystacks everywhere. There's an awful lot of 
material out there.
    I do want to make several things clear. Our officers are 
taking risks, and I will be asking them to take more risks--
justifiable risks--because I would be much happier here 
explaining why we did something than why we did nothing.
    I'm asking for more competitive analysis, more co-location 
of analysts and collectors--in fact, that's underway--and 
deeper collaboration with agencies throughout the intelligence 
community.
    Above all, our analysts must be objective. Our credibility 
rests there, as you pointed out well in this Committee's report 
to the community issued on the WMD.
    We do not make policy. We do not wage war. I am emphatic 
about that. I testified to that during my confirmation, and it 
is still true and it will always be. We do collect and analyze 
information. With respect to the CIA, I want to tell you that 
my first few months as Director have served only to confirm 
what I and, I think, Members of Congress have known about CIA 
for years. It is a special place. It's an organization of 
dedicated, patriotic people who are doing their best.
    In addition to taking a thorough, hard look at our own 
capabilities, we're working to define CIA's place in the 
restructured intelligence community--a community that will be 
led by a new DNI, as we've heard--to make the maximum possible 
contribution to American security at home and abroad that 
uniquely the CIA can make.
    The CIA is and will remain the flagship agency, in my view, 
and each of the other 14 elements of the community will 
continue to make their unique contributions, as well. I say 
that as the DCI, not as the Director of Central Intelligence 
Agency.
    I turn to threats. I will not attempt, obviously, to cover 
everything that could go wrong in the year ahead. We must and 
do concentrate our efforts, experience and expertise on the 
challenges that are most pressing. And they are, of course, 
defeating terrorism, protecting the homeland, stopping 
proliferation of weapons of mass destruction and drugs, 
fostering stability, freedom and peace in the most troubled 
regions of the world.
    My comments today will focus on these duties. I know well 
from my 30 years in public service that you and your colleagues 
have an important responsibility with these open sessions to 
get information to the American people, as the Chairman has 
stated.
    I also know too well, as the Chairman has stated, that as 
we are broadcasting to America, enemies are also tuning in. In 
open session, I feel that I will and must be very prudent in my 
remarks as DCI.
    Mr. Chairman, on the subject of terrorism, defeating 
terrorism must remain one of our intelligence community's core 
objectives, and it will, as widely dispersed terrorist networks 
will present one of the most serious challenges to the U.S. 
national security interests at home and abroad in the coming 
year. That's not startling news, but it's important.
    In the past year, aggressive measures by our intelligence, 
law enforcement, defense and homeland security communities, 
along with our key international partners, have, in fact, dealt 
serious blows to al-Qa'ida and other terrorist organizations 
and individuals.
    Despite these successes, however, the terrorist threat to 
the U.S. in the homeland and abroad endures. I'd make four 
points.
    Al-Qa'ida is intent on finding ways to circumvent U.S. 
security enhancements to strike Americans in the homeland, one.
    Number two, it may be only a matter of time before al-
Qa'ida or another group attempts to use chemical, biological, 
radiological or nuclear weapons. We must focus on that.
    Three, al-Qa'ida is only one facet of the threat from a 
broader Sunni jihadist movement.
    And four, the Iraq conflict, while not a cause of 
extremism, has become a cause for extremists.
    We know from experience that al-Qa'ida is a patient, 
persistent, imaginative, adaptive and dangerous opponent. But 
it is vulnerable and displaced. We and other allies have hit it 
hard. Jihadist religious leaders preach millennial, 
aberrational visions of some kind of a fight for Islam's 
survival. Sometimes they argue that the struggle justifies the 
indiscriminate killing of civilians, even with chemical, 
biological, radiological and nuclear weapons. And, fortunately, 
they have a small audience.
    Our pursuit of al-Qa'ida and its most senior leaders, 
including bin Laden and his deputy, Ayman al-Zawahiri, is 
intense. However, their capture alone would not be enough to 
eliminate the terrorist threat to the U.S. homeland or 
interests overseas. Often influenced by al-Qa'ida's ideology, 
members of a broader movement have an ability to plan and 
conduct operations. We saw this last March in the railway 
attacks in Madrid, conducted by local Sunni extremists.
    Other regional groups connected to al-Qa'ida or acting on 
their own also continue to pose a significant threat. In 
Pakistan, terrorist elements remain committed to attacking U.S. 
targets. In Saudi Arabia, remnants of the Saudi al-Qa'ida 
network continue to attack U.S. interests in the region.
    In Central Asia, the Islamic Jihad Group, a splinter group 
of the Islamic Movement of Uzbekistan, has become a more 
virulent threat to U.S. interests and local governments there. 
Last spring, the group used female operatives in a series of 
bombings in Uzbekistan, as you know.
    In Southeast Asia, the Jemaah Islamiyah continues to pose a 
threat to U.S. and Western interests in Indonesia and the 
Philippines, where JI is colluding with the Abu Sayyaf Group 
and possibly the MILF group, as well.
    In Europe, Islamic extremists continue to plan and cause 
attacks against U.S. and local interests. Some of them may 
cause significant casualties. In 2004, British authorities 
dismantled an al-Qa'ida cell--much reported. And in the 
Netherlands, an extremist brutally killed a prominent Dutch 
citizen--not as widely reported.
    Islamic extremists are exploiting the Iraqi conflict to 
recruit new, anti-U.S. jihadists. Those jihadists who survive 
will leave Iraq experienced and focused on acts of urban 
terrorism. They represent a potential pool of contacts to build 
transnational terrorist cells, groups and networks in Saudi 
Arabia, Jordan and other countries.
    Zarqawi has sought to bring about the final victory of 
Islam over the West, in his version of it. And he hopes to 
establish a safe haven in Iraq from which his group could 
operate against the ``infidel Western nations, the apostate 
Muslim governments.''
    Other groups spanning the globe also pose persistent and 
serious threats to U.S. and Western interests. Hizbollah's main 
focus remains Israel. But it could conduct lethal attacks 
against U.S. interests quickly upon a decision to do so. It has 
that capability, we estimate.
    Palestinian terrorist organizations have apparently 
refrained from directly targeting U.S. or Western interests in 
their opposition to Middle East peace initiatives, but they do 
pose an ongoing risk to U.S. citizens that could be killed or 
wounded in attacks intended to strike Israeli interests.
    Extremist groups in Latin America are still concerned with 
the FARC--the Revolutionary Armed Forces of Colombia--
possessing capability and clear intent to threaten U.S. 
interests in that region.
    The Horn of Africa, the Sahel, the Mahgreb, the Levant and 
the Gulf States are all areas where pop-up terrorist activity 
can be expected and needs to be monitored and dealt with.
    Afghanistan, Mr. Chairman, once the safe haven for Usama 
bin Ladin, has started on the road to recovery after decades of 
instability and civil war. Hamid Karzai's election to the 
presidency was a major milestone. Elections for a new national 
assembly and local district councils, tentatively scheduled for 
this spring--though that's an ambitious schedule--will complete 
the process of electing representatives this year, hopefully. 
President Karzai still faces a low-level insurgency, aimed at 
destabilizing his country and raising the cost of 
reconstruction, and ultimately forcing coalition forces to 
leave before the job is done. The development of the Afghan 
national army and the national police force is going well, 
although neither can yet stand on its own.
    In Iraq, low voter turnout in some Sunni areas and the 
post-election resumption of insurgent attacks--most against 
Iraqi civilian and security forces--indicate that the 
insurgency achieved at least some of its election day goals and 
remains a serious threat to creating a stable, representative 
government in Iraq.
    Self-determination for the Iraqi people will largely depend 
on the ability of the Iraq forces to provide their own 
security. Iraq's most capable security units have become more 
effective in recent months, contributing to several major 
operations, and helping to put an Iraqi face on security 
operations. Insurgents are determined and still trying to 
discourage new recruits and undermine the effectiveness of 
existing Iraqi security forces by grotesque intimidation 
tactics.
    The prolonged lack of security would hurt Iraq's 
reconstruction efforts and economic development, causing 
overall economic growth to proceed at a slower pace than many 
analysts expected and, certainly that the Iraqi people deserve.
    Alternatively, the larger, uncommitted moderate Sunni 
population and the Sunni political elite may seize the post-
electoral moment to take part in creating Iraq's new political 
institutions, if victorious Shia and Kurdish parties include 
Sunnis in the new government and the drafting of the 
constitution. That is a hopeful opportunity.
    On the subject of proliferation, Mr. Chairman, I will now 
turn to the worldwide challenge. Last year started with 
promise, as Libya had just renounced its WMD programs, North 
Korea was engaged in negotiations with regional states on its 
nuclear weapons program, and Iran was showing greater signs of 
openness regarding its nuclear program after concealing 
activity for nearly a decade.
    Let me start with Libya, which is a bit of a good news 
story and one that reflects the patient perseverance with which 
the intelligence community--writ large--can tackle a tough 
intelligence problem.
    In 2004, Tripoli followed through with a range of steps to 
disarm itself of WMD and ballistic missiles. Libya gave up key 
elements of its nuclear weapons program and opened itself to 
the IAEA. Libya gave up some key CW assets, and opened its 
former CW program to international scrutiny.
    After disclosing its Scud stockpile and extensive ballistic 
and cruise missile R&D efforts in 2003, Libya took the 
important step to abide by its commitment to limit its missiles 
to the 300-kilometer range threshold of the Missile Technology 
Control Regime.
    Today, the U.S. continues to work with Libya to make sure 
that any discrepancies in the declarations they have made are 
clarified.
    In North Korea, on the other hand, on 10 February 2005--not 
long ago--Pyongyang announced it was suspending participation 
in 6-party talks under way since 2003, declared it had nuclear 
weapons and affirmed it would seek to increase its nuclear 
arsenal. The North had been pushing for a freeze on its 
plutonium program in exchange for significant benefits rather 
than committing to the full dismantlement that we and our 
partners seek.
    In 2003, the North claimed it had reprocessed the 8,000 
fuel rods from the Yongbyon reactor, originally stored under 
the agreed framework, with the IAEA monitoring in 1994. The 
North claims to have made new weapons from its reprocessing 
effort.
    We believe North Korea continues to pursue a uranium 
enrichment capability, drawing on the assistance it received 
from A.Q. Khan before his network was shut down.
    North Korea continues to develop, produce, deploy and sell 
ballistic missiles of increasing range and sophistication, 
augmenting Pyongyang's large operational force of Scud and 
Nodong-class missiles. North Korea could resume flight testing 
at any time, including longer range missiles, such as the Taepo 
Dong-2 system. We assess the TD-2 is capable of reaching the 
United States with a nuclear weapon-size payload.
    North Korea continues to market its ballistic missile 
technology, trying to find new clients now that some 
traditional customers--read Libya--have halted such trade.
    We believe North Korea has active CW and BW programs, and 
probably has chemical and possibly biological weapons ready for 
use.
    Iran. In early February, the spokesman of Iran's Supreme 
Council for National Security publicly announced that Iran 
would never scrap its nuclear program. This came in the midst 
of negotiations with EU-3 members--that would be Britain, 
Germany and France--seeking objective guarantees from Tehran 
that it would not use nuclear technology for nuclear weapons.
    Previous comments by Iranian officials, including Iran's 
supreme leader and its foreign minister, indicated that Iran 
would not give up its ability to enrich uranium. Certainly, it 
would be right for Iran to have the capability to produce fuel 
for power reactors. But, we're more concerned about the dual-
use nature of the technology that could also be used to achieve 
a nuclear weapon. We do not have transparency.
    In parallel, Iran continues its pursuit of long-range 
ballistic missiles, such as an improved version of a 1,300-
kilometer range Shahab-3 MRBM, to add to the hundreds of short-
range Scud missiles it already has.
    Even since 9/11, Tehran continues to support terrorist 
groups in the region, such as Hizbollah--it is a state 
sponsor--and could encourage increased attacks in Israel and 
the Palestinian territories to derail progress toward peace 
there. Iran reportedly is supporting some anti-coalition 
activities in Iraq and seeking to influence the future 
character of the Iraqi state.
    Conservatives are likely to consolidate their power in 
Iran's June 2005 presidential elections, further marginalizing 
the reform movement of last year. Iran continues to retain, in 
secret, important members of al-Qa'ida, causing further 
uncertainty about Iran's commitment to bring them to justice 
one way or another.
    Moving to China, Beijing's military modernization and 
military buildup could tilt the balance of power in the Taiwan 
Strait. Improved Chinese capabilities threaten U.S. forces in 
the region. In 2004, China increased its ballistic missile 
forces deployed across from Taiwan and rolled out several new 
submarines. China continues to develop more robust, survivable, 
nuclear-armed missiles, as well as conventional capability for 
use in regional conflict.
    Taiwan continues to promote constitutional reform and other 
attempts to strengthen local identity. Beijing judges these 
moves to be a ``timeline for independence.'' If Beijing decides 
that Taiwan is taking steps toward permanent separation that 
exceed Beijing's tolerance, we assess China is prepared to 
respond with varying levels of force.
    China is increasingly confident and active on the 
international stage, trying to ensure it has a voice on major 
international issues, to secure access to natural resources, 
and to counter what it sees as United States efforts to contain 
or encircle it.
    New leadership, under President Hu Jintao, is facing an 
array of domestic challenges in 2005, including the potential 
for a resurgence in inflation, increased dependence on exports, 
growing economic inequalities in the country, increased 
awareness of individual rights, and popular expectations for 
his new leadership.
    In Russia, the attitudes and actions of the so-called 
``siloviki''--the ex-KGB men that Putin has placed in positions 
of authority throughout the Russian government--may be critical 
determinates of the course Putin will pursue in the year ahead. 
Perceived setbacks in Ukraine are likely to lead Putin to 
redouble his efforts to defend Russian interests abroad, while 
balancing cooperation with the West.
    Russia's most immediate security threat is terrorism. And 
counterterrorism cooperation undoubtedly will continue.
    Putin publicly acknowledges a role for outside powers to 
play in the confederate states, but we believe he is 
nevertheless concerned about further encroachment by the U.S. 
and NATO into that region.
    Moscow worries that separatism inside Russia and radical 
Islamic movements beyond their borders might threaten stability 
in southern Russia. Chechen extremists have increasingly turned 
to terrorist operations in response to Moscow's successes in 
Chechnya, and it's reasonable to predict they will carry out 
attacks against civilian or military targets elsewhere in 
Russia in 2005.
    Budget increases will help Russia create a professional 
military by replacing conscript with volunteer servicemen and 
focus on maintaining, modernizing and extending the operational 
life of strategic weapons systems, including the nuclear 
missile force.
    Russia remains an important source of weapons technology, 
material and components for other nations. The vulnerability of 
Russian WMD materials and technology to theft or diversion is a 
continuing concern.
    On other areas of potential instability, Mr. Chairman, I 
would briefly go to the Middle East.
    The election of the Palestinian President, Mahmoud Abbas, 
marks an important step, and Abbas has made it clear that 
negotiating a peace deal with Israel is a very high priority. 
That's extraordinarily good news. Nevertheless, there are 
hurdles ahead.
    Redlines must be resolved while the Palestinian leaders try 
to rebuild damaged PA infrastructure and governing 
institutions, especially the security forces, the legislature 
and the judiciary--those things that will help stability. 
Terrorist groups, some of whom benefit from funding from 
outside sources, could step up attacks to derail peace and 
progress and need close monitoring.
    In Africa, chronic instability will continue to hamper 
counterterrorism efforts and impose heavy humanitarian and 
peacekeeping burdens on us.
    In Nigeria, the military is struggling to contain militia 
groups in the oil-producing south and ethnic violence that 
frequently erupts throughout the country. Extremist groups are 
emerging from the country's Muslim population of about 65 
million. Nigeria is a big oil producer for us.
    In Sudan, the peace deal signed in January will result in 
de facto southern autonomy and may inspire rebels in provinces 
such as Darfur to press harder for a greater share of resource 
and power. Opportunities exist for Islamic extremists to 
reassert themselves in the north, unless the central government 
stays unified.
    Unresolved disputes in the Horn of Africa--Africa's gateway 
to the Middle East--create vulnerability to foreign terrorists 
and extremist groups. Ethiopia and Eritrea still have a 
contested border. And armed factions in Somalia indicate they 
will fight the authority of a new transitional government.
    In Latin America, the region is entering a major electoral 
cycle in 2006. Brazil, Colombia, Costa Rica, Ecuador, Mexico, 
Nicaragua, Peru and Venezuela hold presidential elections.
    Several key countries in the hemisphere are potential 
flashpoints in 2005. In Venezuela, Chavez is consolidating his 
power by using technically legal tactics to target his 
opponents and meddling in the region, supported by Castro.
    In Colombia, progress against counternarcotics and 
terrorism under President Uribe's successful leadership may be 
affected by an election.
    The outlook is very cloudy for legitimate, timely elections 
in November 2005 in Haiti, even with substantial international 
support.
    Campaigning for the 2006 presidential election in Mexico is 
likely to stall progress on fiscal, labor and energy reform.
    And in Cuba, Castro's hold on power remains firm. But a bad 
fall last October has rekindled speculation about his declining 
health and the succession scenarios.
    In Southeast Asia, three countries bear close watching. In 
Indonesia, President Yudhoyono has moved swiftly to crack down 
on corruption. But reinvigorating the economy, burned by the 
cost of recovery in the tsunami-damaged area, will likely be 
affected by continuing, deep-seated ethnic and political 
turmoil exploitable by terrorists.
    In the Philippines, Manila is struggling with prolonged 
Islamic and Communist rebellion. The presence of Jemaah 
Islamiyah, terrorists seeking safe haven and training bases in 
the south, adds volatility and capability to terrorist groups 
already in place.
    And finally, Mr. Chairman, Thailand is plagued with an 
increasingly volatile Muslim separatist threat in the 
southeastern provinces and the risk of escalation remains very 
high.
    I thank you very much for that opportunity to give a brief 
overview.
    [The prepared statement of Director Goss follows:]

                Prepared Statement of Hon. Porter Goss, 
                    Director of Central Intelligence

     Good morning, Mr. Chairman, Mr. Vice Chairman, Members of the 
Committee.
    It is my honor to meet with you today to discuss the challenges I 
see facing America and its interests in the months ahead. These 
challenges literally span the globe. My intention is to tell you what I 
believe are the greatest challenges we face today and those where our 
service as intelligence professionals is needed most on behalf of the 
U.S. taxpayer.
    We need to make tough decisions about which haystacks deserve to be 
scrutinized for the needles that can hurt us most. And we know in this 
information age that there are endless haystacks everywhere. I do want 
to make several things clear:
     Our officers are taking risks, and I will be asking them 
to take more risks--justifiable risks--because I would much rather 
explain why we did something than why we did nothing,
     I am asking for more competitive analysis, more 
collocation of analysts and collectors, and deeper collaboration with 
agencies throughout the Intelligence Community. Above all, our analysis 
must be objective. Our credibility rests there.
     We do not make policy. We do not wage war. I am emphatic 
about that and always have been. We do collect and analyze information.
    With respect to the CIA, I want to tell you that my first few 
months as Director have served only to confirm what I and Members of 
Congress have known about CIA for years. It is a special place--an 
organization of dedicated, patriotic people. In addition to taking a 
thorough, hard look at our own capabilities, we are working to define 
CIA's place in the restructured Intelligence Community--a community 
that will be led by a new Director of National Intelligence--to make 
the maximum possible contribution to American security at home and 
abroad. The CIA is and will remain the flagship agency, in my view. And 
each of the other 14 elements in the community will continue to make 
their unique contributions as well.
    Now, I turn to threats. I will not attempt to cover everything that 
could go wrong in the year ahead. We must, and do, concentrate our 
efforts, experience and expertise on the challenges that are most 
pressing: defeating terrorism; protecting the homeland; stopping 
proliferation of weapons of mass destruction and drugs; and fostering 
stability, freedom and peace in the most troubled regions of the world. 
Accordingly, my comments today will focus on these duties. I know well 
from my 30 years in public service that you and your colleagues have an 
important responsibility with these open sessions to get information to 
the American people. But I also know all too well that as we are 
broadcasting to America, enemies are also tuning in. In open session I 
feel I must be very prudent in my remarks as DCI.

                               TERRORISM

    Mr. Chairman, defeating terrorism must remain one of our 
intelligence community's core objectives, as widely dispersed terrorist 
networks will present one of the most serious challenges to U.S. 
national security interests at home and abroad in the coming year. In 
the past year, aggressive measures by our intelligence, law 
enforcement, defense and homeland security communities, along with our 
key international partners have dealt serious blows to al-Qa'ida and 
others. Despite these successes, however, the terrorist threat to the 
U.S. in the Homeland and abroad endures.
     Al-Qa'ida is intent on finding ways to circumvent U.S. 
security enhancements to strike Americans and the Homeland.
     It may be only a matter of time before al-Qa'ida or 
another group attempts to use chemical, biological, radiological, and 
nuclear weapons (CBRN).
     Al-Qa'ida is only one facet of the threat from a broader 
Sunni jihadist movement.
     The Iraq conflict, while not a cause of extremism, has 
become a cause for extremists.
    We know from experience that al-Qa'ida is a patient, persistent, 
imaginative, adaptive and dangerous opponent. But it is vulnerable and 
we and other allies have hit it hard.
     Jihadist religious leaders preach millennial aberrational 
visions of a fight for Islam's survival. Sometimes they argue that the 
struggle justifies the indiscriminate killing of civilians, even with 
chemical, biological, radiological, or nuclear weapons.
    Our pursuit of Al-Qa'ida and its most senior leaders, including Bin 
Ladin and his deputy, Ayman al-Zawahiri is intense. However, their 
capture alone would not be enough to eliminate the terrorist threat to 
the U.S. Homeland or U.S. interests overseas. Often influenced by al-
Qa'ida's ideology, members of a broader movement have an ability to 
plan and conduct operations. We saw this last March in the railway 
attacks in Madrid conducted by local Sunni extremists. Other regional 
groups--connected to al-Qa'ida or acting on their own--also continue to 
pose a significant threat.
     In Pakistan, terrorist elements remain committed to 
attacking U.S. targets. In Saudi Arabia, remnants of the Saudi al-
Qa'ida network continue to attack U.S. interests in the region.
     In Central Asia, the Islamic Jihad Group (IJG), a splinter 
group of the Islamic Movement of Uzbekistan, has become a more virulent 
threat to U.S. interests and local governments. Last spring the group 
used female operatives in a series of bombings in Uzbekistan.
     In Southeast Asia, the Jemaah Islamiyah (JI) continues to 
pose a threat to U.S. and Western interests in Indonesia and the 
Philippines, where JI is colluding with the Abu Sayyaf Group and 
possibly the Mff.F.
     In Europe, Islamic extremists continue to plan and cause 
attacks against U.S. and local interests, some that may cause 
significant casualties. In 2004 British authorities dismantled an al-
Qa'ida cell and an extremist brutally killed a prominent Dutch citizen 
in the Netherlands.
    Islamic extremists are exploiting the Iraqi conflict to recruit new 
anti-U.S. jihadists.
     These jihadists who survive will leave Iraq experienced in 
and focused on acts of urban terrorism. They represent a potential pool 
of contacts to build transnational terrorist cells, groups, and 
networks in Saudi Arabia, Jordan and other countries.
     Zarqawi has sought to bring about the final victory of 
Islam over the West, and he hopes to establish a safe haven in Iraq 
from which his group could operate against ``infidel'' Western nations 
and ``apostate'' Muslim governments.
    Other terrorist groups spanning the globe also pose persistent and 
serious threats to U.S. and Western interests.
     Hizballah's main focus remains Israel, but it could 
conduct lethal attacks against U.S. interests quickly upon a decision 
to do so.
     Palestinian terrorist organizations have apparently 
refrained from directly targeting U.S. or Western interests in their 
opposition to Middle East peace initiatives, but pose an ongoing risk 
to U.S. citizens that could be killed or wounded in attacks intended to 
strike Israeli interests.
     Extremist groups in Latin America are still a concern, 
with the FARC--the Revolutionary Armed Forces of Colombia--possessing 
the greatest capability and the clearest intent to threaten U.S. 
interests in the region.
     Horn of Africa, the Sahel, the Mahgreb, the Levant, and 
the Gulf States are all areas where ``pop up'' terrorist activity can 
be expected.

                              AFGHANISTAN

    Mr. Chairman, Afghanistan, once the safe haven for Usama bin Ladin, 
has started on the road to recovery after decades of instability and 
civil war. Hamid Karzai's election to the presidency was a major 
milestone. Elections for a new National Assembly and local district 
councils--tentatively scheduled for this spring--will complete the 
process of electing representatives.
    President Karzai still faces a low-level insurgency aimed at 
destabilizing the country, raising the cost of reconstruction and 
ultimately forcing Coalition forces to leave.
     The development of the Afghan National Army and a national 
police force is going well, although neither can yet stand on its own.

                                  IRAQ

    Low voter turnout in some Sunni areas and the post-election 
resumption of insurgent attacks--most against Iraqi civilian and 
security forces--indicate that the insurgency achieved at least some of 
its election-day goals and remains a serious threat to creating a 
stable representative government in Iraq.
    Self-determination for the Iraqi people will largely depend on the 
ability of Iraqi forces to provide security. Iraq's most capable 
security units have become more effective in recent months, 
contributing to several major operations and helping to put an Iraqi 
face on security operations. Insurgents are determined to discourage 
new recruits and undermine the effectiveness of existing Iraqi security 
forces.
    The lack of security is hurting Iraq's reconstruction efforts and 
economic development, causing overall economic growth to proceed at a 
much slower pace than many analysts expected a year ago.
     Alternatively, the larger uncommitted moderate Sunni 
population and the Sunni political elite may seize the post electoral 
moment to take part in creating Iraq's new political institutions if 
victorious Shia and Kurdish parties include Sunnis in the new 
government and the drafting of the constitution.

                             PROLIFERATION

    Mr. Chairman, I will now turn to the worldwide challenge of 
proliferation. Last year started with promise as Libya had just 
renounced its WMD programs, North Korea was engaged in negotiations 
with regional states on its nuclear weapons program, and Iran was 
showing greater signs of openness regarding its nuclear program after 
concealing activity for nearly a decade. Let me start with Libya, a 
good news story, and one that reflects the patient perseverance with 
which the Intelligence Community can tackle a tough intelligence 
problem.

                                 LIBYA

    In 2004, Tripoli followed through with a range of steps to disarm 
itself of WMD and ballistic missiles.
     Libya gave up key elements of its nuclear weapons program, 
opened itself to the IAEA.
     Libya gave up some key CW assets and opened its former CW 
program to international scrutiny.
     After disclosing its SCUD stockpile and extensive 
ballistic and cruise missile R&D efforts in 2003, Libya took important 
steps to abide by its commitment to limit its missiles to the 300-km 
range threshold of the Missile Technology Control Regime (MTCR).
    The U.S. continues to work with Libya to clarify some discrepancies 
in the declaration.

                              NORTH KOREA

    On 10 February 2005, Pyongyang announced it was suspending 
participation in the six-party talks underway since 2003, declared it 
had nuclear weapons, and affirmed it would seek to increase its nuclear 
arsenal. The North had been pushing for a freeze on its plutonium 
program in exchange for significant benefits, rather than committing to 
the full dismantlement that we and are our partners sought.
     In 2003, the North claimed it had reprocessed the 8,000 
fuel rods from the Yongbyong reactor, originally stored under the 
Agreed Framework, with IAEA monitoring in 1994. The North claims to 
have made new weapons from its reprocessing effort.
     We believe North Korea continues to pursue a uranium 
enrichment capability drawing on the assistance it received from A.Q. 
Khan before his network was shutdown.
    North Korea continues to develop, produce, deploy, and sell 
ballistic missiles of increasing range and sophistication, augmenting 
Pyongyang's large operational force of Scud and No Dong class missiles. 
North Korea could resume flight-testing at any time, including of 
longer-range missiles, such as the Taepo Dong-2 system. We assess the 
TD 2 is capable of reaching the United States with a nuclear-weapon-
sized payload.
     North Korea continues to market its ballistic missile 
technology, trying to find new clients now that some traditional 
customers, such as Libya, have halted such trade.
    We believe North Korea has active CW and BW programs and probably 
has chemical and possibly biological weapons ready for use.

                                  IRAN

    In early February, the spokesman of Iran's Supreme Council for 
National Security publicly announced that Iran would never scrap its 
nuclear program. This came in the midst of negotiations with EU-3 
members (Britain, Germany and France) seeking objective guarantees from 
Tehran that it will not use nuclear technology for nuclear weapons.
     Previous comments by Iranian officials, including Iran's 
Supreme Leader and its Foreign Minister, indicated that Iran would not 
give up its ability to enrich uranium. Certainly they can use it to 
produce fuel for power reactors. We are more concerned about the dual-
use nature of the technology that could also be used to achieve a 
nuclear weapon.
    In parallel, Iran continues its pursuit of long-range ballistic 
missiles, such as an improved version of its 1,300 km range Shahab-3 
MRBM, to add to the hundreds of short-range SCUD missiles it already 
has.
    Even since 9/11, Tehran continues to support terrorist groups in 
the region, such as Hizballah, and could encourage increased attacks in 
Israel and the Palestinian Territories to derail progress toward peace.
     Iran reportedly is supporting some anti-Coalition 
activities in Iraq and seeking to influence the future character of the 
Iraqi state.
     Conservatives are likely to consolidate their power in 
Iran's June 2005 presidential elections, further marginalizing the 
reform movement last year.
     Iran continues to retain in secret important members of 
Al-Qai'ida--the Management Council--causing further uncertainty about 
Iran's commitment to bring them to justice.

                                 CHINA

    Beijing's military modernization and military buildup is tilting 
the balance of power in the Taiwan Strait. Improved Chinese 
capabilities to threaten U.S. forces in the region.
     In 2004, China increased its ballistic missile forces 
deployed across from Taiwan and rolled out several new submarines.
     China continues to develop more robust, survivable 
nuclear-armed missiles as well as conventional capabilities for use in 
a regional conflict.
    Taiwan continues to promote constitutional reform and other 
attempts to strengthen local identity. Beijing judges these moves to be 
a ``timeline for independence''. If Beijing decides that Taiwan is 
taking steps toward permanent separation that exceed Beijing's 
tolerance, we believe China is prepared to respond with various levels 
of force.
    China is increasingly confident and active on the international 
stage, trying to ensure it has a voice on major international issues, 
secure access to natural resources, and counter what it sees as U.S. 
efforts to contain or encircle China.
    New leadership under President Hu Jintao is facing an array of 
domestic challenges in 2005, such as the potential for a resurgence in 
inflation, increased dependence on exports, growing economic 
inequalities, increased awareness of individual rights, and popular 
expectations for the new leadership.

                                 RUSSIA

    The attitudes and actions of the so-called ``siloviki''--the ex-KGB 
men that Putin has placed in positions of authority throughout the 
Russian government may be critical determinants of the course Putin 
will pursue in the year ahead.
     Perceived setbacks in Ukraine are likely to lead Putin to 
redouble his efforts to defend Russian interests abroad while balancing 
cooperation with the West. Russia's most immediate security threat is 
terrorism, and counterterrorism cooperation undoubtedly will continue.
     Putin publicly acknowledges a role for outside powers to 
play in the CIS, for example, but we believe he is nevertheless 
concerned about further encroachment by the U.S. and NATO into the 
region.
     Moscow worries that separatism inside Russia and radical 
Islamic movements beyond their borders might threaten stability in 
Southern Russia. Chechen extremists have increasingly turned to 
terrorist operations in response to Moscow's successes in Chechnya, and 
it is reasonable to predict that they will carry out attacks against 
civilian or military targets elsewhere in Russia in 2005.
    Budget increases will help Russia create a professional military by 
replacing conscripts with volunteer servicemen and focus on 
maintaining, modernizing and extending the operational life of its 
strategic weapons systems, including its nuclear missile force.
     Russia remains an important source of weapons technology, 
materials and components for other nations. The vulnerability of 
Russian WMD materials and technology to theft or diversion is a 
continuing concern.

                    POTENTIAL AREAS FOR INSTABILITY

    Mr. Chairman, in the Middle East, the election of Palestinian 
President Mahmud Abbas, nevertheless, marks an important step and Abbas 
has made it clear that negotiating a peace deal with Israel is a high 
priority. There nevertheless are hurdles ahead.
     Redlines must be resolved while Palestinian leaders try to 
rebuild damaged PA infrastructure and governing institutions, 
especially the security forces, the legislature, and the judiciary.
     Terrorist groups, some of who benefit from funding from 
outside sources, could step up attacks to derail peace and progress.

                                 AFRICA

    In Africa, chronic instability will continue to hamper counter-
terrorism efforts and pose heavy humanitarian and peacekeeping burdens.
     In Nigeria, the military is struggling to contain militia 
groups in the oil-producing south and ethnic violence that frequently 
erupts throughout the country. Extremist groups are emerging from the 
country's Muslim population of about 65 million.
     In Sudan, the peace deal signed in January will result in 
de facto southern autonomy and may inspire rebels in provinces such as 
Darfur to press harder for a greater share of resources and power. 
Opportunities exist for Islamic extremists to reassert themselves in 
the North unless the central government stays unified.
     Unresolved disputes in the Horn of Africa--Africa's 
gateway to the Middle East--create vulnerability to foreign terrorist 
and extremist groups. Ethiopia and Eritrea still have a contested 
border, and armed factions in Somalia indicate they will fight the 
authority of a new transitional government.

                             LATIN AMERICA

    In Latin America, the region is entering a major electoral cycle in 
2006, when Brazil, Colombia, Costa Rica, Ecuador, Mexico, Nicaragua, 
Peru, and Venezuela hold presidential elections. Several key countries 
in the hemisphere are potential flashpoints in 2005.
     In Venezuela, Chavez is consolidating his power by using 
technically legal tactics to target his opponents and meddling in the 
region supported by Castro.
     In Colombia, progress against counternarcotics and 
terrorism under President Uribe's successful leadership, may be 
affected by the election.
     The outlook is very cloudy for legitimate, timely 
elections in November 2005 in Haiti--even with substantial 
international support.
     Campaigning for the 2006 presidential election in Mexico 
is likely to stall progress on fiscal, labor, and energy reforms.
    In Cuba, Castro's hold on power remains firm, but a bad fall last 
October has rekindled speculation about his declining health and 
succession scenarios.

                             SOUTHEAST ASIA

    In Southeast Asia, three countries bear close watching.
     In Indonesia, President Yudhoyono has moved swiftly to 
crackdown on corruption. Reinvigorating the economy, burdened by the 
costs of recovery in tsunami-damaged areas, will likely be affected by 
continuing deep-seated ethnic and political turmoil exploitable by 
terrorists.
     In the Philippines, Manila is struggling with prolonged 
Islamic and Communist rebellions. The presence of Jemaah Islamiyah (JI) 
terrorists seeking safe haven and training basses adds volatility and 
capability to terrorist groups already in place.
     Thailand is plagued with an increasingly volatile Muslim. 
separatist threat in its southeastern provinces, and the risk of 
escalation remains high.

