THE OVER-CLASSIFICATION AND PSEUDO-CLASSIFICATION: PART I, II, AND III ======================================================================= HEARING before the SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT of the COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED TENTH CONGRESS FIRST SESSION __________ MARCH 22, 2007, APRIL 26, 2007, and JUNE 28, 2007 __________ Serial No. 110-20 __________ Printed for the use of the Committee on Homeland Security [GRAPHIC] [TIFF OMITTED] TONGRESS.#13 Available via the World Wide Web: http://www.gpoaccess.gov/congress/ index.html __________ U.S. GOVERNMENT PRINTING OFFICE 35-279 PDF WASHINGTON : 2009 ---------------------------------------------------------------------- For Sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; (202) 512ÿ091800 Fax: (202) 512ÿ092104 Mail: Stop IDCC, Washington, DC 20402ÿ0900012009 COMMITTEE ON HOMELAND SECURITY BENNIE G. THOMPSON, Mississippi, Chairman LORETTA SANCHEZ, California, PETER T. KING, New York EDWARD J. MARKEY, Massachusetts LAMAR SMITH, Texas NORMAN D. DICKS, Washington CHRISTOPHER SHAYS, Connecticut JANE HARMAN, California MARK E. SOUDER, Indiana PETER A. DeFAZIO, Oregon TOM DAVIS, Virginia NITA M. LOWEY, New York DANIEL E. LUNGREN, California ELEANOR HOLMES NORTON, District of MIKE ROGERS, Alabama Columbia BOBBY JINDAL, Louisiana ZOE LOFGREN, California DAVID G. REICHERT, Washington SHEILA JACKSON LEE, Texas MICHAEL T. McCAUL, Texas DONNA M. CHRISTENSEN, U.S. Virgin CHARLES W. DENT, Pennsylvania Islands GINNY BROWN-WAITE, Florida BOB ETHERIDGE, North Carolina MARSHA BLACKBURN, Tennessee JAMES R. LANGEVIN, Rhode Island GUS M. BILIRAKIS, Florida HENRY CUELLAR, Texas DAVID DAVIS, Tennessee CHRISTOPHER P. CARNEY, Pennsylvania YVETTE D. CLARKE, New York AL GREEN, Texas ED PERLMUTTER, Colorado VACANCY Jessica Herrera-Flanigan, Staff Director & General Counsel Todd Gee, Chief Counsel Rosaline Cohen, Chief Counsel, Michael Twinchek, Chief Clerk Robert O'Connor, Minority Staff Director ______ SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT JANE HARMAN, California, Chair NORMAN D. DICKS, Washington DAVID G. REICHERT, Washington JAMES R. LANGEVIN, Rhode Island CHRISTOPHER SHAYS, Connecticut CHRISTOPHER P. CARNEY, Pennsylvania CHARLES W. DENT, Pennsylvania ED PERLMUTTER, Colorado PETER T. KING, New York (Ex BENNIE G. THOMPSON, Mississippi (Ex Officio) Officio) Thomas M. Finan, Director and Counsel Brandon Declet, Counsel Natalie Nixon, Deputy Chief Clerk Deron McElroy, Minority Senior Professional Staff Member (II) C O N T E N T S ---------- Page Statements The Honorable Jane Harman, a Representative in Congress from the State of California, and Chairman, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment..................................................... 1 The Honorable David G. Reichert, a Representative in Congress from the State of Washington, and Ranking Member, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment..................................................... 3 The Honorable Bennie G. Thompson, a Representative in Congress from the State of Mississippi, and Chairman, Committee on Homeland Security.............................................. 4 The Honorable Charles W. Dent, a Representative in Congress from the State of Pennsylvania...................................... 22 The Honorable Christopher P. Carney, a Representative in Congress from the State of Pennsylvania................................. 84 The Honorable James R. Langevin, a Representative in Congress from the State of Rhode Island................................. 21 Witnesses Thursday, March 22, 2007, Part I Panel I Mr. Scott Armstrong, Founder, Information Trust.................. 9 Ms. Meredith Fuchs, General Counsel, The National Security Archive, George Washington University: Oral Statement................................................. 11 Prepared Statement............................................. 14 Mr. J. William Leonard, Director, Information Security Oversight Office, National Archives and Records Administration: Oral Statement................................................. 5 Prepared Statement............................................. 7 Panel II Mr. Michael P. Downing, Assistant Commanding Officer, Counter- Terrorism/Criminal Intelligence Bureau, Los Angeles Police Department: Oral Statement................................................. 29 Prepared Statement............................................. 31 Chief Cathy L. Lanier, Metropolitan Police Department, Washington, DC: Oral Statement................................................. 24 Prepared Statement............................................. 26 Thursday, April 26, 2007, Part II Panel I Ambassador Thomas E. McNamara, Program Manager, Information Sharing Environment, Office of the Director of National Intelligence: Oral Statement................................................. 46 Prepared Statement............................................. 48 Dr. Carter Morris, Director, Informational Sharing and Knowledge Management, Office of Intelligence and Analysis, U.S. Department of Homeland Security: Oral Statement................................................. 52 Prepared Statement............................................. 54 Mr. Wayne M. Murphy, Assistant Director, Directorate of Intelligence, Federal Bureau of Investigation: Oral Statement................................................. 57 Prepared Statement............................................. 59 Panel II Mr. Mark Zadra, Assistant Commissioner, Florida Department of Law Enforcement: Oral Statement................................................. 66 Prepared Statement............................................. 68 Thursday, June 28, 2007, Part III Mr. Mark Agrast, Senior Fellow, Center for American Progress: Oral Statement................................................. 94 Prepared Statement............................................. 95 Mr. Scott Armstrong, Founder, Information Trust: Oral Statement................................................. 84 Prepared Statement............................................. 86 Mr. J. William Leonard, Director, Information Security Oversight Office, National Archives and Record Administration............ 83 Ms. Suzanne E. Spaulding, Principal, Bingham Consulting Group LLC: Oral Statement................................................. 90 Prepared Statement............................................. 92 For the Record March 22, 2009, Part I Prepared Statements: Hon. Jane Harman............................................... 111 Hon. Bennie G. Thompson........................................ 113 April 26, 2009, Part II Prepared Statement: Colonel Bart R. Johnson, New York State Police................. 40 THE IMPACT ON INFORMATION SHARING PART I ---------- Thursday, March 22, 2007 U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment, Washington, DC. The subcommittee met, pursuant to call, at 10:09 a.m., in Room 311, Cannon House Office Building, Hon. Jane Harman [chairwoman of the subcommittee] presiding. Present: Representatives Harman, Langevin, Thompson, Reichert, and Dent. Ms. Harman. [Presiding.] The subcommittee will come to order. The chair apologizes for a late start. Even though my party is in the majority, I don't run the schedule here, and there was a conflicting hearing on emergency interoperability, and I was asking questions of witnesses. And that subject, obviously, is directly relevant to some of the tasks of this subcommittee, so I hope you will forgive me. A recurrent theme throughout the 9/11 Commission's report was the need to prevent widespread over-classification by the federal government. The commission found that over- classification interferes with sharing critical information and impedes efficient responses to threats. The numbers tell us we are still not heeding the commission's warning. Eight million new classification actions in 2001 jumped to 14 million new actions in 2005, while the quantity of declassified pages dropped from 100 million in 2001 to 29 million in 2005. In fact, some agencies were recently discovered to be withdrawing archived records from public access and reclassifying them. Expense is also a problem. $4.5 billion spent on classification in 2001 increased to $7.1 billion in 2004, while declassification costs fell from $232 million in 2001 to $48.3 million in 2004. In addition, an increasing number of policies to protect sensitive but unclassified from a range of federal agencies and departments has begun to have a dramatic impact. At the federal level, over 28 distinct policies for the protection of this information exists--28 distinct policies. That is almost as many policies as we have watch lists--that was intended to be humorous. Unlike classified records, moreover, there is no monitoring of, or reporting on, the use or impact of protective, sensitive, unclassified information markings. The proliferation of these pseudo-classifications is interfering with the interagency information sharing, increasing the cost of information security and limiting public access. Case in point, this document from the Department of Homeland Security. This document, which I cannot release to you or the press, is called, ``Special Assessment: Radicalization in the State of California,'' a survey, and it is dated the 22nd of November, 2006. In a few weeks, I will be leading a field hearing to Torrance, California to examine the issues of domestic radicalization and homegrown terrorism, but this DHS document, a survey, as I mentioned, is marked, ``unclassified, for official use only.'' On page one, in a footnote, the survey states that it cannot be released ``to the public, the media or other personnel who do not have a valid need to know without prior approval of an authorized DHS official.'' Our staff requested and was denied an approval. Staff also asked for a redacted version of the document so we could use at least some of its contents at the coming California hearing. DHS was unable to provide one. Let me be clear, and I say this as someone who served for 8 years on the House Intelligence Committee, I am not denying that there may be sensitive information included in this survey and in lots of products prepared by our government, but it illustrates my point. What good is unclassified information about threats to the homeland if we can't even discuss them at a public hearing where the public is supposed to understand what some of those threats may be? How can we expect DHS and others to engage the public on important issues like domestic radicalization if we hide the ball? Unfortunately, this is nothing new. In 1997, the Moynihan Commission stated that the proliferation of these new designations are often mistaken for a fourth classification level, causing unclassified information with these markings to be treated like classified information. These continuing trends are an obstacle to information sharing across the federal government and vertically with state, local and tribal partners, including most especially with our partners in the law enforcement community. And in our second panel, we are going to hear from some of those partners, including Chief Lanier, and I want to welcome her today and congratulate her again on being one of the youngest ever police chiefs in the nation and a very well- qualified person to hold this position. Until we have a robust intelligence and information-sharing system in place in this country with a clear and understandable system of classification, we run the risk of not being able to prevent a terrorist attack on the scale of 9/11 or greater, and I would even add on the scale of 9/11 or smaller. We are hurting ourselves by the way we unnecessarily protect information. This is why this subcommittee will focus some of its efforts in the 110th Congress on improving information sharing with our first preventers, the men and women of state, local and tribal law enforcement who are the eyes and ears on our frontlines. We will do this work in the right way, partnering with our friends in the privacy and civil liberties community who want to protect America while serving our cherished rights. I would like to extend a warm welcome to our witnesses who will be talking about these issues, first, some organizations, and then, two, on the frontlines in our law enforcement organizations. On our first panel, we have assembled an array of experts who will be testifying about the extent of these problems and where are things are trending, and, as I mentioned, our second panel will give us some real-life experiences where classification--and I don't want to put words in their mouths, but I have read their testimony--is an obstacle rather than some form of benefit to them in their role to prevent, disrupt and protect the American public. In addition, I hope witnesses will provide some constructive suggestions about how we might solve this problem, with the goal of ensuring the flow of information, the unfettered flow of necessary information between the federal government and state, local and tribal governments. Welcome to all. I now yield to the ranking member for opening remarks. Mr. Reichert. Thank you, Madam Chair, and thank you for organizing this hearing. It is a pleasure to be here this morning. And thank all of you for being here in time from your busy schedule to come and testify before us. We are all here this morning to discuss one of the subcommittee's major priorities, this over-classification and pseudo-classification. Over-classification, as most of you know, refers to decisions by the federal government to routinely restrict access to information using the designation, ``confidential,'' ``secret'' or ``top-secret.'' Pseudo-classification is a similar practice applied to sensitive but unclassified information. This practice involves federal, state or local entities adding restrictions based on internal policies. The GAO has found that there are at least 56 different sensitive but unclassified designations at the federal level--56. Common examples include, ``for official use only,'' ``sensitive but unclassified,'' ``sensitive security information,'' and ``law enforcement sensitive.'' Some of these designations make sense; some don't. Some, there is a real need to protect classified and sensitive information from disclosure. In a world where virtually piece of unclassified information is available on the Internet, we need to ensure that what needs to be protected remains protected. The lives of our federal, state and local agents in the field often depend on it. But as a classic military strategist once said, ``If you try to protect everything, you wind up protecting nothing.'' The more secrets you keep, the harder they are to keep. I can't tell you how many times I have emerged from a secret briefing only to find out that everything that I have just learned has already been in the newspaper. As a former sheriff, I have vivid memories of the federal government telling me that I could not access information that I needed to do my job because it was classified or otherwise restricted. And I have also watched as the federal government has taken sensitive information from the state and local law enforcement and treated it without regard for its sensitivity. I am just going to share a real brief story with you. Years ago, when we arrested our suspect in the Green River murder case, a serial murder case nationally known, internationally known as one of the worst serial murder cases in the world of 50 victims, the FBI was a part of that team. They produced paperwork connected and associated with that case. Once the person was arrested and charged, of course, there was a request by the defense attorney for information. The FBI would not release the information to substantiate and help our case because they said it was classified. The fear there was this: Of course, they had information that we would have lost our case. Eventually, they came forward, presented the information for discovery; however, the fear was that because of the state laws that existed in the state of Washington, everything they disclosed then would be subject to public disclosure laws. So anything they released to us, the sheriff's office is required by state law to give that to the news media. So that was their concern. We have a lot of issues here to discuss today. I am not going to finish the rest of my statement. We are just happy to have you here, and you know that we understand the problem, and we are looking to help you find solutions. Thank you. Ms. Harman. I thank the ranking member and note that his experience as a sheriff is extremely useful to this subcommittee as we pursue issues like this. The chair now recognizes the chairman of the full committee, the gentleman from Mississippi, Mr. Thompson, for an opening statement. Mr. Thompson. Thank you, Madam Chair. I join you in welcoming our distinguished witnesses today to this important hearing on the problem of over-and pseudo-classification of intelligence. Information sharing between the federal government and its state, local and tribal partners is critical to making America safer, but we won't get there if all we have is more and more classification and more and more security clearances for people who need access to that classified information. The focus should be different. The federal government instead must do all it can to produce intelligence products that are unclassified. Unclassified intelligence information is what our nation's police officers, first responders and private sector partners need most. They have told me time and time again that what they don't need is information about intelligence sources and methods. And I think all of us have been in enough briefings that were somehow classified at varying levels only to see it on the evening news and be shocked that, well, why would you keep it from members of Congress when all we have to do is delay the briefing 6 hours and we can see it? That occurred last week. I am sure Mr. Langevin understands very well. We had a briefing that we were told that was top-secret, took the BlackBerrys, took the cell phones, and, lo and behold, it was on the 5 p.m. news. So to some degree, the over-classification is a problem. If we are going to successfully address terrorism, then we have to share the information in real time and trust our partners to some degree. If we can't trust law enforcement, if we can't trust first responders, who can we trust? So I think it is a hearing that is pertinent to the challenge that we face. I look forward to the testimony of the witnesses, and, obviously, this is one of many, Madam Chair. I am sure we will be participating in over this session. I yield back. Ms. Harman. I thank the chairman and would point out that other members of the subcommittee can submit opening statements for the record, under our rules. I now welcome our first panel of witnesses. Our first witness, Mr. Bill Leonard, is the director of the Information Security Oversight Office at the National Archives. Mr. Leonard's office has policy oversight of the entire federal government-wide security classification system--that is a mouthful--and he reports directly to the president. His office receives his policy and program guidance from the national Security Council. More than 60 executive branch agencies create or handle classified national security information, and Mr. Leonard's work in this capacity impacts all of them. Welcome, Mr. Leonard. Our second witness is my Washington, D.C., neighbor and good friend, Scott Armstrong. Mr. Armstrong is the executive director of Information Trust, a nonprofit group that works toward opening access to government information. He has been inducted into the FOIA Hall of Fame-- congratulations--and was awarded the James Madison Award by the American Library Association in 1992. Mr. Armstrong has been a Washington Post reporter and is the founder of the National Security Archive at George Washington University. Our third witness, Meredith Fuchs, serves as the general counsel to the nongovernmental National Security Archives. At the Archives, she overseas Freedom of Information Act, called FOIA, and anti-secrecy litigation and frequently lectures on access to government information. She has supervised five government-wide audits of federal agency FOIA performance and one focused on the proliferation of sensitive but unclassified information labels. Without objection, the witnesses' full statements will be inserted in the record, and I would hope you could summarize in 5 minutes or less--we have a little timer for your benefit-- your written testimony, and then hopefully we can have a lively exchange of views. Let's start with Mr. Leonard. STATEMENT OF J. WILLIAM LEONARD, DIRECTOR, INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Mr. Leonard. Chairwoman Harman, Mr. Reichert, Chairman Thompson and members of the subcommittee, I wish to thank you for holding this hearing this morning on issues relating to the very real challenge of over-classification. The classification system and its ability to restrict the dissemination of information, the unauthorized disclosure of which would result in harm to our nation and its citizens. represents a fundamental tool at the government's disposal to provide for the common defense. As with any tool, the classification system is subject to misuse and misapplication. When information is improperly declassified or not classified in the first place, although clearly warranted, our citizens, our democratic institutions, our homeland security and our interactions with foreign nations can be subject to potential harm. Conversely, too much classification or the failure to declassify information as soon as it no longer satisfies the standards for continued classification unnecessarily obstructs effective information sharing and impedes an informed citizenry, the hallmark of our democratic form of government. In the final analysis, inappropriate classification activity of any nature undermines the integrity of the entire process and diminishes the effectiveness of this critical national security tool. In this time of constant and unique challenges to our national security, it is the duty of all of us engaged in public service to do everything possible to enhance the effectiveness of this tool. To be effective, the classification process is a tool that must be wielded with precision. Few, if any, both within and outside of government, would deny that too much of the information produced by our agencies is classified. In an audit of agency classification activity conducted by my office approximately one year ago, we discovered that even trained classifiers, with ready access to the latest classification and declassification guides, and trained in their use, got it clearly right only 64 percent of the time in making determinations as to the appropriateness of classification. This is emblematic of the daily challenges confronting agencies when ensuring that the 3 million plus cleared individuals with at least a theoretical ability to derivatively classify information get it right each and every time. In response to the findings of this audit, last year I wrote to all agency heads and made a number of recommendations for their consideration. Collectively, these recommendations help preserve the integrity of the classification system while at the same time reduce inefficiencies and cost. I have included a list of these recommendations in my prepared formal testimony. Recognizing that a focus of this hearing includes policies and procedures for handling sensitive, unclassified information, it is important to articulate recent initiatives by the president to ensure the robust and effective sharing of terrorism information vital to protecting Americans and the homeland from terrorist attacks. To that end, the president has mandated the standardization of procedures for designated marking and handling sensitive but unclassified information across the federal government. Once implemented, our nation's defenders will be able to share controlled, unclassified information more rapidly and confidently. The existence of such an option should significantly reduce the incentive to over-classify information. That happens now, in part, due to the absence of a dependable regime for the proper protection of sensitive information which should not be classified. Again, thank you for inviting me here this morning, Madame Chair, and I would be happy to answer your questions or those that the subcommittee might have. [The statement of Mr. Leonard follows:] Prepared Statement of J. William, Leonard March 22, 2007 Chairwoman Harman, Mr. Reichert, and members of the subcommittee, I wish to thank you for holding this hearing on issues relating to the very real challenge of overclassification of information within the Federal Government as well as for inviting me to testify today. By section 5.2 of Executive Order 12958, as amended, ``Classified National Security Information'' (the Order), the President established the organization I direct, the Information Security Oversight Office, often called ``ISOO.'' We are within the National Archives and Records Administration and by law and Executive order (44 U.S.C. 2102 and sec. 5.2(b) of E.O. 12958) are directed by the Archivist of the United States, who appoints the Director of ISOO, subject to the approval of the President. We also receive policy guidance from the Assistant to the President for National Security Affairs. Under the Order and applicable Presidential guidance, ISOO has substantial responsibilities with respect to the classification, safeguarding, and declassification of information by agencies within the executive branch. Included is the responsibility to develop and promulgate directives implementing the Order. We have done this through ISOO Directive No. 1 (32 CFR Part 2001) (the Directive). The classification system and its ability to restrict the dissemination of information the unauthorized disclosure of which would result in harm to our nation and its citizens represents a fundamental tool at the Government's disposal to provide for the ``common defense.'' The ability to surprise and deceive the enemy can spell the difference between success and failure on the battlefield. Similarly, it is nearly impossible for our intelligence services to recruit human sources who often risk their lives aiding our country or to obtain assistance from other countries' intelligence services, unless such sources can be assured complete and total confidentiality. Likewise, certain intelligence methods can work only if the adversary is unaware of their existence. Finally, the successful discourse between nations often depends upon confidentiality and plausible deniability as the only way to balance competing and divergent national interests. As with any tool, the classification system is subject to misuse and misapplication. When information is improperly declassified, or is not classified in the first place although clearly warranted, our citizens, our democratic institutions, our homeland security, and our interactions with foreign nations can be subject to potential harm. Conversely, too much classification, the failure to declassify information as soon as it no longer satisfies the standards for continued classification, or inappropriate reclassification, unnecessarily obstructs effective information sharing and impedes an informed citizenry, the hallmark of our democratic form of government. In the final analysis, inappropriate classification activity of any nature undermines the integrity of the entire process and diminishes the effectiveness of this critical national security tool. Consequently, inappropriate classification or declassification puts today's most sensitive secrets at needless increased risk. The challenge of overclassification is not new. Over 50 years ago, Congress established the Commission on Government Security (known as the ``Wright Commission''). Among its conclusions, which were put forth in 1955, at the height of the Cold War, was the observation that overclassification of information in and of itself represented a danger to national security. This observation was echoed in just about every serious review of the classification systems since to include: the Commission to review DoD Security Policies and Practices (known as the ``Stillwell Commission'') created in 1985 in the wake of the Walker espionage case; the Joint Security Commission established during the aftermath of the Ames espionage affair; and the Commission on Protecting and Reducing Government Secrecy (otherwise known as the ``Moynihan Commission''), which was similarly established by Congress and which issued its report in 1997. More recently, the National Commission on Terrorist Attacks on the United States (the ``9-11 Commission''), and the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (the ``WMD Commission'') likewise identified overclassification of information as a serious challenge It is Executive Order 12958, as amended, that sets forth the basic framework and legal authority by which executive branch agencies may classify national security information. Pursuant to his constitutional authority, and through the Order, the President has authorized a limited number of officials to apply classification to certain national security related information. In delegating classification authority the President has established clear parameters for its use and certain burdens that must be satisfied. Specifically, every act of classifying information must be traceable back to its origin as an explicit decision by a responsible official who has been expressly delegated original classification authority. In addition, the original classification authority must be able to identify or describe the damage to national security that could reasonably be expected if the information was subject to unauthorized disclosure. Furthermore, the information must be owned by, produced by or for, or under the control of the U. S. Government; and finally, it must fall into one or more of the categories of information specifically provided for in the Order.\1\ --------------------------------------------------------------------------- \1\ Pursuant to Sec. 1.4 of the Order, information shall not be considered for classification unless it concerns: (a) military plans, weapons systems, or operations; (b) foreign government information; (c) intelligence activities (including special activities), intelligence sources or methods, or cryptology; (d) foreign relations or foreign activities of the United States, including confidential sources; (e) scientific, technological, or economic matters relating to the national security, which includes defense against transnational terrorism; (f) United States Government programs for safeguarding nuclear materials or facilities; (g) vulnerabilities or capabilities of systems, installations, infrastructures, projects, plans, or protection services relating to the national security, which includes defense against transnational terrorism; or (h) weapons of mass destruction. --------------------------------------------------------------------------- The President has also spelled out in the Order some very clear prohibitions and limitations with respect to the use of classification. Specifically, for example, in no case can information be classified in order to conceal violations of law, inefficiency, or administrative error, to restrain competition, to prevent embarrassment to a person, organization, or agency, or to prevent or delay the release of information that does not require protection in the interest of national security. It is the responsibility of officials delegated original classification authority to establish at the time of their original decision the level of classification (Top Secret, Secret, and Confidential), as well as the duration of classification, which normally will not exceed ten years but in all cases cannot exceed 25 years unless an agency has received specific authorization to extend the period of classification. As I stated earlier, the ability and authority to classify national security information is a critical tool at the disposal of the Government and its leaders to protect our nation and its citizens. In this time of constant and unique challenges to our national security, it is the duty of all of us engaged in public service to do everything possible to enhance the effectiveness of this tool. To be effective, the classification process is a tool that must be wielded with precision. Few, if any, both within and outside Government, would deny that too much of the information produced by our agencies is classified. In an audit of agency classification activity conducted by my office approximately one year ago, we discovered that even trained classifiers, with ready access to the latest classification and declassification guides, and trained in their use, got it clearly right only 64 percent of the time in making determinations as to the appropriateness of classification. This is emblematic of the daily challenges confronting agencies when ensuring that the 3 million plus cleared individuals with at least theoretical ability to derivatively classify information get it right each and every time. In response to the findings of this audit, last year I wrote to all agency heads and made a number of recommendations for their consideration. Collectively, these recommendations help preserve the integrity of the classification system while at the same time reduce inefficiencies and cost. They included:Emphasizing to all authorized holders of classified information the affirmative responsibility they have under the Order to challenge the classification status of information that they believe is improperly classified (Sec. 1.8(a) of the Order). Requiring the review of agency procedures to ensure that they facilitate classification challenges (Sec. 1.8(b) of the Order). In this regard, agencies were encouraged to consider the appointment of impartial officials whose sole purpose is to seek out inappropriate instances of classification and to encourage others to adhere to their individual responsibility to challenge classification, as appropriate. Ensuring that quality classification guides of adequate specificity and clarity are prepared and updated to further accurate and consistent derivative classification decisions (Sec. 2.2 of the Order). Ensuring the routine sampling of recently classified information to determine the propriety of classification and the application of proper and full markings (Sec. 5.4(d)(4) of the Order). Consideration should be given to reporting the results of these reviews to agency personnel as well as to the officials designated above who would be responsible to track trends and assess the overall effectiveness of the agency's efforts and make adjustments, as appropriate. Ensuring that information is declassified as soon as it no longer meets the standards for classification (?3.1(a) of the Order). Ensuring that prior to exercising the national security exemption as set forth in 5 U.S.C. 552b(1) when responding to FOIA requests, that agency personnel verify that the information involved clearly meets the standards for continued classification irrespective of the markings, to include declassification instructions, contained on the document. Recognizing that a focus of this hearing includes policies and procedures for handling sensitive unclassified information, it is important to articulate recent initiatives by the President to ensure the robust and effective sharing of terrorism information vital to protecting Americans and the Homeland from terrorist attacks. To that end, the President has promulgated a set of guidelines and requirements that represent a significant step in the establishment of the Information Sharing Environment (ISE) called for by section 1016 of the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA). Specifically, to promote and enhance the effective and efficient acquisition, access, retention, production, use, management, and sharing of Sensitive But Unclassified (SBU) information, including homeland security information, law enforcement information, and terrorism information, the President has mandated the standardization of procedures for designating, marking, and handling SBU information across the Federal Government. A clear mandate for achieving this goal has been laid out for the entire Executive branch and significant progress is underway to develop for the President's consideration standardized procedures for handling controlled unclassified information. Once implemented, our nation's defenders will be able to share controlled unclassified information more rapidly and confidently. The existence of such an option should significantly reduce the incentive to overclassify information. This happens now, in part, due to the absence of a dependable regime for the proper protection of sensitive information which should not be classified. Again, I thank you for inviting me here today, Madame Chairwoman, and I would be happy to answer any questions that you or the subcommittee might have at this time. Ms. Harman. I thank the witness. Now, we will hear from Mr. Armstrong. STATEMENT OF SCOTT ARMSTRONG, FOUNDER, INFORMATION TRUST Mr. Armstrong. Thank you, Madam Chair. Thank you. I am pleased to be able to discuss these issues with this subcommittee, given the membership of the subcommittee and the full committee include many of the people that have provided the leadership, or attempted to provide the leadership, to dig into these difficult questions on this committee and other committees of the Congress. I am here on my own, of course, but I also would like to note that I participate in a dialogue, which is presently sponsored by the Aspen Institute, between the senior journalists, editors, publishers and high-level U.S. government officials from various national security intelligence agencies. The purpose of the dialogue has been to address recurring concerns about the handling of classified information, the fact that sensitive information can find its way into the major media and could potential cause damage. The discussions have included the attorney general, the director of Central Intelligence, the deputy director of National Intelligence, ranking members from the National Security Council, the Department of Defense, the National Security Agency, the FBI, the CIA, the Department of Homeland Security and the Department of Justice. The dialogue is continuing with a variety of initiatives that I hope will further involve members of this committee and your colleagues and members of your staff, and we will be in consultation with you on that issue. I would like to note three major areas today out of my testimony. Twenty-two years ago, in 1985, when I left the Washington Post, to found the National Security Archive, I went to the man who was then considered the maven of secrecy in the Reagan administration, General Richard Stillwell, and I developed an interesting and productive dialogue with General Stillwell who was chairing a commission to examine systemic vulnerabilities in the classification system. At that time, the Reagan administration's concern was not so much news media leaks but the fact that there were significant leaks in the form of espionage. General Stillwell not only quoted, and usually misquoted, a sentence in Supreme Court Justice Potter Stewart's concurrence in the Pentagon Papers case, ``When everything is classified, then nothing is classified,'' but he finished that sentence, ``And the system becomes one to be disregarded by the cynical or the careless and to be manipulated by those intent on self-protection or self-promotion.'' Like Justice Stewart, General Stillwell believed that the hallmark of a truly effective internally security system would be the maximum possible disclosure, recognizing that secrecy can best be preserved only when credibility is maintained. Regrettably, the system then pertained a systemic use of special access programs and other compartmented intelligence controls by those that have now been extended even on classified information and created a labyrinth of security measures, often unaccountable and sometimes wholly unauthorized. That situation has not changed in the ensuing 20 years. My experience has reinforced the notion that government needs to spend less energy on calculating how to punish unauthorized disclosures of politically sensitive information to the news media and more on distinguishing the truly sensitive information which must be protected. Once that information is identified as properly warranting protection, government officials and the news media have shown a willingness to honor reasonable requirements. The second issue is the question that this Congress addressed--the House addressed in 2002 when it passed the Homeland Security Information Sharing Act, which became part of the Homeland Security Act of 2004. It mandated the creation of a unique category of information, known as sensitive homeland security information, which was sensibly designed to allow this necessary sharing of information with state and local officials while withholding it from the general public. This designation has proven difficult for the executives to implement, so difficult that in fact it went in a different direction and the mandate instead became to disperse information control authority across of broad range of executive agencies. This resulted in a disjointed and uncoordinated proliferation of sensitive but unclassified designations to protect poorly defined categories of information. In one instance, the Department of Homeland Security drafted a draconian nondisclosure agreement designed to apply the restrictions on tens of thousands of federal employees and hundreds of thousands, potentially, of state and local first responders. Although it was only enforced briefly, this NDA was more severe than NDA's effect for sensitive, compartmented information and for a variety of controls over the most sensitive intelligence information the government has. While it has been withdrawn, it is an indicator of the extent to which there has been little progress. Lastly, the National Intelligence Reform Act of 2004 provided another challenge which the administration found wanting. Congress provided a broad, centralized power for the new director of national intelligence and urged the new DNI to create a tearline report system by which intelligence gathered by an agency is prepared with the information relating to intelligence sources and methods is easily severed but for the report to protect such sources and methods from disclosure. The prospect of such a tearline encouraged many observers to believe the classification system could be improved by concentrating on the guidelines for protecting well-defined sources and methods. By making the refined decisions to protect that which truly requires protection, more of the remaining information would be available for sharing within the intelligence community, as well as with state and local officials charged with homeland security responsibilities. They were naturally a benefit for the public and the press as this information, other information, was decontrolled. Ms. Harman. Mr. Armstrong, if you could summarize now, we would appreciate it. Mr. Armstrong. Increasingly, officials in certain departments must greatly risk their security clearances and potentially their careers and their family's financial security in order to correct and guide public-to-public record. It is my hope that rather than attempt to repair the present system of over-classification to the public, that the public, the news media, the Congress and the intelligence community would benefit more from the specification of rigorous and tight definitions of sources and methods in accord with the tear-line processing of intelligence in order to maximize information sharing while protecting the nation's secrets. Ms. Harman. Thank you very much. Ms. Fuchs? STATEMENT OF MEREDITH FUCHS, GENERAL COUNSEL, THE NATIONAL SECURITY ARCHIVE, GEORGE WASHINGTON UNIVERSITY Ms. Fuchs. Thank you. Chairman Harman, Ranking Member Reichert and members of the subcommittee, thank you for having me appear today. After the September 11th attacks on the United States, there were many signs that official secrecy would increase. Some of it was legitimate, out of concern about risks posed by poorly safeguarded government information. In addition, in March 2002, White House Chief of Staff Andrew Card issued a directive to federal agencies, requesting a review of all records and policies concerning the protection of sensitive but unclassified information, also called SBU. This memorandum spurred agencies to increase controls on information. Mr. Leonard and Ms. Harman have already talked about the classification system and some of the statistics regarding that. I am going to focus on the SBU system where while we identified 28 different information labeling standards and GAO identified 56, I have heard from the Office of the Program Manager of the information-sharing environment that they have identified at least 100 different so-called safeguarding labels. There is no way to determine how many records are labeled with these safeguarding controls, because agencies do not track their use of these labels. When we issued our report a year ago, we identified a number of problems posed by these policies. Since that time, the Government Accountability Office and the program manager of the Information Sharing Environment themselves have expressed the same concerns. I am going to quickly list them, and my written testimony gives some additional detail. First, there is no monitoring of the use of safeguard labels. At many agencies, there are no limits on who can put a safeguard label on the information, and, indeed, at some agencies, that means hundreds of thousands of people are able to put these labels on. There is no time limit for how long the label lasts. Few agencies provide any procedure for the labels to be removed. Few agencies include restrictions that prohibit the use of labels for improper purposes, including to conceal embarrassing or illegal agency actions. Agencies have conflicting policies on the intersection of these labels and the Freedom of Information Act, but evidence certainly suggests that these labels are used to increase withholding of information. These labels likely increase the cost of information security, and there is no consistency among agencies about how to use these labels. So it seems likely that they inhibit information sharing. Focusing just on the three major concerns that my organization has, the absence of reporting mechanisms for sensitive but uncontrolled markings makes any assessment of the extent to which a policy is being used difficult, if not impossible. Because safeguarding sensitive unclassified information impacts safety, security, budget and information disclosure, all of which are important national concerns, there ought to be some sort of overarching monitoring. Second, in order to protect the important role that public access has played in government accountability, it is important that a system for challenging the use of these labels be established. Third, this unregulated use of safeguarding labels inhibits information sharing. Because the systems are sprawling in their scope and uncoordinated, they set up roadblocks for sharing. Lack of trust in the system likely leads to more classification, which also limits dissemination of the information. I would like to quickly touch on what progress has been made within the government. Mr. Leonard referred to this in his statement. As you know, Congress required the president to implement and information-sharing environment with the Intelligence Reform and Terrorist Prevention Act of 2004. Pursuant to that, the Office of the Program Manager of the Information Sharing Environment was established to assist in the development of the environment. A report and implementation plan for the information- sharing environment was required within one year of enactment of the law. President Bush issued a memorandum on December 16, 2005 that set up this office, and specifically directed departments and agencies to standardized procedures for handling SBU. The resulting working group completed an inventory of designations in March 2006, and there should have been a recommendation for submission to the president by June 2006 on standardization of SBU procedures. Well, it is now March 2007, and, as far as I know, that hasn't happened. Part of the problem may be that these legislative mandates are imposed on an executive branch that does not want Congress to interfere and is not as concerned as I would hope about government accountability. And while I am reluctant to express that sort of a sentiment, the lack of willingness by the executive branch to respond is evidenced by the refusal of the Office of the Director of National Intelligence to participate in a March 2006 report by the Government Accountability Office about this very matter. In its report, GAO noted that the ODNI, the Office of the Director of National Intelligence, declined to comment on the draft, stating that review of intelligence activities is beyond GAO's purview. I know that we are running short of time. I am going to just quickly raise three concerns about the process. I met, along with several other people, with Ambassador McNamara, who is now the program manager, and I was very impressed by him and the work that they have done, and I think that they have done a great analysis. However, there is nothing in the process that suggests to me that we are quickly moving to standardization of SBU labels. While they have done an analysis, they were supposed to have submitted a recommendation to the White House in January 2007. That may have occurred. If it did, it hasn't been made public, and having public review of that is absolutely critical. Secondly, the program manager's effort is focused on information related to homeland security, law enforcement and terrorism, but this problem of SBU is far broader, and the category of information that affects our security is even broader than that. Placement of the program manager at the Office of the Director of National Intelligence possibly limits the likelihood that a governmentwide solution will be considered. And, finally, there just doesn't seem to be a schedule in place. They have collected and analyzed scores of information control policies, they have many ideas about how to fix the problem, but they have been perpetually behind schedule. I am hopeful my testimony today has been helpful, and I am happy to take any questions. Thank you. [The statement of Ms. Fuchs follows:] Prepared Statement of Meredith Fuchs March 22, 2007 Chairwoman Harman, Ranking Member Reichert and Members of the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment, I am honored to appear before you today to talk about the growing problem of government secrecy and the danger it poses to our security. I am testifying on behalf of the National Security Archive (the ``Archive''), a non-profit research institute and leading user of the Freedom of Information Act (FOIA). We publish a wide range of document sets, books, articles, and electronic briefing books, all of which are based on records obtained under the FOIA. In 1999, we won the prestigious George Polk journalism award for ``piercing self-serving veils of government secrecy'' and, in 2005, an Emmy award for outstanding news research. In my five years at the Archive, I have overseen five audits of federal agency FOIA processing. Most relevant to this hearing is the report we issued in March 2006 entitled: ``Pseudo-Secrets: A Freedom of Information Audit of the U.S. Government's Policies on Sensitive Unclassified Information.'' After the September 11, 2001, attacks on the United States, there were many signs that official secrecy would increase. The attacks themselves led to a wave of legitimate concern about the risks posed by poorly safeguarded government information. Additionally, in March 2002 White House Chief of Staff Andrew H. Card issued a directive to federal agencies requesting a review of all records and policies concerning the protection of ``sensitive but unclassified'' information. This memorandum spurred agencies to increase controls on information. Further, during times of war or national crisis, the government's tendency to keep secrets always becomes more pronounced and pervasive. Thus, the U.S. entry into hostilities in Afghanistan and Iraq as part of the Global War on Terrorism necessarily led to an increase in the creation of secrets. The available statistics show that since the September 11 attacks on the United States, there has been a dramatic upsurge in government secrecy. Classification has multiplied, reaching 14.2 million classification decisions in 2005, nearly double the number in 2001. Officials throughout the military and intelligence sectors have admitted that much of this classification activity is unnecessary. Former Secretary of Defense Donald Rumsfeld acknowledged the problem in a 2005 Wall Street Journal op-ed: ``I have long believed that too much material is classified across the federal government as a general rule. . . .'' \1\ The extent of over-classification is significant. Under repeated questioning from members of Congress at a hearing concerning over-classification, Deputy Secretary of Defense for Counterintelligence and Security Carol A. Haave eventually conceded that approximately 50 percent of classification decisions are over- classifications.