    Chairman Roberts. We thank you, Mr. Director, for a very 
comprehensive statement.
    Director Mueller.

          STATEMENT OF THE HONORABLE ROBERT MUELLER, 
           DIRECTOR, FEDERAL BUREAU OF INVESTIGATION

    Director Mueller. Good morning, Mr. Chairman. Thank you. 
Thank you, Mr. Chairman and Senator Rockefeller and the Members 
of the Committee. I appreciate this opportunity to discuss our 
current view of threats to the United States and the FBI's 
efforts to address these threats.
    Mr. Chairman, over the past year, through unprecedented 
cooperation, particularly with our other Federal agencies, but 
most particularly with State and local law enforcement, and 
with enhanced intelligence capabilities, we have achieved 
considerable victories against national security and criminal 
threats facing the United States.
    However, at the same time, I must also report that these 
threats continue to evolve and to pose new challenges to the 
FBI and to our partners. It remains the FBI's overriding 
priority to detect and prevent terrorist attacks. And the 
threat posed by international terrorism, and in particular from 
al-Qa'ida and from related groups, continues to be the gravest 
threat that we face.
    In 2004, we learned that terrorist cell members had 
conducted detailed surveillance of financial targets in New 
York, Washington, DC and New Jersey. In response to this threat 
and in coordination with the Department of Homeland Security, 
the threat level was raised. And we mobilized a substantial 
contingent of agents and analysts to review the massive amount 
of information connected with the attack planning and to 
uncover any additional information that would give us insight 
into that plot.
    Later in the year, we received information suggesting that 
there would be an attack. There was an attack being planned, 
possibly timed to coincide with the period before the 2004 
Presidential election.
    To counter that threat, the FBI created a task force in May 
2004, and with thousands of FBI personnel working together with 
hundreds of individuals from other agencies--Federal, State and 
local--we brought to bear every possible resource in an effort 
to identify the operatives and to disrupt the attack plan.
    As part of the initiatives of this task force, field 
offices conducted a thorough canvas of all of our 
counterterrorism investigations, as well as all of our 
sources--not only counterterrorism sources, but other sources--
in an effort to develop any further information that could help 
us find these individuals.
    During the 7 months that the task force was up and running, 
we also checked every substantive lead provided in the threat 
intelligence. It was indeed an extraordinary effort, and while 
we may never know if an operation was indeed being planned, I 
am certain that our response to the threat played an integral 
role in disrupting any operational plans that may have been 
under way.
    Mr. Chairman, since we last spoke, the FBI has identified 
various extremists located throughout the United States and is 
monitoring their activities. My prepared statement sets forth a 
number of instances in which we have taken legal action against 
individuals engaged in terrorism-related activities in 
Virginia, Minneapolis and New York. Although these efforts have 
made us safer, they are also a sobering reminder of the threat 
we continue to face.
    There are three areas that cause us the greatest concern. 
First is the threat from covert al-Qa'ida operatives inside the 
United States who have the intention to facilitate or to 
conduct an attack. Finding them is the top priority for the 
FBI, but it is also one of our most difficult challenges. The 
very nature of a covert operative, trained not to raise 
suspicion and to appear benign, is what makes their detection 
so difficult.
    Whether we are talking about a true sleeper operative who 
has been in place for years, waiting to be activated to conduct 
an attack, or a recently deployed operative who has entered the 
United States to facilitate or to conduct an attack, we are 
continuously adapting our methods to reflect newly received 
intelligence and to ensure we are as proactive and as targeted 
as we can be in detecting their presence.
    Second, we are also extremely concerned with the growing 
body of sensitive reporting that continues to show al-Qa'ida's 
clear intention to obtain, and to ultimately use, some form of 
chemical, biological, radiological or nuclear material in its 
attacks against the United States.
    While we still assess that a mass casualty attack using 
relatively low-tech methods will be their most likely approach, 
we are concerned that they are seeking weapons of mass 
destruction, including chemical weapons, so-called dirty bombs 
or some form of biological agent such as anthrax.
    Third, we remain concerned about the potential for al-
Qa'ida to leverage extremist groups with peripheral or 
historical connections to al-Qa'ida, and particularly its 
ability to exploit radical American converts and other 
indigenous extremists. While we still believe that the most 
serious threat to the homeland originates from al-Qa'ida 
members located overseas, the bombings in Madrid last March 
have heightened our concern regarding the possible role that 
indigenous Islamic extremists already in the United States may 
play in future terrorist plots.
    We are also concerned about the possible role that 
peripheral groups with a significant presence in the United 
States may play, if called upon by members of al-Qa'ida to 
assist them with attack planning or logistical support. The 
potential recruitment of radicalized American Muslim converts 
continues to be a concern and poses an increasingly challenging 
issue. The process of recruitment can be subtle, and many times 
self-initiated. And radicalization tends to occur over a long 
period of time and under very many different circumstances.
    Efforts by extremists to obtain training inside the United 
States is also an ongoing concern. Although there are multiple 
reports and ongoing investigations associated with paramilitary 
training activities, I would suspect that extremists 
nationwide, the majority of these cases involve small groups of 
like-minded individuals who are inspired by the jihadist 
rhetoric found in radical mosques or in prison proselytizing or 
on the Internet.
    Fortunately, the recent amendment to Title 18 adding a 
provision prohibiting individuals from receiving military-type 
training from a designated foreign terrorist organization makes 
it possible now to prosecute individuals who participate or 
assist individuals in receiving this type of training.
    Mr. Chairman, al-Qa'ida and the groups that support it are 
still the most lethal threat we face today. However, other 
terrorist groups that have a presence in the United States 
require careful monitoring.
    It is the FBI's assessment at this time that there is a 
limited threat of a coordinated terrorist attack in the United 
States from Palestinian terrorist organizations such as Hamas 
and the Palestine Islamic Jihad, and the al-Aqsa Martyrs 
Brigade. These groups have maintained a longstanding policy of 
focusing their attacks on Israeli targets in Israel and the 
Palestinian territories. We believe that the primary interest 
of Palestinian terrorist groups in the United States remains 
the raising of funds to support their regional goals.
    We are committed to cutting off the flow of these funds 
from the United States to Palestinian terrorist organizations. 
As an example of this effort, the former leadership of the Holy 
Land for Relief and Development, a Hamas front organization, 
was indicted this past year. And in another case, the Elashi 
brothers, who owned and ran InfoCom, another Hamas front 
organization, were prosecuted and convicted.
    Of all the Palestinian groups, Hamas has the largest 
presence in the United States, with a strong infrastructure 
primarily focused on fundraising, propaganda for the 
Palestinian cause and proselytizing. Although it would be a 
major strategic shift for Hamas, its United States network is 
theoretically capable of facilitating acts of terrorism in the 
United States.
    And like Hamas, but on a much smaller scale, the United 
States-based Palestine Islamic Jihad members and supporters are 
primarily engaged in fundraising, propaganda and proselytizing 
activities. In 2003, the Palestine Islamic Jihad, or PIJ, 
activities and capabilities in the United States were severely 
undercut by the arrests of the PIJ leader Sami al-Arian and his 
lieutenants. And there have been two additional arrests of 
suspected PIJ activists on charges unrelated to terrorism, 
which I believe are set forth in my accompanying statement.
    Currently, the most likely threat of a terrorist attack 
from Palestinian groups in the United States--in the United 
States homeland--is from a lone-wolf scenario. In this 
scenario, a terrorist attack would be perpetrated by one or 
more individuals who may embrace the ideology of a Palestinian 
terrorist group, but act without assistance or approval of any 
established group.
    And then, the Lebanese Hizbollah retains the capability to 
strike in the United States, although we have no credible 
information to indicate that United States-based Hizbollah 
members have plans to attack American interests within the 
United States or, for that matter, abroad.
    I might add in 2004 we had successes in uncovering 
individuals providing material support to Hizbollah, many of 
those individuals involved in various criminal schemes to 
provide the monies that could be sent to Lebanon, to the 
coffers of Hizbollah.
    Mr. Chairman, while the national attention is focused on 
the substantial threat posed by international terrorists to the 
homeland, the FBI must also dedicate resources to defeating a 
number of other threats, as detailed in my prepared statement--
for example, domestic terrorists, motivated by a number of 
political or social agendas, including white supremacists, 
black separatists, animal rights/environmental terrorists, 
anarchists, anti-abortion extremists and self-styled militia 
groups; foreign intelligence activity, often using non-
traditional collectors such as students and business visitors, 
targeting WMD information and technology, penetration of the 
United States government and compromise of critical, national 
assets.
    There is the cyber threat from foreign governments, from 
terrorist groups and from hackers with the ability and the 
desire to utilize computers for illegal and harmful purposes.
    And finally, there are the continuing threats posed to the 
fabric of our society by organized crime, human smuggling and 
trafficking, violent gangs, public corruption, civil rights 
violations, crimes against children and corporate fraud.
    Mr. Chairman, in combating all these threats, from 
international terrorists to child predators, the FBI must 
effectively collect, analyze and share intelligence. As a 
result, over the past year we have continued to strengthen the 
FBI's enterprise-wide intelligence program. It began in 2001, 
with a dedicated analysis section in the Counterterrorism 
Division.
    In 2002, we created the Office of Intelligence in the 
Counterterrorism Division. That structure has enhanced our 
capability significantly for purposes of our counterterrorism 
operations as well as the counterterrorism operations of our 
partners.
    In 2003, we extended this concept across all FBI programs--
criminal, cyber, counterterrorism and counterintelligence--and 
unified intelligence authorities under a new FBI Office of 
Intelligence, led by an Executive Assistant Director. The 
Office of Intelligence has adopted the intelligence community's 
best practices to direct all of our FBI intelligence 
activities. Congress and the 9/11 Commission reviewed these 
efforts, and provided recommendations to strengthen our 
capabilities.
    In the last years, in intelligence reform legislation, 
alluded to by Senator Rockefeller, Congress directed us to 
create the Directorate of Intelligence--a dedicated national 
intelligence workforce within the FBI--and we are doing so. 
This workforce consists of intelligence analysts, language 
analysts, physical surveillance specialists and special agents 
who can pursue an entire career in intelligence.
    This integrated intelligence service leverages the core 
strengths of the law enforcement community, such as reliability 
of sources and fact-based analysis, while ensuring that no 
walls exist between collectors, analysts and those who must act 
upon the intelligence information.
    The Directorate also benefits from the strong FBI history 
of joint operations by unifying FBI intelligence professionals 
and integrating all partners, but most particularly, State, 
local and tribal law enforcement into our intelligence 
structures.
    Mr. Chairman, my prepared statement provides additional 
information about the Directorate of Intelligence and the many 
steps that the Bureau has taken to expand and to strengthen its 
intelligence capabilities.
    We continue to make progress, but there is still much work 
to do. We do not underestimate the challenges we face, but we 
are confident in our strategy and in our plans to protect the 
American people.
    I again would like to thank you and the Committee for your 
support, and I look forward to working with you and the staff 
in the months--and hopefully the years--ahead. And I'm happy to 
answer any questions that you might have.
    Thank you, sir.
    [The prepared statement of Director Mueller follows:]

     Prepared Statement of Hon. Robert S. Mueller, III, Director, 
                    Federal Bureau of Investigation

    Good afternoon, Mr. Chairman, Senator Rockefeller, and Members of 
the Committee. I appreciate this opportunity to discuss our current 
view of threats to the United States and the FBI's efforts to address 
them.
    Before I begin, I would like to take a moment to thank all of our 
partners in the Law Enforcement and Intelligence Communities. They have 
shared their information and expertise, and in many cases worked side-
by-side with us, and together we made great progress over the past year 
to protect our Nation and our communities from terrorism and crime.
    I would also like to thank the men and women of the FBI for 
continuing to embrace our changing mission, for working to enhance our 
intelligence capabilities, for adapting to new technologies and new 
ways of doing things, and for doing all of this without ever pausing in 
our forward push to protect this country from active threats.
    Mr. Chairman, over the past year, through unprecedented 
cooperation, enhanced intelligence capabilities, and continued 
unwavering commitment to protect the American people, we have achieved 
considerable victories against national security and criminal threats 
facing the U.S. However, I must also report that these threats continue 
to evolve and to pose new challenges to the FBI and our partners.
    It remains the FBI's overriding priority to predict and prevent 
terrorist attacks. The threat posed by international terrorism, and in 
particular from al Qa'ida and related groups, continues to be the 
gravest we face.

                 AL-QA'IDA AND RELATED TERRORIST GROUPS

    In 2004, our efforts in the War on Terrorism grew more 
intelligence-driven, more coordinated, and produced many tangible 
results.
    In 2004 we learned that operatives had conducted detailed 
surveillance of financial targets in New York, Washington DC, and New 
Jersey. In response to this threat, in coordination with DHS, the 
threat level was raised from yellow to orange for the cities referenced 
in the threat and we mobilized a large contingent of analysts and 
agents to review the massive amount of information connected with the 
attack planning, and to uncover any additional information that would 
give us insight into the plot.
    Previously, in the Spring of 2004, our allies in the United Kingdom 
arrested a group of terrorists who were plotting an imminent attack 
inside the UK. In response, we immediately formed a task force of 
analysts and agents to determine if there was a U.S. nexus to the plot 
or if any of the UK subjects had links to individuals in the U.S.
    Later in the year, we received information suggesting that there 
was an attack being planned--possibly timed to coincide with the 2004 
Presidential Election. To counter the threat, the FBI created the 2004 
Threat Task Force in May 2004. With thousands of FBI personnel, 
supported by individuals from outside agencies, it was the largest task 
force created since 9/11, and it brought to bear every possible 
resource in an effort to identify the operatives and disrupt the attack 
plan.
    As part of the Task Force's initiatives, field offices conducted a 
thorough canvass of all counterterrorism investigations and FBI sources 
to develop any further information that could help us find these 
individuals. During the 7 months the task force was up and running, we 
also checked every tangible lead provided in the threat intelligence. 
It was an extraordinary effort and while we may never know if an 
operation was indeed being planned, I am certain that the FBI's 
tremendous response to the threat played an integral role in disrupting 
any operational plans that may have been underway.
    Mr. Chairman, since we last spoke, the FBI has identified various 
extremists located throughout the U.S. and is monitoring their 
activities. Although these efforts have made us safer, they are also a 
sobering reminder of the threat we continue to face.
     In Virginia, Mohammed Ali al-Timimi, the spiritual leader 
of the Virginia Jihad training group disrupted last year, was indicted 
for his involvement in the recruitment of U.S. citizens for extremist 
training and jihad preparation. Al-Timimi, the primary lecturer at a 
northern Virginia Islamic center, preached jihad to a small core group 
of followers, provided them paramilitary training and facilitated their 
travel to Pakistan in the days after September 11th to attend Lashkar-
e-Taiba training camp in preparation to fight the United States in 
Afghanistan.
     In Minneapolis, we arrested Mohamad Kamal El-Zahabi, a 
Lebanese citizen who admitted to serving in Afghanistan and Chechnya as 
a sniper and to providing sniper training at Khalden camp in 
Afghanistan and in Lebanon in the 1990s. We first learned of El-Zahabi 
during our investigation of Boston-based Sunni extremists Ra'ed Hijazi, 
convicted for his role in the Millennium plot in Jordan, and Bassain 
Kanj, who was killed in a plot to overthrow the Lebanese government in 
2000.
     In New York, Yassin Muhiddin Aref was arrested on money 
laundering charges connected to a possible terrorist plot to kill a 
Pakistani diplomat.
    Unfortunately, in spite of these accomplishments, al-Qa'ida 
continues to adapt and move forward with its desire to attack the 
United States using any means at its disposal. Their intent to attack 
us at home remains--and their resolve to destroy America has never 
faltered.
    Al-Qa'ida's overall attack methodology has adapted and evolved to 
address the changes to their operating environment. While we still 
assess that a mass casualty attack using relatively low-tech methods 
will be their most likely approach, we are concerned that they are 
seeking weapons of mass destruction including chemical weapons, so-
called ``dirty bombs'' or some type of biological agent such as 
anthrax.
    Every day, personnel in our Counterterrorism Division and in 100 
Joint Terrorism Task Forces around the country, work to determine 
where, when, and how the next attack will occur. The fact remains--
America is awash in desirable targets--those that are symbolic like the 
U.S. Capitol and the White House--as well as the many infrastructure 
targets, like nuclear power plants, mass transit systems, bridges and 
tunnels, shipping and port facilities, financial centers, and 
airports--that if successfully hit, would cause both mass casualties 
and a crippling effect on our economy.
    We continue to be concerned that U.S. transportation systems remain 
a key target. The attacks in Madrid last March show the devastation 
that a simple, low-tech operation can achieve and the resulting impact 
to the government and economy, which makes this type of attack in the 
U.S. particularly attractive to al-Qa'ida.
    Another area we consider vulnerable and target rich is the energy 
sector, particularly nuclear power plants. Al-Qa'ida planner Khalid 
Sheikh Mohammed had nuclear power plants as part of his target set and 
we have no reason to believe that al-Qa'ida has reconsidered.
    Looking ahead, there are three areas that cause us the greatest 
concern.
    First is the threat from covert operatives who may be inside the 
U.S. who have the intention to facilitate or conduct an attack. Finding 
them is a top priority for the FBI, but it is also one of the most 
difficult challenges. The very nature of a covert operative--trained to 
not raise suspicion and to appear benign--is what makes their detection 
so difficult.
    Mr. Chairman, while we are proud of our accomplishments this year 
and the additional insight we have gained into al-Qa'ida's activity, I 
remain very concerned about what we are not seeing.
    Whether we are talking about a true sleeper operative who has been 
in place for years, waiting to be activated to conduct an attack or a 
recently deployed operative that has entered the U.S. to facilitate or 
conduct an attack, we are continuously adapting our methods to reflect 
newly-received intelligence and to ensure we are as proactive and as 
targeted as we can be in detecting their presence.
    Second, because of al-Qa'ida's directed efforts this year to 
infiltrate covert operatives into the U.S., I am also very concerned 
with the growing body of sensitive reporting that continues to show al-
Qa'ida's clear intention to obtain and ultimately use some form of 
chemical, biological, radiological, nuclear or high-energy explosives 
(CBRNE) material in its attacks against America.
    Third, we remain concerned about the potential for al-Qa'ida to 
leverage extremist groups with peripheral or historical connections to 
al-Qa'ida, particularly its ability to exploit radical American 
converts and other indigenous extremists. While we still believe the 
most serious threat to the Homeland originates from al-Qa'ida members 
located overseas, the bombings in Madrid last March have heightened our 
concern regarding the possible role that indigenous Islamic extremists, 
already in the U.S., may play in future terrorist plots. Also of 
concern is the possible role that peripheral groups with a significant 
presence in the U.S. may play if called upon by members of al-Qa'ida to 
assist them with attack planning or logistical support.
    The potential recruitment of radicalized American Muslim converts 
continues to be a concern and poses an increasingly challenging issue 
for the FBI because the process of recruitment is subtle and many 
times, self initiated and radicalization tends to occur over a long 
period of time and under many different circumstances.
    As part of our continued efforts to identify populations that may 
be a target for extremist recruitment, the FBI has been involved in a 
coordinated effort between law enforcement and corrections personnel to 
combat the recruitment and radicalization of prison inmates. Prisons 
continue to be fertile ground for extremists who exploit both a 
prisoner's conversion to Islam while still in prison, as well as their 
socio-economic status and placement in the community upon their 
release.
    Extremist recruitment at schools and universities inside the United 
States also poses a particularly difficult problem. Because the 
environment on campuses is so open and isolated, schools provide a 
particularly impressionable and captive audience for extremists to 
target.
    Additionally, keeping in mind al-Qa'ida recruitment efforts occur 
primarily overseas, we are closely monitoring any possible methods for 
moving individuals to extremist-linked institutions overseas, 
specifically religious schools and mosques that have overt ties to al-
Qa'ida or other terrorist organizations.
    We are also concerned about the possibility that individuals who 
are members of groups previously considered to be peripheral to the 
current threat, could be convinced by more radical, external influences 
to take on a facilitation or even worse--an operational role--with 
little or no warning. Individual members of legitimate organizations, 
such Jama'at Tabligh, may be targeted by al-Qa'ida in an effort to 
exploit their networks and contacts here in the United States.
    Efforts by extremists to obtain training inside the U.S. is also an 
ongoing concern. Although there are multiple reports and ongoing 
investigations associated with the paramilitary training activities of 
suspected extremists nationwide, the majority of these cases involve 
small groups of like-minded individuals who are inspired by the 
jihadist rhetoric experienced in radical mosques or prison 
proselytizing.
    Fortunately, the recent amendment to Title 18 adding a provision 
whereby an individual knowingly receiving military-type training from a 
designated foreign terrorist organization is committing an offense, 
makes it possible to now prosecute individuals who participate or 
assist individuals in receiving this type of training.
    Another area of concern is the recent merging of Iraqi jihadist 
leader Abu Mu'sab alZargawi with al-Qa'ida. Zarqawi has a demonstrated 
capability of directing external operations while maintaining his focus 
on Iraq as noted with the disrupted Jordan plot in April.
    Another aspect of extremist activity in the U.S. is the extensive 
fundraising efforts by various terrorist groups. We continue to 
identify and block funding conduits, freeze assets of terrorists and 
those who support them, protect legitimate charities, and disrupt the 
movement of money through peripheral financial systems such as Hawalas.
    As part of this effort, the FBI has engaged in extensive 
coordination with authorities of numerous foreign governments in 
terrorist financing matters, leading to joint investigative efforts 
throughout the world. The FBI's participation in a U.S.-Saudi Arabia 
Joint Terrorism Task Force, the U.S.-Swiss Terrorism Financing Task 
Force and the International Working Group on Terrorist Financing has 
enhanced cooperation between these agencies and the U.S. and allowed 
the FBI unprecedented access that has increased our understanding of 
these complex financing networks. Since 2002, we have provided 
terrorism financing training and technical assistance to liaison 
partners in almost 50 countries.

          THE THREAT FROM OTHER INTERNATIONAL TERRORIST GROUPS

    Mr. Chairman, al-Qa'ida and the groups that support it are still 
the most lethal threat we face today. However, other terrorist groups 
that have a presence in the U.S. require careful monitoring.
    It is the FBI's assessment, at this time, that there is a limited 
threat of a coordinated terrorist attack in the U.S. from Palestinian 
terrorist organizations, such as HAMAS, the Palestine Islamic Jihad, 
and the al-Agsa Martyr's Brigade. These groups have maintained a 
longstanding policy of focusing their attacks on Israeli targets in 
Israel and the Palestinian territories. We believe that the primary 
interest of Palestinian terrorist groups in the U.S. remains the 
raising of funds to support their regional goals.
    The FBI is committed to staunching the flow of funds from the U.S. 
to Palestinian terrorist organizations. As an example of this effort, 
the former leadership of the Holy Land for Relief and Development, a 
HAMAS front organization, was indicted this past year and convictions 
were won against the Elashi brothers who owned and ran Infocom, another 
HAMAS front organization.
    Of all the Palestinian groups, HAMAS has the largest presence in 
the U.S. with a robust infrastructure, primarily focused on 
fundraising, propaganda for the Palestinian cause, and proselytizing. 
Although it would be a major strategic shift for HAMAS, its U.S. 
network is theoretically capable of facilitating acts of terrorism in 
the U.S.
    Like HAMAS, but on a much smaller scale, U.S.-based Palestine 
Islamic Jihad members and supporters are primarily engaged in 
fundraising, propaganda and proselytizing activities. In 2003, the 
Palestine Islamic Jihad, or PIJ, activities and capabilities in the 
U.S. were severely undercut by the arrests of the U.S. PIJ leader, Sami 
al-Arian, and three of his top lieutenants. There have also been two 
additional arrests of suspected PIJ activists on charges unrelated to 
terrorism. There has been no indication of a new U.S. PIJ leadership 
since the arrest of al-Axian.
    Currently, the most likely threat of terrorist attacks from 
Palestinian groups to the U.S. homeland is from a ``lone wolf 
'scenario. In this scenario, a terrorist attack would be perpetrated by 
one or more individuals who may embrace the ideology of a Palestinian 
terrorist group, but act without assistance or approval of any 
established group.
    Lebanese Hizballah retains the capability to strike in the U.S., 
although we have no credible information to indicate that US-based 
Hizballah members have plans to attack American interests within the 
U.S. or abroad. In 2004, we had some success in uncovering individuals 
providing material support to Hizballah.
     In Detroit, Mahmoud Youssef Kourani was indicted in the 
Eastern District of Michigan on one count of Conspiracy to Provide 
Material Support to Hizballah. Kourani was already in custody for 
entering the country illegally through Mexico and was involved in 
fundraising activities on behalf of Hizballah.
     Also in Detroit, Fawzi Assi was arrested in May of 2004 
and was charged under the 1996 Antiterrorism and Effective Death 
Penalty Act for providing material support to Hizballah. Assi was 
initially arrested in 1998 after an outbound U.S. Customs search at the 
Detroit Metro Airport discovered night vision goggles, one thermal 
imaging scope and two Boeing Global Positioning System devices. Assi 
later fled the country after being released by the court on bail, but 
was later turned over to us in Lebanon to face U.S. criminal charges.

                   THE THREAT FROM DOMESTIC TERRORISM

    While national attention is focused on the substantial threat posed 
by international terrorists to the homeland, law enforcement officials 
must also contend with an ongoing threat posed by domestic terrorists 
based and operating strictly within the U.S. Domestic terrorists 
motivated by a number of political or social agendas--including white 
supremacists, black separatists, animal rights/environmental 
terrorists, anarchists, anti-abortion extremists, and self-styled 
militia--continue to employ violence and criminal activity in 
furtherance of these agendas.
    Animal rights and environmental extremists, operating under the 
umbrella of the Animal Liberation Front (ALF) and Earth Liberation 
Front (ELF) utilize a variety of tactics against their targets, 
including arson, sabotage/vandalism, theft of research animals, and the 
occasional use of explosive devices.
    Serious incidents of animal rights/eco-terrorism decreased in 2004, 
a fact we attribute to a series of law enforcement successes that are 
likely deterring large-scale arsons and property destruction. Following 
a rash of serious incidents of animal rights/eco-terrorism, including a 
$50 million arson in San Diego and two bombing incidents in the San 
Francisco area, law enforcement authorities achieved several 
significant successes which have likely deterred additional terrorist 
activity. Despite these successes, we anticipate that animal rights 
extremism and eco-terrorism will continue to threaten certain segments 
of government and private industry, specifically in the areas of animal 
research and residential/commercial development.
    The potential for violence by anarchists and other emerging 
revolutionary groups, such as the Anarchist Black Cross Federation 
(ABCF), will continue to be an issue for law enforcement. The stated 
goals of the ABCF are ``the abolishment of prisons, the system of laws, 
and the Capitalist state.'' The ABCF believes in armed resistance to 
achieve a stateless and classless society. ABCF has continued to 
organize, recruit, and train anarchists in the tactical use of 
firearms.
    U.S.-based black separatist groups follow radical variants of 
Islam, and in some cases express solidarity with al-Qa'ida and other 
international terrorist groups.
    Incidents of organized white supremacist group violence decreased 
in 2004. This is due to several high profile law enforcement arrests 
over the last several years, as well as the continued fragmentation of 
white supremacist groups because of the deaths or the arrests of 
leaders. We judge that violence on the part of white supremacists 
remains an ongoing threat to government targets, Jewish individuals and 
establishments, and non-white ethnic groups.
    However, the right-wing Patriot movement--consisting of militias, 
common law courts, tax protesters, and other anti-government 
extremists--remains a continuing threat in America today. Sporadic 
incidents resulting in direct clashes with law enforcement are possible 
and will most likely involve State and local law enforcement personnel, 
such as highway patrol officers and sheriff's deputies.
    Potential violent anti-abortion extremists linked to terrorism 
ideologies or groups pose a current threat. The admiration of violent 
high-profile offenders by extremists highlight continued concerns 
relating to potential or similar anti-abortion threat activity.

        WMD PROLIFERATION AND OTHER FOREIGN INTELLIGENCE THREATS

    Although the impact of terrorism is more immediate and highly 
visible, espionage and foreign intelligence activity are no less a 
threat to the U.S. national security. Many countries consider the U.S. 
to be their primary intelligence target; so long as the U.S. maintains 
its position in world affairs, it will continue to be targeted. As part 
of its reinvigorated and refocused foreign counterintelligence (FCI) 
program, the FBI has applied a more rigorous methodology to its efforts 
to assess and articulate the current threat environment.
    One of the key elements of the FBI's National Strategy for 
Counterintelligence (adopted in August 2002) is the threat assessment. 
Over the past 2 years, the FBI has produced comprehensive threat 
assessments on several countries deemed to be of particular CI concern. 
The National Strategy for Counterintelligence identified five 
categories of foreign intelligence activity as being especially harmful 
to the U.S. national security. These five categories of activity are 
weighted in terms of importance, the in the following order:
     Proliferation of chemical, biological, radiological, 
nuclear, and high-energy explosives (CBRNE) information and technology:
     Penetration of the U.S. Intelligence Community (USIC)
     Penetration of U.S. Government entities and contractors
     Compromise of Critical National Assets (CNAs), defined as 
any information, policies, plans, technologies, or industries that, if 
stolen, modified, or manipulated by an adversary would seriously 
threaten U.S. national or economic security; and
     Conduct of clandestine foreign intelligence activities in 
the U.S.
    Several countries have traditionally considered the U.S. to be 
their primary intelligence target, as well as an adversary or threat. 
This prioritization is manifested through their continued large and 
active intelligence presence in the U.S. and their aggressive targeting 
of U.S. persons, information and technology. Other countries, while not 
necessarily viewing the U.S. as an adversary or threat, seek 
information to help them compete economically, militarily, and 
politically in world affairs. As the current leader in all three areas, 
the U.S. becomes their primary target. For still other countries, 
rather than being an intelligence target, the U.S. represents an 
operating environment in which to conduct intelligence-related 
activities focused on their domestic security.
    Some foreign countries are becoming increasingly sophisticated in 
their CI awareness, training and capabilities. Also of growing concern 
is the asymmetrical threat posed by certain intelligence services that 
supplement their collection capabilities in the U.S. by using non-
traditional collectors. These collectors include students, delegations, 
business visitors, emigres, and retired intelligence officers who are 
collecting against targets of opportunity or responding to ad hoc 
requests from the intelligence services. Such non-traditional 
collectors pose a potential threat across the US, requiring a 
coordinated response by all FBI field offices.
    The FBI does not foresee any significant changes in the official 
foreign intelligence presence in the U.S. over the next two to 3 years. 
However, in addition to using non-traditional collectors, several 
countries appear to be exploiting their military liaison officers, who 
are in the U.S. on overt, legitimate intelligence-sharing missions, to 
target and collect sensitive defense information that is outside the 
scope of their official access. Most difficult to identify and assess 
is the intelligence collection activity being directed and/or conducted 
by non-intelligence organizations, such as other foreign government 
agencies and/or foreign companies. The FBI sees this type of activity 
most frequently in the targeting and collection of CBRNE information 
and technology.
    Another challenge the FBI will face is the tendency of some foreign 
intelligence services to leverage liaison relationships for 
intelligence collection purposes. U.S. Government representatives 
participating in international conferences and exchanges, or whose 
duties include routine liaison with foreign intelligence 
representatives, frequently report that their contacts engage in 
elicitation, sometimes to a surprisingly aggressive level.
    The FBI expects to see a continued increase in the use of 
technology as an enabler for intelligence operations, such as 
contacting, tasking; and debriefing sources and agents in the US.
    Over the near term, the priority collection targets for these 
countries will be:
     The effects of the recent 2004 U.S. elections on U.S. 
foreign and domestic policies;
     U.S. military actions in Iraq and Afghanistan;
     U.S. counterterrorism policy;
     U.S. dual use technologies; and
     U.S. policy vis-a-vis particular countries or regions of 
the world.
    The FBI expects to see continued lobbying, political influence, 
and/or perception management activities by countries hoping to affect 
U.S. policy.
    Many foreign intelligence services will also continue to exploit 
their presence in the U.S. to target and collect against third 
countries. Most will also engage in defensive intelligence activities, 
targeting their own expatriate and ethnic communities in the US, 
especially those groups deemed to be a threat to the current regime.
    The FBI's National Strategy for Counterintelligence sets forth 
national priorities and strategic objectives as well as changes in 
management and organizational culture intended to redirect and 
significantly enhance the overall performance of the FBI's FCI program. 
Program objectives and outcomes include:
     Identify intelligence service objectives, officers, 
assets, and operations;
     Disrupt the operations of intelligence services; and
     Change the behavior of exploited institutions and 
individuals.
    To that end, the FBI has identified five program strategies: Know 
the Domain; Understand the Threat; Engage in Strategic Partnerships; 
Conduct Sophisticated Operations; and Inform Policymakers.
    During fiscal year 2004, the FBI FCI program accomplished the 
following:
     Six foreign intelligence officers and/or agents were 
arrested;
     67 requests for persona non grata actions and visa denials 
were issued;
     1,667 Intelligence Information Reports were disseminated.
    In addition, the Asset Validation Review process was implemented in 
July 2002, and the FBI began providing mandatory asset validation 
training for Asset Coordinators in the field regarding procedures and 
policies. The FBI also implemented the Agents in Laboratories 
Initiative (AILI) in February 2003, through which FBI agents have been 
placed in Department of Energy nuclear weapons and science 
laboratories.
    The FBI has also developed several strategic partnerships, to 
include the Regional CI Working Group (RCIWG) Initiative, which was 
established in October 2003 to implement the National Strategy for 
Counterintelligence, leverage the RCIWGs in tasking our USIC partners, 
address intelligence gaps, identify CI trends and priorities in the 
operational arena among USIC agencies at the field level, and ensure 
that all CI operational initiatives and projects across agencies are 
coordinated through the FBI.
    Similarly, the National CI Working Group (NCIWG) was established 
and is led by the FBI and consists of other CI agency head-level 
representatives. The mission is to establish ongoing interagency 
planning discussions to better coordinate CI operations USIC-wide. 
Domain Task Forces are CI project level task forces led by the FBI, in 
vulnerabilities associated with at-risk national security projects, 
i.e., sensitive technologies, information, and research and 
development.
    FBI field offices are developing ``business alliances'' to build 
executive-level relationships and foster threat and vulnerability 
information sharing, with private industries and academic institutions 
located within their territories having at-risk and sensitive national 
security and economic technologies, research and development projects.
    Finally, the FBI has reinvigorated its CI training process. For 
example, field agents are trained in the key components of basic CI 
operations through an intensive 4-week Basic CI Operations course. 
Other advanced, highly specialized CI courses and seminars provide 
training to agents and analysts through a variety of innovative 
instructional methods and include inservices and conferences, the 
Interactive Multimedia Instruction and Simulation (IMIS) computer-based 
training program, and the FBI Intranet.

                             CYBER THREATS

    The cyber-threat to the U.S. is serious and continues to expand 
rapidly the number of actors with both the ability and the desire to 
utilize computers for illegal and harmful purposes rises.
    Cyber threats stems from both State actors, including foreign 
governments that use their vast resources to develop cyber technologies 
with which to attack our networks, and non-state actors such as 
terrorist groups and hackers that act independently of foreign 
governments. The increasing number of foreign governments and non-state 
actors exploiting U.S. computer networks is a major concern to the FBI 
and the Intelligence Community as a whole.
    State actors continue to be a threat to both our national security 
as well as our economic security because they have the technical and 
financial resources to support advanced network exploitation and 
attack. The greatest cyber threat is posed by countries that continue 
to openly conduct computer network attacks and exploitations on 
American systems.
    Terrorists show a growing understanding of the critical role that 
information technology plays in the day-to-day operations of our 
economy and national security. Their recruitment efforts have expanded 
to include young people studying mathematics, computer science and 
engineering in an effort to move from the limited physical attacks to 
attacks against our technical systems.
    Fortunately, the large majority of hackers do not have the 
resources or motivation to attack the U.S. critical information 
infrastructures. Most targets of the hacker are viewed as 
``challenges'' to break into a system. These individuals do not 
introduce malicious code to the system, but usually leave their ``cyber 
signature.'' Although a nuisance, the single hacker does not pose a 
great threat; however, the increasing volume of hacking activity 
worldwide does inadvertently disrupt networks, including that of the 
U.S. information infrastructures. Hackers that plant malicious code or 
upload bots that are designed to steal information are the main threats 
in this group. These individuals have the ability to take down a system 
or steal trade secrets, either of which can be devastating to a company 
or agency.
    The growing number of hackers motivated by money is a cause for 
concern. If this pool of talent is utilized by terrorists, foreign 
governments or criminal organizations, the potential for a successful 
cyber attack on our critical infrastructures is greatly increased.
    To combat these and other cyber threats, the FBI established a 
national cyber program with a Cyber Division at FBI Headquarters and 
dedicated cyber squads in the field offices. The program enables us to 
coordinate and facilitate investigations of those Federal criminal 
violations using the Internet, computer systems, or networks. It also 
helps us to build and maintain public/private alliances to maximize 
counterterrorism, counterintelligence, and law enforcement cyber 
response capabilities. We are also working to aggregate the 
technological and investigative expertise necessary to meet the 
challenges that lie ahead. We are recruiting and hiring individuals who 
possess degrees and experience in computer sciences, information 
systems, or related disciplines. We are looking for specialists who 
possess a bedrock of experience and a profound understanding of the 
cyber world.

                      CONVERGING CRIMINAL THREATS

    It is increasingly the case that counterterrorism, 
counterintelligence, cyber, and criminal investigations are 
interrelated. There are rarely clear dividing lines that distinguish 
terrorist, counterintelligence, and criminal activity. Recognizing this 
trend toward convergence, the first priority of the FBI's Criminal 
Investigative Program is to leverage criminal investigative resources 
to enhance the FBI's Counterterrorism, Counterintelligence and Cyber 
programs.
    Terrorists use criminal enterprises and criminal activities to 
support and fund terrorist organizations. The FBI's criminal 
investigations of these crimes and criminal enterprises, often in task 
forces in conjunction with other Federal, state, and local law 
enforcement, continue to develop invaluable intelligence, as well as to 
initiate investigations, which further identify the United States' 
vulnerability to attack and directly support the FBI's and the 
Intelligence Community's counterterrorism, counterintelligence, and 
cyber crime efforts.
    One of the FBI's first investigations to utilize the material 
support of a terrorist organization statute evolved from a criminal 
investigation of Hizballah operators utilizing credit card scams, 
cigarette smuggling and loan fraud to support the purchase of dual use 
equipment for Hizballah procurement leaders in Lebanon. The FBI used 
the criminal RICO statute to fully neutralize this terrorist cell.
    In combatting converging threats, the FBI's Criminal Program is 
placing greater emphasis on the collection, analysis, dissemination and 
effective use of intelligence, including intelligence derived from 
criminal investigations, including intelligence derived from human 
sources and the use of sophisticated investigative techniques. We are 
using intelligence to identify crime problems and trends, to conduct 
threat assessments, and to drive investigative efforts. Currently, we 
are aggressively pursuing intelligence collection and threat 
assessments on Organized Crime, Human Smuggling and Trafficking, 
Violent Gangs, Public Corruption, Civil Rights, and Middle Eastern 
Criminal Enterprises.
    After CT, CI, and Cyber, the Criminal Investigative Program's other 
priorities in descending order are Criminal Intelligence, Public 
Corruption, Civil Rights, Violent Gangs, Criminal Enterprises, 
Corporate and Securities Fraud, Health Care Fraud, Mortgage Fraud, 
Major Financial Institution Fraud, and Crimes Against Children and 
other Violent Crimes.

Public Corruption
    Public Corruption continues to pose the greatest threat to the 
integrity of all levels of government. Recent investigative efforts 
have been intensified to identify and convict Immigration, Department 
of State, and DMV officials illegally selling visas or other 
citizenship documents and drivers licenses to anyone with enough money. 
Their illegal activities potentially conceal the identity and purpose 
of terrorists and other criminals, facilitating their entry, travel, 
and operation without detection in the U.S. Other investigations have 
convicted numerous law enforcement officers, including those who formed 
criminal organizations involved in drug trafficking. Many major 
metropolitan areas in the U.S. have witnessed the indictment and 
conviction of corrupt public officials who betrayed the public trust 
for profit or personal gain. Over the last 2 years alone, the FBI has 
convicted more than 1050 corrupt government employees, including 177 
Federal officials, 158 State officials, 360 local officials, and more 
than 365 police officers. In addition to pursuing criminal 
investigations against corrupt law enforcement officers, the FBI has 
initiated awareness and training efforts to deter corruption, such as 
``Project Integrity.''

Civil Rights
    During fiscal year 2004, the FBI initiated 1,744 civil rights 
investigations and obtained 154 convictions, focusing its efforts on 
Hate Crimes, Color of Law, and Involuntary Servitude and Slavery 
matters. The FBI and the United States depend on the support, 
cooperation and assistance of the Arab, Muslim and Sikh Communities in 
the United States to fight terrorism and to fight crime. These 
communities are entitled to the same civil rights of every citizen and 
person in the United States. The FBI has worked with these communities 
to ease their fears concerning the FBI's interest in securing their 
help in the fight against terrorism and to address the backlash of hate 
crimes directed against them following 9/11 and the war in Iraq. Since 
9/11, more than 500 hate crime investigations have been initiated, 
where the victims were Arab, Muslim, Sikh, or perceived to be as such, 
resulting in more than 150 Federal and local prosecutions. During 2004, 
the FBI initiated 53 hate crime investigations where the victims were 
of Arab, Muslim, or Sikh descent or were perceived to be such. Thirteen 
of those cases resulted in criminal charges being filed by either State 
or Federal law enforcement authorities. Other groups also continue to 
be the victims of Hate Crimes, including African American and Jewish 
communities.
    Human trafficking and modern day slavery are a worldwide crime and 
human rights problem, due to global, economic, and political factors. 
Approximately 17,000 victims each year are lured to the United States 
with false promises of good jobs and better lives and then forced to 
work under brutal and inhumane conditions. Many trafficking victims, 
including women and children, are forced to work in the sex industry, 
prison like factories, and migrant agricultural work.

Violent Gangs
    Violent gangs are more organized, larger, more violent, and more 
widespread than ever before, and they pose a growing threat to the 
safety and security of Americans. The Department of Justice estimates 
there are approximately 30,000 gangs with more than 800,000 members in 
the U.S.
    Our communities continue to experience devastating incidences of 
murder, drive-by shootings, and assaults by gangs mainly involved in 
the sale and distribution of illicit drugs. However, gang activity 
extends far beyond protection of turf. It impacts innocent citizens who 
have no connection or involvement with gangs, and it increasingly 
transcends municipal boundaries. Gang members travel from city to city, 
between states and, on occasion, between countries to commit their 
crimes.
    In response, the FBI is implementing a coordinated, intelligence-
driven National Gang Strategy to disrupt and dismantle gangs that pose 
the greatest threats to America's communities. In the past year, we 
have increased the number of Safe Street Task Forces from 78 to 107 and 
we are seeking to increase the number by an additional 10 to 20 percent 
in the coming year. We are also centralizing gang investigations at FBI 
Headquarters with a new $10 million National Gang Intelligence Center 
(NGIC). The NGIC will collect intelligence on gangs from across the 
U.S., analyze this intelligence, and disseminate it to help law 
enforcement authorities throughout the country plan and execute 
strategies to prevent further gang activity and violence.
    The FBI has reclassified gang matters from ``violent criminal 
offenders'' to ``criminal organizations and enterprises''--a higher 
priority area. The new classification also allows the U.S. Department 
of Justice to charge gang members under Federal racketeering statues 
which can result in stiffer prison sentences for convicted subjects. 
This approach is similar to the successful strategy used by the FBI to 
dismantle traditional organized crime groups.
    Under the National Gang Strategy, priority is given to efforts to 
disrupt and dismantle gangs that are national in their scope and 
exhibit significant connectivity and internal alliances. Among the 
first to be targeted is Mara Salvatrucha (MS-13), a violent gang which 
originated in Los Angeles comprised primarily of Central American 
immigrants. We have created a National Gang Task Force specifically to 
address MS-13.

Criminal Enterprises
    Organized criminal enterprises operating in the U.S. and throughout 
the world pose increasing concerns for the international law 
enforcement and intelligence communities. Their skill in using 
international monetary systems to conduct and conceal their criminal 
activity, their use of State of the art communications encryption to 
further safeguard their illegal activity, and their transnational 
mobility increases the likelihood they will escape detection or 
otherwise cover their illegal activities with a cloak of legitimacy. 
Although the FBI prioritizes its efforts on criminal enterprises with 
possible connections to terrorist and counterintelligence activities, 
public corruption, human smuggling of Special Interest Aliens and women 
and children, or violent and pervasive racketeering activity, the 
impact from just one criminal activity alone, theft, is staggering. 
Annual property losses from cargo/high tech/retail theft is estimated 
at $30 billion, from vehicle theft $8 billion, from art/cultural 
heritage artifact theft $500 million, and from jewelry and gem theft 
$135 million. However, theft by criminal enterprises often represents a 
multifaceted threat. For example, Middle Eastern Criminal Enterprises 
involved in the organized theft and resale of infant formula pose not 
only an economic threat, but a public health threat to infants, and a 
potential source of material support to a terrorist organization.
    The FBI is increasing its intelligence collection and assessment 
efforts on criminal enterprises, as well as its joint efforts with the 
intelligence and law enforcement services of other nations, to combat 
the criminal activities of the La Cosa Nostra, Italian, Russian, 
Balkan, Albanian, Asian, African, Middle Eastern, Colombian/South 
American and other criminal enterprises. The FBI/Hungarian National 
Bureau of Investigation Organized Crime Task Force in Budapest, 
Hungary, which is investigating a Russian Criminal Enterprise engaged 
in murder, extortion, prostitution, and other significant racketeering 
activity, represents an unprecedented cooperative effort between the 
FBI and the Hungarians.
    Although new criminal enterprises continue to emerge, the LCN 
remains a formidable and ever changing criminal threat. This year, in 
just one criminal scheme, identified by the Federal Trade Commission as 
the largest consumer fraud investigated in the history of the United 
States, members of the Gambino LCN family were convicted for using 
pornographic websites and adult entertainment 1 800 numbers to defraud 
thousands of individuals of $750,000,000. Asian Criminal Enterprises 
also pose a continued threat, as exemplified by one which was 
dismantled earlier this year during a coordinated arrest operation with 
Canada, which resulted in the arrest of 36 subjects in Canada and 102 
subjects in the U.S. for drug trafficking and money laundering. 
Millions of dollars and 21 firearms, including an AK 47 assault rifle 
and a sawed off shotgun were seized during the operation.

Corporate/Securities Fraud
    Corporate fraud can cost Americans their jobs and rob them of hard-
earned savings. It shakes the public's confidence in corporate America 
to its foundation. Since the initiation of the FBI Corporate Fraud Task 
Force in December 2001, there have been 480 indictments and 305 
convictions of corporate executives and their associates. The FBI's 
efforts have also resulted in over $2 billion in restitutions, 
recoveries and fines, in addition to over $30 million in seizures and 
forfeitures. In the Enron, HealthSouth, Cendant Corporation, Credit 
Suisse First Boston, Computer Associates International, Worldcom, 
Imclone, Royal Ahold, Perigrine Systems, and America Online cases the 
FBI obtained 119 indictments/informations and 79 convictions. The 
former Chief Executive Officer (CEO) of Worldcom is on trial in New 
York and the former CEO of HealthSouth is on trial in Alabama. Several 
additional high profile trials are anticipated in the near future, to 
include the trial of Enron's former CEOs and Chief Accounting Officer 
anticipated to be scheduled for August or September 2005.
    The FBI is currently pursuing 334 Corporate Fraud cases throughout 
the U.S. This is more than a 100 percent increase from fiscal year 
2003. Eighteen of the pending cases involve losses to public investors 
which each exceed $1 billion. Unfortunately, the volume of cases has 
yet to reach a plateau, and the FBI continues to open three to six new 
cases each month, each case averaging a loss exceeding $100 million.

Health Care Fraud
    Americans' health care expenditures continue to climb at rates 
higher than inflation and will soon consume more than 17 percent of the 
Gross Domestic Product. It is estimated that health care fraud costs 
consumers, Medicare, Medicaid, and private insurers tens of billions of 
dollars each year in blatant fraud schemes in every sector of the 
industry. The FBI recently instituted the Out Patient Surgery and 
Pharmaceutical Fraud Initiatives to combat blatant fraud identified in 
those health care programs. During fiscal year 2004, the FBI had 2,468 
pending health care fraud investigations, obtained 693 indictments and 
informations, 564 convictions or pre trial diversions, $1.05 billion in 
restitution, $543 million in fines, $28.8 million in seizures, $19.05 
million in forfeitures and disrupted 186 and dismantled 105 criminal 
organizations.

Mortgage Fraud
    The number of FBI mortgage fraud investigations, including major 
undercover operations, rose from 102 in fiscal year 2001 to 
approximately 550 in fiscal year 2004. This rise is expected to 
continue. During FYs 2001-2004 the FBI received over 17,000 mortgage 
fraud related Suspicious Activity Reports from federally insured 
financial institutions alone. The FBI worked with the Mortgage Bankers' 
Association (MBA), the National Notary Association (NNA), as well as 
FINCEN, the Department of Housing and Urban Development, and major 
mortgage lending institutions, to improve the reporting and detection 
of potential mortgage fraud.

Crimes Against Children/Violent Incident Crime
    Of all violent crime, crimes against children and child 
prostitution are of particular concern. Over 300,000 children per year 
are forced into prostitution. The FBI's Lost Innocence, Child 
Prostitution Initiative, has opened 13 cases in 11 field offices, 
emphasizing the use of sophisticated investigative techniques, to 
obtain 135 arrests/locates, 3 complaints, 13 indictments/informations, 
11 convictions/pre trial diversions, and 4 child locates. Major violent 
crime incidents, such as sniper murders, serial killings and child 
abductions can paralyze whole communities and require the cooperative 
efforts of the FBI and local, State and other Federal law enforcement 
agencies. The FBI also continues to address the 6,218 bank robberies, 
resulting in 153 injuries, and 15 deaths, that occurred within the 
first 10 months of 2004, albeit with a greater reliance on other 
agencies and a lesser use of its own resources where possible.

                    ENHANCING THE FBI'S CAPABILITIES

    Mr. Chairman, you will notice that our accomplishments over the 
past year consistently have two things in common, the effective 
collection and use of intelligence and inter-agency cooperation. The 
improvements that made these accomplishments possible result from the 
continued efforts of the men and women of the FBI to implement a plan 
that fundamentally transforms our agency and enhances our ability to 
predict and prevent terrorism.

Intelligence
    As set forth above, threat information crosses both internal and 
external organizational boundaries. Counterterrorism efforts must draw 
from, and contribute to, counterintelligence, cyber and criminal 
programs. In order to most effectively address all threats, we are 
continuing to strengthen the FBI's enterprise-wide intelligence 
program.
    We began in 2001 with a dedicated analysis section in the 
Counterterrorism Division and, in 2002, we created an Office of 
Intelligence in the Counterterrorism Division. The structure and 
capability significantly enhanced our CT operations and those of our 
partners. In 2003, we extended this concept across all FBI programs--
Criminal Cyber, Counterterrorism and Counterintelligence--and unified 
intelligence authorities under a new FBI Office of Intelligence led by 
an Executive Assistant Director. The Office of Intelligence adopted 
Intelligence Community best practices to direct all FBI intelligence 
activities. Congress and the 9/11 Commission reviewed these efforts and 
provided recommendations to further strengthen the FBI's intelligence 
capability.
    The newly established Directorate of Intelligence is the dedicated 
national security workforce that the Congress established within the 
FBI. It comprises a dedicated Headquarters element and embedded 
intelligence entities in each FBI field office called Field 
Intelligence Groups (FIGs). The FIGs are central to the integration of 
the intelligence cycle into field operations. The FIGS include Special 
Agents, Intelligence Analysts, Language Specialists, and Surveillance 
Specialists, as well as officers and analysts from other intelligence 
and law enforcement agencies. They are responsible for coordinating, 
managing, and executing all of the functions of the intelligence cycle 
and have significantly improved the FBI's intelligence capability. This 
integrated intelligence service leverages the core strengths of the law 
enforcement culture--such as reliability of sources and fact-based 
analysis--while ensuring that no walls exist between collectors, 
analysts and those who must act upon intelligence information. The 
Directorate also benefits from the strong FBI history of joint 
operations by unifying FBI intelligence professional and integrating 
all partners, particularly state, local, and tribal law enforcement, 
into our intelligence structures.
    The central mission of the Directorate is to optimally position the 
FBI to meet current and emerging national security and criminal threats 
by: (1) assuring that the FBI proactively targets threats to the US, 
inhibiting them and dissuading them before they become crimes; (2) 
providing useful, appropriate and timely information and analysis to 
the national security, homeland security, and law enforcement 
communities; and (3) building and-sustaining FBI-wide intelligence 
policies and capabilities.
    In 2004, we made substantial progress to expand and strengthen our 
intelligence workforce. For the first time, the FBI offered recruitment 
bonuses for Intelligence Analysts. As a result of these and other 
efforts, the FBI received over 80,000 applications and hired over 650 
Intelligence Analysts.
    We built on the College of Analytic Studies, created in October 
2001, with the addition of two new courses based on intelligence 
community best practices: ACES 1.0, a new basis intelligence analytic 
course, and ACES 1.5, a course for experienced, on-board analysts that 
provides information on the latest analytic resources and techniques. 
To ensure a consistent level of knowledge across the workforce on 
intelligence concepts and processes, ACES Training is now mandatory for 
all FBI Intelligence Analysts. We have increased our training expertise 
and capacity and are on track to deliver basic training to 1,000 
Intelligence Analysts by December 2005. In addition, we have 
incorporated intelligence training into New Agents class, including a 
joint exercise with Intelligence Analysts and joint evening seminars.
    The Intelligence Analyst career path, with multiple work roles and 
cross-training requirements not only provides career development 
opportunities, it also creates a workforce with the agility and 
flexibility needed to respond to the changing threat environment.
    In addition, we implemented several initiatives to enhance the 
analyst career path and improve retention. We extended the promotion 
potential for analysts in the field from GS-12 to GS-14. We created an 
Intelligence Analyst Advisory Board, leveraging the strong FBI culture 
of creating advisory groups to provide advocacy for specific career 
fields. At the same time we worked with Congress and were granted pay 
flexibilities, such that FBI intelligence professionals now can be 
compensated at a rate equal to that of their Intelligence Community 
peers. These and other initiatives have helped us to stabilize our 
attrition rate between 8 percent and 9 percent and FY05 statistics to 
date look promising.
    We have also taken steps to strengthen the Special Agent component 
of our intelligence workforce. In March 2004 we established a new 
career path for Special Agents with three objectives. First, the career 
path gives all Agents experience in intelligence collection, analysis 
and dissemination. Second, the career path will give Agents an 
opportunity to develop specialized skills, experience and aptitudes in 
one of four areas: 1) Intelligence, 2) Counterterrorism/
Counterintelligence, 3) Cyber or 4) Criminal. Third, it makes 
Intelligence Officer Certification a prerequisite for advancement to 
senior supervisory ranks. The Special Agent career path will produce a 
cadre of Agents who are proficient in both intelligence and law 
enforcement operations. This is key to achieving the full integration 
of law enforcement and intelligence operations.
    To improve our foreign language capabilities, we have recruited and 
processed more than 50,000 translator applicants. These efforts have 
resulted in the addition of 778 new Contract Linguists (net gain of 493 
after attrition) and 109 new Language Analysts (net gain of 34 after 
attrition). The FBI has increased its overall number of linguists by 67 
percent, with the number of linguists in certain high priority 
languages increasing by 200 percent or more.
    We have integrated management of the FBI's Foreign Language Program 
(FLP) into the Directorate of Intelligence. This integration fully 
aligns F13I foreign language and intelligence management activities and 
delivers a cross-cutting platform for future improvements across all 
program areas, including translation quality controls.
    We also established the Language Services Translation Center 
(LSTC), a command and control structure at FBI Headquarters to ensure 
that our finite translator resource base of over 1,300 translators, 
distributed across 52 field offices, is strategically aligned with 
priorities set by our operational divisions on a national level.
    We have built a secure network that allows us to efficiently route 
FISA audio collection to any FBI field office. This technology allows 
us to more effectively utilize our national translator base.
    We now possess sufficient translation capability to promptly 
address all of our highest priority counterterrorism intelligence, 
often within 12 hours. Of the several hundred thousand hours of audio 
materials and several million pages of text collected in connection 
with counterterrorism investigations over the last 2 years, a nominal 
level of backlog exists only because of obscure languages or dialects.
    We have instituted a national translation quality assurance 
program. Countervailing operational pressures, however, limit our 
ability to fully comply with instituted translation review procedures 
in those languages for which demand continues to outpace supply. In 
those languages for which we have already achieved excess translation 
capacity, e.g., Farsi, Pashto, and Vietnamese, 100 percent quality 
assurance compliance is expected by April 2005.
    Translation backlogs continue to exist within our 
counterintelligence program. To target these deficiencies, we have 
implemented a highly successful workforce planning model which links 
field-wide workload measurements, trend analysis, and geo-political 
indicators to our recruitment and applicant processing efforts.
    In 2005, we plan to strengthen the integration of the entire 
intelligence cycle (requirements management; planning and direction; 
collection; processing and exploitation of collected information; 
analysis and production; and dissemination) into field office 
operations.
    We will incorporate the recently developed new critical element 
entitled, ``Intelligence,'' into the performance plans of all Special 
Agents and Supervisory Special Agents; this new element emphasizes 
participation in intelligence cycle functions, in particular human 
source development and contributions to intelligence production.
    We will also establish ``fly teams'' of Agents with intelligence 
experience, Intelligence Analysts, Language Specialists, and 
Surveillance Specialists to travel to five field offices and provide 
hands-on guidance and training for the full integration of the 
intelligence cycle within the office.

Partnerships
    Our ability to coordinate and communicate with other members of the 
Intelligence Community has never been better. Our face-to-face 
interaction with the National Counterterrorism Center and members of 
the CIA and DHS has positively impacted our ability to come together on 
a common problem and the results of the cooperation are evident. Case 
in point--during the election threat, analysts were able to meet daily 
to discuss assessments and develop theories that were fundamental to 
understanding the threat, and from those meetings, online forums were 
created to facilitate continued sharing of ideas and new intelligence 
finds--all from the desktop.
    The FBI's Information Sharing Policy Group, chaired by the FBI's 
EAD--Intelligence, brings together the FBI entities that generate and 
disseminate law enforcement information and intelligence to implement 
the FBI's goal of sharing as much as possible consistent with security 
and privacy protections.
    Within the Intelligence Community, the FBI has a two-level 
approach:
    1. For those agencies that operate at the Top Secret-SCI level, we 
are investing in secure facilities for an FBI network (SCI On-Line, or 
SCION) that is linked to the DoD-based JWICS network used by CIA, NSA, 
and other national agencies.
    2. For those agencies that operate at the Secret level, we have 
connected the FBI's internal electronic communications system to the 
DoD-based SIPRNET network that serves. As a result, all FBI Agents or 
analysts who need to communicate at the Secret-level with other 
agencies can do so from their desktop.
    Within the law enforcement community, the FBI's National 
Information Sharing Strategy (HISS) is part of the DOJ Law Enforcement 
Information Sharing Program and builds upon the FBI Criminal Justice 
Information (CJIS) Services program.
    1. The Law Enforcement National Data Exchange (N-DEx) will provide 
a nationwide capability to exchange data derived from incident and 
event reports. Data from incident and arrest reports--name, address, 
and non-specific crime characteristics--will be entered into a central 
repository to be queried against by future data submissions. The 
national scale of N-DEx will enable rapid coordination among all strata 
of law enforcement.
    2. The Law Enforcement Regional Data Exchange (R-DEx) will enable 
the FBI to join participating Federal, state, tribal, and local law 
enforcement agencies in regional fulltext information sharing systems 
under standard technical procedures and policy agreements.
    3. The FBI makes national intelligence more readily available to 
state, tribal, and local law enforcement agencies through the Law 
Enforcement Online (LEO) network.
    4. The Terrorist Screening Center (TSC) also leverages the CJIS 
backbone to provide realtime actionable intelligence to State and local 
law enforcement.

Information Technology
    Recognizing that the ability to assemble, analyze and disseminate 
information both internally and with other intelligence and law 
enforcement agencies is essential to our success in the war on 
terrorism, the FBI has made modernization of its information technology 
(IT) a priority.
    Under the centralized leadership of the Chief Information Officer 
(CIO), the FBI is now taking a coordinated, strategic approach to IT. 
We have a Strategic IT Plan, a baseline Enterprise Architecture, and a 
system for managing IT projects at each stage of their ``life cycle'' 
from planning and investment, through development and deployment, 
operation and maintenance, and disposal. This involves regular 
technical reviews to see if milestones are met.
    The first two phases of the Trilogy IT modernization program have 
been completed. The FBI is now modernized with:
    1. Deployment of a high-speed, secure network that enables 
personnel in FBI offices around the country to share data, including 
audio, video and image files.
    2. More than 30,000 new desktop computers with modern software 
applications 3,700 printers, 1600 scanners, 465 servers and 1400 
routers.
    3. An IT infrastructure that provides for secure communication with 
our Intelligence Community partners.
    The third phase of Trilogy, which includes the Virtual Case File 
(VCF) has not yet been completed. Plans for VCF have changed both in 
response to identified technical problems and because the FBI's 
refocused mission created requirements that did not exist when VCF was 
originally envisioned, such as requirements related to information 
sharing. Last June, after we determined that the product delivered did 
not meet our needs, we decided to move forward with a two-track action 
plan for VCF.
    1. In accordance with this plan, we asked a new contractor to 
examine the latest working version of the VCF as well as available off-
the-shelf software applications and those designed for other agencies, 
to determine the best combination to meet the FBI's needs. In many 
ways, the pace of technological innovation has overtaken our original 
vision for VCF, and there are now existing products to suit our 
purposes that did not exist when Trilogy began.
    2. As we move forward, we will apply all that we have learned and 
leverage what we have already developed, including a critical interface 
to our existing data systems that will be a key component of our final 
solution.
    Separate from the Trilogy Program, we have successfully developed 
and deployed a number of new investigative and information sharing 
capabilities.
    The Investigative Data Warehouse (IDW) offers Agents and analysts 
alike the technology to perform link analysis, while also providing 
enhanced search and analytical tools. IDW provides FBI users with a 
single access point to more than 47 sources of counterterrorism data, 
including information from FBI files, other government agency data, and 
open source news feeds, that were previously available only through 
separate, stove-piped systems. Most of these users are with the 
Directorate of Intelligence, Counterterrorism or Counterintelligence 
Divisions. These users provide search and analysis services using the 
IDW for personnel throughout the Bureau.
    The FBI Automated Messaging System (FAMS) began operations in 
December and now provides more than 300 users with the capability to 
send and receive critical organizational message traffic to any of the 
40,000+ addresses on the Defense Messaging System (DMS). The FBI is the 
first civilian agency to operate a classified DMS.
    The FBI Intelligence Information Reports Dissemination System 
(FIDS) is a web-based software application that allows all FBI 
personnel with access to the FBI's Intranet to create and disseminate 
standardized Intelligence Information Reports (IIRs) quickly and 
efficiently. FIDS allows the Directorate of Intelligence to automate 
and standardize IIR creation and dissemination functions.

                               CONCLUSION

    Looking forward, we expect certain trends to continue. Our 
adversaries will keep evolving, national security and criminal threats 
will further converge, and old jurisdictional boundaries will become 
less and less relevant. If we are to address these trends successfully, 
we must be willing and able to evolve ourselves. The FBI must continue 
to build our intelligence capabilities, including a strong intelligence 
workforce. We must continue hiring and training personnel with 
technical expertise and foreign language skills. We must continue to 
seek new ways to share information and collaborate with partners in the 
Intelligence and Law Enforcement Communities. Above all, we must be 
agile, and encourage creativity, innovation, and strategic thinking. If 
we do all of these things, I am confident that we will out-network, 
out-think, and ultimately defeat our adversaries.
    Mr. Chairman, I thank you again for this opportunity. I look 
forward to working with this Committee as we continue our efforts to 
address threats to the U.S. I would be happy to take any questions you 
might have.

    Chairman Roberts. Mr. Mueller, we thank you for your 
statement as well and thank you for the job you're doing, in a 
very difficult challenge in changing the mission of the FBI and 
still keeping the mission in regards to crime and in regards to 
law enforcement.
    I would say to all Members that Ms. Rodley and Admiral 
Jacoby are here to answer questions. And so, Admiral Loy will 
give the last prepared statement.
    And I neglected to tell all of you that each and every word 
of your testimony will be in the record and preserved for all 
time. And so, feel free to summarize your statements.
    I apologize. That's not an admonition, that's just a 
statement.
    Admiral Loy. And I'm not trying to pick on you.