\2\ These opinions echoed that of then-Chair of the House Permanent Select Committee on Intelligence Porter Goss, who told the 9/11 Commission, ``we overclassify very badly. There's a lot of gratuitous classification going on, and there are a variety of reasons for them.'' \3\ --------------------------------------------------------------------------- \1\ Donald Rumsfeld, War of the Worlds, Wall St. J., July 18, 2005, at A12. \2\ Subcommittee on National Security, Emerging Threats and International Relations of the House Committee on Gov't Reform Hearing, 108th Cong. (2004) (testimony of Carol A. Haave), http://www.fas.org/ sgp/congress/2004/082404transcript.pdf; See id., (Testimony of J. William Leonard, Director of ISOO) (``It is my view that the government classifies too much information.''). \3\ 9/11 Commission Hearing, (Testimony of then Chair of the House Permanent Select Committee on Intelligence Porter Goss) (2003), http:// www.9-11commission.gov/archive/hearing2/9-11Commission_Hearing_2003-05- 22.htmpanel_two. --------------------------------------------------------------------------- Alongside traditional classification are a plethora of new non- statutory labels that are being applied to protect information that is deemed sensitive but unclassified. Some estimates count over 100 different so-called ``safeguarding'' labels for records. There is no way to determine how many records are labeled with safeguarding controls, however, because agencies do not track their use of these labels. At the same time that the indicators all started to point to increasing secrecy, the numerous investigations into the September 11 attacks on the United States each concluded that excessive secrecy interfered with the detection and prevention of the attacks.\4\ Other reports, including one by the Government Accountability Office and one by the successor body to the 9/11 Commission, have decried the delay in establishing a workable information sharing environment.\5\ --------------------------------------------------------------------------- \4\ As the staff director of the Congressional Joint Inquiry on 9/ 11 found, ``[t]he record suggests that, prior to September 11th, the U.S. intelligence and law enforcement communities were fighting a war against terrorism largely without the benefit of what some would call their most potent weapon in that effort: an alert and informed American public. One need look no further for proof of the latter point than the heroics of the passengers on Flight 93 or the quick action of the flight attendant who identified shoe bomber Richard Reid.'' Similarly, the entire 9/11 Commission report includes only one finding that the attacks might have been prevented: ``publicity about Moussaoui's arrest and a possible hijacking threat might have derailed the plot.'' Final Report of the National Commission on Terrorist Attacks Upon the United States, at 276 (emphasis added). \5\ In January 2005, the Government Accountability Office (GAO) added ``Establishing Appropriate and Effective Information-Sharing Mechanisms to Improve Homeland Security'' to its High Risk List, stating that they were ``designating information sharing for homeland security as a government-wide high-risk area because this area, while receiving increased attention, still faces significant challenges'' (GAO-05-207). On December 5, 2005, the 9/11 Public Discourse Project, the successor body of the 9/11 Commission, issued its Final Report on 9/11 Commission Recommendations. Important areas on information sharing, including ``incentives for information sharing'' and ``government-wide information sharing,'' received a D in the scheme of letter grade assessments. --------------------------------------------------------------------------- Against this background, the National Security Archive conducted an extensive audit of the actual policies used by agencies to ``safeguard'' information.\6\ We filed targeted FOIA requests that identified information protection policies of 37 major agencies and components. We obtained and reviewed 28 distinct policies for protection of sensitive unclassified information, many of which allow any employee in the agency to designate sensitive unclassified information for protection, but few that provide any procedure for the labels to be removed. Only a small number of policies included restrictions that prohibit the use of the labels for improper purposes, including to conceal embarrassing or illegal agency actions, or inefficiency. Further, and perhaps most troubling from a security perspective, was the remarkable lack of consistency among agencies as to how to use these labels. Most of the policies were vague, open- ended, or broadly applicable, thus raising concerns about information sharing, the impact of such designations on access to information, free speech, and citizen participation in governance. Given the wide variation of practices and procedures as well as some of their features, it is probable that these policies interfere with interagency information sharing, increase the cost of information security, and limit public access to vital information. --------------------------------------------------------------------------- \6\ The complete audit report is available at http://www.gwu.edu/ nsarchiv/NSAEBB/NSAEBB183/press.htm. --------------------------------------------------------------------------- Further, we concluded that there are almost no incentives to control the use or misuse of these safeguarding labels. Unlike classified records or ordinary agency records subject to FOIA, there is no monitoring of or reporting on the use or impact of protective sensitive unclassified information markings. In comparison, it is useful to look to the formal classification system, which is governed by Executive Order 12958, as amended, and is managed and monitored by the Information Security Oversight Office (ISOO) at the National Archives and Records Administration (NARA). ISOO publishes an annual report to the President in which it quantifies the number of classification and declassification decisions, the number of individuals with authority to classify material, and the type of information that is being classified. Such reports enable the Executive Branch and Congress to monitor the costs and benefits of the classification system and to identify trends that may suggest the need to reform the system. The absence of reporting mechanisms for sensitive but unclassified control markings makes any assessment of the extent to which a policy is being used difficult, if not impossible. Because safeguarding sensitive unclassified information impacts safety, security, budget and information disclosure--all important national concerns--some form of overarching monitoring of all information control would be valuable. Nor is there a procedure for the public to challenge protective markings. For classified information, the security classification system provides precise limits on the extent and duration of classification as well as a system for declassification, including public requests for declassification. For non-security sensitive information, the FOIA provides a relatively clear and user-friendly process for the public to seek access to information held by the government. Sensitive unclassified information, however, falls into a black hole. Based on anecdotal information, we believe that information previously available under FOIA or on unrestricted Web sites may no longer be available to the public. Yet, there is virtually no opportunity for the public or other government personnel to challenge a decision to mark a document for protection as SBU, FOUO, or SSI. Accordingly, in order to protect the important role that public access has played in government accountability, it is important that a system for challenging the use of sensitive unclassified information markings be established at each agency or, alternatively, that FOIA procedures be adjusted to counteract the chilling effect these markings may have on disclosure under FOIA. Congress began to respond to these problems from the outset. Both the Homeland Security Act of 2002 and the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA) directed the development of policies for sharing classified and sensitive but unclassified information. IRTPA requires the rapid implementation of an information sharing environment (ISE) to facilitate the government-wide sharing of information about terrorist threats. As the subcommittee is aware, the office of the Program Manager of the ISE was established pursuant to IRPTA to assist, in consultation the Information Sharing Council (ISC), in the development of the ISE. A report and implementation plan for the ISE was required within one year of enactment of IRTPA. President Bush issued a Memorandum on December 16, 2005, directing federal departments and agencies to standardize procedures for handling SBU information. The President's December 2005 Memorandum setting up the office of the Program Manager contained specific direction related to the standardization of Sensitive But Unclassified (SBU) information. Specifically, Guideline 3 required each department and agency to inventory existing SBU procedures and their underlying authorities across the Federal government, and to assess the effectiveness of these procedures and provide this inventory and assessment to the Director of National Intelligence (DNI) for transmission to the Secretary of Homeland Security and the Attorney General. The working group completed an initial inventory of SBU designations in March 2006. The original schedule would have resulted in recommendations for submission to the President regarding the standardization of SBU procedures by June 2006. More than 5 years after the September 11 attacks, however, there still is no government-wide plan to standardize information controls and ensure government accountability. Part of the problem may be that these legislative mandates are being imposed on an executive branch that does not appreciate Congressional interference and does not seem concerned about government accountability. I am reluctant to express such strong sentiments, but the lack of willingness by the Executive Branch to respond to Congress's mandates is strongly evidenced by the refusal of the Office of the Director of National Intelligence to participate in a March 2006 report by the Government Accountability Office about this very matter. In its report, GAO noted that the ODNI ``declined to comment on [GAO's] draft report, stating that review of intelligence activities is beyond GAO's purview.'' Further, the responsibility for overseeing the development of a comprehensive plan has been shifted from office to office; it was first lodged at the Office of Management and Budget, then at the Department of Homeland Security and now in the Office of the Director of National Intelligence. Thus, despite the urgent need to better coordinate information sharing, it has taken some time for the program to find a home. Whether the ODNI is the proper home remains to be seen, especially in light of that office's unwillingness to be subjected to congressional scrutiny. Another delay was caused by the quick departure of the first Program Manager for the Information Sharing Environment (ISE) in January 2006. He was replaced by Ambassador Thomas McNamara. I had the opportunity, along with several other open government advocates, to meet with Ambassador McNamara on November 20, 2006. Ambassador McNamara described for our group the challenges that the office of the Program Manager is facing in rationalizing the system for safeguarding records. They must obtain the cooperation of many communities of interest, consider multiple users of information, and consider the concerns of both governmental and non-governmental entities. To date, they have only analyzed the problem. The November 16, 2006, Report of the Program Manager, Information Sharing Environment, indicates that the interagency Information Sharing Council (ISC) created to develop an implementation plan for the ISE, along with standardizing procedures for sensitive but unclassified information, has now created a Coordinating Committee which will submit recommendations for SBU standardization through the White House policy process. We were told that a recommendation would be transmitted to the White House in January 2007, but I am not aware whether this has happened or whether the recommendation will ever be made public. For my own part, I was impressed with Ambassador McNamara's work to date, but I was not left with any strong impression that a transparent, government-wide information-sharing plan will emerge any time soon. First, there are many steps in the process that do not yet appear to have taken place. A recommendation has yet to be circulated for review by interested parties. Any recommendations should be made available to the public for comment. Even the general outline of a program, which was previewed to me and others in November 2006, raised several concerns about transparency, government accountability, and appropriate procedures. Once a recommendation is accepted, then an implementation plan will be necessary. It is possible that there will need to be statutory or regulatory changes to facilitate implementation. There certainly will be budgetary issues raised by any recommendation and plan for standardization. Second, the focus of the Program Manager's effort is solely on information related to homeland security, law enforcement and terrorism. The problem of sensitive unclassified information is far broader, and even the category of information that affects our security is likely more extensive than is covered by the Program Manager's mandate. Placement of the Program Manager at the ODNI further limits the likelihood that a government-wide solution will be considered or emerge as an outgrowth of the process. Because of the placement within the ODNI, the program manager is likely to face great challenges in implementing an information sharing network that includes agencies outside the intelligence community. Issues of information security, information sharing, and public access to information should not be addressed in a piecemeal manner. There are best practices in some agencies that should be shared, as well as lessons to be learned about the costs and benefits of secrecy and disclosure. If the problem of information controls interfering with information sharing is ever to be solved, it will require a government-wide commitment. Third, there does not appear to be any schedule in place for moving the process forward. The fact that the Program Manager has collected and analyzed scores of information control policies is progress. That analysis surely offers insight into what works and what does not. Now the analysis must be translated into a plan with strict deadlines and funding in order to make implementation a reality. Given that the project has been perpetually behind schedule, there is cause for concern about the development of an actionable plan and implementation. Unnecessary secrecy has been on the rise since September 11, with the result of threatening our safety and national security while impeding the process of democracy and the effective functioning of government. There is no time for turf wars or bureaucratic inertia. We are long overdue for solving the challenges of information sharing and overcoming the strain on government accountability brought about by excessive secrecy. SBU designations have been noted by government authorities as a major impediment to information sharing, yet no solution to the problem has been developed. I am hopeful that my testimony today offers a rationale and a sense of urgency for instituting stronger measures to encourage needed reforms in information-control programs across the federal government. I am grateful for your interest in these issues and am happy to respond to any questions. Ms. Harman. I thank the three witnesses. Your testimony is very helpful. And, Mr. Leonard, nobody doubts your good faith and hard work, but I do question whether we are making much progress rolling a big rock up a steep hill. Let me start there. As I said, I spent 8 years on the House Intelligence Committee, and I spent many years on virtually every security committee in this House since being elected in 1992. I do respect the need to protect sources and methods. I have never, so far as I know, ever compromised a source or a method, and I understand that real people die if that happens, and we close down our ability to get sensitive information in the future, so we should never do that. But that is the purpose of our classification system. The purpose of our classification system is not to deprive the public of information it should have, and, surely, it is not to deprive our first preventers on the ground of information they need to know what to look for and what to do. Does anyone disagree with what I just said? Mr. Leonard. Absolutely not, Madam Chair. Ms. Harman. I am sure you don't. I also share Ms. Fuchs's opinion of Ambassador Ted McNamara, with whom I have met. His title is program manager, Information Sharing Environment, and he reports to the director of national intelligence, Mike McConnell. He is a good man, and he is trying to shift a lot of information out of the classification system into this SBU system. But, again, I am worried that we are just going to replace one protection system with another protection system. Does anyone disagree with that thought? No. Okay. Well, now I am really getting discouraged. So where do I come out? I am intrigued by Mr. Armstrong's suggestion at the conclusion of his testimony--and I know I was rushing you, but I am trying to be fair all our members and here and to our second panel. I think what you said is, we need to start over. We can't take this jerry-rig system and fix it. It is too complicated, and we aren't going to fix it, we are just going to move the boxes around. We really ought to think through what our goals and objectives are and start over. Is that what you said? Mr. Armstrong. Precisely. That is the lesson of 50 years of national security controls, 35 years since the Pentagon Papers, 34 years since Watergate and 22 years, 25 years of these three commissions that have ensued. All have come back to the same thing: If we want to protect important information, we must identify it, isolate it, understand why it needs to be protected and communicate that to government employees. They will respect it, the press will respect it, in turn, and you will not have dangerous leaks of national security information. You will also have an enormous amount of information that is not contained in those categories that will freely available for public policy debate and discussion. That is what we need. Ms. Harman. Well, let me ask the other two witnesses to respond to this innovative and, I think, potentially visionary suggestion. I am not sure we are up to this, but I just want to ask what you think about it. It is basically to start over, to identify what we need to protect. And, as I heard you, Mr. Armstrong, you were saying if we do this right, then we actually discourage and stop leaks because information that should be in the public domain gets there, and we should presume we have patriots in our press corps who work for government, who serve in Congress and elsewhere who will protect secrets that they understand clearly need to be protected. So my question, let's start with you, Mr. Leonard, is, what do you think about this idea of starting over to isolate what truly needs to be protected? Mr. Leonard. Well, clearly, the challenge of over- classification, as I included in my prepared testimony. As long ago as the 1950s, the Wright commission, established by Congress at the height of the Cold War, found that over- classification was a threat to national security. The largest problem, as I see, with the current framework is that it is tilted toward encouraging people to withhold. Everyone is very mindful of the fact that they can be disciplined, fired, maybe even criminally prosecuted for unauthorized disclosure. Even though the policy makes an affirmative--at least the classification imposes an affirmative responsibility on cleared individuals to challenge inappropriate classifications, quite frankly, I am never aware of that ever happening. And, to me, it is the flipside of the coin: Yes, we have to hold people accountable for inappropriate disclosures, but unless we similarly have a system to hold people accountable for inappropriate withholding or hoarding of information, the system will remain dysfunctional. Ms. Harman. Thank you very much. My time is expiring, so, Ms. Fuchs, if you have any comments, please make them now. Ms. Fuchs. Right. I mean, I would second what Mr. Leonard said. I think that the secrecy is a reflexive response by people within the government, and it is going to be hard to fight that. There should be better training, and the incentives have to be changed. And the incentives are changed, I think, by doing oversight, having audits of secrecy decision making, making legal remedies available to the public, having whistleblower protection and having leadership on the issue. Ms. Harman. Thank you very much. The chair now recognizes Mr. Reichert for 5 minutes. Mr. Reichert. Thank you, Madam Chair, and, again, thank you for being here this morning. Mr. Leonard, you made a statement, I think it was you, that said that trained people only get it right 64 percent of the time. Why is that? Mr. Leonard. It harkens back to the point I just made, Mr. Reichert. I was in a similar forum with a very senior official from the Defense Department once and she indicated, I think, a very prevalent line of thought, and that is, especially in time of war, people want to err on the side of caution. And I am dumfounded by that approach, because, first of all, I never understand why we want to have error as part of any implementation strategy. But besides that, if we are ever going to get it right, to me, in time of war is the time we have to get it right. As Ms. Fuchs says, we have to change the incentives and have people recognize that the inappropriate withholding or hoarding of information can have just as much as a deleterious impact on the national security as any unauthorized disclosure can. Mr. Reichert. Mr. Armstrong, would you say that that is true? In your statement, you mentioned sensitive homeland security information for state and locals don't get to the state and locals. Is that part of the problem that Mr. Leonard is talking about? Mr. Armstrong. I believe it is. I think there are two reasons. One is the bureaucratic default to caution, that it is easier to control than it is to release. But, secondly, control has its own value and purpose. It allows a manipulation of the debate. It prevents people from having a more open and participatory discussion about the allocation of resources, about priorities. We heard in the dialogue from the Department of Homeland Security at one point that they were considering the prosecution or restraint on journalists publishing information about chlorine plants and their danger in metropolitan areas. Now, the plant doesn't become more dangerous because there is a publication of it. It is possible that some terrorist might learn that there is something there that they could blow up, but it is unlikely that they haven't already identified it. What happens is the public learns about it, and as that information is openly discussed, precautions are taken, political actors are held accountable, and those political actors who become decisions makers during crisis begin to take appropriate action. Mr. Reichert. Now, for all three of you, there has been-- Mr. Armstrong, you especially mentioned that you have been involved in discussions with just about every member of the intelligence community. I didn't hear you say that state and local agencies were involved in discussions that you were having. Did I incorrectly-- Mr. Armstrong. No, that is correct. Our primary purpose was when the equivalent of an Official Secrets Act was passed in the year 2000 and the vetoed and then came up again the following year, we wanted to learn, in the press, we wanted to learn what the concern was in the federal government and how we might best meet that. But we have not had that discussion at the local level. Mr. Reichert. For all three of you, quickly, state or local public disclosure laws, have you been trying to connect with state officials and local officials to find out how to work through that problem? Ms. Fuchs. If I could respond, I wanted to mention(it is a big problem what happens at the state and local level, and there is going to have to be some coordination. I wanted to draw the subcommittee's attention to a report that was done by the American Society of Newspaper Editors that was released last week where they did an audit where they went to state and local offices to get copies of the Comprehensive Emergency Response Plan in each of those places. That is something that is mandated to be made public by the Emergency Planning and Community Right to Know Act of 1986, and it is something that, for instance, tells you escape routes that the public should be aware of if something happens in their community. More than a third of the public officials refused to provide the report. It is sort of the opposite of--a variation on the story that you told, Mr. Reichert at the outset---- Mr. Reichert. Yes. Ms. Fuchs. --about not sharing information. But it is the kind of thing, for instance, I know that in D.C. that K Street divides which way you get out of the city if something happens. Well, I work on one side of K Street and my kid goes to school on the other side of K Street. Knowing that information is important to me as a member of the public. Mr. Reichert. Yes. I would make one last point. We can come up, devise the greatest system in the world, which we don't have right now, obviously, but if we start over, it could hopefully end up being better, but the system is made up of people, and that is going to be our major problem. I know on a number of occasions in my 33 years in the sheriff's office we were going to serve a search warrant and I showed up at an address to serve a search warrant on a suspect in that major serial case I was talking about earlier only to find a reporter standing on the front porch waiting for me. So we can build a great system, but it all boils down to the people and the responsibility that they take. Thank you. I yield. Ms. Harman. I thank the ranking member for yielding. The chair now recognizes Mr. Langevin for 5 minutes. Mr. Langevin. Thank you, Madam Chair. I want to thank our witnesses for testifying here today. Can you just walk me through the process of how people get access to this sensitive but unclassified information? Does this come down to the fact that we needed better information- sharing environment among people like law enforcement, and one of the things I know that DHS is struggling through right now is creating an information-sharing environment for terrorism- related issues, similar to the type of information sharing that law enforcement--that type of a system that law enforcement has right now. For example, in New England, we have RISNet, Regional Information Sharing Network, so that information on law enforcement issues can get out there to those that need it. DHS is struggling with creating that kind of a system. I think Charles Allen at DHS is doing a very good job of moving in the right direction, but we are certainly not there yet. So is that the model that we have right now? I just want to get an understanding of when something is sensitive but unclassified, can anybody in the law enforcement realm--you know, is that in the need-to-know category? Mr. Leonard. Although not in my official realm of responsibilities, I can address that and that is the bottom line. The challenge is, there is no one model. With over 100 types of systems, I dare say there is no one individual in the entire federal bureaucracy who knows how to leverage access to all these types of controlled information. And the challenge then, of course, is, when agencies want to leverage technology to help disseminate this information, and there are all different types of controls and constraints on it, you are somewhat restricted in terms of what you can put into a technology system if you don't know the rules for handling and disseminating and access, because there currently are no systems. And this is what Ambassador McNamara's office is in fact trying to address. Mr. Armstrong. One issue you might consider, congressman, is the fact that the Department of Homeland Security does not seem to have a risk assessment matrix that allows them to put value on particular information and figure out what it is they are trying to control and from whom. When they issued, in 2004, a nondisclosure agreement, which I included a copy of, attached to my statement, they included the long list of things and then the words, ``and other identifier used by other government agencies to categorize information as sensitive but unclassified,'' and gave authority to any supervisor to create any such category. So people have millions of different interpretations. It requires leadership, it requires some identification of what the dangers are and what the purpose of controlling information is. If they can't identify that, don't control it. Mr. Langevin. Let's kind of elaborate on that, if we could, a little more. How might we go about creating a standardized system for sharing sensitive but unclassified information? And would a standard approach be a net positive? And furthermore, to what extent do you think there will be any resistance to such an effort and from whom? Ms. Fuchs. Well, I think that standardizing would be a benefit. I mean, we see it in the classification system, there is some regularity, there are reporting requirements, there is way to challenge classification decisions. It may not happen that often, but at least there is some transparency to the system and there is some control. What is happening in the SBU system is it is all over the place, and the absence of any type of regulation means that it is an interference with information sharing. But I want to also add that part of making information sharing work means including the public in information sharing, because the public has just as much concern as the government in protecting ourselves. I mean, we all know the story of the sniper in Washington, D.C. It was only because the license plate on that car got out and a trucker who stopped at the side of the street saw the car and reported it. The public has a role to play as well, so any kind of system should consider the importance of sharing information with the public. Mr. Leonard. And being a lifelong bureaucrat, I find rules can be empowering as well. Because, right now, with the mass confusion, people on the frontlines and the federal bureaucracy who have to make decisions, there is such confusion that the default is, well, I don't know if I am going to default. If we have clearly articulated rules, that can be empowering as well, because then it removes the uncertainty in people's minds. They know exactly what they can disclose, under what circumstances and who. And also then if people want to challenge those controls, we know what it is we are challenging. Mr. Armstrong. I think the standardization needs to be of the risk assessment process and of the process of engaging the partners with whom you want to share information. If you build it, they will come, but it has to be truly understood, as Meredith mentioned, those partners include the public. The chlorine plant situation, people who own chlorine plants do not want information distributed about them, particularly when there are risks from them. Ms. Harman. The time of the gentleman has expired. The chair now recognizes the very patient Mr. Dent of Pennsylvania for 5 minutes. Mr. Dent. Thank you, Madam Chairman. Mr. Leonard, the president directed that the designation of sensitive but unclassified information be standardized. In response, an interagency working group, led by DHS, DOJ and the program manager for the Information Sharing Environment, initiated an effort to address these issues. I understand that your office is part of that effort and that the working group has submitted recommendations to the president regarding the standardization of sensitive but unclassified procedures. When do you expect these recommendations to be approved by the president? And what outstanding issues are there? Mr. Leonard. Sure. Congressman I serve as an advisor to the working group that Ambassador McNamara heads up. Being an observer and an advisor to that group, I can attest that significance progress has been made. Those recommendations actually have not yet been passed up to the president as of yet, but my understanding is that the timeline is a matter of months of get it through the process. Mr. Dent. To get it to the president. Mr. Leonard. To get it to the president; yes, sir. Mr. Dent. Okay. Then what can we do to assist you through this process? I mean, what can Congress do? Mr. Leonard. Well, one of the challenges that I have always took note of is that many of the controls that agencies have placed on unclassified information are actually based in statute. And one of my observations has been is that each and every time we create one of these new homegrown controlled items, that we seem to do it from scratch and we don't pay homage to what has gone before. And I believe whenever Congress makes the observation that certain types of information needs to be controlled from a statutory point of view, that to whatever extent including in those mandates is the need to ensure that it is being done in a consistent manner, I think would be highly effective. Mr. Dent. More specifically, Mr. Leonard, I know you testified before that the classification authority is pursuant to the president's article 2 authorities under the Constitution, and that certainly complicates these legislative remedies. So, I guess, what, in your opinion, would a legislative remedy to the problem of over-classification and pseudo- classification look like? Mr. Leonard. Well, my reference to the president's article 2 authority, of course, is with respect to the classification for a national security information system, which I oversee. The pseudo-classification system, as I said, that has its origins in a number of different areas. Anything that we can do to change--the observation was made about ultimately it is people who make the system works, and anything that we can do to encourage people to recognize the need that inappropriate withholding of information is similarly deleterious and change that culture is, I think, ultimately what is required in this area. Mr. Dent. Thank you. And, finally, in August of 2004, you testified, essentially, that the creation of a director of national intelligence would be a good thing if the DNI could overcome all of the nuances in the classification system. Has this been the case, or does the DNI need more authorities to iron out the classification system, in your opinion? Mr. Leonard. The DNI has taken a leading role, from my observation, in terms of trying to establish greater consistency with respect to how the intelligence sources, methods and activities are handled across the board. That is obviously a work in progress, but my observation is that the DNI has taken a much needed leadership role in this area. Mr. Dent. Thanks, Madam Chairman. I yield back. Ms. Harman. I thank the gentleman. As this panel exits, I would just like to note that I was one of the godmothers for the creation of the Department of Homeland Security, and I was a coauthor of the legislation establishing the Office of the Director of National Intelligence, and our clear intent, on a bipartisan basis, was to simplify, not complicate, this system. So I am hopeful that this subcommittee, on a bipartisan basis, will take up Mr. Armstrong's challenge and see if we can accomplish that goal, which is a lot later than we intended but very timely. The first panel is excused, and as the second panel comes up, I would note that we are expecting votes between 11:15 and 11:30. Mr. Reichert and I want to hear from both witnesses and ask our questions very promptly, because we don't want you to have to stay around for the half hour or more that we will have to recess. Thank the witnesses very much. Okay. Let's have the second panel takes your seats. Even without nametags, we know who you are. Our first witness, Cathy Lanier, is the chief of the Metropolitan Police Department here in Washington, D.C. She was named police chief by D.C. Mayor Adrian Fenty and assumed her position on January 2nd of this year. Before her appointment, she was tapped to be the first commanding officer for the police department's Office of Homeland Security and Counterterrorism, which was established in 2006. A highly respected professional in the areas of homeland security and community policing, Chief Lanier took the lead role in developing and implementing coordinated counterterrorism strategies for all units within the Metropolitan Police Department and launched Operation TIPP, which is D.C.'s Terrorist Incident and Prevention Program. Our second witness, Michael Downing, serves as the assistant commanding officer, Counterterrorism Criminal Intelligence Bureau, where he assists two regional operations, which command the Los Angeles Joint Regional Intelligence Center, called the JRIC. And we welcome him from L.A. I will skip all the rest of his wonderful credentials, because we want to get right to your testimony. And, without objection, the witnesses' full statements will be inserted in the record. I now ask each witness to summarize as quickly as possible, starting with Chief Lanier. STATEMENT OF CHIEF CATHY L. LANIER, METROPOLITAN POLICE DEPARTMENT, WASHINGTON, D.C. Chief Lanier. Thank you. Good morning. Chairman Harman, members of the committee, staff and guests, thank you for this opportunity to present this statement on the impact of over-classification on information sharing. To begin, I emphasize the important role that local law enforcement plays in homeland security efforts. We are more than merely first responders, as you have stated. We are first preventers who are uniquely positioned to detect and prevent terrorist incidents right here in our home. There are 800,000 law enforcement members across the nation who know the communities they serve and are in the best position to detect the investigative criminal activity that might be connected to terrorism. Information provided by local police, if discovered early and matched with the right intelligence, can help detect, disrupt and prevent a terrorist plot. However, in order for local law enforcement to perform its critical role of first preventer, it is essential that the police officers and support personnel be provided with timely intelligence information. This requires an intelligence conduit consisting of an organized, effective and trusting flow of information between local law enforcement and our federal partners. It is important to note that in the national capital region, the flow of information among our federal partners is fairly good through the JTTF. Part of that reason for that is that our agencies have worked together for years sharing information and coordinating responses to a variety of situations. Pre-established relationships and a track record of trust has made smooth and eliminated obstacles experienced by other jurisdictions. The JTTF understands local law enforcement and appreciates the value of those relationships. Nonetheless, several issues remain as it relates to federal and local information sharing. Law enforcement needs better access to federal intelligence information as well as an enhanced ability to translate such information into local law enforcement activity. This involves classifying information appropriately as well as creating a more efficient local access, both classified and non-classified information. Access to federal intelligence information remains a major obstacle for local law enforcement. While the security classification system that mandates security clearances helps to ensure that sensitive information is protected, it also hinders the local homeland security efforts. Information collected by the federal government is sometimes overly classified and causes valuable information that should be shared to remain concealed. Law enforcement does not need to know the details about where information originates or how it is collected; however, we do need sufficient and timely information in order to know what to look out for as well as what scenarios to prepare for. Information provided by the federal government that is dated or only shared once the threat becomes imminent does not offer value to local law enforcement. At this point, it is too late for us to enhance our capabilities to effectively deal with a threat. Conversely, local law enforcement analysts should also ensure that intelligence they collect is assessed and shared with DHS, FBI and other local and state agencies. The significant challenges facing local law enforcement is in translating this intelligence once it is obtained from the federal government into actions for local jurisdictions. This challenge is notably exacerbated when the information provided is either not timely or is restricted so that it cannot be shared with other stakeholders. It is critical that the local law enforcement community be made aware of global trends regarding people and organizations that have a potential to commit crimes or pose a bona fide threat to our community. Awareness of these global trends will identify emerging threats and allow me to properly train my patrol officers on the individual elements needed to mitigate these emerging threats. As a police chief, I need various forms of intelligence that will come from a variety of different agencies. On the strategic side, I need a global view of known terrorist organizations, groups and individuals, both foreign and domestic, and the potential threat they may post to the homeland. This type of intelligence provides me with a better understanding of the history of these groups, their capabilities and their interest in particular targets or weapons. The broad nature of this type of intelligence, in my opinion, should not be classified beyond law enforcement sensitive. Even when it involves emerging groups and capabilities, as long as the information remains in the law enforcement community and is used for legitimate law enforcement purposes, it should not cause harm to any ongoing intelligence operation. In addition to increased awareness of global trends, I also need to be familiar with the local threat environment right here in the national capital region. Being