STATEMENT OF ADMIRAL JAMES LOY, U.S. COAST GUARD, RET., DEPUTY 
           SECRETARY, DEPARTMENT OF HOMELAND SECURITY

    Admiral Loy. Thank you, Mr. Chairman. Good morning, 
Chairman Roberts and Vice Chairman Rockefeller and 
distinguished Members of the Committee. I'm pleased to have the 
chance to appear before you today to discuss the threats 
against the U.S. homeland, as well as some of the capabilities 
we've developed and must continue to develop to confront these 
threats.
    That important link between the intelligence we process and 
the systems we develop in response cannot be understated. For 
every possible action we uncover, there must be an 
intentionally focused reaction designed to secure our homeland 
against that threat.
    In so many areas of greatest concern, vulnerabilities we've 
identified, such as our transportation systems, particularly 
air travel, our border functions and our critical 
infrastructure, such as ports and energy facilities, we've made 
very real, measurable progress that has made our Nation more 
secure.
    The topic of our hearing is very straightforward. What is 
the nature of the worldwide threat? And from the DHS 
perspective, I would make simply five, basic points.
    First, the threat is unclear and complex, but enduring. The 
condition is not expected to change. We continue to note 
attempted entry into the U.S. by aliens who, according to 
intelligence, pose a threat to our homeland.
    Second, we assess that al-Qa'ida continues to be the 
primary transnational threat group, although we are seeing the 
emergence of other threatening groups and gangs, like MS-13, 
that will also be destabilizing influences.
    Third, we think we are most likely to be attacked with a 
vehicle-borne improvised explosive device, because that's the 
weapon of choice around the world. However, it remains very 
clear that our primary adversaries continue to seek weapons of 
mass effects with which they intend to strike us if they 
acquire them.
    Fourth, at DHS we continue to make progress in acquiring 
analysts and improving our capabilities, just 2 years into our 
existence. However, we have not yet fully achieved the 
capability in people, facilities and technical capability we 
think is necessary to protect our homeland. We can, and we are 
doing the job, through extraordinary effort on the part of our 
intelligence professionals and through the collegial efforts of 
all of those at this table and many other agencies in the 
Federal sector.
    And last, the intelligence community interaction with DHS 
has markedly improved over this past year and we continue to 
work toward full integration and interoperability. The 
aftermath of the Intelligence Reform Act is being treated as an 
opportunity to complete that work, to earn the respect of our 
colleagues as a full and deserving player in the intelligence 
community, and to allow that respect to serve as the foundation 
DHS needs to fulfill its responsibilities to secure our 
homeland.
    Thankfully, we have not experienced another attack on our 
soil since September 11, 2001. But the rest of the world has 
not been so fortunate. If you ask the residents of Madrid or 
Beslan or Bali or Jakarta or many others, they will assure you 
that not only the threat, but also the harsh daily reality of 
terrorism is alive and well around the world.
    We realize that an attack here could come in any form at 
any place on any timetable. Terrorist groups--even ones whose 
capabilities may have been weakened by arrests and 
interdictions worldwide--are patient, strategic and methodical 
in their operational planning. At home, we must prepare 
ourselves for any attack, from IEDs to weapons of mass 
destruction, from soft targets like malls to national icons.
    Intelligence suggests that al-Qa'ida may have specific 
tendencies or certain intentions, both small- and large-scale. 
And our efforts must stay directed to this full range of 
threats. We must assume that they are assembling, or 
reassembling, the capabilities they don't currently have or 
those that have been taken from them. So our plan of action, 
like theirs, must be even more deliberate and even more 
enduring, and it is.
    We have built new tools to help in each of the five 
strategic areas of operational emphasis in our department. Our 
charter runs from maximum domain awareness, if you will, 
through prevention and protection efforts to response and 
recovery planning. We have published an all-hazards, all-
threats National Response Plan and its sister document, the 
National Incident Management System.
    We have dramatically improved our technical ability to 
share information. Tools such as the Homeland Security 
Operations Center, the Homeland Security Information Network 
and the Homeland Security Advisory System are steps toward full 
capacity and capability. We know the end state we want to reach 
and we are methodically designing the path to get there.
    We have greatly improved systems to keep track of persons 
who cross the border and we have begun to apply technology to 
monitor the border where there is no human presence. We're 
operating the US-VISIT Program to verify the identity of 
travelers and stop criminals and terrorists before they can 
enter our society.
    We have signed Smart Border accords with our neighbors to 
the north and south, Canada and Mexico, to help the highly 
trained customs officers, border agents, Coast Guardsmen and 
many others who monitor and patrol our Nation's nearly 7,500 
miles of land border and 95,000 miles of coastline and 
waterways.
    We now require unprecedented scrutiny of high-risk 
travelers and flights landing in or flying over the United 
States, including requiring volumetric information on visas and 
passports and agreeing to share passenger data with our 
European allies. These are important strides to keep the doors 
of our country open to legitimate visitors, but firmly shut to 
terrorists.
    We know that al-Qa'ida would like to impact our economy 
with attacks on our financial systems, our cyber networks and 
the vital elements of our global supply chain. So we've taken 
measures to secure cargo and protect the infrastructure that 
supports the free and safe movement of goods and people and 
money around the world.
    We launched the Container Security Initiative to target and 
screen high-risk cargo before it reaches our shores. And today 
we operate that program alongside our allies in 34 ports around 
the world in 22 different countries with a growth posture 
scheduled for 2005 and on into 2006. We are in the process of 
finalizing, with the input from private sector stakeholders as 
well as many others, a national cargo security strategy.
    We included a special section on cyber security in the 
newly released National Response Plan to enhance governmentwide 
collaboration and coordination to prevent an attack on the 
backbone of our electronic economy.
    And most important, we've been careful to consider the 
economic impacts and the privacy implications of any additional 
security efforts, and worked to ensure that added protections 
do not detract from our competitiveness or from our way of 
life.
    In ways large and small, seen and unseen, with advanced 
technologies and additional vigilance, with the help of 
countless agencies and allies at every level of government, in 
the private sector and throughout the world, we have made it 
harder for terrorists to attack our country, more difficult for 
them to defeat our systems and reduce large gaps they once saw 
in our security posture.
    As the President has said, we are safer than ever before, 
but we are still not safe enough. This experiment called DHS is 
astonishingly complex and some dimensions of the challenge are 
further along than others. That's the nature of culture and 
transformational change. I'm proud to hand over a 2-year-old 
department with a solid foundation and a solid sense of 
direction to our incoming leadership team.
    I'm deeply appreciative of the support, constructive 
criticism and the resources that have come our way over the 
past 2 years from the Congress. This Committee's continued 
focus and review must remain our Nation's conscience until we 
get this work accomplished.
    Last night, I spoke to a group of 400 young people--high 
school people--in a program geared to encouraging public 
service. I promised them that we would do all we could to 
lighten their burden when it's their turn on watch. And we can 
only meet that promise when our national intelligence 
capability is sound, inclusive, whole. Anything short of that 
is simply unsatisfactory.
    Thank you, Mr. Chairman. I'll happily answer your 
questions.
    [The prepared statement of Admiral Loy follows:]

      Prepared Statement of Admiral James Loy, Deputy Secretary, 
                  U.S. Department of Homeland Security

    Good morning Chairman Roberts, Vice Chairman Rockefeller, and 
distinguished Members of the Committee. I am privileged to appear 
before you today to discuss the primary threats currently facing the 
United States homeland, as well as their probability, immediacy, and 
severity.
    Most current threats to the homeland continue to be directed by al-
Qaida and its affiliated elements within the broader Sunni extremist 
movement. Despite the successes the United States and our coalition 
partners have had against al-Qaida and other extremists, al-Qaida 
leaders and operational planners continue to think about--if not 
actively plot--the next dramatic attack in the United States. We 
believe that attacking the homeland remains at the top of al-Qaida's 
operational priority list, despite the fact that more than 3 years have 
passed since September 11, 2001. We judge that al-Qaida continues to 
view the homeland as an attractive target for a variety reasons, and 
that the next dramatic attack will attempt to replicate the 9/11 
``model'' of multiple attacks against geographically distant and 
symbolic targets that cause unprecedented economic damage, mass 
casualties, and physical destruction. While al-Qaida and its affiliated 
elements currently appear more capable of attacking United States 
interests outside of the homeland, we believe that their intent remains 
strong for attempting another major operation here.
    While there are other transnational terrorist groups that possess 
noteworthy capabilities to conduct attacks against United States 
interests, we currently do not believe these groups are ready for or 
oriented toward conducting attacks inside the homeland. However, there 
is a legitimate threat posed by groups and persons who are present in 
the country today (not necessarily connected to transnational terrorist 
groups), including multi-national gangs and domestic groups that engage 
in violence to achieve political and economic goals. These groups range 
from single-issue groups such as the Earth Liberation Front to violent 
criminal gangs like MS-13 to right-wing or neo-Nazi groups to ``lone-
wolf' threats. Additionally, the threat from criminal groups and 
persons who engage in criminal enterprise that supports or contributes 
to terrorism and which has homeland security implications remains of 
concern. Examples of such activity include narcotics trafficking, money 
laundering, people smuggling, contraband smuggling, illegal arms 
transfers, illegal technology transfers, currency counterfeiting, 
document forgery, and false identity provision. However, none of these 
threats currently rises to the level of threat posed by al-Qaida and 
its affiliates.
    While there is no single ``crystal ball'' that allows intelligence 
analysts to perfectly determine which terrorist threats are the most 
probable, we believe the al-Qaida and affiliated extremist threat 
remains the most likely in the near term. The strategic intent of al-
Qaida's remaining leaders and planners to attempt another dramatic 
homeland attack is clear. What is less clear are al-Qaida's current 
operational capabilities to execute such an attack. Though al-Qaida's 
current capabilities for dramatic attacks inside the United States 
might seem reduced, we also assess, based on past activity, that a1-
Qaida is patient, deliberate, and methodical in operational planning 
for major attacks. Al-Qaida operates on a very long timeline.
    Thus, the probability of an attack in the United States is assessed 
to be high, but very much conditional and circumstantial. We believe 
that while several attacks may have been considered inside the U.S. 
since 9/11, and some moved forward beyond initial planning, none of 
these plots was ever successfully executed due to the attackers' 
operational limitations and the heightened intelligence and security 
measures employed since that time.
    The cyber risk from various types of malicious actors is more 
significant than previously understood, and could be used to increase 
the impact of a physical attack by disrupting emergency communications.
    The National Intelligence Council released last year its first 
National Intelligence Estimate (NIE) for worldwide cyber security since 
9/11, and the DHS/National Cyber Security Division's law enforcement 
and intelligence branch participated in that assessment. It assessed 
the cyber threat, and the result showed a significant capability and 
threat from various actors.
    Adding to our concern over the possibility of the next al-Qaida 
attack is the potential threat of individuals inspired by al-Qaida and 
its affiliates who are not in any way directly connected to the al-
Qaida core. In early 2004, several individuals in the United Kingdom 
attempted to conduct attacks there, but none of these individuals was 
considered an active al-Qaida member. This and other examples of 
similar activity in Europe demonstrate how individuals or small groups, 
who previously had provided only financial or logistical support to 
Islamic extremist activities, themselves attempted to transition into 
active operational roles.
    The key locales that we currently judge as being at risk for attack 
by al-Qaida and affiliated terrorist organizations include key person 
and large group assemblages, major events as judged by the Department 
of Homeland Security (DHS) and the United States Intelligence 
Community, ports, depots, stations, and related infrastructure, and 
stadiums, auditoriums, and large buildings. Additionally, critical 
infrastructure of primary importance includes nuclear, chemical, 
biological, and other hazardous material facilities, bridges, tunnels, 
dams, and power generation/transfer stations, energy facilities 
including petroleum refining and related industries, and iconic cities 
and facilities, large buildings, and complex high-density 
infrastructure.
    The possible means of attacking such national interests are far 
ranging. We know from operational activity around the world that al-
Qaida can execute mass-casualty attacks using improvised explosive 
devices (IEDs) combined with suicide operatives. The capture of 
operatives overseas this past summer led to the identification of 
detailed casing reports prepared prior to 9/11. The specific tactics 
recommended in these reports highlights al-Qaida's ongoing interest and 
preference for using vehicle-borne improvised explosive devices 
(VBIEDs) to attack high-profile or symbolic targets.
    Al-Qaida has demonstrated operational proficiency in using aircraft 
as weapons, in particular hijacking operations, and has explored the 
idea of bringing down aircraft in flight through the use of several 
different IED configurations. Al-Qaida has also demonstrated a 
capability to use man-portable air-defense systems (MANPADs) in 
operations against aircraft overseas, although there are no indications 
that it plans to use this capability for attacks inside the United 
States. .
    Al-Qaida and its affiliated groups have demonstrated an operational 
capability to conduct dramatic, mass-casualty attacks against both hard 
and soft targets inside the United States and abroad. Within this broad 
operational spectrum, the most severe threats revolve around al-Qaida 
and its affiliates' long-standing intent to develop, procure, or 
acquire chemical, biological, radiological, and even nuclear, weapons 
for mass-casualty attacks. Al-Qaida and affiliated elements currently 
have the capability to produce small amounts of crude biological toxins 
and toxic chemical materials, and may have acquired small amounts of 
radioactive materials. However, we currently assess that al-Qaida has 
not been able to acquire or develop a functioning nuclear weapon (i.e., 
one that generates a nuclear yield).
    Despite al-Qaida's intent to strike us with Weapons of Mass Effect 
(WME), we assess that the United States is a ``harder target'' for the 
terrorist and for the illegal migrant than it was in the past because 
of improvements in information sharing and security measures since 9/
11. There remain, of course, difficulties in securing the over 95,000 
miles of coastline and 7,000 miles of border shared with Canada and 
Mexico. Indeed, the efforts of DHS have been successful, and the 
determination of the 180,000 plus Department personnel working around 
the country and around the world day in and day out is strong and 
completely dedicated to securing our homeland.
    There is much evidence to convince us that interdiction measures 
have improved; intelligence is working, technology has helped, and far 
fewer illegal immigrants are now able to enter our ports of entry or 
cross our borders than in the past. However, we still see persons using 
fraudulent documentation; many are already on our watch lists, 
attempting to enter the United States at the borders and at ports of 
entry. Thus, we assess that the threat of illegal and even covert entry 
is still present and likely will be for the foreseeable future.
    On land, we now have greatly improved systems to keep track of 
persons who cross the border and we have begun to apply technology to 
monitor the border where there is no direct border patrol presence. We 
also believe that fraudulent documentation is far more likely to be 
discovered than in the past--owing in part to improved technology, 
better training, more comprehensive data bases, the increased use of 
biometrics, and better coordination among agencies.
    However, entrenched human smuggling networks and corruption in 
areas beyond our borders can be exploited by terrorist organizations. 
Recent information from ongoing investigations, detentions, and 
emerging threat streams strongly suggests that al-Qaida has considered 
using the Southwest Border to infiltrate the United States. Several al-
Qaida leaders believe operatives can pay their way into the country 
through Mexico and also believe illegal entry is more advantageous than 
legal entry for operational security reasons. However, there is 
currently no conclusive evidence that indicates al-Qaida operatives 
have made successful penetrations into the United States via this 
method.
    In addition to the problems posed by the southwestern border, the 
long United States-Canada border, often rugged and remote, includes a 
variety of terrain and waterways, some suitable for illicit border 
crossings. A host of unofficial border crossings can be utilized when 
employing the services of alien smugglers, especially those winding 
through mountain ranges and across the vast western prairie.
    In addition to the threats posed at the extensive United States 
land border, we believe al-Qaida remains focused on targeting civil 
aviation. Since the creation of the Department in March 2003, DHS has 
led Federal Government effort to harden and protect the aviation 
infrastructure. The barriers and checks put in place since 9/11 at 
airports and the system of baggage and cargo checks for air transported 
materials have proven very effective in identification and interdiction 
of unauthorized items and in the identification of persons engaged in 
air travel. However, al-Qaida operatives have received flight training, 
and we believe al-Qaida continues to consider new and novel methods for 
planning and conducting attacks against civil aviation in the United 
States. Al-Qaida still views the hijacking of commercial passenger 
aircraft inside the United States as a primary objective.
    Other aviation threats include the possible use of ultra-light 
aircraft or remotely piloted vehicles (RPVs), although we have no 
specific or credible information suggesting that terrorists have 
considered these platforms for attacks in the Homeland. Additionally, 
while al-Qaida has considered conducting an attack against United 
States interests overseas using helicopters packed with explosives, 
there is no specific or credible evidence supporting the use of 
helicopters in aerial attacks within the United States. There have been 
recent media reports about lasers being visible to pilots in commercial 
aircraft in the United States. Although no specific or credible 
information suggests terrorists plan to use high-powered lasers in the 
United States, groups overseas have expressed interest in using these 
devices against human sight.
    At sea, we see positive changes and advances in the control system 
similar to those made in land border crossing and aviation. These 
advancements include improving vessel registration documentation and 
identification capabilities and better search technologies and 
procedures. While the complex problem with sea-transported cargo and 
the checking especially of containers and container vessels remains, 
significant improvements have been made since 9/11.
    Al-Qaida remains the preeminent organization with both intent and 
capabilities to targets United States maritime assets. A variation of 
the familiar VBIED, the small, explosiveladen boat usually piloted by a 
suicide operative, remains al-Qaida's weapon of choice in the maritime 
environment. In addition to threats posed by terrorist attack, the 
smuggling of illegal migrants via maritime means continues to be a 
major concern for homeland security. This threat is expected to grow as 
organized criminal groups continue to expand their operations 
throughout the world. The huge profit potential in this trade will 
ensure that it will remain a lucrative venture for the foreseeable 
future. The inability of Central American nations to control their 
borders is also an important factor favoring the smugglers.
    Additionally, a small but increasing threat to homeland security is 
represented by stowaways on merchant vessels and by crewmen jumping 
ship. Most of these individuals are economic migrants and account for a 
small fraction of illegal migration. However, their illegal activity 
highlights persistent border security vulnerabilities that may be 
exploited by contraband smugglers and terrorist organizations, as well 
as concerns for merchant vessel and crew safety. When acting alone, 
stowaways take advantage of poor security in foreign ports to simply 
walk on board vessels and attempt to stay hidden for the duration of 
the voyage. However, many stowaway incidents are part of criminally 
organized attempts to traffic people and require the complicity of 
merchant ship crewmembers. The threat posed by merchant seamen 
illegally entering the United States includes deserters who depart the 
ship legally, but do not return and absconders who illegally depart the 
ship once in port. The use of these methods by criminals or terrorists 
to enter the United States is probable.
    The bottom line is that the best efforts of the DHS, of the United 
States Intelligence Community, and of the entire Federal Government are 
allied against terrorist efforts to stage attacks in the homeland. 
However, despite these efforts and innumerable advances in information 
sharing, technology, communication, and organization, any attack of any 
kind could occur at any time. While we have not seen a trend by any 
terrorist group to tie an act of terrorism to a particular date or 
time, or even place, beyond the obvious goal of striking a locale or 
transportation mode when a larger number of people might be present, we 
do not believe we can predict timing unless we are somehow inside the 
decisionmaking mechanism used by the terrorists.
    An attack against the homeland with the most severe ramifications 
would include the use of a WME, especially nuclear. We also give due 
respect to the potential for some forms of biological attack to 
generate high casualty numbers. Beyond that, most attacks would be 
locally severe and would have larger implications psychologically, 
culturally, and economically even if their immediate destructive impact 
was very limited. While we have not seen such methods employed in the 
homeland to date, we do worry about the possibility of small attacks--
the grenade into the outdoor restaurant, the small bomb in the public 
place, the random shooting on the street--that would ostensibly be 
carried out to influence U.S. authorities to react strongly in the 
context of preventing such acts from occurring.
    There is a risk of cyber or combined physical-cyber attacks from 
various malicious actors, though it is difficult to quantify that risk. 
However, the Intelligence Community believes there is sufficient risk, 
and while there is no known information that anyone is preparing a 
significant cyber attack, there appears to be circumstantial evidence 
that terrorists are using a variety of illegal Internet behaviors to 
finance their activities.
    Given the anecdotal and imprecise nature of information in this 
regard, it is important to focus on the whole risk picture, including 
threat, vulnerabilities, and potential consequences. Accordingly, the 
government is enhancing its interagency coordination through the 
National Cyber Response Coordination Group (NCRCG) formalized by the 
Cyber Annex to the National Response Plan to prepare for and respond to 
national level cyber attacks from any sources and in the Interagency 
Security Plan (ISP) to reduce our vulnerability to attacks that might 
cause a major Internet disruption.
    Which is the largest of the potential threats to the homeland? 
Which is the most severe? Which is the most probable? These are 
questions that cannot realistically be answered beyond the information 
provided here. We are hesitant to make an attempt to answer these 
questions beyond stating that, conditionally and circumstantially, any 
event and any terrorist action is worthy of, and will continue to 
receive, our full attention and interest.
    Chairman Roberts, Senator Rockefeller, and Members of the 
Committee, this concludes my prepared statement. I would be happy to 
answer any questions you may have at this time.

    Chairman Roberts. Well, we thank you, Admiral, for a very 
comprehensive statement.
    I would tell the witnesses that we're having a closed 
hearing on the threat of nuclear terrorism as of tomorrow. It's 
my personal belief that if al-Qa'ida could obtain a nuclear 
weapon or any material and could get it into the U.S., that 
they would use it. The question is not whether al-Qa'ida would 
use a nuclear weapon, but can they get one?
    Pakistani scientist A.Q. Khan passed secrets and equipment 
to a host of rogue nations. The Pakistani government has 
cooperated in our efforts to stop this activity and Mr. Khan is 
under house arrest in Pakistan.
    This is for Director Goss, Admiral Loy. What is your 
assessment of the current status of the Khan network? Does the 
fact that he is in custody mean the network is shut down? Are 
there any other non-state actors that are potential Khans?
    And especially for Admiral Loy, what is the Department of 
Homeland Security's assessment of that threat? You have touched 
on it in your statement. And more particularly, if you could be 
very succinct, what steps has your department taken to prevent 
or to mitigate a terrorist attack utilizing any nuclear weapon?
    Director Goss.
    Director Goss. Mr. Chairman, thank you.
    Actually, it's timely that you ask that question, because 
we are further exploring our opportunities to learn about Mr. 
Khan and what he has done. I am unable to give you the details 
of that. They would be suitable for a closed hearing. But I can 
assure you that, virtually as we speak, efforts--active, 
appropriate direct efforts--are underway on that matter.
    We have found, from a variety of sources, following the 
leads of what we've known already, that we've uncovered many 
new things. And we have found that in uncovering those things 
we have not got to the end of the trail. Getting to the end of 
that trail is extremely important for us.
    It is a serious proliferation question. I'm pleased you're 
having a closed hearing. I'd be very happy to make available 
those experts in our business who can contribute to your wisdom 
in a closed session.
    Chairman Roberts. What about the non-state actors that are 
potential Khans?
    Director Goss. The potential Khans are a very nervous worry 
for us, obviously. If there were a way--and that's the big 
question, how would they go about getting it--would we know and 
could we stop it?
    In some cases, the regimes we have are good enough to 
understand most of the issue and most of the stocks and where 
things are supposed to be and how they're supposed to work. But 
most isn't good enough. You need 100 percent to get to the 
guarantee that you want.
    So, the answer for non-state actors being able to get these 
kinds of materials, either nuclear, chem or bio, is a reality.
    Chairman Roberts. Admiral Loy, your assessment of the 
nuclear terrorism threat? You touched on it in your statement.
    Admiral Loy. Briefly, sir, certainly there are three or 
four that we would categorize as those concerns that keep us 
awake nights the most. They certainly would include nuclear, 
chemical, bio and cyber. With respect directly to nuclear, 
Director Goss has the inside track. I would offer--to offering 
the most insight to the worldwide nature, with respect to 
proliferation--our concerns at DHS go more directly to the 
ability to detect those materials as they might be coming in 
our direction.
    In the President's budget for 2006, there is an initiative 
that we're referring to as the National Nuclear Detection 
Office, to be established inside the Department of Homeland 
Security--not a DHS initiative, but literally a national 
initiative--wherein the offices and the good capabilities of 
DoD and DOJ and DOE and all others with equities in the issue 
can be pooled, such that we can make some kind of an effort 
that does two things--one, optimizes the deployment of current 
capability in the areas of detection and, second, fences a 
significant amount of money--almost a mini-Manhattan Project, 
if you will--to offer us a chance to break through toward next-
generation capability of detection.
    Those are the efforts that we have underway, Mr. Chairman. 
And, again, if there is a closed hearing, we'd be happy to 
participate.
    Chairman Roberts. I'm going to change the subject. In the 
last few years we've had the Joint Inquiry, the 9/11 
Commission, this Committee's review in regards to WMD in Iraq--
all of which highlighted the failure to share intelligence 
information across the intelligence community.
    For every intelligence failure, you hear another 
recommendation for more information sharing. That's the 
buzzword. For too many times, when we hear about a consensus 
threat, we find out there's not a consensus. I believe, 
however, that information sharing is a rather limited idea that 
falsely implies that the intelligence collectors own the 
information that they collect.
    The Vice Chairman and I also think that information sharing 
means that the collectors push information to the analysts they 
believe have a need to know.
    I think we need to change our thinking on this issue. It's 
time to be working toward a more powerful concept. We call it 
information access. No one agency of the U.S. Government owns 
intelligence information and any cleared analyst with a need to 
know should be able to access it.
    While sensitive information must still be managed--I know 
that--cleared analysts should be able to pull that information 
by searching all intelligence databases without having to wait 
for any one agency to push the information to them, as we do it 
today.
    What do you think--and I'm addressing, basically, Director 
Goss here--about this idea of information access, as well as 
Director Mueller. Do we need to take the classification 
authority away from the collection agencies and put it in the 
hands of an authority, i.e., the DNI, who is neither a 
collector or an analyst, who can more honestly balance the need 
to know with the need to protect the sources and methods?
    Director Goss. Thank you, Mr. Chairman.
    The sources and methods question I am clear on. We do need 
to protect our sources and methods. The degree that some of our 
sources and methods are revealed in the media from time to 
time, through leaks and other matters, does not necessarily 
mean we shouldn't continue to protect them. Just because it's 
reported in the paper doesn't mean we're going to confirm it. 
Sometimes we are able to still get further utility out of 
sources and methods, even though they have been discussed, 
because not everybody may read that particular paper.
    But it is harmful to us, in our efforts to broaden the 
product in the community, that not everybody is playing by 
exactly the same rules. We find that different people treat 
classifications different ways and have different reactions to 
it. So I do believe you would be right in focusing some 
attention on the classification and declassification process. 
It is clearly an area that needs attention, something we've 
talked about in the past. And it is still somewhat of a 
neglected stepchild.
    In the area of getting the information to who needs to 
know, that's exactly on target. The trick is, who needs to 
know? It was always a question of sharing with who needs to 
know. The question of who makes that decision of who needs to 
know has always been the problem.
    We find that the audience of who needs to know is, in fact, 
larger as we bring our community and its many, many elements 
together that are being asked to do things--more things--not 
only overseas, but particularly now at home.
    Our domestic agencies--as Admiral Loy has just testified, 
and as Director Mueller has testified--clearly are doing things 
in the war on terrorism that require sharing of information. 
Well, the foreign intelligence program, which is where the 
intelligence program has always operated, is doing new business 
with domestic agencies to deal with terrorism in a domestic 
way, because, as you know, the foreign intelligence program is 
prohibited from spying on Americans.
    So, getting that piece just right has been part of the 
effort, as we have gone along since 9/11. And I am pleased to 
report we are doing exceedingly well, in my view, on that. And 
I would hope that my colleagues would agree. There's still room 
to go, but I believe we are sharing much better. I certainly 
agree analysts should be driving collection and not the other 
way around.
    Chairman Roberts. I ask for the patience of my colleagues. 
My time is up, but I would like for Director Mueller to address 
this, and also Admiral Jacoby.
    If you can be short and succinct, sir.
    Director Mueller. I certainly agree with the premise that 
those responsible for acting should have access to the 
information in whatever database it resides, in whatever 
agency.
    I think TTIC, the Terrorist Threat Integration Center, and 
the National Counterterrorism Center, when it comes to 
terrorism information, has taken us well along that way to give 
us access to the information, regardless of in which database 
it resides. Co-location, as we've co-located out in Tyson, has 
helped immeasurably to break down some of those barriers.
    So, I agree with the premise. I also agree with, I think, 
the second premise. And that is the importance of the analysts 
having access to at least information relating to the 
motivations of underlying sources, the access that the 
underlying source may have to the information. Having more 
clarity as to what moves the person to provide the information, 
to whether it be the FBI, CIA or elsewhere. And that, I think, 
is something we have to work on.
    Last, in terms of moving the authority from the agency to 
the DNI, I do think the agency, at the outset, needs the 
authority to protect its sources and methods, but it should be 
reviewed by the DNI. I don't think that moving it up to the DNI 
would work all that well. But I do believe that the DNI ought 
to review how we classify, how we describe our sources and 
methods.
    Chairman Roberts. Admiral Jacoby.

         STATEMENT OF VICE ADMIRAL LOWELL JACOBY, USN, 
             DIRECTOR, DEFENSE INTELLIGENCE AGENCY

    Admiral Jacoby. Sir, your ownership of information 
statement is just right on the mark, sir. I think that's a 
desperately important area for this Committee and for our 
community to continue to work hard on.
    Part of it that comes along with the need to know is, the 
way we do business today, the collector decides who needs to 
know in many cases. We need to swap that and have the analysts 
who are charged with discovering information and generating 
knowledge be the driver in the process.
    The other part that's desperately important to this is 
putting in place the Smart Network that is talked about so 
concisely in the 9/11 Commission report, because applying 
modern commercial information management kinds of tools will 
help us to separate the content from neglected information 
while still protecting the sourcing of the information. That's 
a desperately important part of this whole discussion and needs 
to be pursued very aggressively.
    [The prepared statement of Admiral Jacoby follows:]

         Prepared Statement of Vice Admiral Lowell E. Jacoby, 
            U.S. Navy Director, Defense Intelligence Agency

    Good morning Mr. Chairman, Mr. Vice Chairman and Members of the 
Committee. It is my honor and privilege to represent Defense 
Intelligence and present what we know and believe to be the principal 
threats and issues in today's world. The dedicated men and women of 
Defense Intelligence work around the clock and around the world to 
protect our country. Many of these active duty, reserve and civilian 
intelligence professionals are working in remote and dangerous 
conditions. Our mission is simple, but rarely easy. It is to discover 
information and create knowledge to provide warning, identify 
opportunities and deliver overwhelming advantage to our warfighters, 
defense planners and national security policymakers.
    This is the third time I report to you that Defense Intelligence is 
engaged in a war on a global scale. Most of the forces and issues 
involved in this war were addressed in my testimony last year. Several 
increased in severity or changed in composition. Few, unfortunately, 
decreased.
    The traditional Defense Intelligence focus on military capabilities 
is insufficient to identify and gauge the breadth of these threats. We 
are working hard to access ``all'' information to better understand and 
counter these threats. Defense Intelligence is engaged with foreign and 
domestic counterparts to better integrate our capabilities. We remained 
focused on information sharing and creating the ``smart networks'' 
described in the 9/11 Commission report. I am anxious to work with the 
new Director of National Intelligence, my fellow intelligence agency 
heads and others to forge a more cohesive and comprehensive 
Intelligence Community.

                        GLOBAL WAR ON TERRORISM

    We continue to face a variety of threats from terrorist 
organizations.
    Al-Qaida and Sunni Extremist Groups. The primary threat for the 
foreseeable future is a network of Islamic extremists hostile to the 
United States and our interests. The network is transnational and has a 
broad range of capabilities, to include mass-casualty attacks. The most 
dangerous and immediate threat is Sunni Islamic terrorists that form 
the ``al-Qaida associated movement.''
    Usama bin Ladin and his senior leadership no longer exercise 
centralized control and direction. We now face an ``al-Qaida associated 
movement'' of like-minded groups who interact, share resources and work 
to achieve shared goals. Some of the groups comprising this movement 
include Jemaah Islamiyya, responsible for the 9 September bombing of 
the Australian Embassy in Jakarta and Hezb-e-Islami-Gulbuddin. Some of 
the groups in the movement provide safe haven and logistical support to 
al-Qaida members, others operate directly with al-Qaida and still 
others fight with al-Qaida in the Afghanistan/Pakistan region.
    Remnants of the senior leadership still present a threat. As is 
clear in their public statements, Bin Ladin and al-Zawahiri remain 
focused on their strategic objectives, including another major 
casualty-producing attack against the Homeland.
    CBRN Terrorism. We judge terrorist groups, particularly al-Qaida, 
remain interested in Chemical, Biological, Radiological and Nuclear 
(CBRN) weapons. Al Qaida's stated intention to conduct an attack 
exceeding the destruction of 9/11 raises the possibility that planned 
attacks may involve unconventional weapons. There is little doubt it 
has contemplated using radiological or nuclear material. The question 
is whether al-Qaida has the capability. Because they are easier to 
employ, we believe terrorists are more likely to use biological agents 
such as ricin or botulinum toxin or toxic industrial chemicals to cause 
casualties and attack the psyche of the targeted populations.
    Pressures in the Islamic World. Various factors coalesce to 
sustain, and even magnify the terrorist threat.
    Islam is the world's second largest religion with over 1 billion 
adherents, representing 22 percent of the world's population. Due to 
high birth rates, it is also the world's fastest growing religion. Only 
twenty percent of Muslims are ethnic Arabs. The top four nations in 
terms of Muslim population, Indonesia, Pakistan, Bangladesh and India, 
are non-Arab. While the vast majority of Muslims do not advocate 
violence, there are deeply felt sentiments that cross Muslims sects and 
ethnic and racial groups.
    Our policies in the Middle East fuel Islamic resentment. Multiple 
polls show favorable ratings for the United States in the Muslim world 
at all-time lows. A large majority of Jordanians oppose the War on 
Terrorism, and believe Iraqis will be ``worse off' in the long term. In 
Pakistan, a majority of the population holds a ``favorable'' view of 
Usama bin Ladin. Across the Middle East, surveys report suspicion over 
U.S. motivation for the War on Terrorism. Overwhelming majorities in 
Morocco, Jordan, and Saudi Arabia believe the U.S. has a negative 
policy toward the Arab world.
    Usama bin Ladin has relied on Muslim resentment toward U.S. 
policies in his call for a defensive jihad to oppose an American 
assault on the Islamic faith and culture. He contends that all faithful 
Muslims are obliged to fight, or support the jihad financially if not 
physically capable of fighting. Another goal is the overthrow of 
``apostate'' Muslim governments, defined as governments which do not 
promote Islamic values or support or are friendly to the U.S. and other 
Western countries. The goals also call for withdrawal of U.S. and other 
Coalition forces from Muslim countries, the destruction of Israel and 
restoration of a Palestinian State and recreation of the caliphate, a 
State based on Islamic fundamental tenets.
    Underlying the rise of extremism are political and socio-economic 
conditions that leave many, mostly young male adults, alienated. There 
is a demographic explosion or youth bubble in many Muslim countries. 
The portion of the population under age 15 is 40 percent in Iraq, 49 
percent in the Gaza Strip and 38 percent in Saudi Arabia. Unemployment 
rates in these countries are as high as 30 percent in Saudi Arabia and 
about 50 percent in the Gaza Strip.
    Educational systems in many nations contribute to the appeal of 
Islamic extremism. Some schools, particularly the private ``madrasas,'' 
actively promote Islamic extremism. School textbooks in several Middle 
East states reflect a narrow interpretation of the Koran and contain 
anti-Western and anti-Israeli views. Many schools concentrate on 
Islamic studies focused on? memorization and recitation of the Koran 
and fail to prepare students for jobs in the global economy.
    Groups like al-Qaida capitalize on the economic and political 
disenfranchisement to attract new recruits. Even historically local 
conflicts involving Muslim minorities or fundamentalist groups such as 
those in Indonesia, the Philippines and Thailand are generating new 
support for al-Qaida and present new al-Qaida-like threats.
    Saudi-Arabia. Al Saud rule is under significant pressure. In 2004, 
15 significant attacks occurred against the regime, U.S. and other 
Western targets in the Kingdom, an increase from 7 in 2003. Attacks in 
2004 included the 6 December 2004 attack on the U.S. Consulate in 
Jeddah.
    Attacks since May 2003 against housing compounds, an Interior 
Ministry facility, a petroleum facility and individual assassinations 
caused Riyadh to attempt to aggressively counter the threat. We expect 
continued assassinations, infrastructure attacks and operations 
directed at Westerners in the Kingdom to discredit the regime and 
discourage individuals and businesses, especially those affiliated with 
the Saudi military, from remaining in the Kingdom.
    Last year Saudi security forces killed or captured many of their 26 
most wanted militant extremists and discovered numerous arms caches. 
However, we believe there may be hundreds, if not thousands of 
extremists and extremist sympathizers in the Kingdom.
    Pakistan. President Musharraf continues to be a key ally in the War 
on Terrorism and provides critical support against Al-Qaida and Taliban 
operating in Pakistan. The economy has displayed strong growth over the 
past 2 years. Indigenous and international terrorist groups have 
pledged to assassinate Musharraf and other senior Pakistan government 
officials and remain a significant threat. Unless Musharraf is 
assassinated, Pakistan will remain stable through the year; however, 
further political and economic reform is needed to continue positive 
trends beyond that time.
    Pakistan significantly increased its military operations and 
pacification efforts in tribal areas along the Afghanistan border in 
2004. These operations affected al-Qaida, Taliban, and other threat 
groups by disrupting safe-havens and, in some cases, forcing them back 
into Afghanistan where they are vulnerable to Coalition operations. 
Pakistan also secured agreements with several tribes by successfully 
balancing military action with negotiations and rewards to encourage 
cooperation and limit domestic backlash. Pakistan must maintain and 
expand these operations in order to permanently disrupt insurgent and 
terrorist activity.
    We believe international and indigenous terrorist groups continue 
to pose a high threat to senior Pakistani government officials, 
military officers and U.S. interests. The Prime Minister and a corps 
commander have been the targets of assassination attempts since last 
summer. President Musharraf remains at high risk of assassination, 
although no known attempts on his life have occurred since December 
2003. Investigations into the two December 2003 attempts revealed 
complicity among junior officers and enlisted personnel in the 
Pakistani Army and Air Force.
    Our assessment remains unchanged from last year. If Musharraf were 
assassinated or otherwise replaced, Pakistan's new leader would be less 
pro-US. We are concerned that extremist Islamic politicians would gain 
greater influence.

                            CONFLICT IN IRAQ

    The insurgency in Iraq has grown in size and complexity over the 
past year. Attacks numbered approximately 25 per day 1 year ago. Today, 
they average in the 60s. Insurgents have demonstrated their ability to 
increase attacks around key events such as the Iraqi Interim Government 
(IIG) transfer of power, Ramadan and the recent election. Attacks on 
Iraq's election day reached approximately 300, double the previous 1 
day high of approximately 150 reached during last year's Ramadan.
    The pattern of attacks remains the same as last year. Approximately 
80 percent of all attacks occur in Sunni-dominated central Iraq. The 
Kurdish north and Shia south remain relatively calm. Coalition Forces 
continue to be the primary targets. Iraqi Security Forces and Iraqi 
Interim Government (IIG) officials are attacked to intimidate the Iraqi 
people and undermine control and legitimacy. Attacks against foreign 
nationals are intended to intimidate non-government organizations and 
contractors and inhibit reconstruction and economic recovery. Attacks 
against the country's infrastructure, especially electricity and the 
oil industry, are intended to stall economic recovery, increase popular 
discontent and further undermine support for the IIG and Coalition.
    Recent polls show confidence in the Iraqi Interim Government 
remains high in Shia and Kurdish communities and low in Sunni areas. 
Large majorities across all groups opposed attacks on Iraqi Security 
Forces and Iraqi and foreign civilians. Majorities of all groups placed 
great importance in the election. Sunni concern over election security 
likely explains the relatively poor showing by the Sunni electorate in 
comparison with the Shia and Kurdish groups. Confidence in Coalition 
Forces is low. Most Iraqis see them as occupiers and a major cause of 
the insurgency.
    We believe Sunni Arabs, dominated by Ba'athist and Former Regime 
Elements (FRE), comprise the core of the insurgency. Ba'athist/FRE and 
Sunni Arab networks are likely collaborating, providing funds and 
guidance across family, tribal, religious and peer group lines. Some 
coordination between Sunni and Shia groups is also likely.
    Militant Shia elements, including those associated with Muqtada al 
Sadr, have periodically fought the Coalition. Following the latest 
round of fighting last August and September, we judge Sadr's forces are 
re-arming, re-organizing and training. Sadr is keeping his options open 
to either participate in the political process or employ his forces. 
Shia militants will remain a significant threat to the political 
process and fractures within the Shia community are a concern.
    Jihadists, such as al-Qaida operative Abu Musab al Zarqawi, are 
responsible for many high-profile attacks. While Jihadist activity 
accounts for only a fraction of the overall violence, the strategic and 
symbolic nature of their attacks, combined with effective Information 
Operations, has a disproportionate impact.
    Foreign fighters are a small component of the insurgency and 
comprise a very small percentage of all detainees. Syrian, Saudi, 
Egyptian, Jordanian and Iranian nationals make up the majority of 
foreign fighters. Fighters, arms and other supplies continue to enter 
Iraq from virtually all of its neighbors despite increased border 
security.
    Insurgent groups will continue to use violence to attempt to 
protect Sunni Arab interests and regain dominance. Subversion and 
infiltration of emerging government institutions, security and 
intelligence services will be a major problem for the new government. 
Jihadists will continue to attack in Iraq in pursuit of their long-term 
goals. Challenges to reconstruction, economic development and 
employment will continue. Keys to success remain improving security 
with an Iraqi lead, rebuilding the civil infrastructure and economy and 
creating a political process that all major ethnic and sectarian groups 
see as legitimate.

                        CONFLICT IN AFGHANISTAN

    The people of Afghanistan achieved a major milestone by electing 
Hamid Karzai president in October 2004 election. Approximately 70 
percent or just over 8 million registered Afghans disregarded scattered 
attacks by the Taliban and al-Qaida and voted. Karzai garnered 55 
percent of the vote in a field of 18 candidates. The election dealt a 
blow to insurgents and provides new momentum for reform, such as the 
demobilization of private militias and increased government 
accountability.
    President Karzai has since assembled a cabinet of reform minded and 
competent ministers who are ethnically and politically diverse. Most 
significantly, he removed Afghanistan's most powerful warlord, Marshal 
Fahim Khan, as Defense Minister.
    Despite the overwhelming voter turn-out, the election's results 
highlighted ethnic divisions. Karzai received a majority of the Pashtun 
vote, but failed to do so within any of the other ethnic groups. 
Continued ethnic divisions remain a challenge to political stability. 
National Assembly elections, scheduled for later this year, will 
provide the opportunity for non-Pashtuns to increase their 
participation in the government.
    The security situation improved over the past year. Insurgent 
attacks precipitously dropped after Afghanistan's presidential 
election. The primary targets remain Coalition Forces and facilities in 
the southern and eastern provinces. Voter registration teams and 
polling sites were attacked in these areas, reflecting the Taliban's 
concern over legitimate elections. Similar attacks in the same 
geographic areas are expected for elections later this year, but are 
unlikely to have a significant impact.
    We believe many Taliban leaders and fighters were demoralized by 
their inability to derail the election and have seen their base of 
support among Pashtun tribes decrease. Loss of support, plus continued 
Coalition and Pakistani military operations, have prompted some to 
express an interest in abandoning the insurgency and pursuing political 
alternatives. Nevertheless some factions will likely remain committed 
to the insurgency and seek funding to continue operations.

         WEAPONS OF MASS DESTRUCTION AND MISSILE PROLIFERATION

    Nuclear Weapons. Immediately behind terrorism, nuclear 
proliferation remains the most significant threats to our Nation and 
international stability. We anticipate increases in the nuclear weapons 
inventories of a variety of countries to include China, India, Pakistan 
and North Korea.
    Iran is likely continuing nuclear weapon-related endeavors in an 
effort to become the dominant regional power and deter what it 
perceives as the potential for U.S. or Israeli attacks. We judge Iran 
is devoting significant resources to its weapons of mass destruction 
and ballistic missile programs. Unless constrained by a nuclear non-
proliferation agreement, Tehran probably will have the ability to 
produce nuclear weapons early in the next decade.
    With declining or stagnant conventional military capabilities, we 
believe North Korea considers nuclear weapons critical to deterring the 
U.S. and ROK. After expelling IAEA personnel in 2002, North Korea 
reactivated facilities at Yongbyon and claims it extracted and 
weaponized plutonium from the 8,000 spent fuel rods. Only last week, 
Pyongyang publicly claimed it had manufactured nuclear weapons. Kim 
Chong-il may eventually agree to negotiate away parts of his nuclear 
weapon stockpile and program and agree to some type of inspection 
regime, but we judge Kim is not likely to surrender all of his nuclear 
weapon capabilities. We do not know under what conditions North Korea 
would sell nuclear weapons or technology.
    India and Pakistan continue to expand and modernize their nuclear 
weapon stockpiles. We remain concerned over the potential for 
extremists to gain control of Pakistani nuclear weapons. Both nations 
may develop boosted nuclear weapons, with increased yield.
    Chemical and Biological Weapons. Chemical and biological weapons 
pose a significant threat to our deployed forces, international 
interests and homeland. Numerous states have chemical and biological 
warfare programs. Some have produced and weaponized agents. While we 
have no intelligence suggesting these states are planning to transfer 
weapons to terrorist groups, we remain concerned and alert to the 
possibility.
    We anticipate the threat posed by biological and chemical agents 
will become more diverse and sophisticated over the next 10 years. 
Major advances in the biological sciences and information technology 
will enable BW agent--both anti-human and anti-agricultural--
development. The proliferation of dual use technology compounds the 
problem. Many states will remain focused on ``traditional'' BW or CW 
agent programs. Others are likely to develop non-traditional chemical 
agents or use advanced biotechnology to create agents that are more 
difficult to detect, easier to produce, and resistant to medical 
countermeasures.
    Ballistic Missiles. Moscow likely views its strategic forces, 
especially its nuclear armed missiles, as a symbol of great power 
status and a key deterrent. Nevertheless, Russia's ballistic missile 
force will continue to decline in numbers. Russia is fielding the silo-
variant of the SS-27 Intercontinental Ballistic Missile (ICBM) and is 
developing a road-mobile variant and may be developing another new ICBM 
and new Submarine Launched Ballistic Missile (SLBM). It recently 
developed and is marketing anew Short Range Ballistic Missile (SRBM). 
Russia also is trying to preserve and extend the lives of Soviet-era 
missile systems.
    China is modernizing and expanding its ballistic missile forces to 
improve their survivability and war-fighting capabilities, enhance 
their coercion and deterrence value and overcome ballistic missile 
defense systems. This effort is commensurate with its growing power and 
more assertive policies, especially with respect to Taiwan. It 
continues to develop three new solid-propellant strategic missile 
systems--the DF-31 and DF-31A road-mobile ICBMs and the JL-2 SLBM. By 
2015, the number of warheads capable of targeting the continental 
United States will increase several fold.
    China also is developing new SRBMs, Medium Range Ballistic Missile 
(MRBMs), and Intermediate Range Ballistic Missile (ICBMs). They are a 
key component of Beijing's military modernization program. Many of 
these systems will be fielded in military regions nearTaiwan. In 2004, 
it added numerous SRBMs to those already existing in brigades near 
Taiwan. In addition to key Taiwanese military and civilian facilities, 
Chinese missiles will be capable of targeting U.S. and allied military 
installations in the region to either deter outside intervention in a 
Taiwan crisis or attack those installations if deterrent efforts fail.
    We judge Iran will have the technical capability to develop an ICBM 
by 2015. It is not clear whether Iran has decided to field such a 
missile. Iran continues to field 1300-km range Shahab III MRBMs capable 
of reaching Tel Aviv. Iranian officials have publicly claimed they are 
developing a new 2000-km-range variant of the Shahab III. Iranian 
engineers are also likely working to improve the accuracy of the 
country's SRBMs.
    North Korea continues to invest in ballistic missiles to defend 
itself against attack, achieve diplomatic advantage and provide hard 
currency through foreign sales. Its Taepo Dong 2 intercontinental 
ballistic missile may be ready for testing. This missile could deliver 
a nuclear warhead to parts of the United States in a two stage variant 
and target all of North America with a three stage variant. North 
Korean also is developing new SRBM and IRBM missiles that will put U.S. 
and allied forces in the region at further risk.
    Pakistan and India continue to develop new ballistic missiles, 
reflecting tension between those two countries and New Delhi's desire 
to become a greater regional power. Pakistan flighttested its new 
solid-propellant MRBM for the first time in 2004. The Indian military 
is preparing to field several new or updated SRBMs and an MRBM. India 
is developing a new IRBM, the Agni III.
    Syria continues to improve its missile capabilities, which it 
likely considers essential compensation for conventional military 
weakness. Syria is fielding updated SRBMs to replace older and shorter-
range variants.
    Several nations are developing technologies to penetrate ballistic 
missile defenses.
    Cruise Missiles. Land-Attack Cruise Missiles (LACMs) and Lethal 
Unmanned Aerodynamic Vehicles (LUAVs) are expected to pose an increased 
threat to deployed U.S. and allied forces in various regions. These 
capabilities are already emerging in Asia.
    The numbers and capabilities of cruise missiles will increase, 
fueled by maturation of land-attack and Anti-Ship Cruise Missile (ASCM) 
programs in Europe, Russia, and China, sales of complete systems, and 
the spread of advanced dual-use technologies and materials. Countering 
today's ASCMs is a challenging problem and the difficulty in countering 
these systems will increase with the introduction of more advanced 
guidance and propulsion technologies. Several ASCMs will have a 
secondary land-attack role.
    China continues developing LACMs. We judge by 2015, it will have 
hundreds of highly accurate air- and ground-launched LACMs. China is 
developing and purchasing ASCMs capable of being launched from 
aircraft, surface ships, submarines, and land that will be more capable 
of penetrating shipboard defenses. These systems will present 
significant challenges in the event of a U.S. naval force response to a 
Taiwan crisis.
    In the next 10 years, we expect other countries to join Russia, 
China, and France as major exporters of cruise missiles. Iran and 
Pakistan, for instance, are expected to develop or import LACMs. India, 
in partnership with Russia, will begin production of the PJ-10, an 
advanced anti-ship and land attack cruise missile, this year.
    Major Exporters. Russia, China and North Korea continue to sell WMD 
and missile technologies for revenue and diplomatic influence. The 
Russian government, or entities within Russia, continues to support 
missile programs and civil nuclear projects in China, Iran, India and 
Syria. Some of the civil nuclear projects can have weapons 
applications. Chinese entities continue to supply key technologies to 
countries with WMD and missile programs, especially Pakistan, North 
Korea and Iran, although China appears to be living up to its 1997 
pledge to limit nuclear cooperation with Iran. North Korea remains the 
leading supplier of missiles and technologies. In recent years, some of 
the states developing WMD or ballistic missile capabilities have become 
producers and potential suppliers. Iran has supplied liquid-propellant 
missile technology to Syria, and has marketed its new solid-propellant 
SRBM.
    We also are watching non-government entities and individual 
entrepreneurs. The revelations regarding the A.Q. Khan nuclear 
proliferation network show how a complex international network of 
suppliers with the requisite expertise and access to the needed 
technology, middlemen and front companies can successfully circumvent 
international controls and support multiple nuclear weapons programs.

                          NATIONS OF INTEREST

    Iran. Iran is important to the U.S. because of its size, location, 
energy resources, military strength and antipathy to U.S. interests. It 
will continue support for terrorism, aid insurgents in Iraq and work to 
remove the U.S. from the Middle East. It will also continue its weapons 
of mass destruction and ballistic missile programs. Iran's drive to 
acquire nuclear weapons is a key test of international resolve and the 
nuclear non-proliferation treaty.
    Iran's long-term goal is to see the U.S. leave Iraq and the region. 
Another Iranian goal is a weakened, decentralized and Shia-dominated 
Iraq that is incapable of posing a threat to Iran. These goals and 
policies most likely are endorsed by senior regime figures.
    Tehran has the only military in the region that can threaten its 
neighbors and Gulf stability. Its expanding ballistic missile inventory 
presents a potential threat to states in the region. As new longer 
range MRBMs are fielded Iran will have missiles with ranges to reach 
many of our European allies. Although Iran maintains a sizable 
conventional force, it has made limited progress in modernizing its 
conventional capabilities. Air and air defense forces rely on out-of-
date US, Russian and Chinese equipment. Ground forces suffer from 
personnel and equipment shortages. Ground forces equipment is also 
poorly maintained.
    We judge Iran can briefly close the Strait of Hormuz, relying on a 
layered strategy using predominately naval, air, and some ground 
forces. Last year it purchased North Korean torpedo and missile-armed 
fast attack craft and midget submarines, making marginal improvements 
to this capability.
    The Iranian government is stable, exercising control through its 
security services. Few anti-government demonstrations occurred in 2004. 
President Khatami will leave office in June 2005 and his successor will 
almost certainly be more conservative. The political reform movement 
has lost its momentum. Pro-reform media outlets are being closed and 
leading reformists arrested.
    Syria. Longstanding Syrian policies of supporting terrorism, 
relying on WMD for strategic deterrence, and occupying Lebanon remain 
largely unchanged. Damascus is providing intelligence on al-Qaida for 
the War on Terrorism. Its response to U.S. concerns on Iraq has been 
mixed. Men, material and money continue to cross the Syrian-Iraqi 
border likely with help from corrupt or sympathetic local officials.
    Damascus likely sees opportunities and risks with an unstable Iraq. 
Syria sees the problems we face in Iraq as beneficial because our 
commitments in Iraq reduce the prospects for action against Syria. 
However, Damascus is probably concerned about potential spill-over of 
Iraqi problems, especially Sunni extremism, into Syria. We see little 
evidence of active regime support for the insurgency, but Syria offers 
safe-haven to Iraqi Baathists, some of whom have ties to insurgents.
    Syria continues to support Lebanese Hizballah and several 
rejectionist Palestinian groups, which Damascus argues are legitimate 
resistance groups.
    Syria is making minor improvements to its conventional forces. It 
is buying modern antitank guided missiles and overhauling some 
aircraft, but cannot afford major weapon systems acquisitions.
    President Bashar al-Asad is Syria's primary decisionmaker. Since 
becoming President in 2000 upon the death of his father, Asad has 
gradually replaced long-serving officials. Potential domestic 
opposition to his rule--such as the Muslim Brotherhood--is weak and 
disorganized. We judge the Syrian regime is currently stable, but 
internal or external crises could rapidly threaten it.
    China. We do not expect Communist Party Secretary and President Hu 
Jintao's succession to chairman of the Central Military Command (CMC) 
to significantly alter Beijing's strategic priorities or its approach 
to military modernization. The commanders of the People's Liberation 
Army (PLA) Air Force, Navy, and Second Artillery (Strategic Rocket 
Forces) joined the CMC in September, demonstrating an institutional 
change to make China's military more ``joint.'' The CMC traditionally 
was dominated by generals from PLA ground forces.
    China remains keenly interested in Coalition military operations in 
Afghanistan and Iraq and is using lessons from those operations to 
guide PLA modernization and strategy. We believe several years will be 
needed before these lessons are incorporated into the armed forces. We 
judge Beijing remains concerned over U.S. presence in Iraq, Afghanistan 
and Central Asia. Beijing may also think it has an opportunity to 
improve diplomatic and economic relations, to include access to energy 
resources, with other countries distrustful or resentful of U.S. 
policy.
    China continues to develop or import modern weapons. Their 
acquisition priorities appear unchanged from my testimony last year. 
Priorities include submarines, surface combatants, air defense, 
ballistic and anti-ship cruise missiles and modern fighters. China 
recently launched a new conventional submarine and acquired its first 
squadron of modern Su30/FLANKER aircraft for the naval air forces from 
Russia. The PLA must overcome significant integration challenges to 
turn these new, advanced and disparate weapon systems into improved 
capabilities. Beijing also faces technical and operational difficulties 
in numerous areas. The PLA continues with its plan to cut approximately 
200,000 soldiers from the Army to free resources for further 
modernization, an initiative it began in 2004.
    Beijing was likely heartened by President Chen Shui-bian 
coalition's failure to achieve a majority in the recent Legislative 
Yuan elections. We believe China has adopted a more activist strategy 
to deter Taiwan moves toward independence that will stress diplomatic 
and economic instruments over military pressure. We believe China's 
leaders prefer to avoid military coercion, at least through the 2008 
Olympics, but would initiate military action if it felt that course of 
action was necessary to prevent Taiwan independence.
    Beijing remains committed to improving its forces across from 
Taiwan. In 2004, it added numerous SRBMs to those already existing in 
brigades near Taiwan. It is improving its air, naval and ground 
capabilities necessary to coerce Taiwan unification with the mainland 
and deter U.S. intervention. Last fall, for instance, a Chinese nuclear 
submarine conducted a deployment that took it far into the western 
Pacific Ocean, including an incursion into Japanese waters.
    North Korea. After more than a decade of declining or stagnant 
economic growth, Pyongyang's military capability has significantly 
degraded. The North's declining capabilities are even more pronounced 
when viewed in light of the significant improvements over the same 
period of the ROK military and the US-ROK Combined Forces Command. 
Nevertheless, the North maintains a large conventional force of over 
one million soldiers, the majority of which we believe are deployed 
south of Pyongyang.
    North Korea continues to prioritize the military at the expense of 
its economy. We judge this ``Military First Policy'' has several 
purposes. It serves to deter US-ROK aggression. Nationwide conscription 
is a critical tool for the regime to socialize its citizens to maintain 
the Kim family in power. The large military allows Pyongyang to use 
threats and bravado in order to limit US-ROK policy options. 
Suggestions of sanctions, or military pressure by the U.S. or ROK are 
countered by the North with threats that such actions are ``an act of 
war'' or that it could ``turn Seoul into a sea of fire.'' Inertia, 
leadership perceptions that military power equals national power and 
the inability for the regime to change without threatening its 
leadership also explains the continuing large military commitment.
    The North Korean People's Army remains capable of attacking South 
Korea with artillery and missile forces with limited warning. Such a 
provocative act, absent an immediate threat, is highly unlikely, 
counter to Pyongyang's political and economic objectives and would 
prompt a South Korean-CFC response it could not effectively oppose.
    Intemally, the regime in Pyongyang appears stable. Tight control 
over the population is maintained by a uniquely thorough 
indoctrination, pervasive security services and Party organizations, 
and a loyal military.
    Russia. Despite an improving economy, Russia continues to face 
endemic challenges related to its post-Soviet military decline. Seeking 
to portray itself as a great power, Moscow has made some improvements 
to its armed forces, but has not addressed difficult domestic problems 
that will limit the scale and scope of military recovery.
    Russian conventional forces have improved from their mid-1990s low 
point. Moscow nonetheless faces challenges if it is to move beyond 
these limited improvements. Significant procurement has been postponed 
until after 2010 and the Kremlin is not spending enough to modernize 
Russia's defense industrial base. Russia also faces increasingly 
negative demographic trends and military quality of life issues that 
will create military manning problems.
    Moscow has been able to boost its defense spending in line with its 
recovering economy. Russia's Gross National Product averaged 6.7 
percent growth over the past 5 years, predominately from increased 
energy prices and consumer demand. Defense should continue to receive 
modest real increases in funding, unless Russia suffers an economic 
setback.
    Russia continues vigorous efforts to increase its sales of weapons 
and military technology. Russia's annual arms exports average several 
billion dollars. China and India account for the majority of Russia's 
sales, with both countries buying advanced conventional weapons, 
production licenses, weapon components and technical assistance to 
enhance their R&D programs. Efforts to increase its customer base last 
year resulted in increased sales to Southeast Asia. Russian sales are 
expected to remain several billion dollars annually for the next few 
years.
    Russia's struggle with the Chechen insurgency continues with no end 
in sight. Chechen terrorists seized a North Ossetian primary school 
where over 330 people were killed and two Russian civilian airliners 
were bombed in flight last summer. Rebels continue targeting Russians 
in Chechnya and Chechen officials cooperating with Moscow. While Moscow 
is employing more pro-Russian Chechen security forces against the 
insurgents, the war taxes Russian ground forces. Although the Chechnya 
situation remains a minor issue to the average Russian, concerns over 
spreading violence prompted new government security initiatives and 
offered cover for imposition of authoritarian political measures.
    Russian leaders continue to characterize Operation IRAQI FREEDOM 
and NATO enlargement as mistakes. They express concerns that U.S. 
operations in Iraq are creating instability and facilitating terrorism. 
Russian leaders want others to view the Chechen conflict as a struggle 
with international terrorism and accuse those who maintain contact with 
exiled Chechen leaders or criticize Moscow's policies toward Chechnya 
as pursuing a double standard. Russian officials are wary of potential 
U.S. and NATO force deployments near Russia or in the former Soviet 
states. Concern that Ukraine under a President Yushchenko would draw 
closer to NATO and the EU was a factor motivating Russia's involvement 
in Ukraine's presidential election.

                            CLOSING THOUGHTS

    This year my testimony focuses on what I believe to be the most 
immediate threats to our Nation and challenges to our interests. The 
threat from terrorism has not abated. While our strategic intelligence 
on terrorist groups is generally good, information on specific plots is 
vague, dated or sporadic. We can and must do better. Improved 
collection and analysis capabilities can make a significant difference. 
We are increasing our ability to provide that timely, relevant 
intelligence.
    The Intelligence Community as a whole needs to improve its 
collection and focus more analytic resources on pressures in the 
Islamic world so that we can better understand the drivers for 
extremism. We also need greater collection and more analytic resources 
devoted to certain key Islamic countries. We have taken steps to 
improve our collection and analysis, hiring more individuals with 
Arabic and Farsi language skills. Nevertheless, more needs to be done 
across the Intelligence Community, particularly in the area of 
meaningful, penetrating collection and making the content of that 
collection available to all who need it.
    Proliferation of Weapons of Mass Destruction and Missiles is my 
second priority. Collection must be improved. Additionally, improving 
our analytic techniques, adoption of true ``all-source'' analysis 
approaches and greater information sharing will help us avoid problems 
similar to those in our pre-war analysis of Iraq's WMD program.
    We also must not let our focus on numerous nations of interest 
wane. Traditional military intelligence disciplines must remain robust 
if we are to provide our national security policymakers, defense 
planners and warfighters the information they need to successfully 
execute their missions. We need improved collection so that we are 
stealing our true secrets. There are significant gaps in our 
understanding of several nations' leaderships' plans and intentions. 
Additionally, more collection and analysis is needed to provide 
adequate warning of attack and a more complete understanding of the 
military capability, doctrine and war plans of numerous countries. We 
are working to better target collection against these hard targets.
    As I mentioned, the threats and challenges I briefed today are the 
most significant and immediate. They are certainly not the only ones. 
In previous years, I have spoken about the security situation in 
Africa, Latin America and South and Southeast Asia. I also addressed my 
concerns on information operations, international crime, problems 
associated with globalization, uneven economic development and 
ungoverned states. Those issues remain significant concerns and the 
focus of collection and analytic resources for defense intelligence. We 
will be requesting additional funding and billets to ensure we retain 
coverage and reporting on global coverage. We are reallocating our 
analytic capabilities, implementing the ``Master, Measure and Monitor'' 
concept in the Defense Intelligence Analysis Program to better address 
many of these threats and disturbing trends.
    Let me conclude by making two points. First, DIA is focused on 
transforming its capabilities in all of its mission areas to operate in 
a true ``all-source'' environment. We are committed to incorporating 
all relevant information into our analyses, integrating analysts with 
collectors and precisely targeting our analytic and collection 
capabilities against complex threats and tough issues. More opportunity 
for ``discovery,'' greater penetration of hard targets and higher 
confidence in our judgments are our goals. Second, we are aggressively 
reengineering our information management approach and architecture. We 
are focused on harvesting non-traditional sources of data and 
positioning ourselves to exploit information from new and future 
sources. We are convinced commercial sector ``content management 
practices'' and data standards hold the key to upgrading our 
information management capability and providing the ``smart network'' 
we need. Much more work is required in the area if we are to realize 
our potential and fundamentally improve our capabilities. These efforts 
follow the Director of Central Intelligence and the Secretary of 
Defense guidance and reflect the letter and spirit of the intelligence 
reform act. Thank you. I look forward to your questions.

    Chairman Roberts. Admiral Loy and Ms. Rodley, I apologize 
for not asking for your response in the interest of time. But I 
would just say, from the INR aspect, I know the Vice Chairman 
and I and Members of this Committee want to thank you. You're 
one agency that got it right in regards to the WMD situation. 
And both of you have a very strong interest in this.
    Senator Rockefeller and I apologize to my colleagues.
    Vice Chairman Rockefeller. Thank you, Mr. Chairman.
    I just second what the Chairman has indicated. I refer to 
sharing and access. If you share, it's the decision to give. 
It's a decision on the part of the holder. If it's access, then 
it is the right of the receiver. So, sharing out/getting in. 
And I think that will be worked out over the years.
    Director Goss, the National Intelligence Council recently 
issued its annual report to Congress on the safety and the 
security of Russian nuclear facilities and military forces. The 
report is both classified and unclassified. One excerpt from 
the unclassified version is as follows:
    ``Russian officials have reported that terrorists have 
targeted Russian nuclear weapons storage sites. Security was 
tightened in 2001, after Russian authorities twice thwarted 
terrorist efforts to reconnoiter nuclear weapon storage sites.
    ``We find it''--this is a continuation of the report, 
unclassified--``we find it highly unlikely that Russian 
authorities would have been able to recover all the material 
reportedly stolen. We assess that undetected smuggling has 
occurred and we are concerned about the total amount of 
material that could be diverted or stolen in the last 13 
years.''
    Now, I'd ask you, sir, is the material missing from Russian 
nuclear facilities sufficient to construct a nuclear weapon?
    Director Goss. Senator, the way I would prefer to answer 
that question, is there is sufficient material unaccounted for, 
so that it would be possible for those with know-how to 
construct a nuclear weapon. I hope that's sufficiently clear.
    Vice Chairman Rockefeller. We'll wait for a closed session.
    On the same subject, the National Intelligence Council 
assessment, can you assure the American people--and I think 
this is a yes-or-no type thing--can you assure the American 
people that the material missing from Russian nuclear sites has 
not found its way into terrorist hands?
    Director Goss. No. I can't make that assurance. I can't 
account for some of the material, so I can't make the assurance 
about its whereabouts.
    Vice Chairman Rockefeller. Appreciate it, sir.
    Africa. Since the 1980s, a million people have died of 
starvation, enormous dislocation, poverty, hopelessness, 
despair, instability, a fertile breeding ground for terrorism, 
both east and west, a large Islamic population. Instability in 
the African continent has allowed us to intervene episodically 
back and forth.
    But the whole prospect of the concept that this is the next 
great threat, and that being something called a failed 
continent, General James Jones made that point to the Chairman 
and me three times in a presentation in London, when he was 
stationed there. He said, this is the continent that you in the 
intelligence world need to be looking at--a failed continent, 
because we are consumed by challenges in Iraq, necessarily, 
Afghanistan and other world hotspots.
    Again, Director Goss, are we facing the possibility, do you 
think, of the collapse of civil society throughout much of 
Africa? Shouldn't we be addressing the problems in these 
countries now, rather than at a future date when our options 
will be more likely to be military?
    Director Goss. Senator, thank you.
    As you know, I've made the statement many times that I 
don't want to get into the Department of State's policy areas, 
and the question you've asked me gets into actually a much 
bigger question than just the intelligence community. But it's 
a great question. And you are right on the mark, that this is 
an over-neglected area that is under-resourced for American 
interests, from my perspective.
    I can tell you that I have read Kaplan's piece about the 
resurgence of anarchy and I've read Friedman's pieces on this. 
We have have seen all kinds of very nasty people, Foday Sankoh, 
people like that in the past, who have taken advantage of 
exploitation of the processes there.
    We find that we are going backwards in some areas where we 
should be going forwards. You heard me mention in my remarks a 
whole series of bands, of arcs, as it were, of different kinds 
of problems in Africa. I think it is a rich seabed for people 
who have a mission on their mind to go and try and recruit 
people. We have found that. And we are making efforts there.
    And I would say we would be wise to solve problems sooner, 
before they get more troublesome later. I do think that that is 
an area that needs more attention in the intelligence community 
and all other efforts that we make.
    Vice Chairman Rockefeller. Thank you, sir.
    Admiral Jacoby, I can't imagine that you wouldn't have some 
comment.
    Admiral Jacoby. Senator Rockefeller, you know in past 
conversations we've talked about sort of the global spread of 
issues. Certainly, there's a fertile ground in the Muslim 
populations in Africa for recruitment to extremist causes. 
Disaffected youth, the youth bulge, socioeconomic situation, 
education shortfalls, unemployment and so forth make inviting 
recruiting targets. And obviously, as we look at the Madrid 
bombing and some of the things that have happened, particularly 
the North African crescent is an area of concern.
    Sir, we take the Africa situation seriously in the sense 
that we have plussed up our presence in our defense attache 
offices and will continue to do that with some new initiatives 
that go in place here in 2005 and 2006.
    We view Africa as place that needs to be monitored 
carefully. Trends need to be carefully described and assessed 
and that the intelligence assessments reach policymakers in 
that part of the world as a sense of urgency.
    Vice Chairman Rockefeller. I would follow through to both 
of you that I think we all know that we have an enormous 
scarcity of resources, of facilities, of capabilities, simply 
because of what's going on elsewhere. And I hear what you both 
say. And I hear the sense of urgency behind what you say.
    But I also would guess that there's some frustration on 
your part that we may not have the financial capability or the 
trained personnel capability to be able to get to those areas 
to get that intelligence. Those are difficult languages, and it 
takes, as Director Goss has often said, 5 years to train a good 
agent.
    Director Goss. I think you've said it well, Senator.
    Admiral Jacoby. I agree completely, sir. Absolutely.
    Vice Chairman Rockefeller. Thank you, Mr. Chairman.
    Chairman Roberts. Let me just say that, in reference to the 
Vice Chairman's concern about the situation in Russia in 
regards to loose nukes or loose bioweaponry or loose scientists 
or loose anything in terms of security, that we should give a 
lot of credit to the Armed Services Committee and its 
distinguished Chairman, who is sitting over here to my left and 
everybody's right--Senator Warner--for taking such a strong 
interest in the CTR program, the Nunn-Lugar program.
    And knowing something about that on the Emerging Threats 
Subcommittee, we learned right away the most important thing is 
to provide the security. We want to eliminate the stockpiles 
and we want to safeguard the scientists and make sure they're 
not, you know, going somewhere else. But we have made some 
progress, and we have put some conditions and some of our 
allies need to step up. And the Russians have stepped up. So 
I'm very hopeful we'll continue to see additional funding and 
really address that security issue.
    Senator Bond.
    Senator Bond. Thank you, Mr. Chairman.
    Director Mueller, you noted that the third concern was the 
recruitment of radical American converts. And this is something 
that I've become increasingly concerned about.
    I don't know if you've seen it, but recently, the Freedom 
House put out a report on Saudi publications on hate ideologies 
filling American mosques. And as you read through it, you see 
the hate-filled language that is officially sponsored by the 
cultural offices of the embassy of Saudi Arabia.
    And mosques supported by the king has admonitions: be 
dissociated from the infidels; hate them for their religion; 
leave them; never rely on them; do not admire them; and always 
oppose them in every way, according to Islamic law.
    The list of documents and the list of publications goes on. 
And it appears that the bargain with the devil they made about 
25 years ago, that the Saudi government would support Wahhabism 
if they stayed out of Saudi Arabia, is coming back to haunt us.
    I would ask the question, number one, how serious a threat 
that is? And I would ask you and Admiral Loy to respond to it.
    And also, it seems to me if our doctrine is that a country 
that harbors terrorists is guilty, what about a country that 
fosters terrorists within our own country?
    Director Mueller. Well, it certainly, as I think I 
indicated in my opening remarks, it is an issue--the 
radicalization of individuals within the United States. And it 
can be done any number of ways.
    We are looking, for instance, at the prison systems, not 
just the Federal system but, through our 100 joint terrorism 
task forces, working with State and local law enforcement to 
address the possibility that radicalization can occur 
throughout our prison system, as it has in the past in a 
variety of ways.
    Through our joint terrorism task forces, we also understand 
that persons absolutely have the right to practice religion in 
whichever way they want. But by the same token----
    Senator Bond. That's not the question, Mr. Director. It's 
what they are----
    Director Mueller. But I'm going to say, on the other hand, 
we have the obligation to determine and identify those persons 
who are becoming radicalized and become a threat to the United 
States.
    And through our working with State and local law 
enforcement, building up our intelligence capacity, working 
through our joint terrorism task forces, we continuously seek 
sources and information and intelligence as to those 
individuals who may become radicalized in a variety of ways.
    The last point I would make--and I think others would agree 
with me--is that there has been a shift in the attitude of 
Saudi Arabia in the wake of the May 2003 bombings--a 
substantial shift, and an understanding and a recognition of 
the threat not only to Saudi Arabia, but to Saudi Arabia's 
interests around the world from those elements who have been 
radicalized.
    Senator Bond. Thank you, Mr. Director. They noted that 
these documents were still, as of December 2004, were still in 
the King Fahd mosque. They're still being handed out.
    Admiral Loy, any thoughts about how, from the homeland 
security standpoint, how dangerous is Saudi Arabia's supplying 
of this literature?
    Admiral Loy. Indeed, Senator Bond, there are three or four 
points that I would make.
    Number one, regardless of the sponsorship, the notions that 
you are citing in the things that you read are dramatic 
evidence of the challenge in front of us here, whether it's 
pure Saudi from the implication of that particular set of 
materials, or what that line of logic is as a pervasive notion 
throughout not only Saudi Arabia, but the rest of the world.
    I sit on a couple of joint contact groups with allies--with 
the Brits, with Canada. And there has been over the last year a 
growth of an agenda item referring to radicalization as a 
significant issue that we have to grapple with.
    Senator Bond. Admiral Loy, if I may interrupt. I apologize; 
the light's on--I needed to ask Director Goss, Ms. Rodley and 
maybe Admiral Jacoby, I think that Southeast Asia is the second 
front of the war on terrorism.
    Director Goss mentioned that. I've recently come back from 
there. Jemaah Islamiyah, Moro Liberation Front, others, Abu 
Sayyaf, are posing significant dangers. Singapore, Malaysia and 
Indonesia have been aggressive.
    Number one, I'd like to know whether you think these have 
become a threat to the U.S. homeland and are our restrictions 
on U.S. aid--IMET aid--to Indonesian military hurting our 
ability to work cooperatively with that country?
    Mr. Goss.
    Director Goss. On the IMET question, there is no question 
that--I can't speak specific to the particulars there. Maybe 
Admiral Jacoby can.
    But I will tell you that, in fact, we do have liaison 
relationships in the war on terror, of course, on a global 
basis. And they are affected by other matters such as that that 
you have specifically mentioned.
    In this case I can't answer your direct question, but I can 
tell you there is a relationship, and it's important that we 
understand that.
    The second thing I would tell you is, I think you are right 
to focus on Southeast Asia. It is an escalating area. We find 
that the degree of capability to deal with the problem there is 
the sophistication of dealing with the problem of terrorism 
there by the governments, the states that are there, is not 
adequate. Consequently, I would say it is a growth industry, 
regrettably.
    Yes, it is a threat.
    Admiral Jacoby. Senator Bond, the key countries in the area 
are the ones that Director Goss identified--Indonesia, 
Philippines, Thailand. Two of those countries we've had very 
longstanding IMET and other interactions and it makes it far 
easier to work not only with their military forces, but also 
with their military intelligence, with my counterparts.
    The situation in Indonesia is quite different, where the 
senior officers in that country, particularly in, again, my 
case, the intelligence area, have not had those kinds of 
interactions with the U.S. military.
    It does create barriers for close interaction and 
interoperation. And Southeast Asia in general is an area that 
needs that kind of attention. And I'm going back to my days in 
the Pacific command as a J-2 to say authoritatively that more 
needs to be done there, sir.