familiar with the presence of known terrorist organizations in this region allows me to educate and train my officers on the known tactics used by these organizations so they can pay particular attention to the certain subtle activities while on routine patrol. For example, if it is known that a particular terrorist organization that has a presence in the NCR is known to engage in financing terrorist activities by selling unpacked cigarettes, my patrol officers need to be aware of this so that particular tactic--so they would know which information needs to be shared with the JTTF for further analysis. This intelligence, combined with information such as how these groups travel, communicate and influence will help me influence the resource allocation, training, prevention efforts and response practices. The bottom line, the frontline officers who see individual elements of crimes every day need to be knowledgeable of emerging threats and tactics in order to link these individual elements so that trends can be identified early and mitigated quickly. I will skip to the end of my testimony to stay within the time, but I do believe that ultimately improvements in the intelligence-sharing environment will make our nation safer, as the federal government and local first responders work jointly as first preventers. And I thank you for having this opportunity today. [The statement of Chief Lanier follows:] Prepared Statement of Cathy L. Lanier March 22, 2007 Chairwoman Harman, members of the Committee, staff and guests-- thank you for the opportunity to present this statement on the impact of overclassification on information sharing. Specifically, I will address federal-level information sharing with local law enforcement. To begin, I emphasize the important role that local law enforcement plays in homeland security efforts. We are more than merely first responders. We are first preventers who are uniquely positioned to detect and prevent terrorist incidents right here at home. There are 800,000 law enforcement members across the nation who know the communities they serve and are in the best position to detect and investigate criminal activity that might be connected to terrorism. Information provided by local police--if discovered early and matched with the right intelligence--can help detect, disrupt and prevent a terrorist plot. However, in order for local law enforcement to perform its critical role of first preventer, it is essential that police officers and support personnel be provided with timely intelligence information. This requires an intelligence conduit consisting of an organized, effective and trusting flow of information between local law enforcement and our federal partners. It is important to note that in the national capital region, the flow of information among federal, state and local partners through our Joint Terrorism Task Force (JTTF) is quite good. Part of the reason for this is that our agencies have worked together for years sharing information and coordinating responses to a variety of situations. Pre-established relationships and a track record of trust have smoothed many of the obstacles experienced by other jurisdictions. The JTTFs understand local law enforcement, and appreciates the value of local relationships. I believe other aspects of the federal homeland security community could learn from the experiences of the JTTFs. Nonetheless, several issues remain as it relates to federal-local intelligence sharing practices. Local law enforcement needs better access to federal intelligence information, as well as an enhanced ability to translate such information into local law enforcement activity. This involves classifying information appropriately, as well as creating more efficient local access to both non-classified and classified information. Further, we need to recognize the importance of smaller law enforcement agencies, as well as the need to expand homeland security efforts beyond our traditional partners. I will discuss these issues in greater detail in this testimony. Access to federal intelligence information remains a major obstacle for local law enforcement. While the security classification system that mandates security clearances helps to ensure that sensitive information is protected, it also hinders local homeland security efforts. Information collected by the federal government is sometimes overly classified, causing valuable information that should be shared to remain concealed. Local law enforcement does not need to know details about where information originates or how it was collected. However, we do need sufficient and timely information in order to know what to look out for--as well what scenarios to prepare and drill for. Intelligence analysts should assess intelligence information and synthesize it in a manner that allows pertinent information to be shared widely among local law enforcement personnel. This requires that they write the analysis for release and appreciate the type of actionable information useful to law enforcement. I want to also emphasize the importance of quickly sharing information--even if the information is not fully vetted. Information provided by the federal government that is dated or only shared once a threat becomes imminent does not offer value to local law enforcement. At this point it is too late for us to enhance our capabilities to effectively deal with the threat. Conversely, local law enforcement analysts should also ensure that intelligence they collect is assessed and shared with DHS, FBI, and other local and state agencies. A significant challenge facing local law enforcement is translating the intelligence information that is obtained from the federal government into action for local jurisdictions. This challenge is notably exacerbated when the information provided either not timely or is restricted and cannot be shared with other stakeholders. It does a local police chief little good to receive information--including classified information--about a threat if she cannot use it to help prevent an attack. Operationally, local law enforcement needs to be aware of the presence of possible terrorist organization activity in their jurisdiction and surrounding region. This intelligence--combined with information such as how these groups travel and communicate-- influence local law enforcement resource allocation, training, prevention, and response practices. It is critical that the local law enforcement community be made aware of global trends regarding people and organizations that have the potential to commit crimes or pose a bona fide threat to the community. Awareness of these global trends will identify emerging threats and allow me to properly train my patrol officers on the individual elements needed to mitigate these emerging threats. As a police chief I need various forms of intelligence that will come from a variety of different agencies. On the strategic side, I need a global view of known terrorist organizations, groups and individuals--both foreign and domestic--and the potential threat they may pose to the homeland. This type of intelligence provides me with a better understanding of the history of these groups, their capabilities and their interest in particular targets or weapons. The broad nature of this type of intelligence, in my opinion, should not be classified beyond ``law enforcement sensitive''. Even when it involves emerging groups or capabilities, as long as the information remains in the law enforcement community, and is used for legitimate law enforcement purposes, it should not cause harm to any ongoing intelligence operation. In addition to increased awareness of global trends, I also need to be familiar with the local threat environment in the national capitol region. Being familiar with the presence of known terrorist groups in the region allows me to educate and train my officers on the known tactics used by these organizations so they can pay particular attention to certain subtle activities while on routine patrol. For example, if it is a known that a particular terrorist group that has a presence in the NCR is known to engage in financing terrorist activities by selling untaxed cigarettes, my patrol officers need to be aware of these and other tactics so that they would know which information to pass to the JTTF for further analysis. The bottom line issue is that the frontline officers, who see the individual elements of crimes, need to be knowledgeable of emerging threats and tactics in order to link these individual elements so that trends can be identified early and mitigated quickly. Importantly, there are also occasions where local law enforcement officials may need to be apprised of classified information. There is no question that local law enforcement personnel have added value to federal task forces--such as the JTTFs--as well as Department of Homeland Security operation centers. It is for these reasons that appropriate security clearances must be granted--in a timely manner--to local police. While the Metropolitan Police Department (MPD) has obtained a number of security clearances for its members, that is not true for all law enforcement organizations. It is imperative that federal, state, and local law enforcement personnel that are working together to protect the nation from terrorist threats be on equal footing. While local law enforcement has seen some improvement in the process of receiving security clearances, more must be done to expedite the process. I am optimistic that the DHS-supported fusion centers that are becoming operational across the country will help bridge some the existing intelligence sharing gaps. This will be accomplished by having analysts from different agencies and perspectives talking to each other and working together. . While large-sized police departments have the ability to develop and implement more sophisticated intelligence functions, small agencies are sometimes left out of the loop. In the Washington area alone there are 21 municipal law enforcement agencies that have less than 40 police officers. It is incumbent upon the federal government and large police departments to ensure that smaller agencies are kept informed--and understand the importance of intelligence information. Formal liaisons should be established, and every agency--no matter how small--should have an accessible representative that is familiar with handling intelligence information. I also believe that federal and local law enforcement should consider expanding its homeland security efforts beyond traditional parameters. We need to examine the possibility of establishing intelligence conduits with other local government components. Firefighters, paramedics and health workers, are well positioned to contribute valuable information to help protect our communities. In order to harness these types of resources, intelligence-sharing networks must be more inclusive. Further, the intelligence community will also need to work on developing and sharing intelligence that is actionable for other professions. We should begin planning for this new front now. Finally, local law enforcement recognizes that in addition to needing timely intelligence from federal agencies, we also must be willing and able to share timely and useful information gathered at the local level with our federal state, and local partners. This is what the fusion center concept is all about. Local law enforcement stands ready to do its part in contributing to--and receiving and acting upon--the information that we hope will be shared more extensively in the future. Ultimately, such improvements in intelligence sharing will make our nation safer, as the federal government as local first responders work jointly as first preventers. Thank you again for the opportunity to appear before you today. Ms. Harman. Thank you, Chief. Your testimony is very important for the hearing record. Mr. Downing? STATEMENT OF MICHAEL DOWNING, ASSISTANT COMMANDING OFFICER, COUNTER-TERRORISM/CRIMINAL INTELLIGENCE BUREAU, LOS ANGELES POLICE DEPARTMENT Mr. Downing. Chairman Harman, Ranking Member Reichert, members of the subcommittee, thank you for the opportunity to discuss the Los Angeles Police Department's efforts to fight terrorism and the important issue of the over-classification of intelligence. Having recently returned from an 8-week attachment to the new Scotland Yard's Counterterrorism Command, I have a much greater appreciation for change and why we need to change. In Peter Clarke's words, the national coordinator for counterterrorism, if you looked at the 30-year IRA campaign and look at the antithesis of that campaign, that is the threat that they have now. To take a 130-year-old organization's special branch and amalgamate it into the counterterrorism command is huge change for a culturally rich institution, and if they change, we certainly need to change. Local law enforcement's ability to play a significant role in stopping terrorism is seriously hampered by the over- classification of intelligence by the federal government. In Los Angeles, we enjoy a positive constructive partnership with various federal agencies, but the classification process has been a substantial roadblock to our capacity to investigate terrorism cases. The terrorist threat to our communities currently involves continued domestic terrorism and international terrorists plotting to destroy American cities. Prior to September 11, local law enforcement agencies primarily investigated domestic terrorist groups, including white supremacists, hate groups, special issue groups conducting criminal activities. Investigations centered on familiar cultures that were socially motivated by political ideologies to commit terrorism. The bombing of the Alfred Murrah building in Oklahoma, in 1995, the most notable domestic terrorist attack, had a catastrophic impact on American soil and brought together local and federal law enforcement to bring the terrorists to justice. Local law enforcement, in fact, played a critical role in the investigation and apprehension of the offenders. I understand that you are coming to Torrance in a few weeks for a field hearing. The JIS case was an unclassified case that dealt in prison radicalization and conversion to gangs and terrorism. That was an unclassified case because it didn't have an international connection. Had it had an international connection, it would have been classified and the outcome perhaps could have been much different. Prior to September 11, international terrorism was not in the national consciousness. Despite the first World Trade Center bombing, most Americans did not realize the significant threat of Islamic extremism and the consequences of this terrorism. September 11 changed the mindset of all Americans, including local law enforcement. In addition, in the war on Afghanistan, and later in Iraq, the face of Islamic terrorism changed. No longer was the only threat a group of dissident Saudis hijacking a plane to crash into American symbols of power. Throughout the world, suicide bombers attacked discos, train stations and buses. Islamic terrorism has continued to demonstrate its reach and power from changing the outcome of the 2004 national election in Spain to paralyzing the transportation system in London in 2005. The terrorist transformed himself from Middle East foreigner to second and third generation local citizen. The sheer number of terrorist threats to our communities across the country has increased dramatically, and the federal government's capacity to collect intelligence and investigate these threats has been overwhelmed. Consequently, local law enforcement's efforts to counterterrorism has never been more important and has never been more critical. Across the country, a new concept of fusion centers arose, where analysts from police departments, FBI, Immigration and Customs Enforcement and other agencies worked on the same information screens to identify possible terrorist threats. In Los Angeles, the LAPD provides personnel to participate in the JRIC located in Norwalk, California. We have 14 other participating agencies in that center. The JRIC provides critical information-sharing opportunities with the federal government. However, over- classification of intelligence has become an impediment to full information sharing with the local law enforcement agencies who participate in the JRIC. As such, it has provided an impediment to the JTTFs, which is a great success story in our partnership with the federal agencies. After the 9/11 Commission issued its comprehensive report, America's local law enforcement community, consisting of over 700 law enforcement officers, was reluctantly invited into the effort of countering the international terrorist threat. One part of the rationale was that neither the CIA or DOD could conduct intelligence operations within the U.S. against American citizens. Moreover, the total number of FBI special agents assigned to protect over 18,000 cities, towns and villages throughout the United States is slightly over 12,000 people. This number becomes less reassuring when one examines the number of agents needed to handle the FBI's other responsibilities, including white collar crime, organized crime, public corruption, financial crime, fraud against the government, bribery, copyright infringements, civil rights violations, bank robbery, extortion, kidnapping, espionage and so on. At the national level, local law enforcement was not deemed an important stopgap in the field of counterterrorism, particularly in the area of Islamic extremists. In addition, the significant role of---- Ms. Harman. Mr. Downing, could you please summarize at this point, because we are concerned that a vote will be called. Mr. Downing. Thank you. I will conclude, Ms. Chairman. The United States faces a vicious, amorphous and unfamiliar adversary on our land. Our previous defensive strategy to protect our cities was ineffective, and our current strategy is fraught with issues. We cannot support any process that takes us closer to another failure. We have mutual interest in working common direction to prevent acts of terrorism in the United States. The classification levels are based on fear, the probability of information being disseminated to those that can cause serious damage to national security. What this system is not designed to do is to protect us against the threat itself. This is achieved by disseminating the information to people who stand the best chance of stopping violence against American cities, our first preventers and law enforcement. [The statement of Mr. Downing follows:] Prepared Statement of Michael P. Downing March 22, 2007 I. Introduction Chairman Thompson, Chairwoman Harman, Ranking Member Reichert, and Members of the Subcommittee, thank you for the opportunity to discuss the Los Angeles Police Department's (LAPD) efforts to fight terrorism and the important issue of the over-classification of intelligence. Local law enforcement's ability to play a significant role in stopping terrorism is seriously hampered by the over-classification of intelligence by the federal government. While in Los Angeles we have enjoyed a very positive and constructive partnership with various federal law enforcement agencies, including the Federal Bureau of Investigation's (FBI) Los Angeles Field Office and the Department of Homeland Security's Immigration and Customs Enforcement (ICE), the classification process has been a substantial roadblock to our capacity to investigate terrorism cases and work hand-in-hand with these federal agencies. II. The Terrorist Threat to Our Local Communities The terrorist threat to our communities currently involves continued domestic terrorism and international terrorists plotting to destroy American cities. A. Domestic Terrorism Prior to September 11, local law enforcement agencies primarily investigated domestic terrorist groups, including white supremacists, hate groups, and special-issues groups conducting criminal activity (e.g. the Animal Liberation Front). Investigations centered on familiar cultures that were socially motivated by political ideologies to commit terrorism. The bombing of the Alfred P. Murrah Federal Building in Oklahoma in 1995, the most notable domestic terrorist attack, had a catastrophic impact on American soil and brought together local and federal law enforcement to bring the terrorists to justice.\1\ Local law enforcement, in fact, played a critical role in the investigation and apprehension of the offenders. --------------------------------------------------------------------------- \1\ The 1993 World Trade Bombing was seen as international terrorism and investigated by the FBI. B. International Terrorism Prior to September 11, 2001, international terrorism was not in the national consciousness. Despite the first World Trade Center bombing, most Americans did not realize the significant threat of Islamic extremism and the consequences of international terrorism. September 11 changed the mindset of all Americans including local law enforcement. Since September 11, the scope of terrorism and extremism has increased exponentially. In addition, as the war in Afghanistan and later in Iraq waged on, the face of Islamic terrorism changed. No longer was the only threat a group of dissident Saudis hijacking a plane to crash into American symbols of power. Throughout the world, suicide bombers attacked discos, train stations, and buses. Islamic terrorism has continued to demonstrate its reach and power from changing the outcome of the 2004 national election in Spain to paralyzing the transportation system in London in 2005. The terrorist transformed himself from Middle East foreigner to second and third generation local citizen. The sheer number of terrorist threats to our communities across the country has increased dramatically and the federal government's capacity to collect intelligence and investigate these threats has been overwhelmed. Consequently, local law enforcement's efforts to counter terrorism have never been more important or critical. III. LAPD's Response to Terrorist Threats A. Counter-Terrorism Bureau The Los Angeles Police Department has taken the threat of international terrorism very seriously. The city has a population of over 4 million and spans over approximately 500 square miles. The region is home to numerous potential terrorist targets including the Los Angeles International Airport, the ports of Los Angeles and Long Beach, and the entertainment industry.In response, the LAPD has invested numerous hours and millions of dollars toward preparedness and response to a possible terrorist attack. In addition, the LAPD has created a Counter-Terrorism/Criminal Intelligence Bureau with nearly 300 officers who are solely dedicated to counter-terrorism and criminal intelligence gathering. While this bureau has served a critical function in the war against terror, the LAPD has been required to dedicate officers to intelligence gathering, a function typically performed by the federal government. B. Joint Regional Intelligence Center and Joint Terrorism Task Force Across the country, a new concept ``fusion centers'' arose where analysts from police departments, the FBI, Immigration and Customs Enforcement, and other agencies worked on the same information streams to identify possible terrorist threats. In Los Angeles, the LAPD provides personnel and participates in a Joint Regional Intelligence Center (JRIC), located in Norwalk, California, which includes fourteen participating agencies. The JRIC provides a critical information- sharing opportunity with the federal government. However, the over- classification of intelligence has become an impediment to full information sharing with the local law enforcement agencies who participate in the JRIC. The LAPD, as well as other Los Angeles-area law enforcement agencies, is an active participant in the Joint Terrorism Task Force (JTTF). Like the JRIC, the JTTF also serves as an excellent partnership with federal law enforcement agencies and provides the opportunity for extensive information sharing. The same impediments of the JRIC, however, apply to the local law enforcement agencies participating in the JTTF. The dissemination of critical intelligence is restricted due to its over-classification. IV. The Consequences of Over-Classification of Intelligence After the 9/11 Commission issued its comprehensive report, America's local law enforcement community, consisting of over 700,000 law enforcement officers, was reluctantly invited into the effort of countering the international terrorist threat. One part of the rationale was that neither the Central Intelligence Agency nor Department of Defense could conduct intelligence operations within the United States against American citizens. Moreover, the total number of FBI Special Agents assigned to protect over 18,000 cities, towns, and villages throughout the United States is slightly over 12,000. This number becomes less reassuring in the when one examines the number of agents needed to handle the FBI's other responsibilities including white-collar crime, organized crime, public corruption, financial crime, fraud against the government, bribery, copyright infringement, civil rights violations, bank robbery, extortion, kidnapping, espionage, interstate criminal activity, drug trafficking, and other serious violations of federal law. At the national level, local law enforcement was not deemed an important stopgap in the field of counter-terrorism particularly in the area of Islamic extremists. In addition, the significant role of local law enforcement in the fight against international terrorism was not viewed as significant. More than five years after the tragic events of September 11, local law enforcement involvement has still not been fully embraced because of the impediment of information sharing and the over-classification of intelligence. The result of including local law enforcement is that uniform police officers, bomb squads, and hazardous material teams now train together to address terrorist threats with the FBI, Department of Energy, Federal Emergency Management Agency, and the Department of Homeland Security, and train to respond to possible terrorist scenarios. Local law enforcement has had a long history in investigating individuals and groups while developing and handling human and electronic intelligence. No agency knows their landscape better than local law enforcement; it was designed and built to be the eyes and ears of communities. Over-classification, however, prevents a true partnership with federal agencies. An impediment for both federal and local agencies, for example, is that local FBI agents, cannot change the originating agency's classification level, and this problem is amplified when the response to the threat is time sensitive. Appropriate law enforcement response to substantial threats can be significantly impaired with minimal lead- time, creating greater risk to the community, and impacting the ability for a ``First Preventer'' response. A local field agent, however, has the discretion to classify a case as ``secret.'' The criteria for this classification is ``secret shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause serious damage to the national security.'' Additionally, the standard used for ``secret'' for intelligence information is ``the revelation of significant intelligence operations.'' Many field agents may over- classify their cases for fear of compromise. Unfortunately, this is a double edge sword because it stifles collaboration with local law enforcement. The burden to overcome is that the investigations push up against federal investigations, which in turn become classified. The result is the old adage of local law enforcement pushing information to federal agencies without getting anything back. The federal fix has been to brief the Chief of the executive staff of classified cases, but restricted the dissemination to their intelligence units (despite proper clearance levels of personnel). The result is to develop separate and likely redundant intelligence gathering operations. For example, New York was first in the country to disengage from relying on the federal agencies to protect their city, committing almost 1,200 officers to counter-terrorism efforts. Currently, the association of Major Cities Chiefs of Police is campaigning in Congress to send police officers overseas to obtain information from their police counterparts rather than rely on our own federal agencies to share information. V. Recommendation The declassification of information currently classified at the secret level would greatly improve the information-sharing environment and build upon the counter-terrorism capabilities of local law enforcement. Federal authorities should consider changing the criteria classification of terrorism-related intelligence to ``Law Enforcement Sensitive'' to enable the dissemination of information to critical personnel in the field. ``Top Secret'' should be an exceptional classification that requires extraordinary demonstration of need while ``Secret'' should be a classification that requires more stringent demonstration of need than currently required. Local law enforcement already works in an environment with a ``right and need to know'' and efforts made to declassify ``secret'' information to ``law enforcement sensitive'' would not only make for more effective and timely intelligence, but inspire true partnership, better collaboration, the building of more robust trust networks, and develop a richer picture with regard to community intelligence. VI. Conclusion The United States faces a vicious, amorphous, and unfamiliar adversary on our land. Our previous defensive strategy to protect our cities was ineffective and our current strategy is fraught with issues. In Los Angeles, we cannot support any process that takes us closer to another failure. We have the mutual interest and are working in common direction to prevent acts of terrorism in the United States. The classification levels are based on fear: the probability of information being disseminated to those that can cause serious damage to national security. What this system is not designed to do is protect us against the threat itself. Local law enforcement has a culture and capacity that no federal agency enjoys; the know how and ability to engage a community and today it is a vital part of the equation. This is achieved by disseminating the information to people who stand the best chance of stopping violence against American cities: our first preventers in local law enforcement. Ms. Harman. Thank you very much. The chair now recognizes the chairman of the full committee, the gentleman from Mississippi, for 5 minutes of questions. Mr. Thompson. Thank you very much, Madam Chairman. I appreciate the opportunity. Chief Lanier, nice to see you again. You do us proud. Chief Lanier. Thank you. Mr. Thompson. Mr. Downing, New York City saw that they had a problem with cooperation and communication with respect to intelligence. So they created their own intelligence division to kind of address many of the items you shared with us today. What has the Los Angeles Police Department put together to address some of the issues that we are talking about today? Mr. Downing. We have our own intelligence section as well, probably 30 people dedicated to gathering intelligence within our major crimes division, which does not include the Joint Regional Intelligence Center. The Joint Regional Intelligence Center sits on top of seven counties that the L.A. FBI office is in charge of. We have approximately 44 people in that center, growing to 80. It is going to be a 7-day, 24-hour operation. It is an all crimes, all hazards approach to intelligence. However, with the minimal staffing right now, it is primarily terrorism. But that is how we deal with it. The FBI has established that as a top-secret level JRIC center. It is managed by the L.A. sheriffs, LAPD and the FBI, with the FBI as the functional lead in the center. Mr. Thompson. Thank you, and I will get back to the other part. Chief Lanier, do you believe that you are receiving all the information, or your department is receiving all the information necessary from federal government sources at this point? Chief Lanier. No, I am sure I am not. Mr. Thompson. And without pointing fingers, can you tell me who is good, who is not so good, who is deserving of being better? Because what we are trying to do with the hearings is trying to determine where we need to start to focus. For instance, I will give you a good example, our Capitol Police happen to use analog radios. Well, they can't talk to anybody but themselves, because everybody else is digital. And that is a problem. So if we can't talk to each other from an interoperability standpoint, I am wondering how much of the sharing of intelligence and other things. So if you could kind of give me your analysis of what you have found so far. Chief Lanier. I can walk that fine line there, sir. Mr. Thompson. All right. Chief Lanier. First of all, I always believe if I am going to criticize anybody for anything, we have to look at ourselves first. And I will say that local law enforcement needs to do a better job of clearly articulating what our intelligence needs are to the various intelligence agencies so they know what to give us. It took some pushing from me--fortunately, I had the support from Chief Ramsey--to go to the right people and the right agencies and say, ``This is what I need and why I need it.'' It is not enough to say, as a police chief, ``You are not giving me enough information; give me more.'' If the other federal agency doesn't know what it is that I need, they are going to give me what they think I need. So I need to lay that out very clearly. So we are guilty as well. With that said, now I can throw other stones. I do think that the participation of the JTTF has increased the information-sharing flow with the FBI because there is a longstanding history there. The new players in the game, through the Department of Homeland Security, does not have that longstanding relationship and well-established conduit for information to flow clearly. And, I don't want to oversimplify this, but I think it is really, really important that in a lot of cases it boils down to the right people, in the right place, having an opportunity to sit down and have a dialogue. I would be happy to sit down with somebody in this classification issue and have them sit across the table from me, as a police chief in the nation's capital, and look me in the eyes and listen to what I have to say about what my needs are and then tell me why I shouldn't have that. Mr. Thompson. You do a good job. Chief Lanier. Thank you. Mr. Thompson. Thank you very much. I yield back, Madam Chair. Thank you. Ms. Harman. Thank you, Mr. Chairman. The chair now yields 5 minutes for questions to the ranking member, Mr. Reichert, from Washington. Mr. Reichert. This brings back memories to me. Ms. Harman. Nightmares. Mr. Reichert. Yes. Everything that you have each said I struggled with as the sheriff in Seattle. And the sharing of information between the federal agencies and local sheriff's office and the local Seattle Police Department and the other 38 police departments in King County, every one of those chiefs would be saying exactly the same thing that both of the witnesses have said today. When you talk about information sharing, of course one of the things that we know is a necessity in these days is technology. Are either of you familiar with the LInX System? Chief Lanier. Yes. Mr. Reichert. Are you participants in that program or beginning to become involved in that program or where do you stand, each of you? Chief Lanier. We are not yet, but we are in the process of getting there. As you might have seen in some of my public testimony lately, technology is still a significant struggle for the Metropolitan Police Department. We are moving forward and bringing up our fusion center, so we are on our way, and we will be full participants in the LInX Program, so we are getting underway with that now. Mr. Reichert. Great. Mr. Downing. Yes. And we, as well, are beginning in that process. We have cops LInX, which connects the agencies within the different counties, and some of the counties that can't afford it are not participating but looking forward to the installation of LInX, which will also bring in the federal system. Mr. Reichert. Yes. Who is the lead on the LInX Systems in your areas? Mr. Downing. Chief Baca, Chief Bratton, Chief Corona, from Orange County. Mr. Reichert. Who from the federal government, do you know? Mr. Downing. Well, Steve Tidwell in the L.A. office is assisting us with that. Mr. Reichert. I just visited your fusion center a couple weeks ago. Chief? Chief Lanier. In Washington, D.C., it is being coordinated through the Council of Governments, the COG, which is regional. Mr. Reichert. How big is your department? Chief Lanier. We will be at 3,900 by the end of this year and probably 4,200 by the end of next year. Mr. Reichert. How many people are assigned to homeland security? Chief Lanier. You are going to get me in trouble with my local constituents, but I will tell you. [Laughter.] I have approximately 30 in the Office of Homeland Security and Counterterrorism, but I do have a Special Operations Division that is 225, 230 people, and I am about to merge those two units together so that every member of the Special Operations Division will now take part in that. Mr. Reichert. And other than UASI money, are you getting any federal assistance, grant monies to pay for those bodies? Chief Lanier. To pay for those bodies? Mr. Reichert. Yes. Chief Lanier. Now you are really going to get me in trouble. Mr. Reichert. I know the answer to that one, so go ahead. [Laughter.] Chief Lanier. There are a variety of grant funds under the homeland security program, LETPP, as you know, and the state funds as well, the UASI, but we struggle to get sometimes reimbursement for federal duties that involve dignitary protection and things---- Mr. Reichert. You have some unfunded mandates. Chief Lanier. Yes. Mr. Reichert. Yes. Mr. Downing? Mr. Downing. Yes. Our department is 9,500. We have just under 300 assigned to the Counterterrorism Bureau, which is primarily the terrorist-related matters. We are one of the six tier one cities in UASI. This year's UASI allows us to get 25 percent of the total grant toward personnel costs. Mr. Reichert. Okay. I have no further questions. I yield. Thank you. Ms. Harman. I thank the ranking member, and I have a few questions. First, I want to thank both witnesses for excellent testimony. Our goal in this session of Congress is to put ourselves in your shoes to think about what are the opportunities and frustrations of our local first preventers and how can we make the sharing of information with them and the tools that they need more effective? Because if you can't do your jobs well, we can't protect America. It is that simple. It is not all in Washington, D.C. I know that may come as a shock to a few folks, but it is not all here. And vertical information sharing has to be adequate, and horizontal information sharing at the local level has to be adequate too. And that is another issue that neither of you raised today but it is something that has been raised by prior witnesses. Both of you provided some useful information. I am quite horrified to think, Mr. Downing, that if the information about that cell in Torrance had had some international connection, we might have missed the whole thing. That gets my attention, because in a couple of weeks when we are in Torrance, California, congratulating the Torrance PD for excellent local police work, we are going to talk about how devastating could have been attacks by a homegrown terrorist cell living next door to some of my constituents had we not prevented them from doing anything. So I just want to observe that. And, Chief Lanier, you make a very good point when you say it is your obligation to make clear to federal agencies what you need and why you need it. I mean, that is a job you have, and you can't just assume they are going to figure it out. In fact, they are not going to figure it out. You have to be an advocate for your own needs. And it is in that connection that I want to ask this question. The chairman of the full committee has had a long and friendly conversation with Charles Allen of the Department of Homeland Security's Office of Intelligence and Analysis--we call it I&A--about the need for local participation either on the NCTC or connected to the NCTC. And some of us were dismayed to learn in a visit we made recently to the NCTC that the new agency about to be created, called the Interagency Threat Assessment and Coordination Group, the ITACG, might have on it one representative of law enforcement. In questions to Charlie Allen last week, he said, ``Well, maybe that will change to two or three.'' I clearly don't know how many members of the ITACG there will be, but I would just like to ask both of you, as consumers of necessary intelligence, what do you think about the idea of one person or maybe two or three participating in the NCTC process? Chief Lanier. Well, it is at least a start, but I will say this: Police departments around the country have very different needs based on the jurisdictions they serve as well as the capabilities that they have. So in the Metropolitan Police Department, a large city police department, I have a lot of capabilities that a small town police department may not have. But at the same token, that small town police department, or sheriff's department, may have some vulnerabilities and some other understandings that I don't have. So I think the representation needs to be fair and representative across the board. State agencies, state patrol, highway patrol officers have different skills and capabilities than transit police, than urban police, than university police. So there needs to be an adequate representation. Ms. Harman. Mr. Downing? Mr. Downing. I absolutely agree, and to take it even further, in coming back from the U.K., they have 17 people in 17 different parts of the world, and they are growing to 21. And as New York, they have eight people in eight different parts of the world as well. We are interested in that as well, because we are not sure that the local perspective is being placed on foreign intelligence. Ms. Harman. I thank you for that, and I actually share that big time. I think that information sharing has to go horizontally and vertically and that your help in designing the products that you will use is absolutely indispensable. Otherwise, they may not be useful to you. It is your point, Chief Lanier, we have to be advocates for what we need and why we need it, so I think you should be sitting inside the room when our National Intelligence Fusion Center is developing products that you are supposed to use. And then I think our next problem is to make sure that the classification system gets revised so that you are in a position to use them. My time has expired. I don't want to abuse this opportunity. And I have spoken more than others. Let me just ask either of the members, starting with Chairman Thompson, whether you have any concluding remarks. The ranking member? Mr. Reichert. Thank you, Madam Chair. I just want to, again, thank you for being here and taking time out of your busy schedule to testify. And as we have learned today and previous hearings from this information, we have a lot of work to do, and we look forward to working with you to help make our country safer. Thank you all. Ms. Harman. The hearing is adjourned. [Whereupon, at 11:34 a.m., the subcommittee was adjourned.] THE RESPONSE OF THE PROGRAM MANAGER OF THE INFORMATION SHARING ENVIRONMENT PART II ---------- Thursday, April 26, 2007 U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment, Washington, DC. The committee met, pursuant to call, at 10:05 a.m., in Room 1539, Longworth House Office Building, Hon. Jane Harman [chairwoman of the committee] presiding. Present: Representatives Harman, Langevin, Thompson, Reichert, and Dent. Ms. Harman. [Presiding.] Good morning. The subcommittee will come to order. The subcommittee is meeting today to receive testimony on ``The Over-Classification and Pseudo-Classification of Government Information: The Response of the Program Manager of the Information Sharing Environment.'' We are here today because our classification system is broken and because pseudo-classifications are making effective information sharing nearly impossible. A few weeks ago, we heard from experts in these areas who described an expanding problem that is making securing the homeland harder. Last fall, the president appointed Ambassador Ted McNamara to take on the pseudo-classification issue, and the ambassador has worked a solution that the White House is reviewing. His proposed controlled unclassified information, CUI, framework holds a lot of promise, but no matter how good this solution might be, if federal agencies don't get on board, and fast, well-planned and well-meaning efforts will fail. I commend Ambassador McNamara, with whom I have met several times, for including state and local law enforcement officers in his process from the outset. The ambassador's working group welcomed law enforcement as part of the process from day one, as well they should have. Police and sheriff's officers are among the people who will be most affected by this new CUI framework. As all of us on the subcommittee have stated, we cannot have a successful fix to the pseudo-classification and other information sharing challenges unless all affected parties are involved in structuring the solution. I hope that DHS is listening. You should know, and I think you do, that this subcommittee is extremely concerned with the absence of numbers of state and local participants in the new ITACG that is being developed as an adjunct to the NCTC. We think that is a problem, and we are going to stay on that problem and hopefully change what is happening. So in this case, in addition to Ambassador McNamara and our DHS and FBI witnesses, we are joined this morning by Mark Zadra, the assistant commissioner of the Florida Department of Law Enforcement. Mr. Zadra will talk to us about the promise and potential pitfalls of the CUI framework from his state- level perspective. I would note with sadness, however, that we are not joined today by Colonel Bart Johnson of the New York State Police, who had been invited as a witness and was originally scheduled to testify. Late yesterday, two of his officers were shot while attempting to apprehend a criminal suspect on Tuesday, and one, Trooper David Brinkerhoff, died from his injuries. Our condolences, and obviously the condolences of the entire Committee on Homeland Security, go to his family and his colleagues. And I ask unanimous consent to enter his prepared remarks into the record at this point. Hearing no objection, we will do so. [The statement of Colonel Johnson follows:] For the Record Prepared statement of Colonel Bart R. Johnson April 26, 2007 Chairman Thompson, Ranking Member King, Chairwoman Harman, and Members of the Subcommittee, I sincerely appreciate the opportunity to appear before you today to discuss state and local law enforcement's involvement with standardizing procedures for sensitive but unclassified (SBU) information and related issues impacting local, state, and tribal law enforcement. I have served with the New York State Police for more than 24 years, and I have over 30 years experience in law enforcement. Presently, I serve as the Deputy Superintendent in charge of Field Command. I oversee the Bureau of Criminal Investigation, the Uniform Force, the Office of Counter Terrorism, Intelligence, and the associated special details of these units. I also have the privilege to serve as the vice chair of the U.S. Department of Justice's (DOJ) Global Justice Information Sharing Initiative (Global) Advisory Committee, the chair of the Criminal Intelligence Coordinating Council (CICC) and of the Global Intelligence Working Group (GIWG). In these capacities, I have been fortunate to actively participate in discussions relating to intelligence reform, and I have provided significant input to the federal government