          STATEMENT OF CAROL RODLEY, PRINCIPAL DEPUTY 
   ASSISTANT SECRETARY OF STATE FOR INTELLIGENCE AND RESEARCH

    Ms. Rodley. We really see it the same way as my colleagues 
have outlined. Indonesia as the main problem.
    Chairman Roberts. Speak right in the microphone.
    Ms. Rodley. Indonesia has the most serious problem with 
Jemaah Islamiyah and, to a lesser extent, the Philippines, 
Thailand and some of the other nations in the region.
    This is of particular concern because of Jemaah Islamiyah's 
affiliation with al-Qa'ida. So the question of targeting U.S. 
interests is one that we are very concerned about.
    [The prepared statement of Hon. Thomas Fingar, Assistant 
Secretary of State for Intelligence and Research follows:]

          Prepared Statement of the Honorable Thomas Fingar, 
       Assistant Secretary of State for Intelligence and Research

    Mister Chairman, Members of the Committee. It is an honor to be 
asked to participate in this important review of threats to our Nation 
and the challenges they present to the Intelligence Community. INR has 
taken to heart your admonition to describe the spectrum of threats to 
the United States and its interests, and to assess the probability, 
immediacy, and severity of the dangers we face, but I will do so in a 
way intended to complement the judgments presented by our colleagues in 
other agencies by focusing on the way threats appear when viewed 
through the lens of diplomacy.
    The subject of this hearing is one on which there is broad 
consensus in the Intelligence Community. INR concurs with the judgment 
that terrorism is the single greatest threat to Americans, both at home 
and abroad, and that the proliferation of weapons of mass destruction 
(WMD), missiles, and certain types of advanced conventional weapons is 
a close and dangerous second. We also share most of the other threat 
judgments presented by our colleagues. But rather than merely echoing 
their assessments, I will approach the subject reflecting INR's unique 
perspective and responsibilities as the Secretary of State's in-house 
intelligence unit.
    As Secretary Rice has made clear in recent statements, diplomacy is 
critical to U.S. efforts to contain, counter, and diminish the threats 
we face. On February 8 she told her audience in Paris, ``We agree on 
the interwoven threats we face today: terrorism, and proliferation of 
weapons of mass destruction, and regional conflicts, and failed states, 
and organized crime.'' She added that America stands ready to work with 
other countries in ``building an even stronger partnership'' to address 
these threats.
    To combat the twin scourges of terrorism and proliferation requires 
more than just the effective collection of hard to obtain intelligence. 
At a minimum, it also requires deep understanding of the motivations 
and objectives of those who resort to terrorism and/or pursue WMD. It 
also takes sophisticated analysis of all-source information, informed 
judgments about what we do not know, and detailed knowledge of other 
countries, cultures, political systems, and the underlying causes of 
discontent and radicalization. The prerequisites for meeting all these 
requirements include global coverage, deep analytical expertise, and 
Intelligence Community commitment to providing policymakers what they 
need, when they need it, and in a form that they can use day in and day 
out.
    Why are terrorism and proliferation at the top of the threat list? 
The short and conventional answer is that the normalization of 
relations with China and demise of the Soviet Union dramatically 
reduced the danger of nuclear war and eliminated or transformed 
fundamentally a wide array of associated threats. But the end of the 
cold war also brought many changes to other aspects of international 
life, including the erosion of constraints on ``client'' states, the 
re-emergence of long repressed political aspirations, and the rise of 
ethnic and religious hatreds. Former DCI Jim Woolsey described the 
change as the displacement of a few big dragons by lots of dangerous 
snakes. But it was, and is, more than that. Globalization and the 
information revolution have changed expectations and aspirations and 
made it possible for nations and non-state actors, including 
individuals, to do things that would have been unthinkable just a few 
years ago.
    One of the many resultant developments has been the emergence of 
vast differences in coercive capabilities. This, in turn, has 
exacerbated the dangers of both terrorism and proliferation. The 
inability of all but a few nations to deter the most powerful countries 
(including, but not limited to the United States) has reinforced the 
determination of states that feel threatened (whether justifiably or 
not) to seek asymmetric solutions to the disparity of power. For some, 
this means pursuit of WMD and delivery capabilities because they know 
they have no hope of deterring or defeating the attacks they fear with 
conventional armaments. Perhaps the clearest illustration of this can 
be found in DPRK public statements after Operation Iraqi Freedom 
intended to reassure its public and warn potential adversaries that, 
unlike Saddam, it had a (nuclear) deterrent; a claim reiterated 
February 10. Pakistan pursued-and obtained nuclear weapons and delivery 
systems to compensate for India's vastly superior conventional military 
power and nuclear weapons.
    Terrorism is at the other end of the spectrum of asymmetric 
responses. State sponsors, most notably Iran, seem implicitly to warn 
potential enemies that the response to any attack will include resort 
to terror. They seem to be saying, in effect, ``You may be able to 
defeat us militarily, but you cannot protect all your people, 
everywhere, all the time.'' Such a porcupine defense/deterrent posture 
is an unfortunate, but not irrational response to wide disparities of 
power. The situation is somewhat analogous for non-state actors 
frustrated by their inability to achieve their (however reprehensible) 
goals by other means. Terror and guerrilla warfare are long-standing 
measures of choice (or last resort) for weak actors confronting a much 
stronger adversary. The targets vary widely, from established 
democracies to authoritarian regimes. However, in some cases, 
terrorists also direct their attacks against those who are seen as 
responsible for-by imposition or support the actions or existence of 
the regime they oppose. That appears to be one of the reasons al-Qaida 
has targeted the United States in Saudi Arabia and terrorists in Iraq 
have used suicide bombers and improvised explosive devices to attack 
Iraqis and others supportive of the Iraqi government. The use of terror 
tactics in liberal democracies is especially problematic because in 
open societies, self-restraint under the rule of law and commitment to 
respect human rights and dignity complicate the challenges of mounting 
an effective response.
    Attacking a distant country is difficult, even in the era of 
globalization, and would-be assailants must choose between difficult, 
high profile attacks, like those on 9/11, and easier to accomplish, but 
probably lower impact incidents (like sniper attacks on random 
individuals or small explosions in crowded public places). We remain 
vulnerable to both types of terror attack, but arguably we are now less 
vulnerable to relatively largescale, high profile attacks than we were 
before 9/11. Nevertheless, it is extremely difficult to penetrate the 
tight knit groups that are most capable of carrying out such attacks on 
our country and our people. We have achieved great success in 
disrupting alQaida, but may be witnessing a repeat of the pattern found 
in the wars on illegal drugs and organized crime, namely, that we are 
fighting a ``hydra'' with robust capabilities of resurgence and 
replacement of lost operatives. The bottom line is that terrorism 
remains the most immediate, dangerous, and difficult security challenge 
facing our country and the international community and is likely to 
remain so for a long time. Despite the progress we have made, it would 
be imprudent to become complacent or to lower our guard.
    The quest for WMD, missiles (or unmanned aerial vehicles), and 
advanced conventional arms has become more attractive to, and more 
feasible for, a small but significant set of State and non-state 
actors. This poses major challenges to the security of the United 
States and our friends and allies, but it is important to put this 
threat in perspective.
    Nuclear Threats. The nuclear sword of Damocles that hung over our 
national existence during the cold war remains largely a concern from a 
different era. Russia and China still have nuclear weapons (the number 
is declining in Russia and increasing only modestly in China), but the 
hostility of the past is no longer a pressing concern and neither 
threatens to use them against our country. North Korea has produced 
sufficient fissile material to make a small number of nuclear weapons, 
but, despite its February 10 statement, there is no evidence that it 
has produced such weapons and mated them to a missile capable of 
delivering them to the United States. However, if it has made such 
weapons, it could reach U.S. allies, our armed forces, and large 
concentrations of American citizens in Northeast Asia. India and 
Pakistan have nuclear weapons and the capability to deliver them to 
targets in the region, but both nations are friends and neither 
threatens the territory of the United States. Iran seeks, but does not 
yet have nuclear weapons or missiles capable of reaching the United 
States. INR's net assessment of the threat to U.S. territory posed by 
nuclear weapons controlled by Nation states is that it is low and lacks 
immediacy. But this should not be grounds for complacency. The 
existence of such weapons and the means to deliver them constitutes a 
latent, but deadly threat. Ensuring that it remains latent is a key 
diplomatic priority.
    The so-far theoretical possibility of nuclear weapons falling into 
the hands of terrorists constitutes a very different type of threat. We 
have seen no persuasive evidence that al-Qaida has obtained fissile 
material or ever has had a serious and sustained program to do so. At 
worst, the group possesses small amounts of radiological material that 
could be used to fabricate a radiological dispersion device (``dirty 
bomb''). The only practical way for non-state actors to obtain 
sufficient fissile material for a nuclear weapon (as opposed to 
material for a so-called dirty bomb) would be to acquire it on the 
black market or to steal it from one of the current, want-to-be, or 
used-to-be nuclear weapons states. The ``loose nukes'' problem in the 
former Soviet Union continues to exist but is less acute than it once 
was, thanks to the Nunn-Lugar cooperative threat reduction program and 
diligent efforts by Russia to consolidate and protect stockpiles. North 
Korea's possession of weapons-grade fissile material adds a new layer 
of danger and uncertainty. There is no convincing evidence that the 
DPRK has ever sold, given, or even offered to transfer such material to 
any State or non-state actor, but we cannot assume that it would never 
do so.
    Chemical and Biological Weapons. Despite the diffusion of know-how 
and dual-use capabilities to an ever-increasing number of countries, 
the number of states with known or suspected CW programs remains both 
small and stable. Most of those that possess such weapons or have the 
capability to produce quantities sufficient to constitute a genuine 
threat to the United States or Americans (civilian and military) 
outside our borders are not hostile to us, appreciate the significance 
of our nuclear and conventional arsenals, and are unlikely to transfer 
such weapons or capabilities to terrorists. There are nations that 
might use CW against invading troops, even American forces, on their 
own territory, but we judge it highly unlikely that Nation states would 
use CW against the American homeland or specifically target American 
citizens except as an act of desperation. Terrorists, by contrast, have 
or could acquire the capability to produce small quantities of chemical 
agents for use against selected targets or random individuals. We judge 
the chances of their doing so as moderate to high. One or a few 
disgruntled individuals or a small terrorist cell could do so in a 
manner analogous to the 1995 Aurn Shinrikyo sarin gas attack on a Tokyo 
subway. The severity of such an attack would be small in terms of 
lethality, but the psychological and political impact would be huge.
    The risk posed by Nation states with biological weapons is similar 
to that for CW; many nations have the capability, but few have programs 
and even fewer would be tempted to use them against the United States. 
The danger of acquisition and use by terrorists, however, is far 
greater. Though hard to handle safely and even harder to deliver 
effectively, BW agents have the potential to overwhelm response 
capabilities in specific locations, induce widespread panic, and 
disrupt ordinary life for a protracted period, with resulting economic 
and social consequences o# uncertain magnitude.
    Conventional Attack. INR considers the danger of a conventional 
military attack on the United States or American military, diplomatic, 
or business facilities abroad to be very low for the simple reason that 
no State hostile to the United States has the military capability to 
attack the U.S. with any hope of avoiding massive retaliation and 
ultimate, probably rapid, annihilation. The only way to reach a 
different conclusion, it seems to us, is to posit an irrational actor 
model in which either all key decisionmakers in a hostile country are 
irrational or there are no systemic constraints on a totally irrational 
dictator. We judge that such conditions exist nowhere at present and 
hence that U.S. military might is, and will be, able to deter any such 
suicidal adventure for the foreseeable future. Here again, ensuring 
that this situation continues is a major goal of American diplomacy.
    A far more dangerous threat is the possibility, even the 
likelihood, that advanced conventional weapons will be obtained--and 
used--by terrorists. For example, the danger that groups or individuals 
antithetical to the United States will obtain MANPADs or advanced 
explosives is both high and immediate. The number of Americans likely 
to be killed or maimed in such an attack would be small in comparison 
with the casualties in a conventional war or nuclear attack, but would 
be unacceptably large no matter how small the number of casualties and 
could have a major economic and psychological impact. Attacks on 
American nationals, whether they are aimed at workers in an American 
city, American tourists abroad, U.S. diplomatic facilities, U.S. 
businesses at home or abroad, or U.S. military facilities at home or 
abroad, are possible and unacceptable. The fact that State Department 
personnel, family members, and facilities have been frequent targets of 
attack makes us acutely aware of this danger and determined to do 
everything possible to thwart it. This determination is magnified 
severalfold by the fact that it is an important part of the State 
Department's mission, and the Secretary of State's responsibility, to 
protect American citizens everywhere around the globe. We take this 
responsibility very seriously, and an important part of INR's support 
to diplomacy involves providing information and insights that 
contribute directly to the success of this mission.
    States of Concern. It has become something of a convention in 
threat testimony to list a number of countries that, for one reason or 
another, are judged to warrant special attention from the Intelligence 
Community. A few countries on this list engage in activities that 
directly or indirectly threaten American lives (e.g., North Korea's 
deployment of massive military power close enough to Seoul to put at 
risk our ally as well as American troops and tens of thousands of 
American civilians). Most countries on the list do not threaten the 
United States militarily, but are important to the success of policies 
to protect and promote other American interests.
    Rather than enumerate a long list of countries, I will simply 
provide a series of generic examples to illustrate the kinds of 
conditions and concerns germane to diplomatic efforts to protect and 
advance American interests. The State Department needs good 
intelligence on some countries primarily because their actions could 
lead to internal instability that could, in turn, threaten other 
American interests. Others belong on the list because they do not or 
cannot prevent the growth and export of narcotics, harbor or assist 
terrorist groups, have leaders who make anti-American pronouncements, 
or have conditions conducive to the rise of extremist movements. Still 
others illicitly traffic in persons, weapons, conflict diamonds, or 
other commodities; control critical energy resources; or have fragile 
political institutions, large and dynamic economies, or any of myriad 
other attributes.
    What states on this long and varied list have in common is the 
capacity to affect American interests and the efficacy of U.S. foreign, 
economic, and security policy. Most do not and will not ``threaten'' 
the United States in the way that we were once threatened by the Soviet 
Union and the Warsaw Pact, but something, or many things, about them 
pose challenges and/or opportunities for American diplomacy. The 
problems of failing states and the tremendous drain on resources in 
developing countries from AIDS and other pandemics, environmental 
stress, and corruption affect our ability to partner with allies and 
friends to meet humanitarian needs in the interest of promoting 
stability and democracy. This, in turn, poses challenges and 
requirements for the Intelligence Community that extend far beyond the 
collection and analysis of information germane to the suppression of 
terrorism and limiting the spread of WMD, delivery systems, and 
advanced conventional weapons. Meeting these challenges requires global 
coverage, deep expertise, extensive collaboration, and, above all, 
acceptance of the idea that the mission of the Intelligence Community 
demands and entails more than collecting and interpreting covertly 
acquired information on a relatively small number of narrowly defined 
threats. Focusing on known threats and concerns is necessary, but could 
prove to be very dangerous if we are not equally vigilant in trying to 
anticipate unknowns and surprises.
    Intelligence is, or should be, about more than addressing 
``threats.'' The Intelligence Community has been justifiably criticized 
for serious failings and shortcomings, but we should not lose sight of 
what we do well and must continue to do well. For example, America's 
unrivaled military preeminence, demonstrated so dramatically in our 
elimination of the Taliban regime in Afghanistan and the destruction of 
Saddam's regime in Iraq, is inextricably linked to the capabilities and 
accomplishments of our Intelligence Community. Intelligence collection, 
analytic tradecraft, insights gained through years of experience, and 
close ties among collectors, analysts, weapons designers, military 
planners, and troops on the ground are all and equally critical to the 
military successes we have achieved, the predominance we enjoy, and the 
fact that conventional military threats to our Nation and our citizens 
are low and almost certain to remain so for many years. Preserving this 
State of affairs will be neither automatic nor easy, but our efforts 
and the allocation of resources to do so must not foreclose equally 
committed efforts to address other threats and challenges.
    Terrorism and proliferation are at the top of every agency's list 
of threats, and the Intelligence Community is committing substantial 
effort and resources to provide the intelligence support required to 
contain and reduce those dangers. In part, this requires and involves 
penetration of highly restricted and suspicious organizations and 
secure systems of communication, including sophisticated measures to 
hide financial transactions, obscure relationships, and deceive human 
and technical collectors. But collection is only one of many essential 
factors in the equation. To place the intelligence we collect in 
context, to distinguish between what is true and useful and what is 
not, and to develop strategies to detect and disrupt activities 
inimical to American interests requires expert analysts and information 
on a very wide array of critical variables. Stated another way, it is 
not possible to identify, anticipate, understand, and disrupt 
terrorists and proliferatitios without broad and deep understanding of 
the countries, cultures, contexts, social networks, economic systems, 
and political arenas in which they spawn, develop, and operate. Without 
broad and deep expertise and information that goes far beyond what we 
can or should collect through clandestine means, we will not be able to 
judge accurately the information we collect, and will ultimately be 
reduced to reliance on lucky guesses and chance discoveries. That isn't 
good enough. We can and must do better.

    Senator Bond. Thank you. Thank you, Mr. Chairman. I 
apologize to my colleagues.
    Chairman Roberts. Senator Feinstein.
    Senator Feinstein. Thank you very much, Mr. Chairman.
    Let me begin by thanking each of you. I think those of you 
that particularly head large departments, it is a most 
difficult time to give your service. And I just want you to 
know how much I appreciate it. So, thank you very much.
    I view a worldwide threat to be our borders. And I'd like 
to explain that a little bit. Let me begin by quoting the 
Homeland Security statement today, Admiral Loy. On page four of 
your statement: ``Recent information from ongoing 
investigations, detentions, and emerging threat streams 
strongly suggest that al-Qa'ida has considered using the 
southwest border to infiltrate the United States. Several al-
Qa'ida leaders believe operatives can pay their way into the 
country through Mexico and also believe illegal entry is more 
advantageous than legal entry for operational security 
reasons.''
    I think that is a very important statement, particularly 
when you consider the fact that a half-a-million other-than-
Mexican intrusions have been made on our borders since 2000. 
Specifically, with respect to the southwest border, in 2003 
there were 30,147 other-than-Mexican intrusions. The next year, 
2004, which is the latest year that we have figures for, there 
were 44,617. That's a 48 percent increase.
    Now, let me take you to a hearing--because I sit on the 
Judiciary Immigration Subcommittee--and a response by Mr. 
Hutchinson to Senator Grassley's questions in February 2004. 
This was a hearing held about a year ago. And let me read an 
answer.
    ``At present, DHS has no specific policy regarding OTMs 
apprehended at the southern border. While OTMs, as well as 
Mexicans, are permitted to withdraw their applications for 
admission and can be returned voluntarily to their country of 
nationality, as a practical matter this option is not readily 
available for them, as it is for Mexicans, whose government 
will accept them back into the Mexican territory. Thus, when 
apprehended, OTMs are routinely placed in removal proceedings 
under Immigration and Nationality Act 240. It is not practical 
to detain all non-criminal OTMs during immigration proceedings. 
And thus, most are released. A majority of OTMs later fail to 
appear for their immigration proceedings and simply disappear 
into the United States.
    ``DHS is reviewing the possibility of extending its 
expedited removal authority and means of addressing this 
problem. DHS is also considering a variety of alternatives to 
detention, especially for asylum seekers.''
    Now, I've looked at the statistics for each country. And 
the so-called countries of concern--Syria, Iran, others--the 
numbers are up of penetrations through our southwest border. 
Clearly we are deficient in a mechanism to deal with these.
    Could you please comment and could you please indicate what 
actions are being taken? I view this as a very serious 
situation.
    Admiral Loy. Thank you, Senator Feinstein. And, indeed, we 
view it in exactly the same way you do, as a very serious 
situation.
    There have been a number of initiatives over the course of 
the last year, many of which I know you're familiar with. For 
example, the opportunity for deep repatriation of people back 
into--not just across the border where the recidivism rate is 
that they'll be back, coming our direction that night or the 
next night.
    The whole notion of being able to take the repatriation 
decision and take Mexican nationals, illegal aliens back to----
    Senator Feinstein. I'm not talking about--none of these are 
Mexican nationals. These are all OTMs--other-than-Mexicans--
44,000 OTMs came across the southwest border last year.
    Admiral Loy. Yes, ma'am. I'm just trying to array a set of 
tools that could be potentially of use, not only in Mexico, but 
wherever the OTMs might be from.
    The challenge here is a lengthy border, as you well know. 
We are introducing technology along that border that'll 
substitute for what has historically been a very human-
intensive effort along the border, to make a difference in 
terms of comings and goings.
    So, US-VISIT, the notion of using UAVs on the border as 
plugs between those portals of entry that we have worked so 
hard to harden, if you will. But the entry-exit system that has 
been now deployed by the Department of Homeland Security after, 
I would offer, 20 years or so of effort on the part of INS 
beforehand in failed efforts to establish some kind of a 
legitimate, biometrically based entry-exit system into the 
country, that we have some confidence in in terms of our 
abilities to say who is here and who is not, and what are we 
going to do about those who we can track and find.
    Senator Feinstein. Let me have a little discussion on this. 
Because essentially, there is no detention for these people. 
They don't show up for their hearings and they disappear. So we 
really don't know who comes into this country illegally over 
that southwest border.
    I have two cases that the FBI was involved in, one actually 
in Michigan, where the gentleman was clearly a terrorist. He 
pled guilty. He got 6 months. This is a big problem in the 
United States. And I really don't think that the mechanical 
aspect of it is going to solve it. You're not detaining these 
people. They're released, essentially.
    Admiral Loy. Well, there certainly is a prioritization 
process to those with any degree of a connection against the 
national terrorism database that has now been forged for us to 
be able to bounce names against. So, to the degree we are 
releasing because of the resource implications attendant to 
keeping them and bedding them and detaining them until 
resolution can come of their individual cases.
    Those without any apparent criminal and/or terrorist 
connection are obviously those that are on the high end of the 
release order and the low end of the detention order.
    Senator Feinstein. Can you give us a number of how many are 
being detained?
    Admiral Loy. I don't have that with me at the moment, but 
I'll be happy to provide it to you.
    Senator Feinstein. I would appreciate it. Out of the 44,000 
that came in in 2004, how many are detained. I appreciate that.
    Admiral Loy. We'll provide that.
    Senator Feinstein. Thank you, Mr. Chairman.
    Chairman Roberts. Senator Chambliss.
    Senator Chambliss. Thank you, Mr. Chairman.
    Director Goss, because of our longstanding relationship 
going back to our House days, you know how keen my interest has 
been in this area of information sharing. I was very pleased to 
hear you, as well as Director Mueller, say that things are 
improving. But at the same time, you both recognize we still 
have a long way to go.
    Donnie Harrelson, the Sheriff of Criss County, Georgia, 
happened to be in the back a little earlier, and I visited with 
him for a minute. He was keenly interested in a number of 
things that were being said. And I told him that we really 
can't let this issue of information sharing rest until his 
office and every other local law enforcement office has the 
information in real time that they need to help us win this war 
on terrorism domestically. So, I appreciate the continued 
effort of everybody at the table on this issue, but obviously 
especially you two.
    Director Goss and Admiral Jacoby, there was a report on Fox 
News this morning in which it stated that the Iranians have 
alleged that an aerial vehicle of some sort fired a missile and 
it did not explode, but it was fired in the area of a nuclear 
facility owned by the Iranians.
    Would either of you care to comment on the information that 
has come out of Iran this morning relative to that issue?
    Director Goss. Senator, thank you for your comments about 
vertical integration of information and your patience on 
letting us get the technology and our architecture, our 
enterprise, together on that. There is progress since we last 
talked, and that's good news.
    On the subject of Iran, I know nothing in my official 
position. What I do know is, I think, from press reports that 
something did fall out of the sky and came down somewhat near 
Bushehr, their ongoing building of their nuclear power plant in 
that area.
    I also heard a subsequent report--and I have no idea 
whether I'm spreading a rumor or not--that it was a gas tank 
that fell off an aircraft and exploded. And I have no idea 
whether that's true or not. It just came into my ear.
    Admiral Jacoby. Senator Chambliss, I have no knowledge of 
the report or any incidents involving Iran.
    Senator Chambliss. Director Mueller, I have had the 
opportunity to visit with your joint terrorism task force folks 
in Atlanta and intend to do so again in the very near future. 
And I will tell you, I am very impressed by the work that's 
ongoing with that operation.
    Every time I meet with them, I am told by some of your FBI 
agents in the field, as well as other local law enforcement 
officers, of the importance of the PATRIOT Act, and their 
ability to fight terrorism as well as fight crime with the 
tools that they have under the PATRIOT Act.
    Now, as you know, the PATRIOT Act, or certain provisions of 
it, are going to be expiring at the end of this year. Would you 
care to comment on what your thoughts are relative to the 
reauthorization of those provisions that are set to expire, and 
how useful the PATRIOT Act has been to your organization in 
fighting crime and fighting terrorism?
    Director Mueller. Let me just start off by saying that the 
provisions of the PATRIOT Act are indispensable to the 
protection of the American public against further terrorist 
attacks.
    And the heartland of the bill that is so important--and 
it's not just important to the FBI, but it's important to the 
CIA, the DIA and others in the intelligence community, as well 
as State and local law enforcement--is the breaking down of 
walls that inhibited our ability to share information across 
our agencies and across our disciplines and across our 
programs. And the safety of the United States depends on the 
ability of all of us together to be able to accumulate the 
information, share the information.
    And I don't mean just in pushing, but having access, equal 
access to the information, and having the opportunity to act on 
that information and all the information, whether it be act 
within the United States, in a city, in a town, in a State or 
nationally, or overseas, by having access to information that 
may have been collected within the United States or outside the 
United States.
    And the PATRIOT Act has been instrumental in breaking down 
those walls and enabling us to do it. It has given us new 
authorities. That has given us the ability to obtain 
information that will allow us to identify persons who present 
a threat against the United States with adequate predication of 
their interest and motivation in so doing.
    It has given us access to records that we previously did 
not have, but often are instrumental pieces of a puzzle that'll 
give us a broader vision, a broader view of the intentions of 
an individual or of a group of individuals in the United 
States.
    And I know myself and others who live day in and day out 
trying to prevent terrorist attacks will be here before 
Congress on a number of occasions, asking Congress to please 
continue to let us have those tools to protect the American 
public.
    Senator Chambliss. Thank you. Thank you, Mr. Chairman.
    Chairman Roberts. Senator Levin.
    Senator Levin. Thank you, Mr. Chairman.
    Mr. Goss, we were given information on an unclassified 
basis in January of 2002, as follows. This is a CIA assessment. 
``We assess that North Korea has produced enough plutonium for 
at least one, and possibly two, nuclear weapons.'' I'm 
wondering, Director, if you could give us the current CIA 
assessment.
    Director Goss. I'm honestly not sure whether or not the 
assessment is classified that we have. But our assessment is 
that they have a greater capability than that assessment. In 
other words, it has increased since then.
    I would also point out there are other agencies that are 
making assessments, and there is a range. And I think that the 
range we're fairly comfortable on--and I know that is 
classified. Be happy to share that with you in closed session.
    Senator Levin. If you also could tell us for the record if 
there's any unclassified numbers you can give us--for the 
record, if you can do that. I'm not asking----
    Director Goss. Senator, I will.
    Senator Levin. If you can give us numbers the way that 
number was given. And also, Director Goss, this is for you.
    The 9/11 Commission included a number of recommendations 
for realigning the Executive Branch, including the following. 
``Lead responsibility for directing and executing paramilitary 
operations, whether clandestine or covert, should shift to the 
Defense Department.'' Do you agree?
    Director Goss. I recall the issue very well.
    Senator Levin. Just briefly, do you agree with that?
    Director Goss. I do not agree with that conclusion. We have 
studied it, and the Secretary of Defense and I have a memo 
which I anticipate signing today.
    Senator Levin. Is that going to be public?
    Director Goss. Certainly the conclusion of it will be.
    Senator Levin. I think as much public as you can make, 
obviously.
    Director Goss. It's in everybody's interest to know, I 
think, how we are dividing up the responsibility.
    Senator Levin. I think it is.
    Director Goss. I can tell you we spent a lot of time 
looking at this. And the Secretary feels that he has 
capabilities that are important, and I agree. And I feel I have 
capabilities that are important, and he agrees. There's not a 
lot of disagreement on this. We just didn't come out the same 
place the 9/11 Commission did.
    Senator Levin. Thank you, Director.
    I understand that your CIA's Inspector General's report on 
treatment of detainees by members of the intelligence community 
is somewhere in the pipeline. Can you tell us where it is?
    Director Goss. Yes, sir.
    Senator Levin. When is it going to be available?
    Director Goss. The IG, or the inspector general of the 
agency, has indeed got all of the complaints and the referral 
on that matter in hand. As you know, it's an independent 
position. I have checked.
    There is one report that was ordered by my predecessor, 
which has come back, which had 10 recommendations or so in it. 
About, I think, eight of those have been done.
    We are now into the process of looking at some of the 
specific cases that have been brought to the IG. I cannot tell 
you what his timetable is, but I'm sure he would be very happy 
to tell you. I am assured that the work is ongoing, as it 
should be appropriately.
    Senator Levin. Well, if he'd be happy to tell us, wouldn't 
he be happy to tell you?
    Director Goss. Sure.
    Senator Levin. Well, what is the timetable? I mean, is 
there a time?
    Director Goss. I haven't asked him what day he's going to 
finish all these cases.
    Senator Levin. Or a month?
    Director Goss. As soon as they are through. I know one case 
has been dismissed. I know one case has been prosecuted. You've 
read about it in the paper, in North Carolina. know there are 
still a bunch of other cases. What I can't tell you is how many 
more might come in the door.
    Senator Levin. OK. Thank you.
    Director Mueller, this is for you. It relates also to the 
interrogation question. The FBI documents which were released 
under a FOIA request include e-mails from FBI agents expressing 
their deep concerns, that during late 2002 and mid-2003, overly 
aggressive and coercive interrogation techniques were being 
used by the Defense Department people at Guantanamo's detention 
facility which ``differed drastically from the FBI's authorized 
practices.''
    Those memos described the Department of Defense's methods 
as, quote: ``Torture techniques,'' expressed disbelief over the 
military's interviews, telling their colleagues back in 
Washington--this is in the FBI--that ``you won't believe it.''
    The FBI agents also described heated exchanges and battles 
with the commanding generals at Guantanamo over the Department 
of Defense's interrogation techniques, which FBI agents ``not 
only advised against, but questioned in terms of their 
effectiveness.'' Incidents described included detainees being 
chained hand and foot in fetal positions, no chair, food or 
water for long periods, ended up defecating on themselves. One 
detainee apparently had been literally pulling his own hair out 
throughout the night.
    Another major concern of the FBI agents present at 
Guantanamo was that the Defense Department interrogators were 
impersonating FBI agents in order to gain intelligence. FBI 
agents were deeply worried that should detainees ever publicly 
report their treatment at Guantanamo the FBI would be left 
``holding the bag,'' because it would be appear falsely that 
``those torture techniques were done by FBI interrogators.''
    Those documents make clear that the FBI was so concerned 
about the Department of Defense's interrogation techniques that 
it issued guidance to FBI agents at Guantanamo to stand clear 
and to keep away from those techniques when the DoD took 
control of interrogation.
    I assume that because of the serious and extensive 
objections that were lodged by FBI agents against those 
techniques, and particularly given the heated discussions at 
which your personnel were present and engaged in, that you or 
your senior advisers were aware of the concerns of those 
members of your staff.
    And I'm just wondering--this is my question--did you raise 
those concerns with either senior officials at the Department 
of Defense, the Attorney General or the head of the criminal 
division at the Justice Department, or higher-ups in the 
Administration, including the National Security Council?
    Director Mueller. Senator, I know that those concerns were 
raised with the Department of Defense by persons within the 
FBI. At least some of those were, at least three incidents 
early-on.
    Certainly after the issues were raised about Abu Ghraib 
there were additional memoranda that were generated as a result 
of an inquiry to the field that you may have been alluding to 
there. Those also have been brought to the attention of the 
military.
    I will also say that our inspector general is doing a 
review of when the information came in and what happened to 
that information once it came into the FBI.
    Senator Levin. You personally did not raise those concerns 
with senior officials at the Department of Defense or with the 
Attorney General or the head of the criminal division?
    Director Mueller. I was not aware of those concerns until 
May of 2004.
    Let me just be precise on that, Senator. I was not aware of 
the concerns that you raised, that you allude to there, in 
Guantanamo until May of 2004.
    Senator Levin. Thank you. Thank you, Mr. Chairman.
    Senator Levin. Thank you.
    Chairman Roberts. Senator Snowe.

         STATEMENT OF THE HONORABLE OLYMPIA J. SNOWE, 
                    U.S. SENATOR FROM MAINE

    Senator Snowe. Thank you, Mr. Chairman. I want to welcome 
all of our panelists here today.
    Director Goss, just to follow up on one of the questions 
that the Chairman raised with respect to A.Q. Khan, there's no 
question that he masterminded a far-reaching, wide-ranging, 
global in scope operation in dispersing nuclear information 
activities and technology.
    Have we pressed the Pakistani government to allow a U.S. 
representative to directly have access to A.Q. Khan for 
questioning to determine the extent of his network of elicit 
nuclear activities?


         Prepared Statement of the Honorable Olympia J. Snowe, 
                        U.S. Senator from Maine

    Mr. Chairman, thank you again for holding this vital hearing that 
will give us an opportunity to examine the threats currently arrayed 
against our Nation as well as a look at those threats that may endanger 
our society in the future. Identifying these threats each year is 
crucial to our ability to gauge our progress in defeating or mitigating 
those threats and to understanding this Committee's role in providing 
the oversight and resources required by the Intelligence Community to 
help defeat those who wish us harm.
    This hearing will also give us an opportunity to examine the 
progress of the changes initiated since passing the Intelligence 
Community reform in the last Congress and the confirmation of the new 
Director of Central Intelligence. But, in the end, it is the current 
and emerging threats to the Nation that drives our investments in, and 
the development of priorities for, the Intelligence Community's 
collection and analytic capabilities. I intend to look at a wide 
spectrum of these threat scenarios--from the threat posed by nuclear-
capable terrorists to the future emergence of a regional peer-
competitor, as well as to our abilities to protect the homeland.
    I also want to thank Mr. Goss, Director of Central Intelligence and 
Mr. Mueller of the FBI for once again appearing before the Committee to 
describe to us their view of the world and how their respective 
agencies are facing the many challenges before them.
    I especially want to acknowledge Admiral James Loy's appearance 
here today. Although he has announced his departure from public life 
later this spring, he remains committed to the nation's defense, as he 
has been for his entire career, and has come before us today to 
describe the Department of Homeland Security's efforts to counter the 
threats arrayed against the homeland. On a personal note, as Chair of 
the Senate's Subcommittee on Oceans, Fisheries and Coast Guard, I was 
able to work closely with Admiral Loy when he was Commandant of the 
Coast Guard. His charge to protect the Nation has always been a part of 
his personal code of honor and he has been unwavering in accomplishing 
his mission. For that and his many years of public service, I thank 
him--the Nation is not only grateful, but safer, for his loyalty and 
dedication.
    I would be remiss if I didn't comment directly about the dedication 
and professionalism of the thousands of Americans who make up our 
Intelligence Community. Each day, across this country and around the 
world, they labor, often without recognition, to keep this country safe 
from harm. It is their vigilance upon which we rely to give us the 
forewarning necessary to counter the many dangers present in our world. 
Although it is impossible to directly express our deep appreciation for 
their efforts, I charge our witnesses to relay our eternal gratitude to 
those who serve America so well.
    It has been an extremely challenging year for the Intelligence 
Community; one in which we saw two major reports detailing the actions 
and failures of our collective intelligence community to provide 
national decisionmakers with the timely and quality intelligence they 
must have to prepare America for the threats faced by the Nation and 
the need to go to war. On the heels of those reports, we in Congress 
undertook the largest revamping of the intelligence community since its 
inception with the 1947 National Security Act. This self-examination 
and correction is a hallmark of our democracy and will serve to make us 
stronger. It is my fervent hope that the professionals of the community 
see this reorganization as an opportunity to renew their dedication and 
take on the challenges to strengthen their craft. In these perilous 
times, the Nation needs them now more than ever.
    We on this Committee have spent a great deal of the past 2 years 
poring over the intelligence provided to decisionmakers before the 
commencement of Operation Iraqi Freedom and, of course, we all learned 
many things and reached many conclusions. In my analysis of that 
information, I became more and more convinced that while Saddam's 
nuclear programs may have been defunct, our Nation continues to face 
the very real threat of nuclear terrorism.
    Terrorists are known to be seeking nuclear technologies and have 
already displayed a proclivity for catastrophic destruction on a 
massive scale. For terrorists, attacking a U.S. city with a nuclear 
device would likely be their ``dream come true.'' In the February 6 
Washington Post, Steve Coll, author of ``Ghost Wars,'' notes that Osama 
bin Laden's inspiration, repeatedly cited in his writings and 
interviews, is the American atomic bombing of Hiroshima and Nagasaki, 
which he says shocked Japan's fading imperial government into a 
surrender it might not otherwise have contemplated. Bin Laden has said 
several times that he is seeking to acquire and use nuclear weapons not 
only because it is ``God's will,'' but because he wants to do to 
American foreign policy what the United States did to Japanese imperial 
surrender policy.
    I intend to focus my work on the Committee on this specific threat 
to the United States because I believe it is time for us to look 
closely at how we can prevent and deter such a threat. I am also 
acutely aware from my work on the Commerce Committee in the area of 
transportation, maritime and port security that we must look to the 
seas as a very likely path of introduction of such a weapon into the 
United States. The 9/11 Commission found that ``Opportunities to do 
harm are as great, or greater, in maritime or surface transportation 
(compared to commercial aviation).''
    Recognizing these vulnerabilities, I included a number of 
provisions and acted as a conferee to the Maritime Transportation 
Security Act signed into law in 2002. One of my provisions included a 
requirement that foreign shippers send their cargo manifest before 
arriving at a U.S. port so the Department of Homeland Security can more 
efficiently evaluate individual container shipments for risks of 
terrorism. I have also held several port security hearings at the 
Subcommittee on Oceans, Fisheries and Coast Guard and will continue to 
do so because I do not believe we are anywhere near finished with fully 
securing our maritime borders.
    That is why I was encouraged by the President's announcement in 
December of his Maritime Security Policy National Security/Homeland 
Security Presidential Directive, which outlined his vision for a fully 
coordinated U.S. Government effort to protect U.S. interests in the 
maritime domain. The directive charges the Department of Defense and 
the Department of Homeland Security with the alignment of all U.S. 
Government maritime security programs and initiatives into a 
comprehensive and cohesive national effort involving appropriate 
Federal, State, local and private sector entities.
    This move comes at a critical time. As we sit here right now, the 
Department of Defense is proceeding with the 2005 Base Realignment and 
Closure (BRAC) process, which I continue to believe is the wrong thing 
to do while we are engaged in a global war on terrorism. We must ensure 
that in the DoD's drive to meet an arbitrary 25 percent reduction 
figure in infrastructure, we do no harm. For example, Brunswick Naval 
Air Station on the coast of my home State of Maine is home to one of 
four remaining maritime patrol bases remaining in the Navy and, in 
fact, possesses the only remaining fully capable active runways in the 
entire Northeast.
    While many say that the maritime patrol community, whose chief 
mission is anti-submarine warfare, is not relevant in the post-cold war 
world, the community has reinvented itself as the warfighting 
commander's premiere manned, long-range intelligence, surveillance and 
reconnaissance (ISR) platform and is performing admirably in direct 
support of Operation Enduring Freedom and Operation Iraqi Freedom.
    But this community also has a role in the President's maritime 
security policy. We have been talking to the Coast Guard and it is 
clear that if we want to be able to conduct ISR operations against 
inbound maritime traffic farther than 200 miles from our shores, the 
maritime patrol community offers a ready and proven capability. These 
points are made eloquently in a white paper written by retired Navy 
Captain Ralph Dean who concludes that optimum basing for maritime 
interdiction assets is as important as the assets themselves. We must, 
therefore, carefully factor in future requirements for maritime 
interdiction before closing any of the maritime patrol bases, which are 
located in the four corners of the continental U.S.--Maine, Florida, 
Washington state, and California.
    The use of conventional forces to interdict the asymmetric threats 
facing the Nation leads me to my final point. The Nation cannot afford 
to develop tunnel-vision when it comes to the threat we face. Just as 
the U.S. failed to adequately counter the developing threat of 
terrorism as we focused solely on the cold war threat, I am concerned 
that we do not now focus solely on terrorism and ignore the growing 
likelihood of a regional peer competitor in the Pacific region. Like 
many, I am alarmed by the rapid and unprecedented buildup of naval 
forces, particularly destroyers and submarines, by the Chinese People's 
Liberation Army Navy.
    Last month members of the House Armed Services Committee visited 
China and came away deeply concerned. Representative Randy Forbes said, 
``We're seeing China really make huge moves in the area of its navy. . 
.There's no question our Navy is the best in the world. . .but at some 
point, sheer numbers start to matter.''
    So I am doubly concerned when the Navy sends Congress a budget that 
radically cuts the number of next generation destroyers and submarines 
to be built by the Navy. I believe that in the future we will need 
conventional ``blue-water'' ships to maintain our global presence in 
the Northern and Western Pacific. I look forward to hearing from VADM 
Jacoby as to the Defense Intelligence Agency's assessment of the 
Chinese naval threat and what we are doing now to counter that threat 
before we wake up one morning to yet another ``new normalcy,'' just as 
we did on September 12, 2001.
    I look forward to hearing the testimony of our witnesses and 
working with them as part of this Committee to ensure that our 
intelligence community has the resources and structure it needs to meet 
the national security challenges we face today and in the future.
    Thank you.