regarding information sharing and intelligence. I expect that we would all agree that the current number of sensitive but unclassified (SBU) designations and the lack of consistent policies and procedures for unclassified information severely hinder law enforcement's ability to rapidly share information with the officials that need it to protect our country, its citizens, and visitors. Much progress has been made recently in addressing the classification issue by way of Guideline 3, and much of the headway is due to the leadership and efforts of Ambassador Thomas E. McNamara of the Office of the Program Manager for the Information Sharing Environment (ISE) and the other relevant federal agencies. I am gratified that I have also had the opportunity to contribute to this effort. For many years, law enforcement agencies throughout the country have been involved in the sharing of information with one another regarding investigations, crime reporting, trend analysis, and other types of information considered law enforcement sensitive. Oftentimes, these investigations involve public corruption, organized crime, narcotics, and weapons smuggling, and they frequently involve the use of undercover operations, confidential sources, and lawful covert electronic surveillance. State, local, and tribal law enforcement agencies do not have the ability to classify their material, and we must be assured that strict control is used when handling and distributing this type of data to ensure that the information and investigation are not compromised and that we do not sustain a loss of a life. Also, since September 11, 2001, law enforcement agencies nationwide are more fully involved in the prevention, mitigation, and deterrence of terrorism, and consequently, they receive more information and intelligence from their federal counterparts. Moreover, many law enforcement agencies generate their own information and intelligence (much of which is collected in a sensitive manner) that is passed to other law enforcement agencies for their possible action. Law enforcement agencies have also begun to share information with new stakeholders in the fight against terrorism. They now routinely share information with non-law enforcement government agencies and members of the private sector in order to assist in prevention efforts. This activity has altered the information sharing paradigm. Another issue that exists within the current environment is the apparent ``over-classification'' of material. Over-classifying data results in information and intelligence not being sent to the law enforcement professionals on the front lines of the fight against terrorism in this country--the officers, troopers, and deputies in the field. It still appears to be a difficult process for the federal intelligence community to develop ``tear-line'' reports that can be passed to law enforcement so that the intelligence can be operationalized in an effective and proactive manner.Up until a short time ago, there was a lack of a coherent, standardized process for marking and handling SBU data. Lack of consistency in markings led to confusion and frustration among local, state, tribal, and federal government officials and also a lack of confidence in knowing that the information that was shared was handled in an appropriate and secure manner. Recent studies by the Government Accountability Office, the Congressional Research Service, and other institutions have confirmed and highlighted the problems created by the various markings and the lack of common definitions for these designations. These studies revealed that there are over 120 different designations being used to mark unclassified information so that agencies can ``protect'' their information. These pseudo-classifications did not have any procedures in place outlining issues such as who can mark the material; the standards used to mark the material; who can receive the information; how the information should be shared, who it could be shared with, and how it should be stored; and what impact, if any, these markings have on the Freedom of Information Act. As a result of several key federal terrorism-related information sharing authorities, such as the Intelligence Reform and Terrorism Prevention Act of 2004, Executive Order 13388, and the December 2005 Memorandum from the President regarding Guidelines and Requirements in Support of the Information Sharing Environment, specifically Guideline 3, much work has been undertaken to bring about intelligence reform in this country. Local, state, and tribal law enforcement have been and continue to be active and collaborative participants in this undertaking. As a representative of the New York State Intelligence Center (NYSIC) \1\ and DOJ's Global Initiative, I have participated in a number of efforts to implement the guidelines and requirements that will support the ISE. Recognizing the need to develop a process for standardizing the SBU process, the CICC and GIWG commissioned a task team in May 2006 to develop recommendations that would aid local, state, and tribal law enforcement agencies in fully participating in the nationwide information sharing environment. This work was done with the Federal Bureau of Investigation, the U.S. Department of Homeland Security, the Office of the Program Manager for the Information Sharing Environment, and other law enforcement entities. The recommendations made by that team were provided to an interagency SBU working group. Subsequently, I participated on the SBU Coordinating Committee (CC) that was established to continue the Guideline 3 implementation efforts begun by the interagency group. --------------------------------------------------------------------------- \1\Formerly known as the Upstate New York Regional Intelligence Center (UNYRIC). --------------------------------------------------------------------------- As you know, the SBU CC recommendations are currently under review and awaiting ultimate Presidential approval. The CC recommends adoption of a new Controlled Unclassified Information (CUI) Regime that is designed to standardize SBU procedures for information in the ISE. The recommendations include requiring controls on the handling and dissemination of SBU information. By and large, I believe local, state, and tribal agencies will support the new CUI Framework because they want to be active participants in the ISE and are supportive of clear and easily understandable protocols for sharing sensitive information. Local, state, and tribal agencies want to be able to receive terrorism, homeland security, and law enforcement information from the federal government and clearly understand, based on the markings on the data, how the data should be handled and stored and to whom the information can be released. The data should be disseminated as broadly as possible to those with a need to know, including non-law enforcement public safety partners, public health officials, and private sector entities. Conversely, local, state, and tribal entities are frequently the first to encounter terrorist threats and precursor criminal information, and the new CUI markings will assist with sharing that type of information both vertically and horizontally while respecting originator authority. A number of critical issues must be addressed at the local, state, tribal and federal levels in order to facilitate a successful CUI Regime implementation, including training, policy and procedural changes, system modifications and enhancements, and funding to implement these recommendations. Emphasis must be placed on the development and delivery of training to local, state, tribal, and federal personnel on the CUI Framework. Because of the possibility of wide distribution of sensitive information, it is imperative that training be given a priority so recipients have a clear understanding of marking and handling procedures. In order to maximize the effectiveness of the training and reach the appropriate recipients at the local, state, and tribal levels, I recommend that it be provided on a regional basis across the country to personnel in the designated statewide fusion centers. Focusing on fusion center officials in the initial delivery phase directly supports the national information sharing framework that calls for the incorporation into the ISE of a national network of state and major urban area fusion centers. In support of the ISE, state and major urban area fusion centers will be contributing information to ongoing federal and national-level assessments of terrorist risks; completing statewide, regional, or site-specific and topical risk assessments; disseminating federally generated alerts, warnings, and notifications regarding time-sensitive threats, situational awareness reports, and analytical products; and supporting efforts to gather, process, analyze, and disseminate locally generated information such as suspicious incident reports. Over 40 states currently have operational fusion centers, and it is critically important that center personnel receive timely, relevant training to enable them to fully function in the national ISE. Training will provide insight and an understanding of how the CUI handling and disseminating requirements affect business processes. This will cause agencies to execute policy and procedural changes and system modifications. There are potentially over 18,000 local, state, and tribal law enforcement agencies in our country that could be impacted by the implementation of the CUI Framework. I believe that the federal government--working collaboratively with local, state, and tribal authorities--should develop model policies and standards to aid in the transition to the Framework. Funding issues will be a major factor for local agencies, especially in regard to modifying/enhancing information technologies and applying encryption requirements to ensure proper transmission, storage, and destruction of controlled information. It will be through these ongoing collaborative efforts regarding Guideline 3 that the ISE will take another step towards being the meaningful and cooperative sharing environment that it was intended to be. These actions will result in the maturation of information sharing among state, local, and tribal agencies; private entities; and their federal counterparts, which will in turn assist in our collective efforts to prevent another terrorist attack and reduce violent crime. Our goal should be to share as a rule and withhold by exception, according to rules and policies that protect the privacy and civil rights of all. Being involved in the CUI Framework development process has been a rewarding and sometimes arduous experience. It is a process that I and the entire state, local, and tribal law enforcement community take very seriously. It is very encouraging to me that the Office of the Program Manager and other relevant partner federal agencies have made great strides in recognizing the value that local, state, and tribal officials bring to the table. We want to remain active, ongoing partners and participants with the federal government as we work towards a national information sharing environment. Mr. Chairman, I thank you and your colleagues for giving me the opportunity to speak to you today, and I hope my comments have been of some use to you in your deliberations. Ms. Harman. But I would also note that our police, sheriffs and firefighters are our front lines. They take all the risks to keep our country safe, and on behalf of a grateful nation, we send, again, our condolences and appreciation to the New York State Police. Today, we will also focus on how best to support the CUI framework at the federal level. That is why DHS and FBI are testifying. Last month, we learned that every agency in the federal government has invented pseudo-classifications for their particular brand of information. The increasing number of these markings has led to tremendous confusion. Obviously, that proliferation is a problem, and our goal here is to find out whether Ambassador McNamara's new framework is one that will be embraced, as it should be, by those federal agencies that are in the same line of work. If we can't get it right at the federal level, we can't expect state and local entities to do any better. We are late in this process, and we can and should move faster. I hope this hearing will help us figure out how to move from a good proposal to a good adopted strategy across the federal government and with our state and local partners. I would like to, again, extend a warm welcome to our witnesses who will be talking about these issues, and I look forward to your testimony. I now yield time for opening remarks to the ranking member, Sheriff Reichert. Mr. Reichert. Thank you, Madam Chair. I like that ``sheriff'' title. Thank you for using that. I, first of all, apologize. My voice is a little hoarse this morning. I am experiencing some effect from the oak pollen, I think, that is flying around out here. I am not used to that back in Seattle. Second, let me also share my condolences with the New York State Police. I have experienced the loss of heartbreak myself in my 33-year career, and that is a tough one to take. Also, Ambassador, I would like to thank you for your briefing earlier this week. It was very helpful, and thank you again for being here today to share your thoughts on your new ideas and plans. I also want to say that I certainly recognize the difficulty that all three of you have in bringing the nation's state and local and federal agencies together to share information. Just on the local level, in the Seattle region, I know how tough that can be. So your job is going to be very tough, as we all recognize, but we certainly want to be a part of the solution with you. So today we meet on a topic of pseudo-classification, which is the use of document controls that protect sensitive but unclassified information. This is the second hearing in a series on the problems of over-classification and pseudo- classification and information sharing. I believe it is essential that sensitive information be able to flow to those that need it, and I shared a story the other day with the ambassador, my own personal experience within the sheriff's office, people holding and withholding information and other police departments not wanting to share the information and therefore resulting in maybe a case not being resolved or solved or being solved much later than it could have. Information needs to flow in a trusted information sharing environment. The people who share sensitive information need to be able to trust that different federal agencies, as well as different states and localities, will treat their information with respect and protect sensitive information. Currently, there is no trusted information sharing environment for sensitive, unclassified information. There are currently over 107 unique markings for sensitive information and over 130 different labeling or handling processes, as we talked about the other day. This disparity creates confusion and leads to information not being properly protected. If a federal agency can't trust that sensitive, unclassified information will be protected, it will simply classify the document as secret or above, severely restricting access. If a private-sector entity or state/local agency does not believe its information will be protected properly, it simply will not share that, and I have experienced that myself. So without trust, the information sharing environment breaks down. Creating a trusted environment is essential to the work of the program manager. Cleaning up a messy system of sensitive but unclassified designations is essential to creating that trust. We are looking forward to the program manager's testimony as well as the testimony of our DHS and FBI witnesses who will be able to discuss how these policies are progressing and how we can ensure the information sharing is a success. From the second panel, hopefully, we will hear from state law enforcement. We have had a role in the process. The state and local perspective is essential, because without the state and local buy-in, as I said, collaboration will lead to not sharing information. We appreciate your testimony and your time this morning, and thank you again for being here. With that, I yield the balance of my time. Ms. Harman. The gentleman's time has expired. The chair now recognizes the chairman of the full committee, the gentleman from Mississippi, Mr. Thompson, for an opening statement. Mr. Thompson. Thank you very much, Madam Chair, and I join you in welcoming our distinguished witnesses today to this important hearing on the work being done by Ambassador McNamara. I also join you and our ranking members and others in expressing our heartfelt sympathies to the New York State Police in the loss of their officer. Any front-line person puts his or her life on the line every day, and, unfortunately, sometimes these things happen. And that is why what we and is so important every day and what so many others do. But from information sharing, I think Representative Reichert spoke volumes when he said it is important to have information available in real-time. I was in local government before coming to Congress and I remember when agencies bragged about knowing something, and when other folks found out about it weeks and months later, they would say, ``Well, we knew about that all the time.'' To me, it is a no-brainer not to share the information if we are supposedly all looking for the bad guys--or gals, in some instances. Ms. Harman. You had it right the first time, Mr. Chairman. [Laughter.] Mr. Thompson. But the notion is we absolutely need to do it, but we are concerned that sometimes government over- classifies information so that it can't get out into the field. And, Ambassador, I know you have a tough challenge ahead of you. We talked a little bit about it before the hearing, and I am looking for this new framework. I want the commitment to be there, to carry it forward. I would not like to see it become another in a long line of acronyms that get put on the shelf never to be taken off. So I look forward to your testimony, and I look forward to pushing forward the new ideas. The comfort zone, as all of us know, is we have always done it this way, but that doesn't necessarily mean that it is correct. And these are different times, different challenges and it calls for broader strategies. So I look forward to the testimony and the questions to follow. And I yield back. Ms. Harman. The gentleman's time has expired. And I would just observe, the comfort zone ended on 9/11. There is no comfort zone anymore. I am looking at a press clip today in the New York Times, which says, ``British anti- terrorism chief warns of more severe al-Qa'ida attacks.'' These are in Britain, but obviously we can imagine this here. So in that spirit, I would hope that what we are talking about never hits a shelf. That should not even be an option. We have to change the way we do business. I welcome our first panel of witnesses. Our first witness, Ambassador Ted McNamara, is the program manager of the Information Sharing Environment, a position established by the Intelligence Reform and Terrorism Prevention Act of 2004, a statute I am very familiar with. Ambassador McNamara is a career diplomat who originally retired from government service in 1998, after which he spent 3 years as president and CEO of the Americas Society and Council of the Americas in New York. Following the September 11 attacks, he was asked to return to government service as the senior advisor for counterterrorism and homeland security at the Department of State. Our second witness, Dr. Carter Morris, is currently director of information sharing and knowledge management for the Office of Intelligence and Analysis at the Department of Homeland Security. That is a mouthful. That can't even be one business card. He is a detailee to DHS from the Directorate of Science and Technology at CIA. Most recently, Dr. Morris served as the deputy assistant director of Central Intelligence for Collection where he helped coordinate all intelligence community collection activities. Thank you for that service. Our third witness, Wayne Murphy, is currently an assistant director at the FBI. He joined the bureau with more than 22 years of service at the National Security Agency in a variety of analytic, staff and leadership positions. The bulk of his career assignments have involved direct responsibility for SIGINT analysis--that is signals intelligence analysis and reporting--encompassing a broad range of targets. Without objection, the witnesses' full statements will be inserted in the record, and I would ask each witness to summarize your statements. I think this time clock is visible to you, or I think it can be, or there is a time clock that is visible to you. And we will get right into questions following your testimony. Thank you. We recognize you first, Dr. Morris. Dr. Morris, we are recognizing you first. I am not sure why we are doing that, but that is what we are doing. Mr. Morris. Didn't realize I was going to go first, but I will be very happy to do that. Ms. Harman. Dr. Morris, you are relieved of going first. [Laughter.] Mr. Morris. Thank you. Ms. Harman. Because this chair, who must be visually impaired, skipped the top of the statement. Ambassador McNamara, you are recognized first. I think that does make more sense, because you are going to present the information, and then we will follow on with two people who will comment on it, which seems obvious. I apologize for the confusion. STATEMENT OF AMBASSADOR THOMAS E. McNAMARA, PROGRAM MANAGER, INFORMATION SHARING ENVIRONMENT, OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE Mr. McNamara. Thank you very much, Madam Chair. Chairman Thompson, Madam Chairman Harman, Ranking Member Reichert and members of the subcommittee, it is a great pleasure to be here with my colleagues today. And I want to thank you for the continued focus and priority for building an effective information sharing environment that you and the committee have shown over the course of many months. I hope to especially discuss with you all work on the presidential priority to standardized sensitive but unclassified information. Our current efforts to provide the president recommendations for standardizing SBU procedures, sensitive but unclassified, have been successful because of the strong interagency commitment that we have found. I want to note that Wayne Murphy, who is a member of the SBU Coordinating Committee with me, has been a part of this process since the very beginning and, with his colleagues in the Department of Justice and the FBI, have been instrumental in bringing the state, local and private sector perspectives and concerns to the table. I also was hoping to thank Colonel Bart Johnson were he here today, but I will thank him in his absence. He is the chair of the Criminal Intelligence Coordinating Council of Global Justice Information Sharing Initiative. He has been giving so much of his time and expert advice to our group, and I join the committee in offering our condolences to the family of the slain officer and to Colonel Johnson and his colleagues. I have a personal sense of this loss. My son is a law enforcement officer and has been in a situation that occurred in the last 24 hours himself. Also, I would like to thank assistant commissioner for the Florida Department of Law Enforcement, Mark Zadra, who is here today, who was our host at the very first national conference on fusion centers, which was held earlier this year in Florida. It was an excellent, very astonishing, in some respects, conference. Over 600 people came to that conference. They closed the rolls for the conference about 3 or 4 weeks before the conference began. When I showed up in this job a year ago, if someone had told me in a year that that would happen, I would have said, ``Well, you people are just overly optimistic.'' And I think that shows how far things have gone over the course of the last few years. Finally, I want to note that the Department of Justice and Department of Homeland Security were leaders in the initial effort to research this issue on SBU and to collect the information on which my committee has been working these last 6 months. The lack of government-wide standards for SBU information is well known. More difficult has been charting a feasible way ahead to create such standards as part of a single regime. Over the years, because SBU is not considered a matter of national security concern, there has been no single control framework that enables the rapid and routine flow of this type of information. Throughout the Cold War, executive branch agencies and Congress responded in a piecemeal fashion, an uncoordinated way, to protecting SBU. It was left to each agency to decide on its control regime. For example, there are close to 107 unique markings and more than 131 different labeling or handling processes and procedures for SBU information. These markings and handling processes stem from about 280 statutory provisions and approximately 150 regulations. Protecting information and sharing information are critical and interdependent functions for the information sharing environment. Simply stated, sensitive information will not be shared unless participants have confidence in the framework protecting that information. Standardizing SBU procedures is a difficult endeavor made more complicated by the complex information management policies and practices which the government now has. Correcting these defects is especially important because some categories of SBU truly require controls as strong as those for national security information. There are sound reasons in law and policy to protect those categories from public release, both to safeguard the civil liberties and legal rights of U.S. citizens and to deny the information advantage to those who would threaten the security or the public order of the nation. Appropriately protecting law enforcement and homeland security related sources and methods, for example, are just as valuable to our nation as protecting our intelligence sources and methods. The global nature of the threat our nation faces today requires that our entire network of defenders be able to share information more rapidly and confidently so that those who much act have the information they need to act. This lack of a single rational standardized and simplified SBU framework is a major cause of improper handling. It heightens risk aversion and undermines the confidence in control mechanisms. These problems are endemic within the federal government between federal and non-federal agencies and with the private sector. This is a national concern because the terrorist threat to the nation requires that many communities of interest, at different levels of government, share information. Ms. Harman. Ambassador McNamara, let me suggest that you just describe the new system, and we can get into the arguments for it and so forth in the question period, because your 5 minutes has expired. Mr. McNamara. Okay. I will then move to saying that I think this new system will enhance our ability to share vital information at the state, federal, local, tribal and private sector entities and also with our foreign partners. There are three major elements to the standardized SBU system that I am proposing. First, is the CU designation. The committee has decided that a clean break with the current SBU system would begin by calling it, controlled, unclassified information, CUI, thus eliminating the old term of SBU and any residual or legacy controls and habits that have grown up. Secondly, CUI markings, there will be a CUI framework recommended that also contains mandatory policy and standards for making safeguarding and dissemination of all CUI originated at the federal government level and shared in the ISE regardless of the medium used for its display, storage or transmittal. This framework includes a very limited marking schema that addresses both safeguarding and dissemination. Thirdly, there will be CUI governance recommended. A central management and oversight authority in the form of an executive agent and an advisory council would govern the new CUI framework and oversee its implementation. This CUI framework is one of the essential elements among many elements that make up the ISE. And since my time is short and over, I guess, I will say that I would like to close by saying how helpful and important it is to the work that I am doing for the Congress to focus on this matter, as this committee and subcommittee has done. This is a high-priority matter creating the ISE and in particular it is important that the amount and quality of the collaboration on implementing these reforms be noted and enhanced so that we can strengthen our counterterrorism mission at all levels of government. Thank you. [The statement of Mr. McNamara follows:] Prepared Statement of Abassador Thomas E. McNamara I. Introduction Chairwoman Harman, Ranking Member Reichert, and Members of the subcommittee: I am pleased to be here with my colleagues and want to thank you for your continued focus and priority to building an effective Information Sharing Environment (ISE). As you and the Committee address classification of information issues, I would like to update you on a Presidential priority to standardize procedures for Sensitive But Unclassified (SBU) information. This is a priority because if we do not have a manageable SBU framework, we will not have an effective ISE. Information vital to success in our protracted conflict with terrorism does not come marked ``terrorism information''; it can and does come from many sources, including from unclassified information sources. Yet we lack a national unclassified control framework that enables the rapid and routine flow of information across Federal agencies and to and from our partners in the State, local, tribal and private sectors. This is especially important because some categories of unclassified information require controls as strong as those for national security information. There are sound reasons to protect those categories from public release, both to safeguard the civil liberties and legal rights of U.S. citizens, and to deny the information advantage to those who threaten the security or public order of the nation. This lack of a single, rational, standardized, and simplified SBU framework is a major cause of improper handling. It heightens risk aversion and undermines confidence in the control mechanisms. This leads to both improper handling and unwillingness to share information. These problems are endemic within the Federal government, between Federal and non-Federal agencies and with the private sector. This is a national concern because the terrorist threat to the nation requires that many communities of interest, at different levels of government, share information. They must share because they have each have important responsibilities in countering terrorism. The problem exists at all levels--Federal, State, local, tribal, and the private sector. All have cultures that are traditionally cautious to sharing their sensitive information, but this must be addressed if we are to properly and effectively share sensitive but unclassified information. Only when the Federal government provides credible assurance that it can protect sensitive data from unauthorized disclosure through standardized safeguards and dissemination controls will we instill confidence that sensitive information will be appropriately shared, handled, safeguarded, and protected, and thus make sharing part of the culture. II. The Current SBU Environment Let me note at the outset that I will focus here on ``unclassified'' information. Classified information is, by law and regulation, controlled separately in a single system that was established early in the Cold War years. The classification regime, currently governed by Executive Order 12958, as amended, applies to ``national security information,'' which includes intelligence, defense, and foreign policy information. Other information, which legitimately needs to be controlled, is controlled by agency-specific regimes. Collectively, these regimes address information referred to as Sensitive But Unclassified (SBU) information. SBU information has grown haphazardly over the decades in response to real security requirements, but this information cannot be encompassed in the subject-specific classified control regime. The result is a collection of control mechanisms, in which most participants have confidence only when information is shared within an agency--and sometimes not even then. Let me give you some understanding of how complex SBU is: Among the 20 departments and agencies we have surveyed, there are at least 107 unique markings and more than 131 different labeling or handling processes and procedures for SBU information. Even when SBU information carries the same label marking (e.g. For Official Use Only), storage and dissemination are inconsistent across Federal agencies and departments. Because such markings are agency-specific, recipients of SBU information in a different agency must understand the processes and procedures of the originating Federal agency for handling the information, even if their agency uses the same marking. The result is an unmanageable collection of policies that leave both the producers and users of SBU information unable to know how a piece of information will be controlled as it moves through the Federal government and therefore reducing information sharing. I would like to highlight just two examples to convey the confusion created by the current SBU processes: The first example is a single marking that is applied to different types of information. Four agencies (DHS, DOT, USDA and EPA) use ``SSI'' to mean ``Sensitive Security Information.'' However, EPA has also reported the use of ``SSI'' to mean ``Source Selection Information'' (i.e. acquisition data). These types of information are completely different and have vastly different safeguarding and dissemination requirements, but still carry the same SBU marking acronym. In the same way, HHS and DOE use ``ECI'' to designate ``Export Controlled Information,'' while the EPA uses ``ECI'' to mean ``Enforcement Confidential Information.'' ``Export Controlled Information'' and ``Enforcement Confidential Information'' are clearly not related, and in each case, very different safeguarding and dissemination controls are applied to the information The second example is of a single marking for the same information, but with no uniformity in control. Ten agencies use the marking ``LES'' or ``Law Enforcement Sensitive.'' However, the term is not formally defined by most agencies nor are there any common rules to determine who can have access to ``law enforcement information.'' Therefore, each agency decides by itself to whom it will disseminate such information. Thus, an individual can have access to the information in one agency but be denied access to the same information in another. Further confusing the situation, SBU markings do not usually indicate the originating entity. As a result, even if a recipient had access to all the different control policies for each agency, he or she could probably not determine what rules apply because the recipient usually does not know which agency marked the document. Protecting the sharing of information is a critical and interdependent function for the ISE. Simply stated, sensitive information will not be shared unless participants have confidence in the framework controlling the information. Standardizing SBU procedures is a difficult endeavor, made more complicated by the complex information management policies. III. Unclassified Information Framework Imperative Producers and holders of unclassified information which legitimately needs to be controlled must have a common framework for protecting the rights of all Americans. In the classified arena, we deal with information that will, mainly, be withheld from broad release. In the unclassified arena, we deal with information that is mainly shareable, except where statute and policy require restrictions. Agencies must often balance the need to share sensitive information, including terrorism-related information, with the need to protect it from widespread access. A new approach is required. Existing practices and conventions have resulted in a body of policies that confuse both the producers and users of information, ultimately impeding the proper flow of information. Moreover, multiple practices and policies continue to be developed absent national standards. This lack of standards often results in information being shared inappropriately or not shared when it should be. In December 2005, the National Industrial Security Program Policy Advisory Committee, described the consequences of continuing these practices without national standards in the following manner ``. . .the rapid growth, proliferation and inclusion of SBU into classified contract requirements without set national standards have resulted in pseudo-security programs that do not produce any meaningful benefit to the nation as a whole.'' Clearly this situation is unacceptable. IV. A Presidential Priority The lack of government-wide standards for SBU information is well- known. More difficult has been charting a reasonable way ahead to create such standards. This is an enormously complex task that requires a careful balance between upholding the statutory responsibilities and authorities of individual departments and agencies, and facilitating the flow of information among them--all the while protecting privacy and civil rights. We were successful in creating such a regime for classified national security information by setting national standards and requiring that they be executed uniformly across the Federal government. In addition, we established a permanent governance structure for managing the classified information regime. A similar approach is necessary to establish an unclassified information regime, with standards governing controlled unclassified information. As required by the Intelligence Reform and Terrorism Prevention Act of 2004, on December 16, 2005, the President issued a Memorandum to the Heads of Executive Departments and Agencies on the Guidelines and Requirements in Support of the Information Sharing Environment, which specified tasks, deadlines, and assignments necessary to further the ISE's development. Guideline 3, of his Memorandum, specifically instructed that to promote the sharing of, ``. . .Sensitive But Unclassified (SBU) information, including homeland security information, law enforcement information, and terrorism information,\1\ procedures and standards for designating, marking, and handling SBU information (collectively ``SBU procedures'') must be standardized across the Federal government. SBU procedures must promote appropriate and consistent safeguarding of the information and must be appropriately shared with, and accommodate and reflect the imperative for timely and accurate dissemination of terrorism information to, State; local, and tribal governments, law enforcement agencies, and private sector entities.'' --------------------------------------------------------------------------- \1\ Pursuant to the ISE Implementation Plan, and consistent with Presidential Guidelines 2 and 3, the ISE will facilitate the sharing of ``terrorism information,'' as defined in IRTPA section 1016(a)(4), as well as the following categories of information to the extent that they do not otherwise constitute ``terrorism information'': (1) homeland security information as defined in Section 892(f)(1) of the Homeland Security Act of 2002 (6 U.S.C. Sec. 482(f)(1)); and (2) law enforcement information relating to terrorism or the security of our homeland. Such additional information includes intelligence information. --------------------------------------------------------------------------- An interagency SBU Working Group, co-chaired by the Departments of Homeland Security (DHS) and Justice (DOJ), undertook an intensive study and developed several draft recommendations for a standardized approach to the management of SBU. Its work provided a solid foundation for completing the recommendations. It was determined, however, that additional work was necessary to fully meet the requirements of Guideline 3. Recommendations for Presidential Guideline 3 are coming close to completion in a SBU Coordination Committee (SBU CC), chaired by the Program Manager, Information Sharing Environment (PM-ISE), with Homeland Security Council oversight. The SBU CC began work in October 2006 with the participation of the Departments of State, Defense, Transportation, Energy, Justice, and Homeland Security; the Federal Bureau of Investigation; the Office of the Director of National Intelligence; the National Security Council; and the Office of Management and Budget. The committee actively consults with representatives from other departments and agencies, the National Archives and Records Administration (NARA), the Information Security Oversight Office, the Controlled Access Program Coordination Office, the Information Sharing Council, the Global Justice Information Sharing Initiative, State, local, and tribal partners, and several private sector groups. The efforts of the SBU CC have focused on developing an SBU control framework that is rational, standardized, and simplified, and as such, facilitates the creation of an ISE that supports the individual missions of departments and agencies and enhances our ability to share vital terrorism information among Federal, State, local, tribal, and private sector entities, and foreign partners. Rationalization means establishing a framework based on a set of principles and procedures that are easily understood by all users. This should help build confidence among users and the American public that information is being shared and protected in a way that properly controls information that should be controlled, and protects the privacy and other legal rights of Americans. Rationalization means structuring a framework in which all participants are governed by the same definitions and procedures and that these are uniformly applied by all users. The objective is to end uncertainty and confusion about how others using the framework will handle and disseminate SBU information. Standardization helps achieve the ISE mandated by Congress: ``a trusted partnership between all levels of government.'' Simplification means operating a framework that has adequate, but carefully limited, numbers and types of markings, safeguards, and dissemination of SBU information. Such a simplified framework should facilitate Federal, State, and local government sharing across jurisdictions; facilitate training users; and reduce mistakes and confusion. V. The Controlled Unclassified Information (CUI) Framework I must reiterate that interagency discussions of a proposed detailed framework are still underway. Furthermore, no recommendation will become final unless and until it is approved by the President. Of course, the ability to implement any reform will depend upon the availability of appropriations. With respect to the present proposal, however there is general agreement that the SBU framework should include the following 6 main elements: 1. CUI Designation: To ensure a clean break with past practices, the Framework would change the descriptor for this information to ``Controlled Unclassified Information'' (CUI)_ thus eliminating the old term ``SBU.'' Participants would use only approved, published markings and controls, and these would be mandatory for all CUI information. All other markings and controls would be phased out. 2. CUI Mmarkings: The CUI Framework also contains mandatory policies and standards for marking, safeguarding and dissemination of all CUI originated by the Federal government and shared within the ISE, regardless of the medium used for its display, storage, or transmittal. This Framework includes a very limited marking schema that addresses both safeguarding and dissemination. It also provides reasonable safeguarding measures for all CUI, with the purpose of reducing the risk of unauthorized or inadvertent disclosure and dissemination levels that with the purpose of facilitating the sharing of CUI for the execution of a lawful Federal mission or purpose. 3. CUI Executive Agent: A central management and oversight authority in the form of an Executive Agent would govern the new CUI Framework and oversee its implementation. 4. CUI Council: Federal departments and agencies would advise the Executive Agent through a CUI Council composed of senior agency officials. The Council will also create mechanisms to solicit State, local, tribal, and private-sector partner input. 5. Role of Departments and Agencies: The head of each participating Federal department and agency will be responsible for the implementation of a functional CUI Framework within the agency. 6. CUI Transition Strategy a Transition Strategy for a phased transition from the current SBU environment to the new CUI Framework is needed. During the transition, special attention would be paid to initial governance, performance measurements, training, and outreach components. On a final note, our work has recognized that the substantive information that will be marked and disseminated in accordance with the proposed Framework is also subject to a variety of other legal requirements and statutes. Among some of the most important statutes and legal authorities that apply to this information are the Privacy Act of 1974, the Freedom of Information Act, the Federal Information Security Management Act (FISMA) and various Executive Orders, including Executive Order 12333, which governs the Intelligence Community and its use of United States Persons information. I would like to stress that this proposed Framework for handling SBU has thoroughly considered these legal authorities and does not alter the requirements and obligations imposed by these authorities. We will continue to work with the ISE Privacy Guidelines Committee to ensure that the appropriate privacy issues fully meet any legal requirements to protect the civil liberties and privacy of Americans. VI. Conclusion For information sharing to succeed, there must be trust--the trust of government providers and users of information, or policymakers, and most importantly, of the public. Each of these must trust that information is being shared appropriately, consistent with law, and in a manner protective of privacy civil liberties. Building trust requires strong leadership, clear laws and guidelines, and advanced technologies to ensure that information sharing serves important purposes and operates consistently with American values.\2\ --------------------------------------------------------------------------- \2\ Mobilizing Information to Prevent Terrorism: Accelerating Development of a Trusted Information Sharing Environment, Third Report of the Markle Foundation Task Force, July 2006 --------------------------------------------------------------------------- The lack of a single, rationalized, standardized, and simplified SBU framework does contribute to improper handling or over- classification. To instill confidence and trust that sensitive information can be appropriately shared, handled, safeguarded, and protected, we must adopt a standardized CUI Framework. This is especially critical to our counterterrorism partners outside the intelligence community. Appropriately protecting law enforcement and homeland security related sources and methods are just as valuable to our national security as protecting our intelligence sources and methods. The global nature of the threats our Nation faces today requires that: (1) our Nation's entire network of defenders be able to share information more rapidly and confidently so that those who must act have the information they need, and (2) the government can protect sensitive information and the information privacy rights and other legal rights of Americans. The lack of a government-wide control framework for SBU information severely impedes these dual imperatives. The CUI Framework is essential for the creation of an ISE which has been mandated by the President and the Congress. Only then can we meet the dual objectives of enabling our Nation's defenders to share information effectively, while also protecting the information that must be protected. A commitment to achieving standardization is essential--a vital need in the post-9/11 world. Ms. Harman. Thank you, Ambassador. We now recognize Dr. Morris for a 5-minute summary. STATEMENT OF CARTER MORRIS, Ph.D., DIRECTOR, INFORMATION SHARING AND KNOWLEDGE MANAGEMENT, OFFICE OF INTELLIGENCE AND ANALYSIS, DHS Mr. Morris. Thank you, Madam Chairman, Chairman Thompson, Ranking Member Reichert, other distinguished members of the subcommittee. It really is a pleasure for me to be here this morning to talk about the activities that we are doing in DHS relative to information sharing and specifically to talk about the activities that we are doing with Ambassador McNamara, the FBI, our other federal partners and our state and local partners in developing a system that will effectively allow us to share information but also to protect the information that needs to be protected. When I go around and give my various talks that I give on information sharing, I like to quote from the Homeland Security Act that says one of the responsibilities of DHS is to share relevant and appropriate homeland security information with other federal agencies and appropriate state and local personnel together with assessments of the credibility of such information. And the act defines state and local to include the private sector. I think that is my charge in DHS to make that happen and that we take that very seriously that that is a major part of the responsibilities of the Department of Homeland Security. The challenge that we face, and the one we are talking about here today, is the issue that being able to share but to still protect the information that needs to be protected. Now, I know from the Congress we hear both things coming at us strongly, and we want to make sure that we do both effectively. In the national security community, we have had a classification system in place for a very long time. You can argue as to what is in it and what is out of it, but let me assure you, even in that community, we continue to look at need to know and originator control and third agency rules, all the things that people believe are an impediment to sharing, all of which are actively being debated at the moment. Outside of the national security community, as we have already talked about, there are also reasons to protect information. Some of this information is very vital to national security--privacy, law enforcement case information, witness protections, security practices, vulnerabilities in our critical sectors and even lots of others. These are very legitimate reasons, and what we have to do is figure out how to share, how to protect and how to build trust in the system, as Ranking Member Reichert pointed out, so that people will actually share the information. And that is the challenge that we have. Let me add a little bit of my own personal assessment here, speaking for myself. As I look around the information sharing business, information that is what I would call important is rarely not protected in some way. So in almost everything we talk about in information sharing, we have to couple that with a discussion of information protection. And so we can't talk about one without the other. We believe that DHS has moved forward in the information sharing business. If you look at my written statement, you will see that there are a number of references made, the things we have done. I would like to point out just two, and one of them is very relevant today. One is, in the classified domain, we have led a community effort with all of our partners to look at how we better produce unclassified tear lines from classified reporting and to not only produce that tear line with information but produce an assessment, let me say, of the credibility of that information. We believe we have a new system that is currently being implemented, and some of my intelligence community partners we have already seen a real change in how that is being implemented. The second area on the non-classified side is all of the efforts that we have put into working the controlled, unclassified information. As Ambassador McNamara said, DHS, working with the Department of Justice, that really started that planning into these activities, and we take this as a very important thing to accomplish. Some of the people who work for me are very rabid about the issue that we really do need to get this under control and do it very well. So that is the area that we really need to work on, this regime for how we handle and control information. Let me say that when we do this regime of looking at how this controlled, unclassified information, we believe there are three things that we particularly need to pay attention to. One is that we put in place a governance structure to run this, and we put it in quickly, effectively and from the beginning. The second thing is we believe any system is going to have to be easy to use. It is going to have to be convenient. And the third thing is that we believe that we are going to have to make sure that any system that we put in at the federal level is closely coordinated with the state and locals and how they handle information. As we know, there is law enforcement information at the federal level, there is law enforcement information at the state level. They are controlled differently, and we need to bring those systems together. Let me finish up then, since my light is on, and very quickly. One, we are dedicated to information sharing. We are dedicated to implementing a new system to run the controlled, unclassified information. We are very much on board with the program and the proposal that is currently being proposed. However, I will say, I do not believe this is easy. It is not easy at all, and I think that we are going to have to pay particular attention. We believe the phased approach that is in the initial proposal and how to get into this, we believe, is the right proposal. And I am here now to answer any questions that you might like to ask. [The statement of Mr. Morris follows:] Prepared Statement of Dr. Carter Morris April 26, 2007 Good morning, Chairwoman Harman, Ranking Member Reichert, and distinguished members of the subcommittee. My name is Carter Morris, and I am the Director of Information Sharing and Knowledge Management for the Office of Intelligence and Analysis at the Department of Homeland Security (DHS). It is a pleasure to be with you today to discuss the control of government information and the actions DHS is taking to address and improve our ability to share information without unnecessary restrictions and in a manner that protects what needs to be protected. The Homeland Security Act of 2002 authorizes DHS to access, from any agency of the Federal government, state, local, and tribal governments, and the private sector, all information relating to threats of terrorism against the United States and other areas; information relating to the vulnerabilities of the United States to terrorism; and information concerning the other responsibilities of the Department as assigned to and by the Secretary. After analyzing, assessing, and integrating that information with other information available to DHS, the Secretary must then ensure that this information is shared with state, local, and tribal governments; and the private sector, as appropriate. Concomitant with these responsibilities is the obligation of the Secretary to identify and safeguard all homeland security information that is sensitive, but unclassified, and to ensure its security and confidentiality. Information sharing, for counterterrorism and related purposes, therefore, is key to the mission of DHS. Moreover, the Intelligence Reform and Terrorism Prevention Act of 2004 established the Program Manager of the Information Sharing Environment (PM-ISE) to assist in the development of policies, procedures, guidelines, rules, and standards, including those which apply to the designation, marking, and handling of sensitive but unclassified information, to foster the development and proper operation of the ISE. DHS, in coordination with the PM-ISE and other agencies on the Information Sharing Council, is actively participating in efforts to standardize procedures for sensitive but unclassified information and create an effective Information Sharing Environment. . The Challenge The challenge that we face in handling information is balancing two important and competing factors: ``sharing the information that needs to be shared'' and ``protecting information that needs to be protected.'' Our goal is to share information unless there is a valid and necessary reason to protect such information and thus limit or control the dissemination to a discrete community or other set of users. The legitimate need to classify some information, for purposes of national security and to protect our sources and methods and allow information collection operations to be conducted without advanced notice to our adversaries, is well established. As sources and methods for acquiring information change, as well as our adversaries capabilities, we continue to evaluate and adjust our classification criteria. Similarly, there are many indisputably legitimate reasons for protecting certain unclassified information, which we refer to generically as Controlled Unclassified Information (CUI)--for example, privacy concerns relating to personal information, the danger of compromising ongoing law enforcement investigations or of endangering witnesses, the need to protect private sector proprietary information and, most importantly, the need to protect information containing private sector vulnerabilities and other security-related information that could be exploited by terrorists. Unauthorized disclosure of this information could cause injury to a significant number of individual, business, or government interests. Through DHS's work with state and local fusion centers, we have encountered examples of how the proliferation of internal policies for handling unclassified but sensitive information can create unintended barriers to information sharing. Existing markings that are meant to identify necessary safeguards and dissemination restrictions on information often create as much confusion as help. For example, a state fusion center received a report that contained actionable threat information bearing the marking ``LES'', meaning Law Enforcement Sensitive. The fusion center personnel were unsure to what extent they could disseminate information with such a marking. When they contacted the originating Federal agency, they were unable to speak with someone who knew the data and could explain the disclosure rules. The fusion center personnel erred on the side of caution and did not share the information--in this case not the best solution. Sensitive information (classified or unclassified) is only shared by people who trust the systems, policies, and procedures that guide that sharing. Any lack of confidence regarding the operation and effectiveness of a system reduces the willingness of consumers to share the information, therefore limiting any benefits it might offer. With that in mind, we continue working to transition from a historically risk averse approach to sensitive information sharing, to one where the risks are considered and managed accordingly, but consistent with a responsibility to provide information to our partners and customers who need it. In order to implement the mandates of the Information Sharing Environment we must both produce material at the lowest sensitivity level appropriate to allow it to be easily shared with all who need it and ensure that processes for protecting information that needs to be protected are defined and effective. DHS is leading information sharing DHS has been a leader in establishing new approaches to information sharing--including federal sharing at all classification levels; sharing with our state, local, tribal, and territorial partners; and sharing with the private sector. In this sharing it is critical to address both operational needs and the appropriate security in transferring the information. I would like to talk about five specific DHS information sharing initiatives where we are addressing the need to share but still providing an appropriate level of control of this information. 1. Like other Federal departments and agencies, DHS shares information with state, local, and tribal partners through state and local fusion centers. We are providing people and tools to these fusion centers to create a web of interconnected information nodes across the country that facilitates the sharing of information to support multiple homeland security missions. Working with the Federal government and its partners to establish this sharing environment, DHS is ensuring that its processes and systems not only achieve the sharing necessary but also provide the protection and control of the information that gives all parties confidence and trust that the information is appropriately used and that information which needs to be protected--such as personally identifiable information--is appropriately controlled and protected. 2. DHS, DOJ and other federal entities are also creating a collaborative, unclassified information sharing community, based on establishing a trusted partnership between the fusion centers and the federal government. This environment is requirements driven, and focused on providing information to support the mission of the intelligence analysts, allowing both information sharing and collaboration with the state and local intelligence communities to encourage the development of mature intelligence fusion capabilities. A key to the development of such a sharing environment is providing a system and processes that build confidence that information will not only be shared but also protected and controlled as needed, which is what we are doing. 3. As part of the Presidential Guideline effort, DHS led an interagency working group that developed the ``Recommended Guidelines for Disseminating Unevaluated Domestic Threat Tearline Reporting at the Unclassified Level.'' Federal agencies disseminate unclassified extracts from unevaluated classified threat reports to facilitate sharing of threat information with those on the domestic front lines. Federal dissemination of raw threat reporting to State and local authorities--before the relevant Federal agencies can assess the specific threat--has, at times, led State and Local authorities to misinterpret the credibility of the threat. This effort provided recommendations to support timely sharing of terrorist threat data with state and local officials with increased clarity on the credibility of the information while maintaining the appropriate security for sources and methods. These recommendations are now being implemented in the intelligence community. 4. DHS is also leading the Federal Coordinating Group, to create coordinated federal intelligence products at the lowest appropriate levels of classification, for dissemination to state, local, tribal and private sector communities. The Group will coordinate three categories of ``federally coordinated terrorism information products''--time- sensitive threat/incident reporting, situational awareness reporting, and strategic or foundational assessments. For each category of products, the Group will ensure originating agencies validate sourcing, ensure substantive completeness, and tailor the analysis for state, local, tribal, and private sector use. The Group will coordinate the downgrading and/or ``tearlining'' of classified materials where appropriate levels of classification or control that permit wider state, local, tribal, and private sector use but do not jeopardize national security or other sensitivities. Again the key is providing the necessary information while also providing clear understanding of the necessary protection and control of this information. 5. And finally, DHS is active in the interagency group working to minimize the number of different CUI safeguard and dissemination requirements. We undertake these efforts with an eye toward facilitating appropriate information sharing--and significant progress can be made by eliminating internal safeguarding and dissemination policies that are inconsistent throughout Executive agencies and that are occasionally overly protective of information. We are committed to developing a system for Controlled Unclassified Information that effectively facilitates sharing while at the same time protecting sensitive information that requires robust protection. DHS Key CUI elements There are three issues that we believe are critical to success in instituting an effective CUI framework. First, an effective and continuing CUI governance structure must be established. The lack of a government-wide governance structure is one of the primary reasons that we have been struggling to overcome confusion in this area. To advance the government's information sharing demands with the attendant need to appropriately safeguard sensitive information requires a permanent governance structure to oversee the administration, training, and management of a standardized CUI system. Second, DHS believes that the improved CUI framework must be clear and easy to implement for all stakeholders. It is important that we can justify and defend all information that is so controlled. If the framework is not readily understood it will not be used. Furthermore, adoption must be swift. Establishing the governance structure will aid this process by documenting the rules and standardizing the policies, processes, and procedures for handling CUI across the federal government. And third, we must ensure that all potential users of CUI have a clear understanding of the CUI framework so that we can facilitate a more effective and interactive information exchange. We understand that they have their own constraints surrounding systems and sensitive data, so we must work to identify mechanisms to integrate state and local systems with the Federal framework. Addressing these elements will help provide transparency and build confidence to increase sharing across communities--from intelligence to law enforcement, from law enforcement to the first responders, etc. Challenges Facing CUI standardization Over 100 CUI designators or markings have been identified, and each of these has arisen to address a valid need to protect information. Most are codified as internal policies and procedures, some of which have actually served to enhance information sharing, i.e., clearly defined control systems create a trusted environment that encourages information sharing. Less often, such designators or markings are the result of legislative and/or regulatory requirements to protect certain information in a particular way. These practices worked well within a local environment, but the challenge is to leverage the successful practices and build a trusted environment that bridges communities and domains. We must exercise caution, however, as we go forward to consider and, where appropriate, revise operational practices in a manner that can achieve both sharing and protection in an expanded community. This caution is especially true in cases where controls were created more to facilitate, rather than limit, information sharing. Within DHS, there are three such information-protection regimes-- ``Protected Critical Infrastructure Information (PCII),'' ``Sensitive Security Information (SSI),'' and the newly established ``Chemical Vulnerability Information (CVI).'' Congress mandated these categories of information be protected and DHS promulgated regulations implementing these regimes. Each was specifically created to foster private sector confidence to increase their willingness to share with the federal government crucial homeland security-related information. To date, PCII and SSI have been successful in this regard and have been well-received by the private sector. Moreover, these designations are ready examples of how robust control of information can actually promote appropriate sharing. Summary Because we are changing established cultures and procedures and moving forward, in coordination with the PM-ISE, with a new framework for CUI, it is important that we adequately address all elements of its implementation. Governance, training, strategic communications, information technology systems planning, and the development of new standards and procedures are all important to the effective implementation of these reforms. Phased implementation and continuous incorporation of the lessons learned in this process are basic tenets of change management. It is important that the appropriate governance model is adopted to ensure systematic implementation of the framework and foster information sharing. That said, DHS is fully committed to this new framework and is, moreover, pleased that the framework fully recognizes the difficulties of implementation by proposing, among other things, a planning phase and phased implementation. Doing so will allow a smoother implementation and reduce the risk of losing the confidence that non- federal partners have now found in current DHS programs. DHS looks forward to continue working with the PM-ISE, the Information Sharing Council, and each of our Federal partners, to address the challenges of what many perceive to be the ``over- classification'' of information. We believe we made great strides in identifying the challenges. We also believe the paths forward are paved for interagency success in improving the sharing of information and providing an appropriate and streamlined system for controlling sensitive information. Nevertheless, and notwithstanding the good progress we have made to date, we should not underestimate the challenges that exist for implementing a new system for standardizing and handling Controlled Unclassified Information across the Federal government. Thank you for your time. I would be glad to answer any questions. Ms. Harman. Thank you, Dr. Morris. The chair now recognizes Mr. Murphy for a 5-minute summary of his testimony. STATEMENT OF WAYNE M. MURPHY, ASSISTANT DIRECTOR, DIRECTORATE OF INTELLIGENCE, FEDERAL BUREAU OF INVESTIGATION Mr. Murphy. Good morning. Thank you, Madam Chairman Harman, Chairman Thompson, Ranking Member Reichert and members of the subcommittee. I am pleased to be here today to demonstrate the commitment of the Federal Bureau of Investigation to strengthening our nation's ability to share terrorism information. We are diligently working to fulfill the expectations that Congress set forth in the Intelligence Reform and Terrorism Prevention Act of 2004. As the assistant director for intelligence to the FBI and the FBI's senior executive for information sharing, I am at once responsible for, accountable to, and have a vested interest in a successful information sharing environment. I am particularly pleased to be testifying today with Ambassador Ted McNamara and Dr. Carter Morris. It has been my privilege over the past many months to work with these professionals and many others as we seek to craft an outcome that matches both the letter and spirit of the task before us. I join them today to discuss our collective efforts to develop a standardized framework for marking, safeguarding and sharing controlled, unclassified information. My nearly 24 years in the intelligence community have largely been served in an environment where I dealt almost exclusively with classified national security information. While those regimes could be complicated and require great discipline and attention to detail, by comparison, they are far less challenging than my experience has been in working to organize a functional CUI framework. This is not because of a lack of commitment, focus and creativity and trying to address that framework but because of the myriad of issues and interests that one encounters in the transitional world of information between what is controlled and what is not. From an FBI perspective, getting it right is especially important. Our information sharing environment spans the range from classified national security information to fully open source. We must have the capacity to interpose information from all of these regimes and to do so in a dynamic manner. We must have the agility to rapidly move information across security barriers and into environments that make it more readily available and therefore of greater value to the broadest set of players. And across all of our partners, we must have a framework that allows for an immediate and common understanding of information's providence and the implications that that imparts. We must make the sharing of CUI a benefit, not a burden, especially on state, local and tribal police departments who would be disproportionately affected if asked to sustain a complex and expensive control framework. We must manage information in way that sustains the confidence of people and organizations who share information that puts them and their activities at risk. Most important of all, we must respect the power of that information and the impact it holds for the rights and civil liberties of American people who have trusted us to be its stewards. That means we must also never use control as a way to deny the public access to information to which they are properly entitled. With the FBI, achieving a streamlined CUI framework is much more than establishing a process; it is about shaping mindsets so that we can shift fully from a need to know to a duty to provide. The CUI framework, as proposed, creates opportunities and solves problems for me that I could not have solved on my own. The FBI is fully and completely committed to this process. All of us who have been part of this process wish we could move more quickly in reaching a point where we are today, but I believe the investment of time, the level of effort and the openness and commitment that has marked our dialogue has done justice to the expectations of the American people. Thank you for this hearing. I look forward to answering your questions. [The statement of Mr. Murphy follows:] Prepared Statement of Wayne M. Murphy april 26, 2007 Good morning, Chairman Harman, Ranking Member Reichert, and members of the Subcommittee. I am pleased to be here today to demonstrate the commitment of the Federal Bureau of Investigation (FBI) to strengthening our nation's ability to share terrorism information. We are diligently working to fulfill the expectations Congress set forth in the Intelligence Reform and Terrorism Prevention Act of 2004. As the Assistant Director for Intelligence and the FBI Senior Executive for Information Sharing, I am at once responsible for, accountable to and have a vested interest in a successful Information Sharing Environment. I am particularly pleased to be testifying today with Ambassador Ted McNamara, the Information Sharing Environment Program Manager, and Dr. Carter Morris, Director for Information Sharing and Knowledge Management, Intelligence and Analysis from the Department of Homeland Security. It has been my privilege over the past many months to work with these professionals and others as we seek to craft an outcome that matches both the letter and spirit of the task before us. I join them today to discuss our collective efforts to develop a standardized framework for marking, safeguarding, and sharing ``Controlled Unclassified Information'' (CUI), or as it is more commonly known, ``sensitive but unclassified'' information. On December 16, 2005, the President issued the ``Guidelines for the Information Sharing Environment'' as mandated by the Intelligence Reform and Terrorism Prevention Act of 2004. These Guidelines, among other things, set in motion a process for standardizing the handling of controlled unclassified information. My nearly 24 years in the intelligence community have largely been served in an environment where I dealt almost exclusively with classified national security information. While those regimes could be complicated and required great discipline and attention to detail, by comparison they are far less challenging than my experience has been in working to organize a functional CUI framework. This is not because of a lack of commitment, focus and creativity in trying to address that framework, but because of the myriad of issues and interests that one encounters in the transitional world of information between what is controlled and what is not. It is essential that we get it right, because it is information in this environment that can be of greatest utility when we need to share across a broad range of interests and constituencies. This framework provides a measure of protection for sensitive information to reassure those who might seek to hold such information in a classified or overly restrictive regime, which would deny others access and cause us to fail on our ``duty to provide.'' From an FBI perspective--getting it right is essential. The Information Sharing Environment, which is the lifeblood of our mission, spans the range from classified national security information to fully open source. We must have the capacity to interpose information from all of these regimes and do so in a dynamic manner. We must have the agility to rapidly move information across security boundaries and into environments that make it more readily available and therefore of greater value to the broadest set of players. And across all of our partners, we must have a framework that allows for an immediate and common understanding of information's provenance and the implications that imparts. We must make the sharing of CUI a benefit, not a burden-- especially on State, Local and Tribal police departments who would be disproportionately affected if asked to sustain a complex and expensive control framework. We must manage information in a way that sustains the confidence of people and organizations who share information that puts them at risk. Most important of all, we must respect the power of that information and the impact it holds for the rights and civil liberties of the American people who have entrusted us as its stewards. That also means that we must never use ``control'' as a way to deny the public access to information to which they are entitled. For the FBI, achieving a streamlined CUI framework is much more than establishing a process, it's about shaping mindsets so we can fully shift from ``need to know' to ``duty to provide.'' This shift does not diminish our responsibility to properly protect the privacy rights and civil liberties of all Americans. It does not set up a framework that puts at greater risk our sources and methods and it does not compromise our capacity to conduct both an intelligence and law enforcement mission with full vigor and impact. Rather, this framework seeks to level the information sharing playing field through a common lexicon and a shared understanding of goals. Unfortunately, the present set of policies and practices make it extremely difficult for well meaning individuals to act responsibly, appropriately and completely in this regime. There are well over 100 separate markings for CUI and there is no easy way for the recipient of information bearing an unfamiliar marking to find out what that marking means. Moreover, the same marking means different things in different parts of the Federal Government. The FBI, working in close coordination with the Department of Justice, have jointly drawn upon the experience and the wisdom of state and local law enforcement personnel to help us understand better what kinds of CUI policies would be most helpful to them as we strive to share information without compromising either privacy or operational effectiveness. The Criminal Intelligence Coordinating Council (CICC) of the Global Justice Information Sharing Initiative has played an active role in advising us on this matter, including the convening on December 6, 2006 for an all-day meeting to discuss the practicability at the state and local level of various proposed ``safeguards'' for CUI. I would like to acknowledge here the particularly constructive role played by the CICC Chair, Col. Bart Johnson of the New York State Police. Col Johnson is forthright in explaining what Federal policies would be most helpful in enabling state and local law enforcement to play their part in preventing terrorism, but he is also sophisticated in his understanding of the many other factors that must be taken into account. In our view there are three aspects of the current draft framework that are particularly important: 1. Every marking that appears on any CUI document in the future must have a clear and unambiguous meaning. There should be a website--accessible over the Internet to everybody--on which the approved markings are defined, and no markings should ever be used that are not defined on this website. This will mean that recipients of shared information who want to do the right thing will easily be able to find out what protective measures are expected of them. I believe that this change will both increase sharing and decrease the risks of sharing. 2. All CUI information must be marked with a standardized level of safeguarding. For most CUI this safeguarding will be no more than ordinary prudence and common sense--don't discuss CUI when you can be overheard by people you don't intend to share it with, store it in an access controlled environment, as needed protect it with a password. 3. All CUI information must be marked with appropriate dissemination guidance so that recipients can easily understand what further dissemination is permitted. All of us who have been part of this process wish we could have moved more quickly in reaching the point where we are today, but I believe the investment of time, the level of effort and the openness and commitment that has marked our dialog has done justice to the expectations of the American people. Thank you for time, I look forward to answering your questions. Ms. Harman. Thank you very much. We are impressed that there is a minute and a half left over. You win the prize, Mr. Murphy. [Laughter.] Well, I do apologize for rushing Ambassador McNamara. He has important things to tell us. But unless we adhere to this format, we don't give adequate time to ask questions and to respect the fact that we have a second panel of witnesses and also probably that we are going to have to recess for votes at some point during this hearing. Well, I thank you all for your testimony. And I will now recognize myself for 5 minutes of questions, and I will strictly adhere to the time. Dr. Morris, I was sending DHS a message through you about frustration with the lack of progress on the ITACG and the inclusion of state, local and tribal representatives in the preparing of analytic products that is hopefully going to give those state, local and tribal authorities information they need in a timely way to know what to look for and what to do. Every terror plot is not going to be hatched in Washington, D.C. where we might have adequate FBI and federal resources at the ready. I don't believe that for a minute, and I know no one on this panel does. So I am sending this message that it is absolutely critical for DHS to spend more time supporting the inclusion of numerous state, local and tribal representatives in the ITACG and to stand up the ITACG promptly. We don't understand any reason for delay. I am speaking for myself. I have a feeling that the chairman is going to speak for himself shortly on this same issue. And the way to do it right is the way Ambassador McNamara, working with you and state and local and tribal authorities, has come up with this proposal. So there is a positive example to learn from, and I hope that DHS, through you, is going to learn. Are you going to learn? Mr. Morris. I think that we are all committed to bringing state and locals into this activity. I can tell you personally it has always been my objective to do that. I have a meeting with my staff this afternoon on how we do this. I think the challenge has been, the delay is that, in a sense, establishing the infrastructure for doing this kind of thing is more challenging than we would all like to have, but there is no lack of commitment, and we will move forward aggressively. And that is what we are doing. Ms. Harman. Well, I hope that is true. Some of us thought that these folks could just be included in the NCTC itself, and then we were told we need a separate entity. Now you are saying setting up a separate entity has problems. I think the principle is the critical piece, and so let's not create problems with the second entity if it is a problem. Let's just move forward on the principle. Mr. Morris. We agree. No, absolutely. Ms. Harman. Sure. Okay. Ambassador McNamara, I did rush you and you really didn't get a chance to lay out how this is going to happen. We all get it that the White House hasn't approved your proposal. We are hopeful that it will be approved. Surely, the other two witnesses were saying positive things about it, and we have been briefed, the members of this committee, by you on it, and we are positive. Could you put on the record how this is going to happen, what the governance structure will look like, and could you address the issue of whether you need legislation to accomplish this? Obviously, it makes no sense to have a brilliant proposal that no one follows, so I am sure you have already--I know you have already thought about this, and I don't think we have testimony yet on the record about how this will get adopted across the federal government. Mr. McNamara. Yes, Madam Chairman. First of all, how: Right now the committee that I am chairing is putting in what I hope is final form a series of recommendations that will be a report to the president. He has asked for that report. It is known as guideline three, and we will be responding to that in, I expect, within a month or two, say, by the end of this quarter. We will send forward for review by the interagency process--that means deputies, principals and then sent to the president--a series of recommendations. It is not a study, it is not an investigation. What it is, is a series of policy recommendations for changing the current system and instituting a new regime called, CUI, as I mentioned. Second, you asked about the---- Ms. Harman. The need for legislation. Mr. McNamara. For legislation. Ms. Harman. To make certain there is compliance. Mr. McNamara. Correct. There is in fact a group, a subgroup of this committee that has been looking at the legislative history of SBU and what might be necessary in the way of legislation for the implementation of a new regime. It is headed by the Department of Justice, and we expect, once we have given them the final version of this, that they will come back to us with recommendations, and we will include those recommendations with the other recommendations. But those recommendations can't be made until they look at the product that we are telling them that we want implemented. And then they will give us their opinion as to whether or not legislation is needed. On whether legislation is needed to get acceptance of this, the answer, I think, is, no. The president has asked for this, he wants it, and he will review it, I think, with dispatch. Ms. Harman. I thank you for your answers. My time has expired. I would just alert you and the public listening in that we are considering legislation here on the issue of over- classification, which Dr. Morris spoke to briefly, as well as this issue. We think it is absolutely critical that we have understandable and clear rules for what information is protected and what information is shared. Otherwise, we think, we are not going to be able to get where we need to get, which is to block Al Qaida plots coming our way in real-time. I now recognize the ranking member of the subcommittee, the gentleman from Washington, for 5 minutes for questions. Mr. Reichert. Thank you, Madam Chair. Just to follow up on the chairwoman's last question, governance and legislation, I was taking notes during your testimony and didn't find it in your written testimony, but you mentioned 280 pieces of legislation or ordinances and then another 150-- Mr. McNamara. Regulations. Mr. Reichert. --regulations. Is the group in DOJ, are part of their tasks to take a look at those 280 and 150 to see---- Mr. McNamara. Yes, indeed. In fact, they were the ones who came up with those numbers. Mr. Reichert. Oh, okay. Mr. McNamara. They did a research project to find out what legislation created the current SBU system and what regulations were adopted subsequently after the legislation was passed to implement the requirements of the legislation. That is where that comes from, from that group. Mr. Reichert. Because I can see that maybe some of what we could do, Madam Chair, is pass a law eliminating some of these rules and regulations that might be inhibiting you in accomplishing that task. Mr. McNamara. Let me note that the vast majority, I believe, not having looked at all of them, but I have been told that the great majority of those simply require controls without going into detail as to what control mechanism should be put on specific kinds of information. The details of what controls were put on were determined by the regulations. And, therefore, it is the opinion of this group at this point that many of those legislative mandates require just a change of the implementing regulations rather than go back and change the legislation. But the definitive answer will only come when we have a final set of recommendations that we can hand to the lawyers. Mr. Reichert. Great. Good. The subcommittee would be happy to be working with you on those changes. I wanted to ask Dr. Morris, you mentioned as a part of the DHS mandate that you have, in that statement that you read, it talks about appropriate state and local personnel, which includes the private sector. How do you define ``appropriate''? Who does that include? Mr. Morris. That is an interesting question. As part of my talks, I have talked about that word exactly, because it was written in there. I think that is something we have to work with the state and locals. The program that we currently have is certainly focusing on the fusion centers that operate at the state level and at the local ones that have that. We believe that in the DHS program right now, that is where we are focusing our efforts and then working with the people in those fusion centers to understand where it needs to go beyond that. One of the things that I have actually talked to some people who worked for me for awhile is, how do we define, in working with the fusion centers, what are the other distribution methods that need to be there? Who else has to get the information in order to act? Mr. Reichert. Yes. Mr. Morris. I think that is the key thing. But right now our focus is through the fusion centers and working with the FBI and the activities that they do in the JTTF. Mr. Reichert. Good. Well, I think we all know from our experience that there are a lot of people who think they are appropriate, and that is the tough part is letting some people that they are not. Also, we talked a few days ago, Ambassador, about cultural change as it relates to gaining trust and training, and it is also something that Mr. Murphy mentioned. I kind of know where you are at on that, Ambassador, but I was hoping maybe Mr. Murphy might comment since you mentioned it in here, in your opening statement. The cultural change, in your opinion, is the need to know versus the need to share. So I think you nailed it when you said that. How would you say we are going to reach that goal? Mr. Murphy. I wish I could take credit for that. What really brought it home for me was when I was supporting a military operation as part of my responsibility at NSA, and afterwards we were doing a hot wash, and a Marine infantryman who was working as part of the front end operational activity told me, ``What makes you think that you have my perspective? What makes you think you can make judgments about what I need to know and don't need to know? You need to understand my environment better and work within my environment.'' That has resonated with me, particularly after 9/11, and the decisions I had made that made good sense at the time but, frankly, were parochial and limiting. I think this moves toward exposing our customers to the information that we have and letting them help us shape the message and shape the way it is delivered so the people that they represent is absolutely critical. And so changing the mindset, at the end of the day, is more important than any process thing that we do, because if the mindsets change, the processes will really take care of themselves. Mr. Reichert. I appreciate that answer very much, and we are all three on the same page. Ms. Harman. The gentleman's time has expired. I appreciate that answer very much too. I now yield 5 minutes to the chairman of the full committee, Mr. Thompson of Mississippi. Mr. Thompson. Thank you very much, Madam Chairman. Good answer, Mr. Murphy. Dr. Morris, if we implement CUI framework, do you think we can get DHS to come along? Mr. Morris. Well, I don't think there is any problem with us coming along. I think that the only issue that I believe that we need to address in the end is going to be, how do we make sure with any new system we come up with that we build the trust in that system and the trust in the markings, the controls, the disseminations that are specified by that? One of the big challenges for us in DHS has been working with the private sector, particularly, in the sharing of threat information on our critical infrastructure. And what we are dedicated to do under the new system is to make sure that whatever it says on the top of the piece of paper along an electronic message that people trust that system. And we think that is so critical in working with the private sector. Mr. Thompson. And so do you think we can get our ICE, CBP, TSA to buy into it also? Mr. Morris. I didn't say it was going to be easy. Yes, I do. Actually, I do. I think that we have socialized the proposal within the department. We haven't gotten back major pushbacks on it. I think people are still wondering how they are going to implement it, but in principle, yes, we have gotten acceptance. Mr. Thompson. Ambassador, what participation have we gotten in the development of this new framework from the private sector? Did you have any discussions with any private sector stakeholders or anything? Mr. McNamara. Yes, we have. We have been in consultation with them. There is a committee that the Department of Homeland Security has formed with private sector partners to examine many issues related to homeland security, not just this issue of the SBU and CUI. And we have gone over with them in some detail various aspects of this proposed and this recommendation for CUI that would affect the private sector in particular. We have had telephone conferences, we have had meetings with them here in Washington. They are about, I think, within a few days or a week to send in some final comments on the CUI proposal as well as some other proposals that they have been looking at to, I think, the chair of that committee or that group, the assistant secretary for infrastructure protection at the Homeland Security Department, Bob Stephan. And my understanding, from phone conversations, et cetera, is that they will be favorably disposed. They believe that their needs will be met by this new proposal for CUI. Mr. Thompson. I yield back, Madam Chair. Ms. Harman. Thank you, Mr. Chairman. We have been so efficient that I would ask Sheriff Reichert if he has an additional question, maybe one, and then we will move to our second panel. Unless you do, Mr. Chairman. Mr. Thompson. I have no further questions. Mr. Reichert. I would like to just give Dr. Morris a chance to address the cultural change. I noticed you had your hand up and you might have a comment there. Thank you, Madam Chair. Mr. Morris. I was just going to make a comment. I was on another panel recently and we were talking about information sharing, and there was a representative from private industry who came