    Director Goss. Senator Snowe, I want to be very careful how 
I answer your question. I think my definition of ``pressed'' 
and yours would be the same. And I would say yes.
    I can tell you that there is continuous attention to this 
matter. And I believe that is being done with the necessary 
urgency and fortitude, to make sure our interests are 
completely understood.
    Senator Snowe. So, could you characterize the cooperation 
on the part of the Pakistani government, sharing information?
    Director Goss. Yes.
    Senator Snowe. I think it is disconcerting. I'm sure you 
saw the article in Time Magazine recently citing a source close 
to the Khan research laboratories in Islamabad. And he's quoted 
as saying, ``even though its head has been removed, Khan's 
illicit network of supplies and middlemen is still out there.''
    Director Goss. Senator, in about 2 minutes in a private 
conversation, I think I could satisfy your answers to these 
questions.
    Let me just simply say, there is an understanding that A.Q. 
Khan enjoyed a certain amount of celebrity status in his 
country because he was the man who brought them the bomb, which 
was very critical to that culture and their national pride and 
so forth.
    It has been a difficult prospect. And understanding the 
problem there, have to dealing with it, is useful in 
negotiating our interests, which are to get all the information 
possible.
    I think that those discussions are understood and 
appropriate steps by the right people are taking place. I can 
be more specific in private.
    Senator Snowe. I appreciate that.
    Admiral Loy, I'm sure you're familiar with this report from 
the inspector general of the Department of Homeland Security 
regarding the visa waiver program and the use of stolen 
passports from the visa waiver countries.
    And it's pretty troubling and disconcerting the extent to 
which aliens have applied for admissions into the United States 
with stolen passports from these specific countries and have 
been admitted, even when information has been submitted to the 
lookout system, all the more disconcerting, I think, when you 
consider--and I think we all agree--the greatest threat to this 
country is having terrorists have access to nuclear weapons or 
the materials to manufacture them.
    And this report indicates ``aliens applying for admission 
to the United States using stolen passports have little reason 
to fear being caught and are usually admitted. Our analysis 
showed that it only made a small difference whether the stolen 
passports were posted in the lookout system.''
    They reviewed two groups. Of the first group, 79 of the 98 
aliens attempting entry were admitted. The second group had 
lookouts posted for their stolen passports prior to their 
attempted entries. And from the second group, 57 out of the 78 
aliens who attempted entry were admitted.
    Thirty-three of these admissions occurred after September 
11, 2001. And then 136 successful entries using stolen 
passports were allowed.
    I mean, obviously, this is significant and disturbing, to 
say the least, that obviously we haven't made much headway with 
respect to this issue regarding stolen passports. And when you 
think that worldwide there are 10 million stolen passports, it 
only takes one to gain admission into the United States.
    You know, when you think about the fact on June 6, 2001, 
according to this report, 708 blank passports were stolen from 
the visa waiver program. The IG reported that this was 
significant because the passports were stolen in a city that 
also was the location of the al-Qa'ida cell that played a 
significant role in providing financial and logistical support 
for the September 11th terrorists.
    It's interesting as well because there is little attempt by 
law enforcement officials to follow up and to try to locate 
these individuals, even when they have learned--even when 
officials have learned--that they have come into this country 
illegally.
    So, one, what are we doing to investigate these activities 
of these aliens that have used stolen passports? What are we 
doing to determine their whereabouts? And what are we doing to 
improve our ability to locate, investigate and remove these 
individuals from the United States, who have stolen passports 
to gain entry?
    Admiral Loy. Thank you, Senator Snowe. It's a very serious 
issue. The ICE agency is following up dramatically as a result 
not just of the IG's investigation but, rather, of their 
recognition of this, I'll call it, chink in the armor, so to 
speak.
    We must recall that, of course, over the course of a couple 
of hundred years of our country's openness to people coming to 
our borders, our exit-entry control system attendant to those 
borders was, frankly, very weak.
    The fact that the last year-and-a-half that we have 
established US-VISIT as an entry-exit control system, that we 
have engaged internationally to try to use Interpol as a 
database storage for stolen passport information, so that 
there's a database that can be used internationally, not just 
by folks of concern coming to the United States, but crossing 
any borders anywhere.
    The visa waiver program in and of itself now is required--
any folks coming into our country from visa waiver countries go 
through US-VISIT, and we begin to gain the biometric value of 
the fingerprints and the facial imagery that we capture as they 
come into our country each time they enter.
    We are conducting reviews of the visa waiver countries as 
we speak. There are 25 of the 27 countries being reviewed, as 
the Congress biannually, with a report due back to provide you 
a solid status report on the visa waiver countries as it 
relates to the issue that you're describing.
    Furthermore, that review process always has the opportunity 
for sanctions attendant to it, as to whether or not one stays 
in the visa waiver program at the other end of the day.
    There have been rather dramatic, public reflections of both 
Germany and France and other countries having this nightmarish 
problem of not tens or twenties, but literally thousands of 
their brand-new, machine-readable passport blanks finding their 
way into the status that you were describing. So it is a 
significant international issue that we're trying to fight on 
all those fronts.
    Senator Snowe. Well, it's clear that we need to do 
something very expeditiously.
    Admiral Loy. Including the enforcement.
    Senator Snowe. I think it's a huge challenge and the 
countries better be cooperating in that regard.
    Admiral Loy. Exactly.
    Senator Snowe. Thank you, Mr. Chairman.
    Chairman Roberts. Senator Wyden.
    Senator Wyden. Thank you, Mr. Chairman and gentlemen. 
Sorry, we've got multiple hearings going on this morning and I 
didn't get to hear all of your testimony.
    But I did understand that several of you made the point 
that information sharing is improving. And I will tell you that 
I'm still concerned that the walls that have prevented 
information sharing still have not been brought down. And to 
some extent what has happened, the pre-9/11 walls that prevent 
information sharing seem to have been replaced with a new set 
of walls that prevent information sharing. And I want to give 
you an example that revolves around the area that you all 
talked about, the National Counterterrorism Center, NCTC, where 
you all feel things have gotten better.
    Now, our Committee has been told that, while information 
can be shared among those who work at the center, an analyst 
has to go out and seek approval before sharing information that 
may be of value with the home agency, and the approval may or 
may not be granted and it's sort of a bureaucratic shuffle to 
get it done.
    My question would be to you, Director Goss. Are you aware 
of the problem? And if so, how do you believe it ought to be 
addressed?
    This is something that our Committee has heard about now 
several times. And it sort of caught my attention when you all 
were talking about information sharing improving.
    Director Goss, your response?
    Director Goss. Yes, I'd be very happy to, Senator. Thank 
you.
    I do believe that the across-the-board information sharing 
is improved. There are still areas--and this is one of them.
    Senator Wyden. I want to make sure I got that you say this 
is an area that you will still be willing to work with us on.
    Director Goss. Oh, absolutely. This is not finished 
business yet.
    We have the question of how do you protect an individual 
agency's sources and methods? How do you get assurance for that 
agency when they are making a contribution?
    And the question of how we use either TAGINTs or tearlines, 
or how we make this available, it's easier if you're just 
talking about a customer. But if you're talking about an 
analyst that wants to go further in and probe further and 
perhaps do tasking, then you come to the questions of some of 
the things we're trying to use, like co-location, getting the 
analysts and the collectors to talk together, changing things 
with agencies, setting up different rules.
    Part of that is going to be the business of the new DNI. As 
you know, the NCTC reports to the DNI. And the NCTC is now run 
very, very effectively, I would say, but on an acting basis, by 
John Brennan.
    They have absorbed the TTIC into the NCTC. And I think 
they've gone just about as far down the road as they can go 
without stepping on the prerogatives of a new DNI, whose main 
function, in my view, is going to have to be sorting out the 
authorities and the interface between the DNI's job and 
responsibilities and the individual agencies--and those 
interfaces between the 15 agencies in the community.
    Because until you do that and make those lines clear, the 
question of sharing proprietary--and excuse me for using the 
word, but it does fit--information is going to be difficult, 
because everybody is charged with preserving their sources and 
methods.
    Senator Wyden. I think what concerns me is that there are a 
finite number of people working the terrorism issue for the 
entire intelligence community. They all hold security 
clearances. They're all trained.
    And it just seems to me that these analysts ought to have 
access to all the information that can help our side. And I 
would like to talk about this with you all further, talk about 
it more, perhaps, in a private session.
    But it seemed to me, what we ought to have is the 
equivalent of a terrorism analyst program--a special terrorism 
analyst program--that would allow all of these analysts access 
to all the same data.
    And until we get there, we're still going to be trying to 
break down these walls. And time is short. We'll talk about it 
some more, but I think, Mr. Director, your answer is 
constructive. The acknowledgment that there is more work to do 
is what I was interested in hearing.
    It just seems to me there's only so many people in this 
community. Let's make sure they all can get access to the same 
kind of information. And there's an awful lot of shuffling 
going on, just with NCTC. And I'm just not going to take this 
further, but I saw Bob Mueller nod, and I consider that 
constructive, as well.
    The second area that I'd like to touch on involves 
accountability. If there's one thing my constituents are 
frustrated about as it relates to government is the absence of 
accountability. And still after 9/11, I keep looking for 
anybody who lost a job, was demoted, was reprimanded--any kind 
of consequences--and I can't find any. I can't find any 
anywhere.
    And my question would be to you, Director Goss, in that you 
all apparently have a report from the Inspector General, as a 
result of input from this Committee, the Joint Inquiry on the 
terrorist attacks, where there was clear interest in the 
Inspector General conducting a review to determine if any CIA 
officials ought to actually be held accountable for the 
mistakes that led to the attacks. And I'm trying to figure out 
where this Inspector General report is. I gather there are just 
layers and layers of review.
    But where are we on this Inspector General report? What can 
you tell us today? When are we going to get it on this 
Committee, so that we can get serious about some 
accountability?
    Director Goss. Senator, thank you. You will get the IG 
report as soon as it is finished. I've made the same pledge 
yesterday to HPSCI. It was commissioned, I think, by Congress, 
and you'll get it. And the IG is independent.
    Now, as for where is it right now, the IG came to me 
shortly after I came in and said that this matter was under 
review and he would be presenting it shortly to me, for the 
next step, because there is a process, apparently, in how this 
works.
    And I asked him a very simple question. I said, if you are 
naming names, are you giving those names the opportunity to 
express their views? And it turned out that in the process he 
had not taken that option. I suggested to him that in the 
interest of what I would just simply call American fair play, 
if you're going to start bandying people's names about, you 
might let them know what it is you're saying about them. And he 
agreed. I did not instruct him to do that, please understand. 
We just had a discussion about how this process would unfold. 
This is somewhat new.
    And so I understand that he has done that. And individuals 
have been advised of what this report says about them, on a 
confidential basis. I also understand that some of these 
individuals have hired attorneys because they wish to, for 
whatever reason, have that kind of advice. When attorneys come 
into the issue like this, I understand that the timing becomes 
a little uncertain of when matters will be concluded.
    I do not feel it appropriate for me to demand a deadline at 
this point, since the process has elements of due process in 
it. And I view that the IG is capable of making the decisions 
of when he's ready to present that to me. That has not happened 
at this point.
    When he does, I have already got two staffers I've 
selected, who are in the process or I suspect have probably 
read the report. So we will be able, when it comes to my level, 
as the Director of the Central Intelligence Agency, to decide 
whether or not it is appropriate to convene boards in the 
agency, in-house, to deal with accountability or not. And that 
is apparently what my responsibility will be.
    Either way, this Committee and the other Oversight 
Committee--the House Oversight Committee--will get the IG's 
report. And it is understood, it will be classified.
    Senator Wyden. Do I have time for one additional question, 
Mr. Chairman?
    Chairman Roberts. I think Senator Mikulski has been waiting 
very patiently throughout the whole hearing. And if we have 
time for a second round, I would be delighted to recognize the 
Senator. And I don't mean to pick on him, in that most Senators 
have gone red.
    I think I'll probably leave that comment alone.
    The patient, but always accommodating, Senator from 
Maryland.
    Senator Mikulski. Patient. Yes, a signature characteristic 
of myself, well known to all.
    [Laughter.]
    Senator Mikulski. Good morning, and thank you really for 
what you do everyday. I think all of us appreciate the fact 
that the job of everybody here is to prevent predatory attacks 
against the homeland, against U.S. assets abroad, against our 
troops, and even to help predatory attacks against allies.
    I'm going to focus on the issue of terrorism and want to 
come back to this whole issue of how we have gotten better at 
connecting the dots and focus really on threats to our ports.
    So these are really questions for Directors Mueller, Goss, 
and Admiral Loy. There's considerable concern that sea-based or 
ship-borne terrorist attacks are big concerns and big 
possibilities. Many analysts are concerned about the security 
of U.S. ports, foreign ports, but in my case, like Baltimore 
and other coastal Senators.
    So my question is: Of the various scenarios, which do we 
fear attacks on our ports? Do we fear nuclear weapons being 
smuggled in and detonated at a U.S. port? And what are we doing 
about it? And how did the three of you work together?
    And Admiral Loy, of course, we know you from your Coast 
Guard days, and you've adapted to a new transportation mode 
pretty quick. But you see where we are. So there's Goss, you 
know, looking at the world. You know, Loy's got Mr. Homeland 
Security. And there's Mueller, and he's got the domestic 
whatever. So where are we on the threat to the ports, and what 
are we doing to prevent the threat? And how do you all 
coordinate this information so that Governors, and mayors, and 
the people can feel pretty good about it?
    Director Goss. Thank you, Senator. I'll start.
    I will tell you that my normal day starts in the company of 
these two gentlemen. And matters of this urgency are discussed 
between us. But, not only that, we have close working 
relationships between our agencies. And it is well understood, 
the danger of which you speak, properly.
    In terms of our part, from the national foreign 
intelligence program, obviously, leaning overseas and getting 
all the information we can to stop it over there and to get 
information before something's put on a ship, or to understand 
a plot, is very, very important. I would point out--somebody 
can correct the statistic--but it's a very high percentage of 
success, perhaps 95 percent, of all drug interdictions come 
from good tips from information, not from random searches.
    But you have to do the gates-guns-guards approach 
domestically to take care of the ports. And you have to do the 
information approach. Am I satisfied they're as plugged in as 
they can be? Yes, under the circumstances that we have.
    Now, with the DHS and with the FBI, law enforcement people, 
people with new responsibilities dealing with homeland 
security, and our very clear understand that this is part of 
the target for our operatives overseas, I think we have done as 
good as we can do, in terms of understanding information that's 
critical.
    Senator Mikulski. I appreciate that the three of you meet, 
but I'm talking about all the way down, are we really 
communicating?
    Director Goss. I think it goes pretty far down for us.
    Director Mueller. For us, in every city that there's a 
port, there's a Joint Terrorism Task Force with a specific 
responsibility to work closely with the elements of the port to 
exchange information and provide what can be done to enhance 
the port security. In several of the ports around the country, 
we have--particularly where there's substantial ferry traffic, 
for instance--we have done intelligence analyses of 
vulnerabilities of the ferry services.
    Each port has a little different mixture of the type of 
shipping that comes in. And consequently, the Joint Terrorism 
Task Forces, working with the Coast Guard and other elements, 
work closely with State and local law enforcement as well as 
the other Federal components, to come up with a plan to assure 
that we have the intelligence that's necessary to focus on the 
threat of a potential attack. And then, if there's an attack, 
how we are going to respond to it.
    And perhaps I can turn that over to Admiral Loy to pick up 
on.
    Admiral Loy. Thank you, Senator Mikulski.
    The information flow into this challenge is as was just 
described by Director Goss and Director Mueller. At the other 
end, I would offer that the chair I was sitting in on 9/11 was 
still in uniform as the Commandant of the Coast Guard. And, 
frankly, we spent the rest of the time that I was in that great 
service focusing on domestic maritime strategy--domestic 
maritime security strategy.
    We also recognized that it was enormously important to see 
that this was an international challenge immediately, because 
all of those 9 million containers a year, 20,000 a day, that 
find their way to Baltimore and many other ports come from 
overseas. And so one of the first things we did was literally 
take a delegation to the International Maritime Organization to 
start a process which has become a standard-setting effort for 
international commerce as it relates to facilities, crews, 
ships that ply the waters of the United States, to meet those 
international standards.
    Second, there have been excellent resource plus-ups 
attendant to the Coast Guard's capability to shift gears from 
emphasizing what it has always been able to emphasize as an 
array of responsibilities it has for the Nation and focus on 
port security in this particular time of need.
    I think one of the greatest strengths of that service is 
its agility to reshape its focus on what Nation needs it to 
focus on now. And it certainly has done so over the course of 
these last 3 years.
    We have also recognized the legitimacy through port 
security grants and Operation Safe Commerce. The requirements 
that we have to look down the supply chain, literally from the 
point of origin to the point of destination, with a sense of 
transparency all the way through that, in order to see and be 
able to apply the insights we gain from the intelligence 
community as to what we should be doing operationally in those 
various responsibilities.
    The notion of pushing our borders out so that they don't 
become the first portal that we look at things under concern 
about, the Container Security Initiative, as I mentioned in my 
opening comments, is now alive and well in 34 different ports 
where customs agents, side by each with their host nation 
counterparts, are watching the stuffing of those boxes, the 
sealing of those boxes, as it relates to cargo security.
    One of the most dramatic initiatives that we had already 
underway for what then Vern Clark and I, as the Chief of Naval 
Operations, viewed as an asymmetric array of threats, which 
shifted focus to the terrorism piece of that asymmetric array 
after 9/11, had already been underway in Suitland with a joint 
effort, with respect to intelligence reviews that the two sea-
going services of this Nation jointly conduct there day after 
day after day.
    That has developed into two initiatives today. One of them 
attended to something I termed maritime domain awareness and 
has become almost a term of art in this look that the two 
services take. With NORTHCOM's responsibility reaching 500 
miles out to sea on the Pacific side and literally almost 1,700 
miles to sea on the Atlantic side, we have joined forces, the 
Navy and the Coast Guard, to truly understand what's going on 
and how do we assure that we know what's going on in the domain 
we're responsible for.
    Senator Mikulski. Let me come back.
    First of all, this was really, I think, very helpful, and I 
hope enlightening to the Committee. I know my time's up. But 
number one, how real is this threat?
    And number two, Admiral Loy, homeland security is the 
ultimate user of the intelligence, the ultimate customer, of 
course, along with the FBI. But, you know, you're Coast Guard. 
You're Customs. That's the battle line.
    Admiral Loy. We hold the bag. Yes, ma'am.
    Senator Mikulski. Yes. One, how real is this threat? And 
number two, do you really feel that what has been described is 
really working well?
    Admiral Loy. The gathering and the sharing of the 
information, this is, I think, working extraordinarily well in 
this particular domain. I think, to go back to the Chairman's 
commentary about information access as opposed to information 
pushing and the comments that the Vice Chairman made attendant 
to that, are absolutely right on point.
    We discussed, though, there just two operatives. You talked 
about the analyst and you talked about the collector. And I 
would offer that the operator is the other absolutely crucial 
ingredient to keep in that algorithm. The requirements that the 
operator can express to the collector and the analyst go a long 
way to figuring out the workload of those people on any given 
day, any given week, for any given purpose or project.
    So I would ask you to have the operators articulate their 
requirements, those things that they're going to be able to use 
properly to do the work they're required to do. Let the 
analysts and the collectors then get about that business to 
meet those operators' requirements.
    Senator Mikulski. Threat?
    Admiral Loy. The threat is as real here. We have the same 
kind of exercise program to think our way through the nightmare 
scenarios on the maritime sector, as in any other sector. Ports 
represent that place where it all comes together. Ninety-five 
percent of what comes and goes to this country comes and goes 
by the water. So the port complexes are clearly a targeted area 
for the terrorists.
    Senator Mikulski. Mr. Chairman, I presumed my time was up. 
That was a lengthy conversation, but I think really is crucial, 
because that's where it all comes together.
    Chairman Roberts. As usual, the Senator raised an important 
point. Has the Senator finished her comments?
    Senator Mikulski. My time is up.
    Chairman Roberts. The distinguished Chairman of the Senate 
Armed Services Committee.
    Senator Warner. I thank you, Mr. Chairman and the Ranking 
Member. We've had a good hearing. I'm sorry I had to step out 
for a moment.
    Sixty years ago this month, at age 17, I started my very 
modest and inauspicious military career. And I had over a half 
century of the privilege of being associated with the men and 
women of the United States military. And this afternoon, like 
so many of our colleagues, I go to Arlington for the burial of 
a brave Marine who lost his life in Iraq.
    As I sit through these ceremonies quietly, the thought 
always occurred to me, ``Senator, have you failed to do 
anything in your official capacity either to equip or train 
this individual or to provide him the intelligence, or his 
superiors the intelligence, which could have prevented this 
death?''
    There is an issue here, I say to my distinguished Chairman 
and Ranking Member and colleagues on the Committee, which I 
think we've got to address, both in my Committee and in this 
Committee. And that is the manner in which we gain intelligence 
from those that are captured, either on the battlefield or in 
other areas.
    There has been a good deal written, and I draw the 
attention of my colleagues to an article today in The New York 
Times entitled, ``CIA is Seen as Seeking New Role on 
Detainees.'' And so my question to you is as follows.
    America has always been a Nation that follows the rule of 
law, and we must preserve that. And the Geneva Convention, as 
such, is a part of our body of law. But we recognize other 
nations have other laws, traditions, whatever. And there could 
well be means by which they gain intelligence which we can't, 
following the rule of law. And I'm not suggesting we deviate 
from the rule of law.
    But when an individual is apprehended in Iraq, should we 
turn him over to the Iraqis, who may have a different system, 
and from that individual we gain information that not only 
preserves the opportunity to protect our coalition forces, but 
indeed the terrible and tragic killing of so many Iraqi 
citizens and their own security forces.
    I think largely this issue has to be addressed in closed 
session. But I wonder, Mr. Director, to what extent you can 
talk about what your hope is in this area to gain the maximum 
intelligence that we need to not only bring to, hopefully, a 
successful conclusion of the Iraqi campaign, but other 
campaigns on other fronts and, at the same time, carefully 
preserve the traditions of this country by following the rule 
of law.
    And most specifically, what should we do in dealing with 
other countries in terms of sharing the burdens of captivity 
and interrogation of a witness or a captive or whatever we may 
have in our possession? And then I'll ask the Department of 
State, Ms. Rodley, to give the views of State on that.
    Director Goss. Thank you, Mr. Senator.
    The subject is of critical importance to us. You are 
correct to point out that we are dealing in a life-and-death 
business, and you are correct to point out that interrogation 
is a mainstream of information. Having enough professional 
interrogators operating the proper way, that would be within 
the rule of law, and professional interrogators will tell you 
that torture is not something they would wish to have, because 
it doesn't work. There are better way to deal with captives.
    So I don't think there is any inconsistency with the idea 
of professional interrogation of combatants, whether they're 
conventional or unconventional, taken off the field of 
hostility and brought into our captivity, being subject to a 
professional interrogation. I do not think that's an impossible 
job.
    The question of who does it and under what circumstances 
does get us into some legalities. I'm not a lawyer, an 
attorney. And I will obviously be guided by what they say. But 
that is not going to be a deterrent to a professional program. 
It's just going to affect the mode a little bit.
    Clearly, as Americans, we are concerned with legality, the 
rule of law. We are concerned with human rights because we are 
compassionate human beings, and what we stand for is what we're 
fighting for. And we're not going to abrogate that.
    We have an immediacy of protection of forces and protection 
of innocent lives in the interrogation process. We do not want 
to forego that opportunity. Nor would we ask another country to 
do something that we would not do ourselves as a cute way of 
end-running our commitment to the law and decency.
    I believe that we have most of that in hand. There are some 
parts of that that I cannot answer with you yet that are sort 
of down-the-road pieces of it that I need to talk to you about 
in closed session.
    But if you asked me today, is interrogation vitally 
important to saving lives, and disrupting terrorists, and 
protecting our forces, the answer is unequivocal. Yes.
    If you are asking me today if we are handling interrogation 
within the proper norms and bounds, the answer is yes. If you 
are asking me today if I would like to get more information 
from some of our captives that I still think have information 
we would like to have, the answer is yes. And if you asked me 
would I like to have more captives tomorrow to interrogate, the 
answer is yes.
    Senator Warner. Let's take it to one last subject. When 
you're given the option that you could transfer this prisoner 
to another nation, recognizing that nation employs methods 
different than we, how would deal with that?
    Director Goss. I would require safeguards, if that captive 
were going back, either as a non-interrogee or as an 
interrogee. If that individual is being returned to a nation, a 
judgment should be made that nothing beyond, I would say, due 
process punishment, if that is deserved, would happen to that 
individual, even though they may not have the same standards in 
that nation.
    As you know, many nations will claim their citizens back. 
And we have a responsibility of trying to ensure that they are 
properly treated. And we try and do the best we can to 
guarantee that. But, of course, once they're out of their 
control, there's only so much we can do. But we do have an 
accountability program for those situations.
    Senator Warner. Thank you.
    Chairman Roberts. Senator Bayh.
    Senator Warner. I hadn't finished.
    Chairman Roberts. I beg your pardon.
    Senator Warner. Could the witness from the Department of 
State give their perspective from their department?
    Chairman Roberts. Certainly.
    Ms. Rodley. Thank you, Senator Warner.
    One of our key policy goals in Iraq, obviously, has been to 
build and to build up institutions in Iraq--government 
institutions, government services--that will adhere to the rule 
of law. This is a long-term process. Mr. Goss's agency has been 
involved in this project with us in the stand-up of the new 
Iraqi intelligence service.
    It's a long-term process, obviously. But we are, of course, 
heartened by the results of the election in Iraq. And we are 
following closely the formation of the new government there. 
And we are hopeful that the new government in Iraq will be a 
government that respects the rule of law, and that the Iraqi 
people, who suffered horribly for a long time under a brutal 
dictatorship, won't be subject to the kind of abuses that 
routinely went on under Saddam Hussein.
    So I wouldn't automatically assume that detainees turned 
over to the Iraqi services now would suffer the same fate that 
has been the case very commonly in the past.
    Senator Warner. But, Mr. Chairman, if I could just ask a 
question for the record, such that they can, I guess, given my 
time's up, have to answer for the record.
    But I'm following carefully initiatives by Secretary of 
Defense Rumsfeld as he begins to augment his gathering of 
intelligence which he deems essential. And, frankly, thus far, 
in my examination, he's acting within the guidelines of the 
law, including the newest law that passed the Congress, in 
establishing a greater ability to collect, I think, largely 
tactical intelligence.
    And if the Director would provide for the record his 
views--because I'm sure you're following this--as to whether or 
not you're of the mind that he is acting within the bounds of 
the law and not in any way conflict with the objections of the 
new law in establishing these units.
    The distinguished Chairman and Ranking Member have begun to 
look at this. We both, our Committees, have had hearings or 
briefings on this subject. And it's a matter of active 
consideration here in the Senate side.
    Director Goss. If I'm permitted----
    Senator Warner. You'll have to take it for the record, 
because I don't want to interfere.
    Director Goss. I'm very happy to answer if the time is 
permitted.
    Chairman Roberts. Let me just say that the distinguished 
Chairman has asked the question that I was going to ask in 
reference to the encroachment stories that we have been seeing, 
both in reference to the FBI and the Department of Defense, in 
augmenting their intelligence operations in cooperation with 
you. You don't look encroached upon as of this morning.
    And that we have had a hearing with Admiral Jacoby and with 
Dr. Cambone in the Intelligence Committee about Title 10, Title 
50, and the legalities involved. They have, in fact, kept the 
Committee informed through the staff and through this hearing, 
but I do think that if you could submit that answer to the 
record, you know, for the Chairman, I think it would be very 
helpful, because I think this is a subject we're all interested 
in.
    Senator Warner. Thank you, Mr. Chairman.
    Director Goss. Mr. Chairman, Mr. Chairman, I am completely 
comfortable with where we are in terms of forward-leaning 
efforts by all of the elements in the intelligence community to 
do the best they can with the missions that we have been 
assigned. It is quite clear to me that there has been a lot of 
speculation and RUMINT and so forth, and comment in the paper, 
which is unfounded or badly founded.
    The truth is that I believe that the efforts that the 
Department of Defense is trying to undertake are entirely 
appropriate. They are looking forward to the best ways to get 
the information they need to accomplish their objectives with 
the maximum protection for their warfighters. I think that is 
excellent.
    What it involves is some coordination overseas and some 
understanding about who's doing what where. I go to the analogy 
that the leader of our country team in any overseas situation 
is the Ambassador, the chief of mission, that the person who is 
normally in charge of intelligence, all intelligence 
activities, is the representative of the Central Intelligence 
Agency.
    That does mean there's no other intelligence going on 
except under the Central Intelligence Agency's immediate 
direction. It means it's coordinated there. And I believe that 
we understand that. Those details, in some cases, yet to be 
worked out, because there is forward-leaning, which we have not 
seen forward, which is entirely appropriate.
    I can say on the domestic front exactly the same thing. 
There have been a lot of stories about who is doing what. There 
is no question that the intelligence community has the 
experience to do--it's the National Foreign Intelligence 
Program overseas. There's also no question that occasionally 
agencies like the FBI need to be overseas doing things that 
they do very well in pursuit of their role in counterterrorism. 
We ask that it be coordinated.
    Equally, I think that the FBI wants to be assured, as do I, 
that we are not usurping our authorities in the domestic 
homeland. We all know Americans do not spy on Americans. And 
that is our absolute pledge. It is equally true, however, we 
need some support. And we do have a support base that we use in 
the United States. It is critical that we keep that coordinated 
with Director Mueller.
    These are questions of working out details. Perhaps a DNI 
would have done it faster than we are doing it. But I frankly 
think we're doing it quite well, considering we've got 15 
agencies doing very intense things that we haven't done before.
    I realize that the DCI, which is one of my titles, is an 
endangered species. But I will be handing off my thoughts to 
the DNI. And my thoughts are forward-leaning by all agencies is 
good, and we can coordinate it and make it work.
    Senator Warner. Mr. Chairman, I'm very impressed by the 
responses you've given to both of my questions. I wish you 
well, and we're fortunate you've taken on this task.
    Director Goss. Thank you, sir.
    Senator Warner. You could have been basking in that sunny 
clime of Florida.
    Director Goss. Thank you, Senator.
    Chairman Roberts. Senator Bayh.
    Senator Bayh. Senator Warner, sometimes the heat in 
Washington is just as warm.
    Thank you very much, all of you, for your service to our 
country. I really do appreciate it. These are issues of 
profound importance, the resolution to which is often not 
clear. I wouldn't be surprised if all of you didn't lose a 
significant amount of sleep over your service to our country 
and dealing with what you're dealing with, so I thank you for 
that.
    I also apologize, Mr. Chairman, to you and the panel for 
having to shuttle back and forth. Alan Greenspan, Chairman 
Greenspan, was testifying before the Banking Committee today, 
so we are trying to simultaneously deal with our Nation's 
economic security and prosperity and our physical security 
here. So I apologize for my absence.
    Let me begin by asking a question that involves 
credibility. And I want to make very clear that it doesn't 
involve personal credibility. No one would question any of your 
personal credibility. But I think we do have a national 
credibility problem.
    And so what I want to ask specifically is, for the 
Americans watching us today and hearing about assessments 
involving Iran and North Korea and what is maybe going on there 
that could be threatening our country, what has improved over 
the last couple of years since the assessments about weapons of 
mass destruction in Iraq that would give greater assurance to 
the American people that what we're hearing today is accurate?
    Without getting into obviously classified specifics, have 
our collection capabilities improved significantly? Have our 
analytical capabilities improved significantly? Why should 
people place, you know, credibility behind what we're saying 
here today, given the history with regard to WMD in Iraq?
    Director Goss. That's actually the perfect question, and 
that's what we do. That's, I think, why we all go to work.
    How do we take what we were using and make it better and 
more appropriate? And I think I can report back that we have 
more collectors, better technology being properly applied and 
more focused in the application, more analysts who understand 
the language, who understand the pitfalls of group-think, more 
systems that put this together to make the information come out 
more timely, more flexibility in our systems to deal with 
problems as they pop up--and the nature of our enemy is pop-up, 
quite often--and a greater understanding of each other's 
problems.
    We have all walked a little in everybody else's shoes, and 
I think we see it a little differently. And I think that that's 
been a helpful exercise. We need to get on with the 
architecture of what the community is going to look like, and 
we need to make sure that each unique contribution of each of 
the elements of the community is provided for in a way that it 
is still unique and adding value to the total product.
    I think that we are moving well.
    Senator Bayh. Are we encouraging contrarian analysis? You 
mentioned group-think.
    Director Goss. Indeed, we are. And we're publishing it, 
too, right on the same page.
    Senator Bayh. Any of the rest of you care to comment about 
capabilities having improved? If not, that's OK, too.
    Admiral Jacoby. I'd like to just echo the Director's words 
and talk about a couple of other things, processes, processes 
that you bring, you know, the different views together, 
processes that have made more sourcing of information available 
as we go to community products, and in my agency, a tremendous 
emphasis on training and retraining all the way through the 
senior levels to make sure that we are reinforcing good 
analytical, logical source utilization kinds of capabilities 
that are available to us.
    Senator Bayh. Thank you.
    Yes, Director Mueller.
    Director Mueller. I would say our capabilities have 
dramatically increased. We had a little bit over 1,300 
counterterrorism agents before September 11th. We now have 
3,000-plus. We've established an intelligence directorate which 
has a total complement of 3,787. Of those, 438 are agents, 490 
translators, 2,273 analysts.
    We have, in each of our field offices, a field intelligence 
group that was not there before. Our ability to obtain the 
intelligence, analyze the intelligence, and getting the 
intelligence to the operators has improved dramatically since 
September 11th.
    Senator Bayh. One of the things I think we've all realized 
is that in some of these areas there is just an irreducible 
level of ambiguity. And we try and minimize that, but in some 
of these areas it's still there. And so a certain level of 
humility in reaching conclusions is, I think, in order in all 
of our parts.
    Let me ask you about North Korea and what you assess to be 
the likely reaction to our current strategy in North Korea and 
the role that China might play. But let me back up for a 
second. At least in 2000, with regard to their plutonium 
effort, it seemed to have been in stasis. Now they may have 
been cheating on the uranium side, but cameras were in place. 
Those have been removed. Inspectors were in place. Those have 
been removed.
    There were published reports that plutonium has been 
reprocessed and possibly devices have been created. There are 
even published reports that perhaps in some other areas they 
may have proliferated. This is not a happy course of events 
over the last several years, and at least the initial strategy, 
which seemed to be threaten and ignore, does not seem to have 
worked too well.
    Now we currently have a strategy of engagement through the 
6-party talks, trying to encourage the neighbors to take charge 
of their own neighborhood. My question is: What do you assess 
the North Koreans' likely response to be to our current sort of 
sticks and carrots approach, number one? And number two, might 
a cynic not think that China, which is in a very good position 
to be helpful on this, that there might be an interest there in 
not resolving this problem, because as long as North Korea is 
there and of concern to us, that gives them leverage over us in 
a variety of other areas.
    So, my question is, what do you assess the likely response 
of North Korea to our current approach? And second, how do you 
assess the role that China will play in trying to reach a 
positive conclusion?
    Director Goss. I'm going to try and avoid a policy comment.
    My view is that we are seeing what is the traditional 
bluster diplomacy by North Korea, trying to threaten something 
terrible and get something concrete back. They're dealing with 
nothing to get something, and they do it very effectively. And 
this has been their MO, in my view.
    As to their response, I think that their responses are 
predictable. They are going to continue to do what they want to 
do. Their number-one goal is survivability of the regime. And 
that is where they are going to go. And whatever it takes, 
that's what they'll do. How ridiculous they look on the world 
stage does not seem to bother them.
    Senator Bayh. Forgive me for interrupting, Director. Is 
there anything, in your estimation, or anybody else's 
estimation, that could convince them that the survival of their 
regime--since that's their top priority--is inconsistent with 
the creation and possession of nuclear weapons? They seem to 
have concluded that those two things have to go hand-in-hand. 
What, in your estimation, could lead them to a different point 
of view?
    Director Goss. I do not know the answer to that question. I 
just simply don't have that information. I could make a guess 
and say for them to be relevant, they feel that they have to be 
in the nuclear club.
    There is another aspect that's practical. That's the way 
they make their money. Their bread-and-butter money is selling 
this stuff, proliferating.
    The Chinese response that you ask, I think the Chinese 
understand they have got a very troublesome child right there 
in the nest of the family, and they can't go anywhere. The real 
estate's not going to change. They've got to deal with the 
problem.
    They have border problems, refugee problems, all kinds of 
things. I think the Chinese are genuinely interested in not 
having this be a worse problem. Now, I'm not going to practice 
diplomacy. I'm going to yield to the Department of State. Much 
of that was my personal view, not an informed intelligence 
response.
    Senator Bayh. Thank you, Director.
    Ms. Rodley. I'm just going to pick up on that point about 
the Chinese. We agree with that assessment, that the Chinese 
are genuinely interested and have concluded that it is in their 
interest to resolve the problem with North Korea. We don't see 
any indications that they think it is somehow in their interest 
in dealing with us to have North Korea continue to be a 
problem.
    Senator Bayh. But they seemed to be in denial for such a 
long time, I'm glad they finally found religion on this issue.
    Just two quick things, just very, very quickly.
    Hizbollah, you report their capabilities in terms of 
striking U.S. interests, if provoked. Should we assume that if 
it was ever in our national--if we ever felt compelled to act 
against Iran, that might be the sort of triggering event that 
we would have to anticipate, Hizbollah taking some sort of 
action against us?
    Director Goss. I would certainly recommend that any 
policymaker considering that take that calculation.
    Senator Bayh. My final question is with regard to FARC, 
kind of looking out beyond the horizon. Any assessment by any 
of you about--obviously, they have capabilities of striking our 
interests in Colombia. Are you at all concerned about their 
potential for striking us here in the homeland?
    Director Goss. Well, I used to represent southwest Florida. 
And I have perhaps a different view than others. But I do feel 
there is an immediacy to making sure we understand what is 
going on there. There are, obviously, dialog and communications 
going on between the countries. That means there can be between 
the bad players. And I think it's very important for our law 
enforcement people to be absolutely on top of that. And, as far 
as I know, they are.
    Senator Bayh. Director Mueller.
    Director Mueller. We have not seen, I do not believe, any 
indications or preparations for FARC to launch an attack in the 
United States. However, there are ties between individuals 
associated with FARC and persons in the United States. And 
they're something we have to keep an eye on.
    Senator Bayh. Thank you. Again, I appreciate your service. 
Thank you all.
    Chairman Roberts. Let me just say that, in reference to 
Senator Bayh's comment, if Kim Jong-Il would suddenly get 
religion, having been to North Korea and trying to deal with 
that regime in regards to the famine--and they always have a 
famine, but it was a more severe famine several years ago--he 
is the religion. He is a deity in his own mind, and the people 
believe that, as was his father. So it's a little difficult.
    And I would agree with Director Goss. That's the only card 
he has to play on the world stage, and they're going to play 
it. And they're going to continue. I still think our best 
opportunity is to do exactly what the Director said with China 
in the 6-party talks. But I have no illusions of all of a 
sudden him getting a light bulb to go off. They don't have any 
light bulbs, by the way, in North Korea.
    And following on your statement, I'd like to ask a question 
about Iran. And by your statement, I mean Senator Bayh.
    Admiral Jacoby, your written statement says that Iran is 
likely continuing nuclear weapon-related endeavors, is devoting 
significant resources to its WMD programs, and that, unless 
constrained by a nuclear non-proliferation agreement, Tehran 
will probably have the ability to produce a weapon early in the 
next decade.
    Director Goss, your statement notes that the CIA is 
concerned about the dual-use nature of the technology that 
could also be used to achieve a nuclear weapon.
    Ms. Rodley, your statement notes that Iran seeks, but does 
not yet have, any nuclear weapons.
    It sounds like to me you all agree that, just like Iraq 
before 2004, Iran has troubling dual-use nuclear capabilities. 
What I'm interested in, and both the Vice Chairman and I want 
to get into capabilities and whether or not we have the 
capabilities to determine some intelligence analysis on intent. 
As far as Iran's intent to build a nuclear weapon, it sounds 
like there might be a difference of opinion between you three. 
I'm not suggesting that, but at least that might be the case.
    I would ask all three of you to give us your assessment of 
Iran's intent, to characterize your confidence in that 
judgment, and if you feel that should be better handled in a 
classified section, I certainly appreciate it.
    Director Goss. Mr. Chairman, I would limit my answer. I 
think there is something I would say that is obvious. There are 
other players in the neighborhood that are very concerned that 
also have views about what Iran is up to. And it's important 
that we understand what that might lead to.
    I believe that, having watched the pride of some countries 
in acquiring the world-stage status of having nuclear weapons 
and what that has meant for nationalism and leadership, is that 
it becomes almost a piece of the holy grail for a small country 
that otherwise might be victimized living in a dangerous 
neighborhood to have a nuclear weapon.
    So, in my view, there is an inclination, a very strong 
inclination, by the conservative leadership, present 
conservative leadership of Iran to make sure that they can live 
up to the same levels as some of their neighboring countries. 
And some of those neighboring countries--indeed, Pakistan comes 
to mind--have the bomb.
    Chairman Roberts. Admiral Jacoby.
    Admiral Jacoby. I would join Director Goss, in terms of the 
intent part. We did some work recently looking at the direction 
that threats were going. And they are going away from 
conventional force-on-force confrontation strategy with the 
United States toward terrorism on one end and nuclear weapons 
and not only the status, but the perceived deterrent value, 
that comes with them.
    So I would join the Director, in terms of intent in Iran, 
and would also say that we're engaged in a hard look at 
sequentially nuclear programs or suspected nuclear programs in 
various countries. Iran is next on our agenda, and I believe 
that our look and the Committee's look will probably coincide. 
And we look forward to working that together.
    Chairman Roberts. Ms. Rodley.
    Ms. Rodley. I don't disagree with anything that's been 
said. I would merely add that another element that makes this 
harder to get at is the advantage of ambiguity when it comes to 
nuclear programs.
    In a sense, the Iranians don't necessarily have to have a 
successful nuclear program in order to have the deterrent 
value. They merely have to convince us, others and their 
neighbors that they do. This is a lesson that hasn't been lost 
on them, and it merely complicates both the collection and the 
analysis on this issue.
    Chairman Roberts. I thank all three of you for your 
comment.
    I'm enjoying the red light--I'm now a member of the red 
light club. Have patience, Senator Wyden.
    This is a parochial question, but it's really not. It's a 
national question. Tommy Thompson, the former secretary of HHS, 
left and said his was worried about the Nation's food supply. 
And all of us who are privileged to represent States who are 
involved in agriculture were asked time and time again--I just 
heard it again on the radio as of yesterday. I'm not sure why 
Tommy said that.
    But, at any rate, Admiral Loy, can you tell me how the 
Department of Homeland Security views the threat of what we 
call agroterrorism. The Emerging Threats Subcommittee of the 
Armed Services Committee 4 or 5 years ago got into this subject 
area, knowing how serious it could be, but not many people were 
really thinking about it.
    They had an exercise, or one of the many exercises that has 
been held, called Crimson Sky. Six States were infected by 
foot-and-mouth with an attack from Iraq. Devastating results 
happened, utter chaos. We lost our markets. The herds had to be 
destroyed. People panicked in urban areas. Our food supply 
was--and I'm not talking about 1 year. I'm talking several 
years.
    So are those efforts now really being coordinated well with 
other agencies, specifically the Department of Agriculture? Are 
you getting the intelligence you need? What kind of a priority 
are you putting on this? This is sort of the Mikulski port/
Roberts agriculture question.
    Admiral Jacoby. Yes, sir, Mr. Chairman.
    Without a doubt, the Homeland Security Presidential 
Directive 7 first of all directs the Secretary of Homeland 
Security to be the collaborate effort to pull together the 
critical infrastructure protection of our Nation writ large. 
One of the economic sectors cited in that directive is the food 
sector. And so that has caused the Secretary of Homeland 
Security to challenge that designated lead-sector agency in the 
Department of Agriculture to develop a plan attendant to 
becoming a piece of this puzzle that will be the additive piece 
for food, as it relates to the whole critical infrastructure 
protection of our Nation.
    So there has been very good work undertaken with the 
Department of Agriculture in agricultural operations, the meat-
poultry-eggs world, and in the HHS/FDA world responsible, if 
you will, for the rest of the food production and distribution 
chain that they're responsible for.
    We're at a point where this critical national 
infrastructure protection plan, the base plan, has been 
completed and submitted to the White House. Each of these 
sector plans, we have taken stock--we at the Department have 
taken stock of how we felt their original plan submission met 
the specifications that were outlined in HSPD-7 and have 
offered that commentary back to, in this case, the Secretary of 
Agriculture, with a bit of a challenge to go back to the 
drawing boards a bit and resubmit such that the thresholds are 
reached with what we think are the right concerns to allow not 
only that to be a free-standing sector and plan attended to 
food protection for our country.
    Chairman Roberts. OK. When did you send that over?
    Admiral Jacoby. That's back just before the holidays, sir.
    Chairman Roberts. So that would be under the auspices of 
the new Secretary of Agriculture, obviously. How many people do 
you have on board in regards to homeland security that either 
are on loan from, or consulting with, or are a regular employee 
that are dealing with this? I know that's a tough question to 
ask you right here. I think I know the answer. There's one, at 
least that I know of.
    Admiral Jacoby. There's one as a detailee, if you will, 
into the Department in this business.
    Chairman Roberts. Yes.
    Admiral Jacoby. And, of course, we've got those elements 
from Agriculture that came into the border portal validation 
process.
    Chairman Roberts. Yes.
    Admiral Jacoby. But the effort is to allow the Agriculture 
Secretary to take the lead with respect to developing these 
plans for our country and make sure that they fit well, because 
we could have 13 perfect plans, and I'm convinced that it's the 
interdependencies between and among them that are the real 
challenge.
    Chairman Roberts. It's a very hard thing to develop a 
contingency plan to try to mitigate this. Well, OK, I'll stop 
at that point, because I've already gone way over my time. But 
I need to visit with you and the new Director about this as we 
can determine.
    Chairman Roberts. Senator Rockefeller.
    Vice Chairman Rockefeller. Director Goss, just a very 
specific and one short question. Before the election, we went 
up a color.
    Director Goss. I'm sorry?
    Vice Chairman Rockefeller. On imminent threat, we went up 
from yellow to orange, and nothing happened. And there has been 
no talk or consideration, at least that I'm aware of, of 
similar elevations since then. I'm wondering if, to the extent 
that you're involved with it, sir, to the extent that Homeland 
Security, FBI is involved with it, has there been attempt to go 
back and review the nature of that intelligence and whether or 
not it was a psychological move or whether--I don't mean by 
that political. I mean psychological simply as a warning to 
others--or whether it was, in fact, justified. Has there been 
an effort to go back and re-look at that intelligence?
    Director Goss. Senator, in part, the answer's yes. I don't 
know all of the things that have been looked at. But part of 
that, and again, I'm not--that's not my decision area. We 
provide the information. Part of that, I think, was an 
assessment of the Usama bin Ladin statement that came out, that 
there was a question, was that trying to interfere, and some of 
the questions of propaganda began to really take shape. Exactly 
how that figured into the decisions that were made by others on 
raising the elevation, I don't know.
    Have we gone back and taken a look? The answer is yes. And 
I'll tell you why. One of the things that Senator Bayh was 
pointing out--I should have answered and I neglected to--is 
that we have learned the difference between a worst-case 
scenario and a most-likely scenario. We need to be very careful 
how we need to present these things so people are hearing 
things not as worst-case scenarios, but as most-likely 
scenarios, if that's what we believe.
    We find that, when the chatter level goes up--that's an 
expression we like to use because it sort of covers up what 
we're really talking about--but it means there's something to 
be tuned into. All of our sensors out there, the system is 
blinking red, all of those kinds of statements that we've 
heard. What it means is that we're getting a huge flow of 
information.
    The problem is, how much of that is just wishful thinking 
and how much of it is real planning? That is a very hard 
question to make a judgment on. We are going back, as part of 
our process of how do we get our product better, how do we make 
sure our customer understands what we're saying.
    And that process is very clearly part of the overall 
process that Senator Bayh was asking about. Are we attending to 
correcting not only the collection piece, but the analytical 
piece, including operators, incidentally, when they're 
available?
    Director Mueller. I think there has been an effort to go 
back and look at the--well, we continuously review the threat 
posture day in and day out. And I convinced, given the 
information we had at the time, that we made the right 
decision, in terms of the actions we took, given the 
intelligence at the time.
    Subsequent to that there has been further development in 
that intelligence that may call into question at least some of 
that intelligence. But you also have to reflect upon the fact 
that we had al-Hindi, we had the surveillance documents, the 
Prudential, the stock exchange, a number of things back in this 
time prior to the election, along with intelligence that 
indicated that we can expect a threat or an attack in that 
period before the election.
    As I indicated in my opening statement remarks, we 
undertook substantial efforts to assure that such an attack did 
not take place. We will never know whether those efforts, our 
efforts, the efforts of the CIA, the efforts of DHS, the 
efforts of our counterparts overseas, were effective in 
reducing or removing that threat of an attack before the 
elections.
    But in reflecting upon what we knew at the time, I believe 
that we took the right steps. That doesn't mean that we can't 
do it better the next time, but I'm comfortable with the 
decision that was made back then.
    Admiral Loy. Sir, I think that's a very good capture of the 
time. One thing I would offer is that, over the last 2 years 
and certainly in the last year, where we are with respect to 
capability, where we are with respect to stature of an 
interagency security plan that we keep track of day after day 
after day, I would offer that today's yellow is probably much 
closer to yesterday's orange as it relates to the constancy of 
capability that is there 24 by 7/365 around our country.
    So we have simply grown and matured, both as a brand-new 
department trying to coordinate and collaborate on many of 
these things. And the absolute value of some of the 
contributions that are being made by many yield an attitude, if 
you will, that has the country sort of at a level significantly 
stronger than it ever was before.
    That offers us a chance to keep from the going up and down 
road, so to speak, when the net evaluation of all the players 
at a SVTC or a series of weekly and daily meetings that we 
conduct, rates the flow going by as not being ``worthy'' of 
adjusting the homeland security advisory system to a greater 
level.
    I think the country should take great assurance that the 
level of capability attendant to these things is significantly 
higher day after day after day. And that simply is a result of 
us learning lessons going back from each of the experiences of 
up-and-down that we've undertaken and then ratcheting up, as 
appropriate, the prevention, the protection, and the response 
capabilities of the Nation across the board.
    Vice Chairman Rockefeller. I thank you.
    Chairman Roberts. Let me just say--and Senator Wyden, I'll 
have to buy you lunch or something or, for that matter, 
probably all of you, but we don't need to get in any food 
depravation here. And so I'll try to make this quick. I hope 
there's a look-back on this.
    Admiral Loy. Indeed, there is.
    Chairman Roberts. The same people, same table, same threat, 
no consensus before our Committee in regards to access to 
information. That was the problem. Same representatives 
testifying before us that you're in charge of, that do this on 
a day-to-day basis. And then, 30 days later, a lot of questions 
about the credibility of the sources.
    Now, if you're going to err, you're going to err on the 
side of safety, for goodness sakes. I know that. And if you 
take certain steps, you can't come back. We even had one 
Senator leave this place as a result of this. He did come back. 
But I'm saying that the leadership and this Senate and this 
House were informed in such a way with a very aggressive kind 
of consensus that was not shared when we had them before the 
Committee.
    That's not been too long ago. And then, 30 days later, 
because of detainee information that's been so highlighted 
here, why, then we decided, well, you know, we just didn't have 
a consensus. Now, damn, that's got to quit. Now I know that you 
can't have every source and have a consensus threat analysis 
that's perfect. I'm not asking that.
    But at the time, when you had the same people at same 
table, you know, one of my questions is, do you people know 
each other? And again it was information access. Now I feel 
very strongly about that. And I think it was a classic example 
of why you have to go back--the Vice Chairman calls it red 
teaming--and take a look at this, and say, well, what in the 
heck went wrong? Because we panicked, the entire Congress, not 
to mention Washington, DC., so on and so forth.
    Thank God it didn't happen. You know, maybe I'm wrong. 
Maybe there was an element there that we missed. But it 
certainly was not present in regards to the presentation that 
we received.
    Senator Wyden.
    Senator Wyden. Thank you, Mr. Chairman. As you know, I 
share your concerns about this whole question of how 
information is shared, and that's one of the reasons I raised 
the questions I did on the last round.
    I'd like to go into another area, though, that goes to the 
heart of what I think the challenge is in America. I believe 
strongly in the proposition that our country has got to fight 
terrorism relentlessly and ferociously. And it's got to be done 
in a way that's consistent with protecting the privacy of law-
abiding people, innocent people.
    Now it's been 2 years since the Congress closed down the 
Operation Total Information Awareness program, but the Congress 
is still totally in the dark with respect to what kind of 
information your agencies collect on citizens and how it's 
used. And I want to be very specific and talk about data 
mining.
    Data mining, by the way of shorthand, is essentially 
technology that your agencies use to sift through the records 
and information that involves millions and millions of American 
citizens. I can't find any rules on data mining anywhere.
    And so what I'd like to ask each of you is, what do your 
agencies do with respect to data mining, A? B, are there any 
rules at all? And, C, how are the rules enforced? Because I've 
spent a lot of time on this. And I cannot find any rules at all 
on data mining.
    So maybe if we just go right down the row.
    Admiral Loy.
    Admiral Loy. Sir, you and I have spoken about this a lot, 
as it's been perhaps 18 months or 2 years ago associated with, 
at that point, the Computer Assisted Passenger Pre-Screening 
second program, then known as CAPPS II. As you know, I have 
worked very, very hard to work with the privacy community and 
with many others attendant to recognizing what then became a 
list of eight absolutes that the GAO report initiated for CAPPS 
II and is now ten items that the Congress put in the 
appropriations bill last year for this department, attendant 
to, ``You're not going any further with CAPPS II--and it's now 
Secure Flight, the new program--until all ten of those concerns 
that we have as a Congress are taken care of.''
    We have very diligently gone to great lengths to explore 
each and every one of the eight, each and every one of the now 
ten, and are right on the cusp, I believe, of satisfying the 
Congress and satisfying GAO that it is the right thing for us 
to press on with that particular program, because it has come 
to represent three things.
    Senator Wyden. Admiral, are you saying that that's the only 
program that involves data mining at your agency? I appreciate 
what you've tried to do, and you've certainly been a 
straightshooter on it.
    What I'm concerned about is whether there are any rules 
with respect to data mining generally. I do know what happens 
when Congress picks up on one thing or another and suddenly the 
travel records get out on somebody. You all work with us. We 
try to get something to deal with that specific problem. But I 
don't see any rules with respect to data mining generally. And 
that's what troubles me.
    Admiral Loy. I do not have a management directive in force, 
if you will, in the Department that I'm aware of covering data 
mining.
    Senator Wyden. Are there plans to do that?
    Admiral Loy. I'll be happy to take that on and work with 
you, sir.
    Senator Wyden. All right. Let me just go right down the 
row. We've established at least one agency, other than the 
computer-assisted travel records, doesn't have it.
    Yours, sir?
    Admiral Jacoby. Senator, we have very clear, definitive 
restrictions on what the Department of Defense can do with 
respect to having any information having to do with U.S. 
persons in our files. And those are very conservative 
interpretations and they are regularly inspected by inspectors 
general at all levels inside the departments.
    When we apply data mining tools against the information 
that we have available, there's no U.S. person's data in there 
to begin with. So it's a bit different situation than maybe 
some of the other departments.
    Senator Wyden. So you get no data, for example, from non-
governmental sources, sir?
    Admiral Jacoby. We are not permitted to maintain 
information on U.S. persons, sir.
    Senator Wyden. OK.
    Director Goss.
    Director Goss. As you know, the National Foreign 
Intelligence Program was specifically set up to make sure that 
Americans do not spy on Americans and our work is done 
overseas. And I think that the proposition you have given us is 
one that, when I left Congress, was still red-hot after a 
couple of years of debate, which I think will go on. And that 
is the crossroads between privacy and protection.
    As far as I know, our agency is not a relevant agency to 
answer your question, because we don't do data mining on U.S. 
persons unless it's under some safeguarded procedure which is 
properly notified and so forth.
    Senator Wyden. That's what I'm curious about. I know there 
are areas where you do it, and I'm wanting to know what the 
safeguards are. You're saying you don't do----
    Director Goss. The safeguards are notification of this 
Committee, sir.
    Senator Wyden. Director Mueller.
    Director Mueller. Well, we have one entity in the 
counterterrorism area called the Foreign Terrorist Tracking 
Task Force that, accomplishes certain data--I wouldn't call it 
data mining, but requesting from sources outside the Bureau 
information relating to possible locations of terrorists in the 
United States. And that has been briefed to Congress on a 
number of occasions. It's transparent. We're happy to have you 
come over and brief on it.
    Senator Wyden. That's the only set of rules you have with 
respect to data mining?
    Director Mueller. Well, it's not the only set of rules in 
terms of data mining. You're definition of data mining----
    Senator Wyden. That's what I'm asking.
    Director Mueller. We have information that's brought into 
the Bureau.
    Senator Wyden. Right.
    Director Mueller. When information is brought into the 
Bureau, it's brought in on predication. We have some reason to 
bring the data in. It may be telephone numbers. It may be 
addresses of potential terrorists. Now, we data mine that data. 
But it's data that we have a basis for bringing into our 
databases, whether it comes from our cases or from the 
collection of intelligence that is based on adequate 
predication.
    Senator Wyden. The reason I'm asking the question is that 
there are a lot of people in this country who believe that a 
lot of this information, you know, data mining, takes place 
without predication. And that's why I'm trying to figure out 
what the rules are. And I'm going to let Ms. Rodley answer the 
question. Then I'm going to ask something of all of you, and 
let my colleagues wrap up.
    Ms. Rodley. Senator Wyden, as you know, the State 
Department is not an intelligence collection agency. To my 
knowledge, the only information that we collect and maintain on 
American citizens is passport information. And passport 
information is held very closely and has a very strict set of 
rules regarding its use. I believe, but I will confirm to you 
later, that that's restricted to use for notifying next-of-kin 
when an American citizen is injured or dies abroad and 
cooperation with law enforcement.
    Senator Wyden. Thank you.
    What I'd like from each of you is to confirm in writing 
what policies exist with respect to the sifting of information 
on Americans. And I would like it also to include how 
information is used, if it's used at all--and I understood that 
the Pentagon they had nothing--how it's used when it comes from 
non-governmental agencies where there, I think, is really the 
Wild West.
    I mean, it's one thing if it comes from a Government 
agency. It's quite another if it comes from a non-government 
body. And having spent a fair amount of time digging into this 
area, I can't find what the ground rules are for data mining.
    Can I ask, then, that each one of you will get us the 
ground rules you use for data mining within the next 30 days?
    Director Goss. Absolutely, sir.
    Senator Wyden. Thank you, Mr. Chairman.
    Chairman Roberts. We thank you for your patience, your 
perseverance and your commitment to our country. Thank you very 
much.
    This hearing is adjourned.
    [Whereupon, at 1:17 p.m., the hearing adjourned.]
  

                                  
.