to the panel and basically said that approaching information sharing the way we are doing it now is going to fail, because it doesn't address the issue of discovery. And that gets back to the key point that you were making is that we have to put in place a system that promotes discovery of information, find the people out there who need it. And then that is an area that we really need to start and continue. It struck a note with me, and I certainly agreed with what I heard. Mr. Reichert. Madam Chair, if I could just quickly follow up. The public disclosure issue, as you mentioned discovery, is also one that I think the FBI might have to handle and deal with, isn't that true, all three, nod your head? Thank you. Ms. Harman. Well, I thank the witnesses and do agree with the ranking member that building trust is the key to making all of this work. Without that, discovery won't happen, changing cultures won't happen and getting information, accurate and actionable information in real-time won't happen. This is, as far as I am concerned, the critical mission for this subcommittee to drive home. Ambassador McNamara, I hope when you leave this room you will call the White House and ask them what minute they are going to approve your guidelines so we can get on with this. Right? Good. I know the phone number. [Laughter.] All right. This panel is excused. Thank you very much. Thank you very much, all. Are we now set up? Yes, we are. Counsel can take a seat next to me. I welcome our second panel. Our witness, Mark Zadra, serves as assistant commissioner, Florida Department of Law Enforcement, and is a 29-year veteran who has served in many leadership positions. Among them was overseeing the development and implementation of various intelligence and information technology systems. He served as special agent supervisor of the Domestic Security Task Force prior to his appointment to chief of office of statewide intelligence in 2002 and subsequently to special agent in charge of domestic security and intelligence. And as we heard, he welcomed 600 people to Florida recently to have a conference on the critical subject of fusion centers. Without objection, Mr. Zadra's full statement will be inserted in the record. And I would now ask you to summarize in 5 minutes. STATEMENT OF MARK ZADRA, ASSISTANT COMMISSIONER, FLORIDA DEPARTMENT OF LAW ENFORCEMENT Mr. Zadra. Thank you, Madam Chair and distinguished members of the committee. I am pleased to speak to you today about the importance of common federal information sharing protocols and the impact that they have on the state, local and tribal governments. Prior to 9/11, law enforcement agencies at all levels had little need to share sensitive information with non-law enforcement agencies. We had a generally accepted practice for sharing with one another, but because local and state law enforcement had minor involvement in the counterterrorism arena, we had limited experience with classified information. Little consideration was also given to sharing information outside of law enforcement, and particularly with respect to the private sector, it was generally not done. The paradigm shifted after 9/11 when it became known that 14 or more of the hijackers had lived, had traveled and trained in the state of Florida while planning their atrocities. One month later, Florida experienced the first of several nationwide deaths from anthrax, which once again terrorized our nation. In light of these grim realities, we recognized that local, state and tribal resources, together with a whole new set of non-law enforcement partners, including the private sector, represent the frontline of defense against terror and our best hope for prevention. Over the years, since 9/11, collectively, we have made great strides in overcoming the cultural barriers to information sharing. Despite many successes and a new cultural that encourages information sharing, barriers that impede the establishment of the desired national information sharing environment remain. Perhaps the single largest impediment is the lack of nationally accepted common definitions for document markings and standard policy procedures for handling, storing and disseminating non-classified information. Some states like Florida have open record laws, while other states impose very restrictive requirements and afford broad protections from release. Florida's reputation is that of an open record state, and it is widely known. Exemptions provided by Florida's public record law are insufficient to protect against public disclosure of all types of sensitive information. The fear that sensitive information may not be protected under state law has a chilling effect on the free flow of information from out-of-state agencies and non-governmental to and from Florida. We also believe that a lack of a standard definition results in federal agencies over-classifying information in an effort to protect it. Developing and implementing a nationally accepted designation will provide Florida and other states with the justification that they need to encourage modification of state laws so that sensitive information can be protected. Florida supports the implementation of the controls, unclassified information framework to replace the existing, sensitive but unclassified designation. Implementation of the new standard will involve varying degrees of physical and legislative impacts. However, it is my opinion that acceptance will be facilitated if the guidelines are straightforward and delivered in clear and concise language that there is a single, nationally accepted, encrypted communication standard and system, which can also be used by non-law enforcement homeland security partners and that that be designated. The fiscal impacts are mitigated through the use of grants for the training and awareness programs and reprogramming of systems to allow this new framework. And then implementation timelines need to consider the need to change policies and laws, purchase new equipment, do programmatic changes and to do the training that I referenced. Federal agencies are now providing state and local agencies with significant amounts of threat information. Much of the information that is still needed, however, is classified at the national level in order to protect methods, means and collection and national security interests. Under most circumstances, however, we do not need to know the identity of the federal sources, nor the means, nor the methods of intelligence collection, only whether the information is deemed to be credible and specifically what actions that they want state, local and tribal authorities to take. Florida believes the implementation of state regional fusion centers is the key to the establishment of the desired information sharing environment. These centers bring properly trained and equipped intelligence professionals with appropriate clearances to connect the puzzle pieces and disseminate actionable intelligence. The problem remains that, unfortunately, most of the operational components at the state and local level that may benefit from the information and would otherwise be available to report on indicators and warnings we observed in the field will never have access to this information because of the classification. Tear line reports forwarded to fusion centers can help address this particular concern. So state, local and tribal law enforcement, in addition to other discipline partners and the private sector, can receive information that they can act upon. Madam Chair and members of the subcommittee, thank you for the opportunity to appear and testify before you. I can assure you that the state of Florida is encouraged by your interest in facilitating an enhanced information sharing environment across the nation. It is my hope that the testimony and the understanding of Florida's desire to be a strong participant in the flow of critical, sensitive information and intelligence nationally will be help on your endeavor. And, ma'am, if I may take 15 more seconds. I want to, from a state perspective and probably on behalf of Colonel Johnson, to thank you for the recognition and the gratefulness on behalf of the nation for the agency's loss of their trooper, the New York state trooper, the New York state police and lost his family and agency. And thank you for recognizing the sacrifice of the state and local and tribal multidisciplinary partners that are also part of this fight on terror. Thank you. [The statement of Mr. Zadra follows:] Prepared Statement of Assistant Commissioner Mark Zadra Good morning Madam Chair and distinguished members of the Subcommittee. My name is Mark Zadra and I am a 29-year member of the Florida Department of Law Enforcement (FDLE). FDLE is a statewide law enforcement agency that offers a wide range of investigative, technical and informational services to criminal justice agencies through its seven Regional Operations Centers, fifteen Field Offices, and six full service Crime Laboratories. Our primary mission is to promote public safety and strengthen domestic security by providing services in partnership with local, state and federal criminal justice agencies to prevent, investigate, and solve crimes while protecting Florida's citizens and visitors. FDLE utilizes an investigative strategy that comprises five primary focus areas including Violent Crime, Major Drugs, Economic Crimes, Public Integrity and Domestic Security. I was recently appointed as FDLE's Assistant Commissioner of Public Safety Services however, prior to that appointment I served as the Special Agent in Charge of Domestic Security and Intelligence and the state's Homeland Security Advisor. In those roles I have overseen the development and implementation of various intelligence and information sharing programs and systems for FDLE and subsequently for the State of Florida. I have also overseen the development and implementation of the prevention component of Florida's Domestic Security Strategy and Florida's implementation of national information-sharing initiatives such as the Homeland Security Information Network (HSIN) and Florida's fusion center. I have further been an active participant on the Global Justice Information Sharing Initiative--Global Intelligence Working Group (GIWG). The goals of the GIWG include seamless sharing of intelligence information between systems, allowing for access to information throughout the law enforcement and public safety communities, creating an intelligence sharing plan, determining standards for intelligence sharing, developing model policies, determining training needs, and creating an outreach effort to inform law enforcement of the result of this effort. Over the last ten months I have been afforded an opportunity to provide input to the GIWG regarding the development of the recommended common protocols for sharing and protecting sensitive information and intelligence among multiple agencies with a role and responsibility in homeland security. I am pleased to speak to the Committee today about the importance of common federal information-sharing protocols and the impact they have on state, local and tribal governments. Prior to 9/11, law enforcement agencies at all levels had little need to share sensitive information with non law enforcement agencies. We had generally accepted practices for sharing information with one another but, because local and state law enforcement had minor involvement in the counterterrorism arena, we had limited experience with federally classified information. Little consideration was given to sharing sensitive information outside the law enforcement community, and sharing information with the private sector was generally not done. The paradigm shifted after 9/11 when it became known that fourteen or more of the hijackers had lived, worked, traveled and trained across Florida while planning the atrocities they would ultimately commit. In their daily activities they left many clues that, if viewed together, may have predicted the plan and given authorities an opportunity to avert the catastrophic consequences. One month after the horror of 9/ 11, Florida experienced the first of several nationwide deaths from Anthrax which once again terrorized our nation. In light of these grim realities, we recognized that local, state and tribal resources-- together with a whole new set of non-law enforcement partners including the private sector- represent the front line defense against terror and our best hope for terror prevention. Appropriately shared information is the key weapon in moving from the role of first responder to that of first preventer. Sharing information with agencies such as health, fire, emergency managers, and even non-governmental entities with a role in the fight against terror presented new challenges, not just the inherent cultural ones, but those relating to law, policy/procedure, technology and logistics. Over the years since 9/11, collectively, we have made great strides in overcoming the cultural barriers to sharing information. In Florida, through our Domestic Security Strategy and governance structure, we routinely work with and share information across all entities that have a role in protecting the safety and security of our citizens. Despite these successes and a new culture that encourages information sharing, barriers that impede the establishment of the desired national Information Sharing Environment (ISE) remain. Common Document Markings and Dissemination Protocols Perhaps the single largest impediment to an effective national ISE is the lack of nationally accepted common definitions for document markings and standard policy/procedure for handling, storing, and disseminating non-classified information. Sensitive but unclassified information, which is routinely received from federal and other state agencies, is needed by state, local, tribal and private sector partners that have a duty and responsibility to utilize it to provide for our safety and security. Consistency in definition and protocol is paramount to both fully sharing useful and actionable information, and protecting information that should not be shared. Some states, like Florida have open record laws that mandate revealing information compiled by governmental agencies unless a specific ``chapter and verse'' exemption or confidentiality provision applies. Other states impose very restrictive dissemination requirements and afford broad protections from release to those without a need to know. Florida's reputation as an open records state is widely known. While Florida law exempts certain information from public disclosure, the most likely exemptions applicable to the type of information that I am discussing are limited to criminal intelligence/ investigative information and information that pertains to a facility's physical security system plan or threat assessment. Exemptions provided by Florida's Public Records Law are insufficient to protect against public disclosure of all types of sensitive information needed by Florida's domestic security partners. For example, there is no specific exemption in Florida's public records law for information provided to Florida by a non-Florida agency unless it is intelligence or investigative information--both of which have fairly narrow definitions under Florida law. The fear that sensitive information may not be protected under state law has a ``chilling effect'' on the free flow of important information from out-of-state agencies and non governmental entities to and from Florida. We also believe that the lack of a standard designation results in federal agencies over-classifying their information in an effort to protect it. Information and intelligence sharing partners need to know, with certainty, that the information they share will be appropriately protected. At the same time, we understand there must be appropriate limits on what is removed from public scrutiny and review, and a balance achieved between properly informing the public and ensuring the safety and security of our state and nation. Developing and implementing a nationally accepted designation, with clear and appropriate handling and dissemination standards for sensitive information, will provide Florida and other states with the justification they need to encourage modification of state laws so that sensitive information can be protected in compliance with an accepted national standard. Fortunately, there appears to be a workable solution to the concerns I have identified. Florida supports the implementation of the Controlled Unclassified Information (CUI) framework to replace the existing Sensitive But Unclassifed (SBU) designation. The SBU designation contains numerous confusing designations used to mark unclassified information. The recommended CUI framework streamlines existing designations and provides handling requirements that facilitate wide distribution among law enforcement, homeland security, other government sectors and the private sector. We strongly believe that the information sharing environment mandated by Presidential Guideline 3 cannot be fully achieved without the implementation of a model such as the CUI framework. In the absence of common protocols, existing classification schemes will continue to be over utilized and/ or improperly utilized, resulting in the inability of persons who receive information to adequately distribute it to those with a duty and responsibility to take action to protect our citizens. We believe that the recommendations made by the Sensitive But Unclassified Working Group reflect workable solutions that could be accepted and replicated by most states. As a state representative I have been afforded an opportunity to review and comment on these recommendations during their formulation. I have also had the pleasure of personally meeting with Ambassador Thomas E. McNamara, Office of the Program Manager for the Information Sharing Environment and espousing Florida's views with respect to this and other information sharing topics. Implementing CUI In the absence of federal guidance and standards, many states, including Florida, have already expended resources in building systems and programs to fill the information needs of their consumers. Implementation of the new standard will involve varying degrees of fiscal and legislative impacts, however it is my opinion that acceptance will be facilitated if: 1. Guidelines are straight-forward and delivered in a clear, concise language; 2. A single, nationally accepted, encrypted communications system and federal information sharing encryption standard that can be used by non-law enforcement homeland security partners is designated; 3. Fiscal impacts are mitigated through grants for training and awareness programs, as well as for new equipment and system re- programming; and 4. Implementation timeline considers the potential need for state, local, and tribal governments to: a. Change policy and/or rules to comply with new information dissemination requirements; b. Purchase new equipment and/or system programming changes; and c. Train appropriate personnel in markings, handling, storage and dissemination requirements. For Official Use Only Tear Line Reporting In response to post 9/11 criticism regarding failure to share information vertically and horizontally across the spectrum of homeland security partners, federal agencies are now providing state and local agencies with significant amounts of threat information. Much of the information that is still needed, however, is classified at the national level in order to protect sources, methods and means of collection and national security interests. State and local law enforcement fully understand and appreciate the need to protect certain information and restrict dissemination to only those with a need or right to know. Under most circumstances, however, we do not need to know the identity of federal sources or means and methods of intelligence collection--only whether or not the information has been deemed credible and specifically what actions that the state, local and tribal entities should take. Florida believes the implementation of state and regional fusion centers is key to the establishment of the desired Information Sharing Environment. These centers bring properly trained and equipped intelligence professionals with appropriate clearances to connect the pieces of the puzzle and disseminate actionable intelligence. The problem remains that once the classified material is fused with the non-classified information from which analysis is performed, the information takes on the restrictions with the classified information which significantly narrows to whom and how it can be shared. Unfortunately, most of the operational components at the state and local level that may be benefit from the information, and would be otherwise available to report on the indicators and warnings being observed within the field, will not ever have access to this information. Tear line reports forwarded to fusion centers can help address this particular concern so that state, local and tribal law enforcement in additional to other discipline partners and the private sector receive information that they can act upon. In conclusion, I would like to compliment our federal partners for recognizing the value of state, local and tribal representative's expertise and allowing input on such a critical initiative prior to its implementation. This has not always been the case, but is a testament to the positive change in the information sharing culture and established and improved partnerships. I have been honored to be a member of the Global Intelligence Working Group and would like to acknowledge the work done by those professionals under the guidance of their Chairman, New York State Police Deputy Superintendent, Bart Johnson. Lastly, Madam Chair and Members of the Sub Committee, thank you for the opportunity to have appeared and testified before you today. I can assure you the State of Florida is encouraged by your interest in facilitating an enhanced information sharing environment across the nation. It is my hope that this testimony and the understanding of Florida's desire to be a strong participant in the flow of critical sensitive information and intelligence nationally will be helpful in your endeavor. Ms. Harman. I thank the witness for your testimony and now yield myself 5 minutes for questions. Let me say, first, Mr. Zadra, that I think we need to bottle you. I am not sure what that process could involve, but I would like to a bottle of you to sit on Charlie Allen's desk and I would like a bottle of you to sit on the desk of the appropriate people at the CIA who have a great role to play in our present classification system. And I definitely want a big bottle of you to be sitting on Fran Townsend's desk in the White House, as we move forward. Because it is absolutely critical, as you said, that you have timely information. And we have both classification and pseudo- classification systems that are making that more difficult than it should be. No one is arguing about the need to protect sensitive sources and methods. I served for 8 years in the House Intelligence Committee, and I think I get it, but I haven't found a defender, and I would disagree with such a person if I found one, who says that our present system works well. It doesn't, it is broken, and this is hearing is about how to fix at least a portion of it, and this subcommittee will focus on trying to fix as much of it as we can get our arms around. I want to ask you about a specific situation. I don't think anyone in the country and most people around the world missed the tragic events at Virginia Tech last week where 32 students and faculty lost their lives. Initially, it was not known who the shooter was. It turned out to be, we think, a mentally ill student acting alone. But I want to ask you, from your perspective, what were you thinking about when that information came over the wire? For example, were you thinking, is this a terrorist plot, is this the first phase, is this going to roll out in some of my universities in Florida? And what information were you able to get in real-time as you had those thoughts, and from whom? Mr. Zadra. Madam Chair, I can assure you that the state of Florida, there is not an incident that happens within our state, whether it is an accident of hazardous materials on a roadway or anything across the country, our mindset initially is first to determine whether or not it has a potential nexus to terrorism. I think we all learned a lesson after 9/11. Certainly, when this happened our immediate thought, the Florida Department of Law Enforcement has protective operations detail for our governor and also for our legislature and cabinet. And we, of course, when we first heard the news, were concerned, did we have a nexus to anything within our state and our particular universities and colleges that we needed to also be concerned with. Fortunately, because of the fusion center concept now, we have an embedded Department of Homeland Security analyst within our state fusion center. Very immediately two things happened. We reached out immediately, through our DH analyst, to the national operations center, and we were advised very quickly that there was no known nexus to terrorism. Of course, it was still unfolding at that time, but there were no initial indicators. The second thing that happened, which I think is proof positive about the fusion center concept is that the Virginia fusion center began putting out information that was made available to the other state fusion centers. And that was extremely critical and beneficial to us. I know the last thing that we would want to do as a state is to call and begin impacting the local law enforcement agencies that were responding to that tragic incident. They had their hands full. To have a state, a thousand or more miles away, calling and wanting to check to know the status of everything, it would be understandable that that could be an impediment to them. But because of the fusion center there and to be able to reach out to them directly and with them providing updates to us, and I know the last I saw was update number six, I know at least six updates were provided from that fusion center to all fusion centers across the nation. Ms. Harman. Well, that is a good news report. That is not a report you could have given a year or two ago, am I right? Mr. Zadra. Yes, ma'am, that is correct. Ms. Harman. Fusion centers, which have been the subject of other hearings, are beginning to work. DHS does have personnel embedded in 12 of them. You are obviously one of 12. We are trying to help move more DHS people there, and I am just assuming that the products you saw also reflected, for example, FBI input, since they are typically a part of the fusion center. Is that correct? Mr. Zadra. Yes, ma'am, that was my understanding, that there was a cooperative effort. And let me add, too, that we are awaiting our FBI analyst. We will have an FBI analyst also embedded in our state fusion center. The member has just not arrived yet, but we are expecting that soon. Ms. Harman. Well, I hope that does happen. I mean, the goal, again, is to get the right people and right information to the right places in real-time. Do you agree? Mr. Zadra. Absolutely. Ms. Harman. I thank you very much, Mr. Zadra, and now yield 5 minutes to the ranking member for questions. Mr. Reichert. Good morning. Thank you, Madam Chair. First of all, you mentioned open record laws. I am from Washington state, was the sheriff there for a while. In 33 years of law enforcement, one of the frustrating things in working with the federal government, and you touched on, was sharing that information and as they shared it with the local sheriff's office in Seattle, it became subject to the public disclosure laws of the state of Washington. Can you talk a little bit about that, how that discussion occurred within the framework of your involvement in discussing where one had the future of sharing information? Mr. Zadra. Yes, sir. In the state of Florida, we have some exemptions from public disclosure, and from our perspective there are usually three that we point to. One is active criminal investigation, the other is active criminal intelligence, and then the other deals with security plans, which include photographs, floor plans and things like that, of critical infrastructure. While those are good, there is a hole, so to speak, with sensitive information, because now, after 9/11, we have a lot of different partners that we need to share with--health, fire, emergency managers. So a lot of the information that we get is not active criminal investigation, it is not active criminal intelligence, and it is not a floor plan, it is not a photograph. For example, if we have mass prophylaxis from dealing with health issues and where that is stored and how it is transported, as we have hazardous materials come through our state, we want to alert our Florida highway patrol, we want to alert our motor carrier compliance, our Department of Agriculture, their weigh and inspection stations, of the flow of this. Under our current public records exemptions, that information is not criminal investigative, it is not criminal intelligence, and it is not a security plan. We attempt to protect it under those type things, and we have been pretty much successful. But to have a national framework that we--and I have talked to both our house and our senate in our state, and if we had a national framework that we could point to, to say, this is a nationally accepted, controlled, unclassified information that we could amend our state laws to provide those protections so that when we need to share with other states, they have confidence that the state of Florida, despite being an open records law state, that we can protect the information they share with us. Mr. Reichert. Very good. The last part of my question was going to address the last part of your answer. I was also wondering what your opinion might be in this whole area of governance, because local law enforcement has difficulty at the state level, the sheriff's level and the police chief. Who is going to be in control of the information? The governance issue is a big one, as you know. It is always a huge issue. How did that discussion play out in your discussion of SBU and all the players around the table? That governance issue is always touchy. Mr. Zadra. The state of Florida is a participant in the Global Intelligence Working Group under the global justice initiative, and so the state of Florida has been able to provide input. I personally have been able to review the recommendations and provide input to those. I also served as homeland security advisor until most recently, and we have seven regional domestic security task forces that all have intelligence operations and components. So we have had discussions with those, and everyone agrees that this is a difficult, and we need a national standard. We have awaited, of course, understanding the formal adoption of these before we have done a lot of pushing out to our state, because one thing that happens, while you want to have the input from your local state, one thing that has happened to us that encouraged our federal partners, it really needs to be done and it needs to be done right, so when we take it and share it, we can share it once, and it doesn't move, and it doesn't change. One of the most detrimental things that has happened to us in the past is the rollout of new programs, and I have heard them described as, well, we were building this airplane on the fly. To be honest with you, sir, I don't want to fly on an airplane that is being built while I am on it, as we are flying. And so what happens is you push these things out to the states, the locals. The federal government begins to lose credibility because it continues to change and morph. So, truthfully, from the state's perspective, what we have done is we would like to know that there are recommendations, we have provided input, and once we believe that they are close to being finalized, to be able then to really push that through our state framework. Mr. Reichert. Great. Thank you so much. I yield. Thank you, Madam Chair. Ms. Harman. Thank you, Mr. Reichert. We have votes coming up shortly, but I do have another question or two, and so I hope you will join me in a second round of questions until we can adjourn the hearing for voting. First of all, it is Mr. ``Zadra''? Is that correct? Mr. Zadra. Yes, ma'am, but anything is fine. [Laughter.] Ms. Harman. Well, you are very flexible, but this is my second goof of the morning here, besides recognizing another witness out of order. I apologize to you, and we will now produce Zadra pills, which we are going to put in every federal office. I surely agree with you, in answer to your last question, that it needs to be done right. But it also needs to be done now. Do you agree with that? Mr. Zadra. Yes, ma'am. Ms. Harman. Okay. Mr. Zadra. If not, the state and locals, like we have done on many things in the past, we have implemented our own methodologies and that continues to lead to the confusion and interoperability between states. So you are correct. It needs to be right, and it needs to be done as soon as possible. Ms. Harman. So we have the ambassador calling the White House today, and we will have approval later today. That would be nice, obviously. Then we need a forcing mechanism across the federal government. My question to you is, would some funds for training help push this concept into the states? I know there are some other issues that you were just discussing with Mr. Reichert, but would training money be of use to you? Mr. Zadra. Madam Chair, absolutely, and the recommendation for Florida that we have made, particularly through the Department of Homeland Security, deals with the federal grant funding programs, and I know that you are highly aware of those different ones. We would ask, because currently we fund our fusion center efforts through the Law Enforcement Terrorism Prevention Program, we would ask, because the fusion centers are so critical to this entire effort, that there be thoughts, just as there are designated port grants or transit grants, that we designate fusion center grants. And I believe that the money in a fusion center grant is so tied to what we are talking about that we would use those funds in conjunction with the fusion centers to deal with how we would train how to use CUI. Ms. Harman. Well, we are working right now on several proposals to push more money into fusion centers to help with local training, local involvement, also to get DHS people in every fusion center. I was confused about your answer before, probably my fault, about the Virginia Tech information. Your fusion center does or does not presently have a DHS person in it? Mr. Zadra. It does. Ms. Harman. It does. Mr. Zadra. It has since January. Ms. Harman. And that fusion center was what you contacted, and it got in touch with the Virginia fusion center; is that what happened? Mr. Zadra. Our state Florida fusion center made contact with the Virginia fusion center. Our Department of Homeland Security analyst made direct contact to the national operations center, which is the Department of Homeland Security. We went both ways. Ms. Harman. So we had a real live example of information sharing, horizontally at the local level and vertically with the federal intelligence community; is that correct? Mr. Zadra. Yes, ma'am. That is not the first time. I think we continually see progress and movement. And, again, the creation of state and the regional fusion centers and then having our federal components embedded in those, I think, are the best things that we could be doing. Ms. Harman. Well, we totally agree. We think that is one of the best things. We think another of the best things is to change the way we protect information so that we only protect what we need to protect and we share the rest of it, both on the classified side and the pseudo-classified or non-classified side. And that is why we are having this hearing. And I think you are on the same page; am I right? Mr. Zadra. Absolutely. I couldn't agree more. Ms. Harman. I thank you again for your very valuable testimony, Mr. Zadra, and now yield for additional questions to the ranking member. Mr. Reichert. I just have two or three follow-ups. Thank you, Madam Chair. How much of your budget is dedicated to homeland security efforts? Would you know the answer to that? Mr. Zadra. How much of our state budget or federal grant? Mr. Reichert. Your agency's budget. Mr. Zadra. Our agency budget? Not a tremendous amount, and the reason why is because our state legislature, and I can forward it to you later, if you would like, sir, our state statute that designates our domestic security efforts in Florida indicate that we are to maximize federal funding. I believe that Florida has placed approximately $25 million of state revenue into this. Florida, fortunately, because of the critical infrastructure landscape that we have, we have been treated very well from the national level. I mean, we would always want more, but Florida has been a recipient and last year was the third largest amount of federal funding from the Department of Homeland Security. Mr. Reichert. What is your agency's training budget? What percentage of your budget goes to training? Mr. Zadra. Sir, I don't know the answer to that. I don't have that with me today. I can certainly provide that as a follow-up to you. I do note that we also maximize our federal homeland security funds to deal with our training. Mr. Reichert. And to further follow up on the chair's question regarding funding, would it be helpful to you to have additional funds that would pay for backfill as you send people to training? Mr. Zadra. Yes, sir. To be honest with you, I am sure it would be greatly appreciated. I think I can say on behalf of the state of Florida, particularly from the law enforcement component, is that this is our mission. It is clear to us. This is just as important as responding to any burglary, rape, robbery, and we would do it if you didn't give us backfill. I will say this from the fire side: The fire, we do provide backfill and overtime for them. Because when you take a hazardous material truck and you send them all to training, that is loss. So if you take one member and they don't have enough to have that team, so they have to backfill that. Law enforcement, we are a little bit different. So I guess the best way to answer that, we would be happy to receive it and it would be a benefit, but I will assure you the state of Florida is going to do what is necessary, even if we did not have it. Mr. Reichert. Well, one of the things we talked about--this is the last question I have--is creating an environment of trust. And I just have to smile, still being probably new here in my second term, beginning my third year at the federal acronyms, so just today SBU, CUI, ISE, PCI, ICC. So when you talk about building trust and user friendly, the local cops really would like language they can understand, don't you agree? Mr. Zadra. Sir, interesting that you bring that up, as Governor Crist, our newly elected governor, his very first executive order was a plain language initiative in the state of Florida. Mr. Reichert. Yes. I think it is a great idea. Mr. Zadra. We concur wholeheartedly. It needs to be very plain, it needs to be simple. And no disrespect to our law enforcement officers who are obviously very confident, but it makes sense that whatever we do has to be simple so that we can assure it is done properly and that it will be utilized. If it is too complicated, it is not going to be utilized and we won't effect what we are after. Mr. Reichert. Well, certainly appreciate your time, and thank you for your service to your community. And I yield back. Ms. Harman. I thank the gentleman for yielding back. The time for questions has expired. I would just note to Mr. Zadra that I often say the dirtiest four-letter word in government is not an acronym; it is spelled T-U-R-F, and it has a lot to do with the subject we are discussing today. The hearing is adjourned. [Whereupon, at 11:22 a.m., the subcommittee was adjourned.] MAKING DHS THE GOLD STANDARD FOR DESIGNATING CLASSIFIED AND SENSITIVE HOMELAND SECURITY INFORMATION PART III ---------- Thursday, June 28, 2007 U.S. House of Representatives, Committee on Homeland Security, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment, Washington, DC. The subcommittee met, pursuant to call, at 10:08 a.m., in Room 311, Cannon House Office Building, Hon. Jane Harman [chairwoman of the subcommittee] presiding. Present: Representatives Harman, Langevin, Carney, Reichert and Dent. Ms. Harman. The hearing will come to order. I apologize to my colleagues and our witnesses for needing to be in two places at the same time, but the Energy and Commerce Committee is marking up the energy bill, and that includes things like plug-in hybrids, which are a huge issue for California. So I will, as soon as my BlackBerry goes off, have to go out; and Mr. Langevin will chair the hearing for a period. But I would like to welcome our witnesses and welcome our panel and take a deep breath and launch. Good morning. According to last Sunday's Washington Post, the Vice President is inventing his own classified and unclassified designations to keep his work products secret. My personal favorite--and I have never heard of this designation in my 8 years on the House Intelligence Committee--is, quote, treated as Top Secret SCI, unquote. According to the Post, experts in and out of Government said Cheney's office appears to have invented that designation, which alludes to Sensitive Compartmented Information, the most closely guarded category of Government secrets. By adding the words ``treated as'', the Post noted, the Vice President seems to be seeking to protect his unclassified work as though its disclosure would cause exceptionally grave damage to national security. The problem is that the Vice President and some other law enforcement and security agencies believe that they should decide which information they can keep secret, regardless of the law, rules or what the needs are of our local law enforcement community. In my view, this is bad policy. But, not only that, it poses huge obstacles to our need to connect the dots in time to protect, to prevent or to disrupt the next terrorist attack against us. I ask the question, what hope is there for the controlled unclassified information regime being developed by the program manager of the Information Sharing Environment at the DNI's office if we have agencies and parts of our White House that are going to continue to make their own decisions on what information they keep secret? One of our witnesses today is a player, a participant, in the controversy involving the Vice President's office. Bill Leonard of the Information Security Oversight Office testified before this subcommittee this past March, and we welcome him back. At the prior hearing, he and other witnesses helped paint a picture of the consequences of abusing the classification regime and its outrageous costs to both taxpayers and our information-sharing efforts. I am aware, Mr. Leonard, that the Justice Department is currently trying to resolve the issue between your office and the Vice President, and I anticipate that you may not be able to comment on the issue, but surely I personally admire your courage, and I think you are on the right side. Mr. Leonard appears today to testify about what he believes the Department of Homeland Security should do to reduce the problems from overclassification and pseudo-classification. And our other witnesses, each of our other witnesses, brings enormous expertise to this. Several of you have been witnesses before us before. All of you are people whom I talk to on a regular basis about what this committee should be doing to get the problem right. Let me just state a few other tentative conclusions that we have reached after exploring this issue for some time. Number one, the only way to insure that relevant homeland security information is shared between the Federal Government and its State, local, tribal and private sector partners is to create a classification and pseudo-classification system that is enforceable, understandable and applicable to everyone. Number two, almost 6 years after 9/11, we should be treating far less information as classified. Number three, fixing this should be a top priority. Number four, classified markings are not--repeat not--to be used to protect political turf or hide embarrassing facts from public view. They should only be used to properly hide--if that is a good word--or protect sources and methods from public view because if those sources and methods are disclosed, people die and information dries up. Indeed, a recurrent theme throughout the 9/11 Commission's report was the need to address the problems of over--and pseudo--classification to clear up a major stumbling block to dealing with terrorist threats. While I hope that Congress will fashion a Government-wide solution, this committee, the Homeland Security Department and this subcommittee is a good place to start. We can try to figure out what Homeland Security should be doing, and we can hope that what we propose for the Homeland Security Department can become the best practices Government-wide. As I mentioned, we have phenomenally good witnesses before us today; and I look forward to working with them, continuing to work with them, and to working on a bipartisan basis with Sheriff Reichert getting this right. I would like to extend a warm welcome to everyone and would now yield to the ranking member for his opening comments. Mr. Reichert. Thank you, Madam Chair; and welcome to all of you. I have a couple of pages of prepared comments, but I am just going to read one paragraph, and then I am going to comment from more of a local perspective. This subcommittee is to focus on the Department of Homeland Security and actions that they can do better in terms of overclassification, pseudo-classification. However, in crafting legislation, we must not lose sight of the fact that overclassification is a Government-wide problem, and that requires Government-wide solutions. I think really that kind of boils the whole thing down. I just want to again comment from a local perspective. It has only been a little over 2 years since I came from the Sheriff's Office in Seattle. I had 33 years experience there, some working with the Federal officials, the FBI, Secret Service and DEA and ATF and you name it, from a detective's perspective in sharing information and working as partners in investigating crimes. One of those crimes, as I mentioned in earlier hearings, is a well-known case called the Green River Murder Investigations, where we had nearly 50 to 60 Federal agents assigned to the task force. I operated there as the lead investigator from the middle 1980s into the early 1990s. We had difficulty obtaining information from the Federal agencies and agents that worked there with us, right alongside, side by side. My partner, FBI agent Special Agent Bob Agnew, shared information with me because we built a relationship. We had a friendship where we trusted each other. But the agency itself classified the documents that were associated with our case at a level where I had no access to the documents in our own case. So this is back in the 1980s. So when we finally come to make an arrest years later, 19 years later, while I then served as the first elected sheriff in 30 years in Seattle, I had the opportunity once again to oversee for 2 years the investigation of this serial murder case that solved 50 murders. Part of that investigation then required that we go back to the Federal agency, the FBI, and acquire the documents that they had produced during that investigation for discovery so that we could pursue charges against the suspect. They refused to give them to us. That is ridiculous, and it touches on the level that the Chair mentioned at a local level. Really, it boils down to, look, cops on the street, the local cops, the local sheriff's deputies, the State Patrol, you know, the State agencies, and all the other Federal agencies, the guys and gals on the street do not care one iota about the Vice President and the politics of this stuff. What they want is a system in place where we can share information, where we can build that trust, that sort of friendship that Bob Agnew and Dave Reichert had back in the mid-1980s, where we could share the information vital to investigating a local crime. Now, in today's world, after September 11th, vital to the security of this Nation, because, as we have all said over and over again in this subcommittee and in our full committee, the involvement of local law enforcement is critical in the protection of our country. And if we don't share information with our local agencies and we can't trust each other and build trust between local agencies and Federal agencies, this country's safety is at great risk. So I know all of you are working hard to overcome this problem, but I wanted to share with you just one of my experiences in my 33-year career working with one Federal agency. I have other stories I could share with you that would illustrate this point, but I won't take the time this morning. So I appreciate you being here this morning and look forward to your testimony. Madam Chair, I yield. Ms. Harman. I thank the gentleman for his comments and would note that other members of the subcommittee are reminded that, under committee rules, opening statements may be submitted for the record. Ms. Harman. As mentioned, I welcome our four witnesses. Our first witness, Mr. William Leonard, is the Director of the Information Security Oversight Office. The ISOO reports to the President and is responsible for policy and oversight of the Federal Government-wide security classification system and the National Industrial Security Program. Mr. Leonard has testified several times before Congress about the need to break down the classification impediments to information sharing. Some of them were just graphically mentioned by Mr. Reichert. Our second witness, and a very long-standing friend of mine, is Scott Armstrong, who is the Executive Director of the Information Trust, a nonprofit group that works toward opening access to Government information. He has been inducted into the Freedom of Information Act, FOIA, Hall of Fame--that is impressive; I hope you are wearing the medal--and was awarded the James Madison Award by the American Library Association. Mr. Armstrong has been a Washington Post reporter, a member of the board of several nonprofits, is the founder of the National Security Archive of the George Washington University and co-author of a major book on the Supreme Court. Our third witness, Suzanne Spaulding, is an authority on national security issues, including terrorism, homeland security, critical infrastructure protection, cybersecurity, intelligence, law enforcement, crisis management and issues relating to the threats of chemical, biological, nuclear and radiological weapons. She just knows everything. She started working on national security issues on Capitol Hill over 20 years ago. More recently, she was the Executive Director of two congressionally mandated commissions, the National Commission on Terrorism, on which I was a member and where I met her, and the Commission to Assess the Organization of the Federal Government to Combat Proliferation of Weapons of Mass Destruction, which was chaired by former CIA Director John Deutch; and she also was the chief of staff to the then minority on the House Intelligence Committee when I was the ranking member. Welcome back, Suzanne. Ms. Spaulding. Thank you. Ms. Harman. Our fourth witness, Mark Agrast, is a Senior Fellow at the Center for American Progress, where he focuses on the Constitution, separation of powers, terrorism, civil liberties, and the rule of law. Prior to joining the Center for American Progress, Mr. Agrast was counsel and legislative director to Congressman Delahunt of Massachusetts. He serves on the 37-member Board of Governors at the American Bar Association, past Chair of ABA's section on Individual Rights and Responsibilities, and a former colleague of mine in law practice. Very, very knowledgeable about this subject. Without objection, all the witnesses' full statements will be inserted in the record; and I would now urge you each to summarize, in 5 minutes or less, your principal points. We do have a timer. You will see it. It will start blinking at you. But it will be much more productive if we can have a conversation here, not just having you read from a prepared text. And all of us are very eager to learn from you today. STATEMENT OF J. WILLIAM LEONARD, DIRECTOR, INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORD ADMINISTRATION Ms. Harman. Please start, Mr. Leonard. Mr. Leonard. Thank you, Madam Chair, Mr. Reichert, members of the subcommittee. I want to thank you for holding this hearing today and giving me the opportunity to appear. Obviously, the ability and the authority to classify national security information is a critical tool at the disposal of the Government and its leaders to protect our Nation and its citizens. As with any tool, the classification system is subject to misuse and misapplication. When information is improperly declassified or not classified in the first place, although clearly warranted, our citizens, our democratic institutions, our homeland security, and our interactions with foreign nations can be subject to potential harm. Conversely, too much classification, the failure to declassify information as long as it no longer satisfies the standards for continued classification, or inappropriate reclassification unnecessarily obstructs effective information sharing and impedes an informed citizenry, the hallmark of our democratic form of Government. In this time of constant and unique challenges to our national security, it is the duty of all of us engaged in public service to do everything possible to enhance the effectiveness of this tool. To be effective, the classification tool is a process that must be wielded with precision. Last year, I wrote to all agency heads and made a number of recommendations for their consideration. Collectively, these recommendations help preserve the integrity of the classification system, while at the same time reduce inefficiencies and cost. They included things such as emphasizing to all authorized holders of classified information the affirmative responsibility they have under the order to challenge the classification status of information they believe is improperly classified. I also suggested requiring the review of agency procedures to ensure that they facilitate classification challenges. In this regard, agencies were encouraged to consider the appointment of impartial officials ombudsmen, if you will, whose sole purpose is to seek out inappropriate instances of classification and to encourage others to adhere to their individual responsibility to challenge classification as appropriate. Also, I suggested ensuring that quality classification guides of adequate specificity and clarity are absolutely necessary in order to insure accurate and consistent derivative classification decisions. In this letter, I also suggested ensuring the routine sampling of recently classified products to determine the propriety of classification and the application of proper and full markings. Agency inspector generals, for example, could be involved in this process. Consideration should also be given to reporting the results of these reviews to agency personnel as well as to officials designated who would be responsible to track trends and assess the overall effectiveness of the agencies' efforts and make adjustments as appropriate. Finally, I suggested that agencies need to ensure that information is declassified as soon as it no longer meets the standards for continued classification. Again, thank you for inviting me here today, Madam Chair; and I would be happy to answer any questions you or the subcommittee may have. Ms. Harman. Thank you, Mr. Leonard. [The statement of Mr. Leonard follows:] Ms. Harman. I just want to announce to all that I have to leave to return to this markup. I will try to get back. Mr. Carney will assume the Chair, because Mr. Langevin has to depart shortly. But we will hear testimony from all four of you, and then we will ask questions of all four of you. Again, I would like to thank you all, but I would like to say to you particularly, Mr. Leonard, that you are in a tough fight, and your courage and integrity are very impressive. Thank you very much. Mr. Leonard. Thank you. Ms. Harman. Without objection, I will now turn the Chair over to Mr. Carney. Mr. Carney. [Presiding.] Thank you, Mr. Leonard, for your testimony. Mr. Armstrong. Thank you. Mr. Armstrong. I was intending to wish our chairwoman, Mrs. Harman, a happy birthday, as today is her birthday, but we can sing to her when she returns. Mr. Carney. Not me. I want to get re-elected. STATEMENT OF SCOTT ARMSTRONG, FOUNDER, INFORMATION TRUST Mr. Armstrong. I appreciate the opportunity to address these issues of classification and pseudo-classification at the Department of Homeland Security. My views are my own, but I should note I have been working closely within the Aspen Institute to sustain a 6-year dialogue between senior journalists, editors and publishers and high- level Government officials from various national security agencies, including senior members of Congress and their staffs. We met from time to time with the Director of Central Intelligence and the Attorney General and ranking members of the various intelligence bureaucracies. The product of those meetings I think is an agreement that the goal is to have a well-informed citizenry that is assured of its safety, without sacrificing its liberty. The lessons of 9/11 were focused on sharing more information within Government agencies, laterally across Government agency barriers, and among Federal, State, and local governments and with critical private industries, community first responders and the public at large. The challenge for the Department of Homeland Security is not so much how to withhold information or secrets from the public but how to share information so as to promote our security. For once, the Government's first mission is not to silence leaks but to effectively share official information outside of its usual constraints. The discipline of controlling information needs to give way to the creative task of selectively selecting previously withheld information and pushing it rapidly and articulately out to the extraordinarily varied organizations that protect us, from local law enforcement, first responders, medical and emergency response teams, community leaders, utility industry managers with nuclear facilities, or farms of chemical and electrical storage tanks, mass transportation, and on and on. Homeland security requires the vigilance of the many, rather than the control of the few. Awareness, prevention, protection, response and recovery are not hierarchical tasks delegated or dictated from the top. The National Intelligence Reform Act of 2004 allowed--in that Congress took a major step to address these needs. It authorized broad central power for the new Director of National Intelligence and urged the DNI to create a tear-line report system, in which intelligence gathering by agencies is prepared so that information relating to intelligence sources and methods is easily severable within multi-layered products to allow wide sharing, while still protecting truly sensitive sources and methods from unauthorized disclosure. The benefit of the protection to our communities lies on the other side of that tear-line. By concentrating on classification guidelines for protecting well-defined sources and methods and making refined decisions to protect that which really, truly require protection, more of the remaining information will be available for sharing with the public. Your attention today follows a series of extraordinary efforts by this administration to control information with such severity and vengeance that it has blinded its constitutional partners here and in the judiciary. Most startling, this administration has used the information controls to institute policy and decision-making layers which have deemed even senior departmental officials from working--have doomed them to working in the sort of isolated stovepipes that are repeated again and again in the lessons of 9/11. The practices that I have outlined in my prepared statement of DHS that have frustrated this effort can be read there. But I emphasize that it is DHS that is the place to start. By adopting legislative features, you can directly address your interests. Give DHS near-term objectives and extra resources to achieve results. Hold the Secretary of Homeland Security accountable for the mandates already contained in the law which dispensed such sweeping power. The DNI has the authority to mandate DHS as a test-bed and to direct other departments and agencies to cooperate in changing the range of intelligence information controls. Hold the DNI accountable for regularly measuring achievements within the organizations under his control. Provide built-in monitoring by independent and experienced observers, such as Bill Leonard and the Information Security Oversight Office and Public Interest Declassification Board. The tear-line system defined by Congress 4 years ago is the right standard. It is the place to start. It needs major attention to standardize guidance materials which can be applied with precision. Training and performance evaluation is necessary throughout. But, most of all, demand and reward less information control in order to maximize communication. Translate the classification guides that Mr. Leonard referred to into action directives about what and how Congress--what and how should be communicated, rather than simply whether information might be classified and decontrolled. Hold Government officials and employees accountable for their decisions. When mistakes come to light, reeducate and retrain and emphasize the importance of the supervisors in that process. Lastly, encourage the Office of the DNI and the full range of agencies under the DNI authority. This includes, not limited to DHS, to take careful cognizance of the well-established tradition of background briefings in which national security officials and the news media communicate informally in a manner meant to inform the public, including Congress and others in the executive, and provide a degree of confidence that secrecy is not being used to erode or impede civil liberties and free expression. We would all do well to recall that our freedom has been protected and our homes have been secure because we as a people have understood how to best share information and how to best respond together to mutual threats. We look forward to cooperating with you in that effort. Thank you. Mr. Carney. Thank you, Mr. Armstrong. [The statement of Mr. Armstrong follows:] Prepared Statement of Scott Armstrong June 28, 2007 Chairwoman Harman, Ranking Member Reichert, and members of the Committee, thank you for this opportunity to address the issues of classification and pseudo-classification at the Department of Homeland Security. My views today are my own, but I should note that I have been working closely with the Aspen Institute to sustain a six-year Dialogue between senior journalists, editors and publishers and high level US government officials from various national security and intelligence agencies, including senior members of congress and their staffs. The Dialogue on Journalism and National Security has attempted to address recurring concerns about the handling of sensitive national security information by government officials and representatives of the news media. The discussions have included the Attorney General, the Director of the Central Intelligence Agency and ranking officials from the National Security Council, the Department of Defense, the National Security Agency, the FBI as well as the CIA and the Department of Justice. The Dialogue grew out of mutual concerns that legislation passed by both Houses of Congress in 2000 was, in effect, America's first Official Secrets Act. Although vetoed by President Clinton, the bill was reintroduced in 2001. In the wake of 9/11, high ranking officials of the national security community and the leadership of national press organizations recognized that the disclosure of sensitive national security information was a reason for concern. We found considerable agreement that legislation which inhibited virtually all exchanges of sensitive information--even responsible exchanges designed to increase public appreciation of national security issues--was not likely to make America more secure. The goal, we seemed to agree, has been to have a well-informed citizenry that is assured of its safety without sacrificing its liberty. The lessons of 9/11 focused on sharing more information within government agencies, laterally across federal agency barriers and among federal, state, local governments and with critical private industries, community first responders and the public at large. The Homeland Security Information Sharing Act, first passed by the House in 2002 and incorporated into the Homeland Security Act of 2004,\1\ mandated the creation of a unique category of information known as ``sensitive homeland security information.'' This category of SHSI information--as we have transliterated the acronym--was designed to permit the sharing of certain critical information with state and local authorities without having to classify it and require its recipients to hold clearances thus creating new barriers to communication. At the same time, SHSI designates information deemed necessary to withhold briefly from the general public while appropriate measures are taken to protect our communities. --------------------------------------------------------------------------- \1\ PL.107-296 --------------------------------------------------------------------------- The challenge for the Department of Homeland Security is not so much how to WITHHOLD secrets from the public and its local governmental representatives. The challenge is how to SHARE information so as to promote our security. For once government's first mission is not to silence ``leaks,'' but to effectively share official information outside its usual restraints. The discipline of controlling information needs to give way to the creative task of selecting previously withheld information and pushing it rapidly and articulately out to the extraordinarily varied organizations that protect us: local law enforcement; first responders; medical and emergency response teams; community leaders; utility industry managers with nuclear facilities or farms of chemical and energy storage tanks; mass transportation operators, and so forth. Homeland security requires the vigilance of the many rather than the control of the few. Awareness, prevention, protection, response and recovery are not hierarchical tasks dictated from the top. Secrecy must yield to communication. This is no trivial task. The mission of information sharing is difficult enough within the cumbersome and slumbering giant newly merged from dozens of agencies and populated more than 180,000 employees. But that job is only the beginning since DHS is the focal point for leveraging some 87,000 different governmental jurisdictions at the federal, state, and local level which have homeland security responsibilities involving tens of millions of Americans whose responsibilities cannot be choreographed from afar, but must be inspired by shared information. In the National Intelligence Reform Act of 2004, the Congress took another major step to address this phenomenon. It authorized broad centralized power for the new Director of National Intelligence and urged the new DNI to create a tear-line report system by which intelligence gathered by an agency is prepared so that the information relating to intelligence sources and methods is easily severable within multiple layered products to allow wide sharing while protecting truly sensitive sources and methods from unauthorized disclosure. The benefit to the protection of our communities lies on the other side of that ``tear-line'' system. By concentrating on the classification guidelines for protecting well-defined sources and methods and making refined decisions to protect that which truly requires protection, more of the remaining information should be available for sharing within the intelligence community as well as within the diversified and distributed elements of the colossus of those charged with Homeland Security responsibilities. The public benefits from these designations within internally published intelligence requiring protection because it makes majority of fact and analysis available for expedited release--not just to homeland security organizations--but also to the media and the public. Your attention today follows a series of extraordinary efforts by this administration to control information with such severity and vengeance that it has blinded its constitutional partners here and in the judiciary. Most startling, this administration has used these information controls to institute policy and decision making layers which have doomed even senior departmental officials to work in the sort of isolated stovepipes described in the repetitious texts of 9/11 failures. This is no longer a question of issues of over-classification but one of wholesale compartmentalized control and institutionalized intimidation through the use of draconian Non-Disclosure Agreements. It appears designed more to inhibit and constipate internal communications in the federal government than to protect the national security. Not surprisingly, the Department of Homeland Security wasted no time in replicating the move to Non-Disclosure Agreements (NDA's). But it combined it with an effort to side-step the congressional mandate to foster information sharing. Rather than educate the rest of the government on how to effectively communicate information, DHS dispersed new information control authority across the full spectrum of executive agencies. The uncoordinated proliferation of Sensitive But Unclassified designations--of the sort you address today--already includes some remarkable missteps. In one instance, the Department of Homeland Security drafted a draconian Non-Disclosure Agreement (NDA) designed to impose restrictions on tens of thousand federal employees and hundreds of thousands of state and local first responders. This NDA \2\ for unclassified information more severe than the NDA's covering Sensitive Compartmented Information and even more sensitive information under the government's control. --------------------------------------------------------------------------- \2\ DHS Form 11000-6 (08-04) ``NON-DISCLOSURE AGREEMENT''. --------------------------------------------------------------------------- This NDA required officials, employees, consultants and subcontractors to protect such ``sensitive but unclassified information,'' which is defined as ``an over-arching term that covers any information. . . which the loss of, misuse of, or unauthorized access to or modification of could adversely affect the national interest or the conduct of Federal programs, or the privacy [of] individuals . . . but which has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept secret in the interest of national defense or foreign policy. This includes information categorized by DHS or other government agencies as: For Official Use Only (FOUO); Official Use Only (OUO); Sensitive Homeland Security Information (SHSI); Limited Official Use (LOU); Law Enforcement Sensitive (LES); Safeguarding Information (SGI); Unclassified Controlled Nuclear Information (UCNI); and any other identifier used by other Government agencies to categorize information as sensitive but unclassified.'' This overbroad--but legally binding requirement--was implemented as a condition of access to certain unclassified information. Such an NDA represented a vast increase in government secrecy. It left control in the hands of an undefined and virtually unlimited number of supervisors. Those who signed the agreement were bound perpetually until it was explicitly removed. The NDA had no statutory authority and thus no defined criteria, rules, limitations or effective oversight. Although it did not provide an explicit rationale for withholding ``Sensitive But Unclassified'' information under the Freedom of Information Act, it surely provided an incentive to err in favor of using other exemptions to deny release.\3\ --------------------------------------------------------------------------- \3\ See also DHS directive (MD 11042) on ``Safeguarding Sensitive But Unclassified (For Official Use Only) Information,'' dated May 11, 2004. --------------------------------------------------------------------------- Although this NDA was withdrawn by DHS in January 2005, it was used last year at the Department to silence private Wackenhut guards who were speaking to the press about security breakdowns at the Department's Nebraska Avenue headquarters. Other instances of SBU constraints by government agencies, contractors and utilities appear to be used most often to discourage and prevent the public from participating in its government. Provisions similar to the DHS NDA have since appeared in other employee and contractor agreements both within DHS and within other departments.\4\ --------------------------------------------------------------------------- \4\ See CRS Report RL33303, ``Sensitive But Unclassified'' Information and Other Controls: Policy and Options for Scientific and Technical Information, February 15, 2006 Genevieve J. Knezo, Specialist in Science and Technology Policy, Resources, Science, and Industry Division. --------------------------------------------------------------------------- I repeat the details of DHS's failed practices to underline the suggestion that DHS is dramatically out of synch with its mandate to increase our security at home by aggressively--and yet carefully-- sharing information in order to frustrate terrorists through prepared and coordinated responses of the most sophisticated intelligence capabilities on one hand, and our most formidable first line of defense--local law enforcement and first responders, on the other hand. The Necessary Response Adopt into legislation features which directly address your intentions. 1. DHS is the right place to begin. The current classification system within government is out of control and likely uncontrollable. Someone needs to start over with a new test-bed. DHS, with its critically mission of communicating effectively across the federal government and with all other layers of state and local institutionsm has the greatest incentive for change. 2. Give DHS near-term objectives and extra resources to achieve concrete results. Hold the Secretary of Homeland Security accountable for the mandates contained in the law which dispensed such sweeping power. 3. The DNI has the authority to mandate DHS as a test-bed and to direct other departments and agencies to cooperate in changing the range of intelligence and information control systems. Hold the DNI accountable by regularly measuring achievements within organizations under his control. 4. Provide built-in monitoring by independent and experienced observers such as the Information Security Oversight Office and the Public Interest Declassification Board and provide the monitors with the resources to do their job. 5. The tear-line system designated by Congress four years ago is the right standard. It needs major attention to standardize guidance materials which can be applied with precision. All intelligence publication and sharing should be premised on carefully and formally defining sources and methods which require protection by isolating the smallest number of critical details. Information which requires less protection will receives greater circulation and earlier decontrol. 6. Provide training and performance evaluation incentives throughout all levels of DHS, in order to assure that the information which needs tight sources and methods control--and only that information--receives the ultimate protection. 7. Create an electronic metadata tagging system which requires that rigorous classification decision making will follow established guidance. Use it to assure that all levels understand they must conform with established practice and their effectiveness can and will be calibrated. Such a tagging system not only improves accountability, but also allows corrections and the protection of information improperly handled. 8. Demand and reward less information control in order to maximize communication. Changing goals require reinforcement that professionalizes every level and every aspect of the information control process. Translate Information Control Guides (Classification Guides) into action directives about what and how to communicate rather than simply what and when information might be declassified or decontrolled. Provide opportunities for training and conceptual exercise which insist on communication up and down the line as well as lateral reviews and find mechanisms to make sure that the communication runs to, as well as from, all intended recipients. 9. Hold government officials and employees accountable for their decisions. When mistakes come to light, reeducate and retrain. Rethink the scope and purpose of both past practices and contemporary innovations by insisting managers manage the process with a willingness to keep changing procedures until they truly work. Remove authority from those who abuse it. Hold supervisors responsible by requiring them to assume additional monitoring and training responsibilities if those reporting to them fail to perform well-defined and specifically designated responsibilities. Similarly reward them when their aides perform their communication roles well. End the incentive to classify simply because over classifying has no consequences to individuals but information released can be career ending. Institute pro-active audits and correlated retraining. Allow government employees and motivated citizens-- such as users of the FOIA--to bring mistakes to light. Follow- up in a transparent manner to demonstrate that improved communication and improved information controls are not necessarily on separate planes but are integrated concerns of all stakeholders in a democracy. 10. Encourage the Office of the DNI and full range of Agencies under DNI authority--including but not limited to DHS--to take careful cognizance of the well established tradition of background briefings in which national security officials and the media communicate informally in a manner meant to inform the public (including the Congress and others in the Executive) and provide a degree of confidence that secrecy is not being used to erode or impede civil liberties and free expression. Include training for national security officials on responsible interaction with the news media by including the news media in the training Offer the media opportunities to learn about the laws, regulations and practices which involve secrecy and other national security protocols. We would all do well to recall that our freedom has been protected and our homes have been secure because--as a people--we have understood how to best to share information and how best to respond together to mutual threats. Mr. Carney. Ms. Spaulding for 5 minutes, please. STATEMENT OF SUZANNE E. SPAULDING, PRINCIPAL, BINGHAM CONSULTING GROUP LLC Ms. Spaulding. Thank you, Chair, ranking member and members of the committee. I very much appreciate this opportunity to be here today to testify about classification issues at the Department of Homeland Security. It is a very important issue, and I commend the committee for making it a priority. In my 20 years working national security issues for the Government, I have seen firsthand how important it is to get this classification issue right. It may seem counterintuitive to some, but avoiding overclassification is essential to protecting vital national security secrets. Those handling classified documents will have greater respect for that Top Secret stamp if they know that things are only classified when they their disclosure will truly harm national security. When things are classified that clearly would not harm national security, it tempts some individuals to believe that they can decide what is really sensitive and what is not. Now let me be clear that, in making that observation, I am in no way trying to excuse the disclosure of classified information, merely to note that the risk of leaks I believe is heightened by overclassification. A similar phenomenon follows the increasingly common practice of selective declassification by Government officials. Strategic and carefully considered decisions to make previously classified information available to the public can be important in increasing transparency. But when the disclosures appear to be designed to advance a particular political agenda or to gain an advantage in a policy dispute, it again undermines the respect for and confidence in the classification system. And this risk is heightened when the declassification is done selectively, so as to reveal only intelligence that supports one side of the issue, leaving contrary intelligence classified. It is equally essential for our national security that information that can be shared without jeopardizing national security is not prevented by overclassification from getting to those who need it and could make use of it. It is appropriate that the committee has decided to begin with an effort to make the Department of Homeland Security the gold standard for reducing overclassification, because it is DHS that faces the most significant imperative to provide relevant information to a wide range of users, including those at the State and local level, the private sector, and even within DHS who are not traditional members of the national security community and are unlikely to hold security clearances. If information is unnecessarily restricted, it threatens homeland security by hampering the ability of these key players to contribute to the mission. I know the committee is considering a number of ideas, a number of which have already been articulated here today, and I think these are very sound suggestions. There are additional near-term and longer-term steps that the committee might also consider. One, require that intelligence documents be written in an unclassified version first to the maximum extent possible. Rather than creating a tear-line of unclassified or less sensitive information at the bottom of a document, why not set up the system so that no classified document can be prepared without first entering information into the unclassified section at the top of the document? This exercise could prompt a more careful effort to distinguish between truly classified information and that which can be shared more broadly and provide a visual reinforcement of the importance of writing in an unclassified form. Two, enforce portion marking. This used to be the standard practice, where each paragraph was determined to be whether it was classified or unclassified. We have drifted away from that, and I think we should go back to really enforcing that requirement. Three, use technology to tag information as it moves through the system. This provides even greater granularity than the paragraph portion marking, indicating which precise bits of information are classified. And then these tags, perhaps embedded in metadata, can move through the system with that information, facilitating the production of less classified documents. Reverse the incentive to overclassify. This will not change until performance evaluations consider classification issues. It should be a specific factor when employees are evaluated for moving up or for raises. Employees who routinely overclassify should be held accountable and receive additional training, and employees should be rewarded for producing reports that can be widely disseminated. Five, identify key Federal, State and local officials who can receive relevant classified information by virtue of their office, rather than by having to get a clearance. This is how we have always handled it for Members of Congress. More recently, we have included Governors; and DHS should consider extending it to other key officials. And, six, develop innovative ways of sharing information without handing over documents; and I have got some specifics on that in my prepared testimony. In conclusion, these are just a few ideas, based on practical experience working in the classified environments for nearly 2 decades. I know the committee is aware of the outstanding work of the Markle Foundation and others, and I recommend those to your consideration as well. The problem of overclassification is an enduring one and presents a daunting challenge. The committee is to be commended for taking up that challenge and endeavoring to set a new standard at DHS, and I appreciate the opportunity to contribute to that effort. Thank you. Mr. Carney. Thank you, Ms. Spaulding. [The statement of Ms. Spaulding follows:] Prepared Statement of Suzanne E. Spaulding June 28, 2007 Chairwoman Harman, Ranking Member Reichert, and members of the Committee, thank you for this opportunity to testify today about classification issues at the Department of Homeland Security. This is an important issue and I commend the committee for making it a priority. I was fortunate enough to spend 20 years working national security issues for the government, including 6 years at CIA and time at both the Senate and House Intelligence Committees. I have seen first hand how important it is to get the classification issue right. It may seem counterintuitive to some, but avoiding over- classification is essential to protecting vital national security secrets. Those handling classified documents will have greater respect for that ``Top Secret'' stamp if they know that things are only classified when their disclosure would truly harm national security. When things are classified whose disclosure clearly would not harm national security, it tempts some individuals to believe that they can decide what is really sensitive and what is not. This could apply to employees in the intelligence community or others, such as members of the media, who receive classified documents. In making this observation, I certainly do not mean in any way to excuse the disclosure of classified information, merely to note that the risk of leaks is heightened by over-classification. A similar phenomenon follows the increasingly common practice of ``selective declassification'' by government officials. This selective declassification can be accomplished either by unofficial leaks to the media or by official decisions to declassify material. Strategic and carefully considered decisions to make previously classified information available to the public can be an important and effective way of increasing the transparency that is so vital for a functioning democracy. However, when the disclosures appear to be designed to advance a particular political agenda or to gain advantage in a policy dispute, it again undermines the respect for and confidence in the classification system. An employee or reporter who sees senior officials deciding that classification isn't as important as their particular agenda may be emboldened to make similar decisions. This risk is heightened when the classification is done selectively so as to reveal only intelligence that supports one side of the issue, while leaving contrary intelligence classified. Just as getting the classification process right is vital for protecting true secrets, it is essential that information that can be shared without jeopardizing national security is not prevented by over- classification from getting to those who could make use of it. As the 9/11 Commission Report made clear, this is particularly urgent for our counterterrorism efforts. It is appropriate that the Committee has decided to begin with an effort to make the Department of Homeland Security the ``Gold Standard'' for reducing over-classification, since DHS faces the most significant imperative to provide relevant information to, and receive and analyze information from, a wide range of users who are not traditional members of the national security community. Key players at the state and local level, in the private sector, and within DHS? own entities, are unlikely to have clearances. Yet they serve vital roles in protecting the homeland and can provide, benefit from, and help analysts to better understand, information that is gathered overseas and in the US. If this information is unnecessarily restricted, it threatens homeland security by hampering the ability of these key players to contribute to the mission. I know that the committee is considering a number of ideas, including a certification process to ensure that those who have authority to classify documents are properly trained to recognize when information is truly sensitive and regular audits of existing classified documents to assess the scope and nature of any over- classification. I think these are sound suggestions. There are additional near-term and longer-term steps that the Committee might also consider. 1. Require that documents be written in unclassified version first, to the maximum extent possible. Traditional practice in the intelligence community has been to prepare a classified document reflecting the intelligence and then, if dissemination to non-cleared individuals was required, to prepare an unclassified version at the bottom of the document after a ``tear line.'' These are known as ``tear sheets;'' the recipient would tear off the bottom portion to provide to the un-cleared recipient. Instead, to facilitate the admonition to move from a ``need to know'' to a ``need to share'' culture--what the Markle Foundation called a ``culture of distribution''--why not set up the system so that no classified document can be prepared without first entering information in the unclassified section at the top of the document. There may be times when almost nothing can be put it the unclassified portion, but the exercise could prompt more careful effort to distinguish between truly classified information and that which can be shared more broadly. And putting the unclassified version at the top visually reinforces the shift in priorities. 2. Enforce ``portion marking.'' It used to be standard practice that each paragraph of a document had to be individually determined and marked as classified or unclassified. This requires more careful consideration of what information is actually sensitive and assists in any later efforts to provide an unclassified version of the document. My sense is that, over time, documents are increasingly classified in their entirety, with no portion marking, making it far more difficult and cumbersome to ``sanitize'' the information for wider dissemination. A simple immediate step would be to enforce the requirement for portion marking for every classified document. 3. Use technology to tag information as it moves through the system. The optimum system would provide even greater granularity than the paragraph portion marking, indicating what precise bits of information are classified. These classification ``tags''--perhaps imbedded in metadata--would then move with the information as it flows through the system and facilitate the preparation of unclassified versions of documents. The more precisely we can isolate truly sensitive information, the easier it will be to identify and disseminate unclassified information. 4. Reverse the ``default'' incentive to over-classify. Virtually all of the incentives today are in favor of over-classification. The danger of not classifying information that is indeed damaging to national security is well understood. What is not as widely appreciated in the national security risk of over-classification. Thus, there are effectively no penalties in the system for an individual decision to classify unnecessarily. This will not change until performance evaluations consider classification issues. Regular audits can provide insight into individual patterns as well as overall agency performance, for example. Employees who routinely over--classify should be held accountable and receive additional training. And employees should be rewarded for producing reports that can be widely disseminated. In addition, the system should make it easy to produce unclassified documents and require a bit more effort to classify something. Requiring that unclassified documents be written first and enforcing the requirement for portion marking are some examples. Requiring that the specific harm to national security be articulated in each case might be another possibility, although it is important not too make the system so cumbersome that it undermines the ability to be quick and agile when necessary. Ultimately, you want a process that makes it harder to go around the system that to use it. 5. Identify key federal, state, and local officials who can receive relevant classified information by virtue of their office rather than having to get a clearance. This is how it has always worked with Members of Congress. More recently, this was adopted as the policy for governors. DHS should consider extending this to other key officials. 6. Develop innovative ways of sharing information without handing over documents. Ultimately, the key is to enhance understanding and knowledge. Too much emphasis is sometimes placed on sharing documents, rather than on sharing ideas, questions, and insights gleaned from those documents. This can often be done without revealing the sensitive information in the documents. In addition, when dealing with unclassified but sensitive information, such as business proprietary information, DHS could consider ``partnership panels'' where the government and business would come together in a neutral space, share information such as vulnerability assessments and threat information, so as to enhance mutual understanding and benefit from each others insights, but then leave the space without having handed over the documents. These are just a few ideas based on practical experience working in classified environments for nearly two decades. I know that the Committee is aware of the outstanding work by the Markle Foundation and others in developing recommendations for improving information sharing and will take those under consideration as well. The problem of over-classification is an enduring one and presents a daunting challenge. This Committee is to be commended for taking up that challenge and endeavoring to set a new standard at DHS. I appreciate the opportunity to contribute to that important effort. Mr. Carney. Mr. Agrast, please summarize for 5 minutes. STATEMENT OF MARK AGRAST, SENIOR FELLOW, CENTER FOR AMERICAN PROGRESS Mr. Agrast. Thank you, Mr. Carney. My name is Mark Agrast. I am a Senior Fellow at the Center for American Progress, where I focus on civil liberties and national security concerns; and I previously spent a decade on Capitol Hill. Most Americans understand and accept the need to protect Government information whose disclosure would endanger the Nation's security. But as the 9/11 Commission found, too much secrecy can put our Nation at greater risk, hindering oversight, accountability and information sharing, concealing vulnerabilities until it is too late to correct them, and undermining the credibility of the classification system itself. Ten years ago, the Moynihan Commission concluded secrets could be protected more effectively if secrecy is reduced overall. Unfortunately, while the Clinton Administration made much headway in reducing unnecessary secrecy, today we are moving in the opposite direction. There were nearly three times as many classification actions in 2004 as in the last year of the Clinton Presidency; and while President Clinton declassified nearly a billion pages of historical material, the pace has slowed to a trickle in the last 6&ars. Today's epidemic of overclassification stems in part from rules that resolve all doubts in favor of nondisclosure and in part from standards so hard to administer that even skilled classifiers often get it wrong. Sometimes material is classified only to suppress embarrassing information. Take the decision to classify the Taguba Report on prisoner abuse at Abu Ghraib. A reporter who had seen a copy of that report asked Secretary Rumsfeld why it was marked Secret. You would have to ask the classifier, Rumsfeld said. Or the decision to reclassify a 1950 intelligence estimate written only 12 days before Chinese forces entered Korea, predicting Chinese entry in the conflict was not probable. Still, despite such failures, at least there are rules what can be classified, for how long and by whom. The same cannot be said for the designations used by Federal agencies to deny access to sensitive but unclassified information. Few of these pseudo-classifications have ever been authorized by Congress. They allow virtually any employee, and even private contractors, to withhold information that wouldn't even rate a Confidential stamp, with few standards or safeguards to prevent error and abuse. As the Chair noted, last Sunday's Washington Post described a pseudo-classification scheme invented by the Vice President himself. His office has been giving reporters documents labeled treat as Top Secret/SCI, an apparent attempt to treat unclassified material as though it were Sensitive Compartmented Information, a special access designation reserved for secrets whose disclosure would cause exceptionally grave damage to national security. I commend the committee, the subcommittee for its commitment to doing the oversight that is so long overdue; and I hope you won't stop at oversight. It has been 10 years since the Moynihan Commission urged Congress to legislate the rules that protect national security information, rather than leaving it up to the executive branch to police itself. It is time for Congress to take up that challenge. In some cases, this will require Government-wide solutions. For example, Congress could and should reinstate the presumption against classification in cases of significant doubt, the Clinton era policy which the Moynihan Commission urged Congress to codify. Congress should also rein in the use of pseudo- classification, at a minimum prohibiting agencies from adopting unclassified designations that are not expressly authorized and mandating strict standards for any designations it does authorize to minimize their impact on public access. Better still, Congress could refrain from authorizing unclassified designations in the first place. Such powers are all too easily given; and, once they are in place, it is virtually impossible to get rid of them. Finally, Congress can take steps to reform the system one agency at a time by initiating reforms at the Department of Homeland Security. By making DHS the gold standard, Congress can promote best practices throughout the system. My full statement includes recommendations to improve oversight of the classification system at DHS and to reduce the harmful effects of pseudo-classification as well. I would just review a couple of those in the half a minute or so that I have left. I would recommend that Congress establish an independent DHS Classification Review Board to ensure that information is declassified as soon as it no longer meets the criteria for classification. Congress should establish an independent ombuds office within DHS to assist with declassification challenges and requests for declassification. It should require the DHS Inspector General to conduct periodic audits of the DHS classification program and report to Congress on the appropriateness of classification decisions. And it should require DHS to implement a system of certification for DHS officials with classification authority and to provide them with training and proper classification practices. I would refer you to my testimony for recommendations regarding sensitive information controls. I do think that by helping to ensure that the Government keeps secret only what needs to be kept secret, these measures and others would enhance both openness and security at DHS and throughout the Government. Thank you. [The statement of Mr. Agrast follows:] Prepared Statement of Mark D. Agrast June 28, 2007 Madame Chair, Ranking Member Reichert, and members of the subcommittee, thank you for conducting this hearing and inviting me to testify. My name is Mark Agrast. I am a Senior Fellow at the Center for American Progress, where I work on issues related to the Constitution, separation of powers, terrorism and civil liberties, and the rule of law. Before joining the Center, I was an attorney in private practice and spent over a decade on Capitol Hill, most recently as Counsel and Legislative Director to Congressman William D. Delahunt of Massachusetts. A biographical statement is appended to my testimony. In an address to the Oklahoma Press Association in February 1992, former Director of Central Intelligence, Robert M. Gates, now the Secretary of Defense, noted that the phrase ``CIA openness'' can seem as much an oxymoron as ``government frugality'' and ``bureaucratic efficiency.' That seeming contradiction in terms illustrates the anomalous role that secrecy plays in a democracy that depends so profoundly on an informed and engaged citizenry. At the same time, most Americans understand and accept the need to withhold from public view certain national security information whose disclosure poses a genuine risk of harm to the security of the nation. But the events of 9/11 taught us how dangerously naive it would be to equate secrecy with security. As the 9/11 Commission conclude, too much secrecy can put our nation at greater risk, hindering oversight, accountability, and information sharing. Too much secrecy--whether through over-classification or through pseudo-classification--conceals our vulnerabilities until it is too late to correct them. It slows the development of the scientific and technical knowledge we need to understand threats to our security and respond to them effectively. It short-circuits public debate, eroding confidence in the actions of the government. And finally, it undermines the credibility of the classification system itself, encouraging leaks and breeding cynicism about legitimate restrictions. As Associate Justice Potter Stewart famously cautioned in the Pentagon Papers case: I should suppose that moral, political, and practical considerations would dictate that a very first principle of that wisdom would be an insistence upon avoiding secrecy for its own sake. For when everything is classified, then nothing is classified, and the system becomes one to be disregarded by the cynical or the careless, and to be manipulated by those intent on self-protection or self-promotion. I should suppose, in short, that the hallmark of a truly effective internal security system would be the maximum possible disclosure, recognizing that secrecy can best be preserved only when credibility is truly maintained.\1\ --------------------------------------------------------------------------- \1\ N.Y. Times Co. v. U.S., 403 U.S. 713, 729 (1971) (Stewart, J., concurring). --------------------------------------------------------------------------- The Commission on Protecting and Reducing Government Secrecy, chaired by Sen. Daniel Patrick Moynihan, reached a similar conclusion in its 1997 report: ``The best way to ensure that secrecy is respected, and that the most important secrets remain secret, is for secrecy to be returned to its limited but necessary role. Secrets can be protected more effectively if secrecy is reduced overall.'' \2\ --------------------------------------------------------------------------- \2\ Report of the Comm'n on Protecting & Reducing Gov't Secrecy (1997) at xxi [hereinafter Moynihan Commission Report]. Classification, Declassification and Reclassification The Moynihan Commission was created by Congress to consider whether it was time to rethink the vast system of secrecy that had been brought into being during the Cold War. The Commission recommended a series of statutory reforms to the classification system that were widely praised but never implemented. The spirit of the Moynihan recommendations can certainly be discerned in the contemporaneous amendments to the classification system that were instituted by President Clinton under Exec. Order No. 12958. The order established a presumption of access, directing that ``If there is significant doubt about the need to classify information, it shall not be classified.'' Similarly, the order provided that ``If there is significant doubt about the appropriate level of classification, it shall be classified at the lower level.'' The Clinton order also: . Limited the duration of classification, providing that where the classifier cannot establish a specific point at which declassification should occur, the material will be declassified after 10 years unless the classification is extended for successive 10-year periods under prescribed procedures. Provided for automatic declassification of government records that are more than two years old and have been determined by the Archivist of the United States to have permanent historical value, allowing for the continued classification of certain materials under specified procedures. Established a balancing test for declassification decisions in ``exceptional cases,'' permitting senior agency officials to exercise discretion to declassify information where ``the need to protect such information may be outweighed by the public interest in disclosure of the information.'' Prohibited reclassification of material that had been declassified and released to the public under proper authority. Authorized agency employees to bring challenges to the classification status of information they believe to be improperly classified. Created an Interagency Security Classification Appeals Panel (ISCAP) to adjudicate challenges to classification and requests for mandatory declassification, and to review decisions to exempt information from automatic declassification. The changes instituted by President Clinton were largely erased by his successor, who issued a revised executive order in 2003. Exec. Order No. 13292 eliminated the presumption of access, leaving officials free to classify information in cases of ``significant doubt.'' It also: Relaxed the limitations on the duration of classification, and made it easier for the period to be extended for unlimited periods. Postponed the automatic declassification of protected records 25 or more years old from April 2003 to December 2006, and reduced the showing that agencies must make to exempt historical records from automatic declassification. Revived the ability of agency heads to reclassify previously declassified information if the information ``may reasonably be recovered.'' Allowed the Director of Central Intelligence to override decisions by ISCAP, subject only to presidential review. The results of this shift in policy are reflected in the annual classification statistics published by the Information Security Oversight Office (ISOO). The number of classification actions by the government hit an all-time high of 15.6 million in 2004, with only slightly fewer (14.2 million) reported in 2005. This was nearly twice the number of classification actions (8.6 million) taken in 2001, the first year of the Bush administration, and three times the number (5.8 million) taken in 1996, the last year of President Clinton's second term.\3\ --------------------------------------------------------------------------- \3\ Info. Sec. Oversight Office, Nat'l Archives & Records Admin., Report to the President 2005 at 13. --------------------------------------------------------------------------- As classification actions have soared, declassification actions have plummeted. President Clinton oversaw the declassification of more historic materials than all previous presidents combined. During his last six years in office, 864 million pages were declassified, hitting an all-time high of 204 million pages in 1997 alone. Under the Bush administration, the numbers have fallen precipitously. Only 245 million pages were declassified from 2001--2005, with fewer than 30 million pages were declassified in 2005.\4\ --------------------------------------------------------------------------- \4\ Id. at 15. --------------------------------------------------------------------------- Apart from its costs to both openness and security, all this classifying and declassifying comes at a heavy financial cost as well. In 2005, the cost of securing classified information was $7.7 billion, of which only $57 million was spent on declassification. In all, for every dollar the federal government spent to release old secrets, it spent $134 to create new ones.\5\ --------------------------------------------------------------------------- \5\ OpenTheGovernment.org, Secrecy Report Card 2006 at 4. --------------------------------------------------------------------------- What the numbers cannot reveal is whether classification decisions are lawful and appropriate. Estimates of the extent of over- classification vary, but I was particularly struck by Mr. Leonard's testimony before this subcommittee last March, in which he said that an audit conducted by the Information Security Oversight Office found that even trained classifiers, armed with the most up-to-date guidance, ``got it clearly right only 64 percent of the time.'' \6\ --------------------------------------------------------------------------- \6\ Overclassification and Pseudo-classification: The Impact on Information Sharing: Hearing Before the Subcomm. on Intelligence, Information Sharing and Terrorism Risk Assessment of the House Comm. on Homeland Sec., 110th Cong. (2007) (statement of J. William Leonard). --------------------------------------------------------------------------- There are also instances in which over-classification is the result, not of honest error, but of a desire to conceal. Both the Clinton and Bush executive orders prohibit the use of the classification system to ``conceal violations of law, inefficiency, or administrative error'' or prevent embarrassment to a person, organization, or agency.'' Yet at least some recent classification decisions could have had little purpose other than to suppress information that might be embarrassing to the government. A particularly troubling example is the decision by the Department of Defense to classify in its entirety the March 2004 report of the investigation by Maj. Gen. Antonio M. Taguba of alleged abuse of prisoners by members of the 800th Military Police Brigade at Baghdad's Abu Ghraib Prison. According to an investigation by the Minority Staff of the House Committee on Government Reform: One reporter who had reviewed a widely disseminated copy of the report raised the issue in a Defense Department briefing with General Peter Pace, the Vice Chairman of the Joint Chiefs of Staff, and Secretary Rumsfeld. The reporter noted that `there's clearly nothing in there that's inherently secret, such as intelligence sources and methods or troop movements' and asked: `Was this kept secret because it would be embarrassing to the world, particularly the Arab world?' General Pace responded that he did not know why the document was marked secret. When asked whether he could say why the report was classified, Secretary Rumsfeld answered: `No, you'd have to ask the classifier.' \7\ --------------------------------------------------------------------------- \7\ Minority Staff of House Comm. On the Judiciary, 10TH Cong., Report on Secrecy in the Bush Administration (2004) at 50. --------------------------------------------------------------------------- The desire to prevent embarrassment seems also to have played a role in the Bush administration's aggressive reclassification campaign. According to a February 2006 report by the National Security Archive, the administration has reclassified and withdrawn from public access 9,500 documents totaling 55,500 pages, including some that are over 50 years old. For example: complaint from the Director of Central Intelligence to the State Department about the bad publicity the CIA was receiving after its failure to predict anti-American riots in Colombia in 1948. A document regarding an unsanctioned CIA psychological warfare program to drop propaganda leaflets into Eastern Europe by hot air balloon that was canceled after the State Department objected to the program. A document from spring 1949, revealing that the U.S. intelligence community's knowledge of Soviet nuclear weapons research and development activities was so poor that America and Britain were completely surprised when the Russians exploded their first atomic bomb six months later. A 1950 intelligence estimate, written only 12 days before Chinese forces entered Korea, predicting that Chinese intervention in the conflict was ``not probable.'' \8\ --------------------------------------------------------------------------- \8\ Matthew M. Aid, Nat'l Sec. Archive, Declassification in Reverse: The U.S. Intelligence Cmty's Secret Historical Document Reclassification Program (2006). --------------------------------------------------------------------------- These reclassification actions call to mind the observations of the late Erwin N. Griswold, former Solicitor General of the United States and Dean of Harvard Law School, who argued the Pentagon Papers case before the Supreme Court in 1971. Presenting the case for the government, he had argued that the release of the Pentagon Papers would gravely damage the national security. Nearly two decades later, Griswold reflected on the lessons of that case: It quickly becomes apparent to any person who has considerable experience with classified material that there is massive overclassification and that the principal concern of the classifiers is not with national security, but rather with governmental embarrassment of one sort or another. There may be some basis for short-term classification while plans are being made, or negotiations are going on, but apart from details of weapons systems, there is very rarely any real risk to current national security from the publication of facts relating to transactions in the past, even the fairly recent past. This is the lesson of the Pentagon Papers experience, and it may be relevant now.\9\ --------------------------------------------------------------------------- \9\ Erwin N. Griswold, Secrets Not Worth Keeping: The Courts and Classified Information, Wash. Post, Feb. 15, 1989, at A25. Pseudo-Classification For all its faults, the classification system has many virtues as well. Classification actions are subject to uniform legal standards pursuant to executive order. These actions can be taken by a limited number of officials who receive training in the standards to be applied; they are of limited duration and extent; they are monitored by a federal oversight office; they can be challenged; and they can be appealed. The same cannot be said for the potpourri of unclassified control markings used by federal agencies to manage access to sensitive government information, most of which are defined by neither statute nor executive order, and which collectively have come to be known pejoratively as the ``pseudo-classification'' system. Among the better known are Sensitive But Unclassified (SBU), Sensitive Security Information (SSI), Sensitive Homeland Security Information (SHSI), Critical Infrastructure Information (CII), Law Enforcement Sensitive (LES), and For Official Use Only (FOUO). While some of these control markings are authorized by statute,\10\ others have been conjured out of thin air. Some of these pseudo- classification regimes allow virtually any agency employee (and often private contractors) to withhold information without justification or review, without any time limit, and with few, if any, internal controls to ensure that the markings are not misapplied. --------------------------------------------------------------------------- \10\ See, e.g., Aviation and Transp. Sec. Act, Pub. L. No. 107-71; Fed. Info. Sec. Act, Pub. L. No. 107-347; Homeland Sec. Act, Pub. L. No. 107-296; Critical Infrastructure Info. Act, Pub. L. No. 107-296. --------------------------------------------------------------------------- A March 2006 report by the Government Accountability Office (GAO) found that the 26 federal agencies surveyed use 56 different information control markings (16 of which belong to one agency) to protect sensitive unclassified national security information. The GAO also found that the agencies use widely divergent definitions of the same controls.\11\ --------------------------------------------------------------------------- \11\ U.S. Gov't Accountability Office, Rep. No. GAO-06-385, Information Sharing: The Federal Government Needs to Establish Policies and Processes for Sharing Terrorism-Related and Sensitive but Unclassified Information (2006). --------------------------------------------------------------------------- According to the GAO report, the Department of Homeland Security (DHS) employs five of these control markings: For Official Use Only (FOUO) (agency-wide); Law Enforcement Sensitive (LES) (agency-wide); Limited Official Use (LOU) (U.S. Secret Service); Protected Critical Infrastructure Information (PCII) (Directorate for Preparedness); and Sensitive Security Information (SSI) (Transportation Security Administration and U.S. Coast Guard). The department's approach to the use of these designations is set forth in a DHS management directive regarding the treatment of sensitive but unclassified information originating within the agency.\12\ The directive is chiefly concerned with the For Official Use Only designation, which it says will be used ``to identify sensitive but unclassified information within the DHS community that is not otherwise specifically described and governed by statute or regulation.'' The directive identifies 11 categories of SBU information that can be designated as FOUO, and provides that the designation can be made by any DHS employee, detailee, or contractor and will remain in effect indefinitely until the originator or a management official determines otherwise. --------------------------------------------------------------------------- \12\ Safeguarding Sensitive But Unclassified (For Official Use Only) Information, Mgt. Dir. No. 11042 (2004), at http://www.fas.org/ sgp/othergov/dhs-sbu.html, revised by Mgt. Dir. No. 11042.1, (2005), at http://www.fas.org/sgp/othergov/dhs-sbu-rev.pdf [hereinafter Safeguarding]. --------------------------------------------------------------------------- For good measure, the directive notes that where other agencies and international organizations use similar terminology but apply different requirements to the safeguarding of the information, the information should be treated in accordance with whichever requirements are the more restrictive. A 2004 report by the JASON Program Office at MITRE Corporation suggests that the designation authorities at DHS are not atypical: ``'Sensitive but unclassified' data is increasingly defined by the eye of the beholder. Lacking in definition, it is correspondingly lacking in policies and procedures for protecting (or not protecting) it, and regarding how and by whom it is generated and used.'' \13\ --------------------------------------------------------------------------- \13\ JASON Program Office MITRE Corporation, Horizontal Integration: Broader Access Models for Realizing Information Dominance 5 (2004). --------------------------------------------------------------------------- As in the case of classification and reclassification actions, these designations have at times been used not to protect legitimate national security secrets, but to spare the government from embarrassment. In a March 2005 letter to Rep. Christopher Shays, then the Chairman of the House Committee on Government Reform, Rep. Henry Waxman cited examples in which: The State Department withheld unclassified conclusions by the agency's Inspector General that the CIA was involved in preparing a grossly inaccurate global terrorism report. The State Department concealed unclassified information about the role of John Bolton, Under Secretary of State for Arms Control, in the creation of a fact sheet that falsely claimed that Iraq sought uranium from Niger. The Department of Homeland Security concealed the unclassified identity and contact information of a newly appointed TSA ombudsman whose responsibility it was to interact daily with members of the public regarding airport security measures. The CIA intervened to block the chief U.S. weapons inspector Charles A. Duelfer, from revealing the unclassified identities of U.S. companies that conducted business with Saddam Hussein under the Oil for Food program. The Nuclear Regulatory Commission sought to prevent a nongovernmental watchdog group from making public criticisms of its nuclear power plant security efforts based on unclassified sources.\14\ --------------------------------------------------------------------------- \14\H.R. Rep. No. 109-8, at 16 (2005) (letter from Henry Waxman to Christopher Shays). --------------------------------------------------------------------------- In another case, currently in litigation, a federal air marshal blew the whistle when TSA attempted to reduce security on ``high risk'' flights, and the agency allegedly retaliated by retroactively designating the material he had disclosed as Sensitive Security Information (SSI).\15\ --------------------------------------------------------------------------- \15\ Project on Gov't Oversight, Alert: Robert MacLean v. DHS (2007), at http://pogo.org/p/government/rmaclean-dhs.html --------------------------------------------------------------------------- Another concern arises out of the interplay between unclassified control markings and the Freedom of Information Act (FOIA). Certain unclassified control markings, including Sensitive Security Information (SSI) and Critical Infrastructure Information (CII), are specifically exempt by statute from release under FOIA. But some agencies have claimed that other unclassified control markings constitute an independent legal basis for exempting information from public disclosure under FOIA--even in the absence of an express statutory exemption and even where the information does not fit within an existing exemption. Such claims prompted the American Bar Association's House of Delegates to adopt a resolution in February 2006 urging the Attorney General to clarify that such designations should not be used to withhold from the public information that is not authorized to be withheld by statute or executive order. As it happens, the DHS directive meets the ABA standard. It provides that FOUO information is not automatically exempt from disclosure under FOIA and that FOUO information may be shared with other agencies and government entities ``provided a specific need-to- know has been established and the information is shared in furtherance of a coordinated and official governmental activity.'' \16\ --------------------------------------------------------------------------- \16\ Safeguarding, supra note 11. --------------------------------------------------------------------------- But whether or not an agency has a legal basis for withholding pseudo-classified information not otherwise exempt under FOIA is almost beside the point. The designation is itself sufficient to exert a chilling effect on FOIA disclosures. As Thomas S. Blanton of the National Security Archive testified before a subcommittee of the House Committee on Government Reform in March 2005, ``the new secrecy stamps tell government bureaucrats `don't risk it'; in every case, the new labels signal `find a reason to withhold.' '' \17\ --------------------------------------------------------------------------- \17\ Emerging Threats: Over-classification and Pseudo- classification: Hearing Before the Subcomm. on Nat'l Sec., Emerging Threats and Int'l Relations of the House Comm. on Gov't Reform, 109th Cong. (2005) (statement of Thomas S. Blanton). --------------------------------------------------------------------------- An article published in the Washington Post on June 24, 2007, brought to light a pseudo-classification scheme apparently invented by the Vice President of the United States. His office has been giving reporters documents labeled: ``Treated As: Top Secret/SCI''--an apparent attempt to treat unclassified material as though it were Sensitive Compartmented Information (SCI)--a special access designation reserved for secrets whose disclosure would cause `exceptionally grave damage to national security.'' '\18\ --------------------------------------------------------------------------- \18\ Barton Gellman & Jo Becker, A Different Understanding with the President, Wash. Post, June 24, 2007, at A1. --------------------------------------------------------------------------- Unlike the Cheney innovation, Special Access Programs (SAPs), which limit access above and beyond the three-tiered classification system, are authorized by law, and are confined to a relatively limited circle of senior officials. Exec. Order No. 12859, as amended, provides that unless otherwise authorized by the President, only certain named officials are authorized to establish such programs. The list includes the Secretaries of State, Defense, and Energy, and the DCI, or the principal deputy of each. Interestingly, the list does not include the Vice President--perhaps in anticipation of his novel assertion that the Office of the Vice President is not an agency of the Executive Branch and need not comply with the requirement under Exec. Order 12859 that such agencies file an annual report with ISOO.\19\ --------------------------------------------------------------------------- \19\ Peter Baker, Cheney Defiant on Classified Material: Executive Order Ignored Since 2003, Wash. Post, June 22, 2007, at A1. --------------------------------------------------------------------------- The fact that SAPs are authorized by executive order does not mean they are immune from the deficiencies of pseudo-classifications. The Moynihan Commission noted a ``lack of standardized security procedures'' that ``contributes to high costs and other difficulties,'' and recommended the establishment of a single set of security standards for Special Access Programs--another of its sensible recommendations which, as far as is known, has not been carried out.\20\ --------------------------------------------------------------------------- \20\ Moynihan Commission Report at 28. Recommendations for Congress Madame Chair, you and the subcommittee should be commended for exercising your oversight authority over the treatment of national security information--both classified and unclassified--at the Department of Homeland Security. Such scrutiny is essential, and it is long overdue. I would also respectfully suggest that the time has come for the committee, and for Congress, to exercise its legislative authority over these matters. For 67 years, Congress has largely ceded that authority to the president, and as I hope I have explained, the results have been decidedly mixed. It has been ten years since the Moynihan Commission urged Congress to legislate the rules that protect national security information, rather than leaving it up to the executive branch to police itself. It is time for Congress to take up that challenge. A. Systemic solutions Many of the problems facing the classification system are systemic, and they require comprehensive, government-wide solutions. Among other things, Congress should reinstate the provisions of Exec. Order No. 12958 which (a) established a presumption against classification in cases of significant doubt (a policy which the Moynihan Commission urged Congress to codify); (b) permitted senior agency officials to exercise discretion to declassify information in exceptional cases where the need to protect the information is outweighed by the public interest in disclosure; and (c) prohibited reclassification of material that had been declassified and released to the public under proper authority. Congress also should undertake a thorough and comprehensive examination of the growing use of agency control markings to restrict access to unclassified information. Much has been said, and rightly so, about the importance of information sharing among government agencies. But what is the justification for a system that entrusts low-level employees and private contractors with the non-reviewable discretion to determine whether an unclassified document--a document that doesn't even rate a ``Confidential'' stamp--a document that may not even qualify for a FOIA exemption--is too sensitive for public view? Before Congress acquiesces in the further proliferation of these designations, it should consider whether those that already exist place an unwarranted burden on the free exchange of information, not only among government officials, but between the government and the people who elect it. At a minimum, Congress should prohibit agencies from adopting unclassified controls that are not expressly authorized by statute (or executive order), and should mandate strict standards for any controls it does authorize to minimize their impact on public access. H.R. 5112, the Executive Branch Reform Act, which was reported by the House Government Reform Committee during the 109th Congress, directs the Archivist of the United States to promulgate regulations banning the use of information control designations not defined by statute or executive order. If the Archivist determines that there is a need for some agencies to use such designations ``to safeguard information prior to review for disclosure,'' the regulations shall establish standards designed to minimize restrictions on public access to information. The regulations shall be the sole authority for the use of such designations, other than authority granted by statute or executive order. This approach would ameliorate some of the worst features of what is today an unregulated wilderness of inconsistent standards and insufficient checks. But it begs the question of whether Congress should be authorizing agency officials to withhold unclassified information in the first place. Such powers are all too easily given, and once they are in place, it is virtually impossible to get rid of them. I hope that Congress will consider codifying standards that incorporate these policies. But there are also many steps that can be taken to reform the management of national security information one department at a time. By undertaking such reforms at the Department of Homeland Security--by making DHS the ``gold standard''--Congress can create a model for best practices that other agencies can adopt. B. The Classification System at DHS (1) Congress should establish an Information Security Oversight Office, modeled after the Information Security Oversight Office at the National Archives and Records Administration, to oversee security classification programs at DHS. Its responsibilities would include development of implementing directives and instructions; maintenance of liaison with ISOO and agency counterparts; monitoring of agency compliance and preparation of reports to Congress; and development of security classification education and training programs. (2) Congress should establish an independent DHS Classification Review Board to ensure that information is declassified as soon as it no longer meets the criteria for classification. Among the responsibilities of the board would be to facilitate and review requests for declassification and classification challenges, and to conduct an independent ongoing review of classified materials to determine whether they are properly classified. (3) Congress should establish an independent ombuds office within DHS to provide assistance with classification challenges and requests for declassification. (4) Congress should require the DHS Inspector General to conduct periodic audits of the DHS classification program and report to Congress on the appropriateness of classification decisions. (5) Congress should require DHS to implement a system of certification for DHS officials with classification authority and to provide them with training in proper classification practices. C. Sensitive Information Controls at DHS As noted above, I hope that Congress will reconsider the question of whether agency employees and private contractors should be given a license to withhold unclassified, non-FOIA exempt information from the public. But short of curtailing the use of unclassified control markings, there are steps that can be taken by DHS to minimize error and abuse, and reduce the impact of pseudo-classification on public access to information. (1) Congress should require DHS to place strict limits on the number of agency officials authorized to designate FOUO and other unclassified information as controlled, to implement a system of certification for DHS officials with designation authority, and to provide authorized officials with training in proper designation practices. (2) Congress should require DHS to limit the duration of controls on unclassified information and provide procedures by which such controls can be removed. (3) Congress should require DHS to develop procedures by which members of the public can challenge unclassified designations. (4) Congress should require the DHS Inspector General to conduct periodic audits of the use of controls on unclassified information and report to Congress on the appropriateness of designations. (5) The Homeland Security Committee should oversee DHS implementation of-- a. The directives regarding the use of the SSI designation by TSA which Congress included in the DHS Appropriations Bill for FY 2007 (Pub. L. 109-295). Those directives require review of any document designated SSI whose release is requested and require release of certain documents designated SSI after three years unless the DHS Secretary provides an explanation as to why it should not be released. b. The recommendations included in the GAO report of June 2005 evaluating the use of the SSI designation by TSA.\21\ The GAO found significant deficiencies in TSA's management of SSI, and recommended that the Secretary of DHS direct the TSA Administrator to: --------------------------------------------------------------------------- \21\ U.S. Gov't Accountability Office, Rep. No. GAO-05-677 Transportation Security Administration: Clear Policies and Oversight Needed for Designation of Sensitive Security information (2005). --------------------------------------------------------------------------- i. Establish clear guidance and procedures for using the TSA regulations to determine what constitutes SSI. ii. Establish clear responsibility for the identification and designation of information that warrants SSI protection. iii. Establish internal controls that clearly define responsibility for monitoring compliance with regulations, policies, and procedures governing the SSI designation process and communicate that responsibility throughout TSA. iv. Establish policies and procedures within TSA for providing specialized training to those making SSI designations on how information is to be identified and evaluated for protected status. Conclusion By helping to ensure that the government keeps secret only the information that needs to be secret, these measures would enhance both openness and security--at DHS and throughout the government. Thank you. Mr. Carney. Well, I thank the witnesses for their testimony; and I remind each member he or she will have 5 minutes to question the panel. I now recognize myself for 5 minutes, and this is for all the witnesses. If you could do one thing to overcome the overclassification or pseudo-classification problem at DHS, what reform initiative or best practice would you adopt? I know Mr. Agrast, you just mentioned a few, but Mr. Leonard and Mr. Armstrong, Ms. Spaulding? Mr. Leonard. One that I would recommend, some agencies, such as State and CIA, as a best practice have independent advisory commissions comprised of historians that advise those agencies on the effectiveness of their agencies' declassification program. There is no reason why such an advisory committee could not be established on the front end of the process. An advisory committee may be of the principal consumers, State and local officials with appropriate clearances who could provide advice back to the Department as to the effectiveness of what they are classifying and its impact on their information needs. Mr. Armstrong. Mr. Carney, I would emphasize--I think Ms. Spaulding made reference to the same phenomenon--in the tear-- line system, or something like the tear-line system, emphasize the communication of important information in the least-- controlled manner necessary. Remember that the purpose of all communication in Government, whether it is the most sensitive intelligence or not, is to influence someone somewhere to take cognizance of it and to change their behavior or focus their analytical skills. In doing so, put the emphasis on communication and then minimize and restrict the sources and methods portion of the communication to protect it. But put the emphasis on communicating, not withholding. Ms. Spaulding. I think the most important thing is to do something to begin to change the culture and the mindset, and I think that is set at the top. That is a tone and an emphasis that is set at the top. So I would consider issuing, maybe even from the President, an Executive Order, for example, that would direct the agencies, Department of Homeland Security to begin with, to include in their performance evaluations the issue of overclassification and underclassification, how employees do in terms of getting the classification right, that that would be a factor in how they are evaluated. I think that would go a long way in setting the right tone. Mr. Carney. Are the evaluators in your opinion able to do that? Don't they have a vested interest in kind of keeping the system as it is? Ms. Spaulding. Well, I think it would be combined with the kinds of recommendations that have been made at this table, including regular audits of documents that have been classified; and that would help to inform those kinds of performance appraisals as to whether this employee regularly is found to have overclassified documents, for example, or whether this employee has written a great number of unclassified reports that have been able to be widely disseminated. Those performance appraisals are fairly standardized actions; and if those forms have a specific thing that you have to fill in that relates to how this employee does in terms of their classification decisions, I think that would provide an appropriate incentive. Mr. Leonard. If I could add to that, as a follow-on, another best practice that is very closely related to that, the CIA, even though it is not required at the national level, requires a personal identifier on every product they produced as to who was responsible for the classification decision; and something like that facilitates a follow-up and holding people accountable. Mr. Agrast. If I could also add, I completely agree with the recommendations, particularly with the remarks of Ms. Spaulding. Mr. Reichert opened his portion of the hearing by talking about his experience as a law enforcement officer at the State and local level. I think there are two kind of prosecutors. There are two kinds of law enforcement officers. There is the kind that says my job is to convict as many people as possible, and there is the other kind who says my job is to get the truth, and I will be satisfied that I have done my job if I convict the people who are guilty and don't convict the people who are not guilty. I think that is the cultural change that has to happen at these agencies so the premium is set not solely on the number of documents you have successfully kept from the public but using discernment and using fine judgment in determining when and whether classification decisions should be made. Mr. Carney. Thank you. Mr. Leonard, I know your office is responsible for regulating classification by agencies within the executive branch; and you consistently stated that the Government classifies too much information. Why is this happening, in your opinion? What is the reason? Mr. Leonard. Reasons are varied, but I would agree more than anything else with Ms. Spaulding's assessment that it is really one of culture. We are very effective in terms of holding people accountable for the inappropriate disclosure of information, either administratively or criminally. Very rarely, if ever, have I ever seen anyone held accountable for inappropriately withholding or hoarding information. Mr. Carney. Too many people have classification power? Mr. Leonard. Yes. Another best practice--and Mr. Agrast mentioned this--is DOE follows it. They actually require people to be trained and certified before they can affix classification controls on the product, as opposed to just having clearance and having access to it. So something along those lines would facilitate accountability, because you could have something to take away from them now if they abuse it, and it restricts the universe of people that you have to make sure are appropriately trained. So there is a lot of benefits to it all around. Mr. Carney. Thank you. I now recognize the ranking member, my good friend from Washington, Mr. Reichert. Mr. Reichert. Thank you, Mr. Chairman. I just wanted to go back to Mr. Carney's original question, which was if you do one thing. I want to ask it in just a little bit of a different way. What is the biggest hurdle--I have an answer in my mind, in my experience, but what is the biggest hurdle to overcome in this whole issue of not sharing information and overclassifying? Okay, I will give you a hint at least where I am going with this. Somebody mentioned the stovepipe thing. And, to me, really to get more specific, governance, who has control over the information? Who is the lead person? At the local level in the sheriff's office, with 38 police departments and the sheriffs in the county, you know, the battle is over who controls the server that has the information. And you are running into that sort of an issue at the Federal level. I am sure you are. Mr. Armstrong. I think what we have seen, Mr. Reichert, is that the leadership of the various departments--that we had the merger into the Department of Homeland Security and specific incentives given--direction given to the DNI to begin to break down the barriers, break down the stovepipes. But it requires the leadership to do that. The drift in the bureaucracy is toward safety, is toward the norm, is toward withholding, is toward not exposing oneself to criticism. Until and unless someone initiates a test-bed of a new direction and puts the incentive on making sure that everyone knows what they need to know, but all of what they need to know, this will not happen. Things will not change. It will default back to the old system. I think that is the problem we are faced with. Mr. Reichert. Certainly the difficulty is highlighted as you bring the 22 departments under the one Homeland Security umbrella. But it even gets more complicated then as you reach outside to the other agencies that don't report to the homeland security effort. So I mean it is a huge issue to overcome. Does anyone have any suggestions? Mr. Leonard. I would suggest, Mr. Reichert, another major hurdle is the myriad of information protection regimes that exist within the Federal Government. There is no individual who can comprehend and understand all of them, even know of all of them. While there are efforts under way within the executive branch to streamline that and what have you, there are still contributing issues, many of them statutorily based, in terms of establishing requirements for protecting critical infrastructure information and things along those lines. What that results in is it is incomprehensible to me how an operator, who has decisions to make on a day-to-day basis and getting information from multiple sources, how they can even begin to understand what they can and what they can't disclose. And it can result in paralysis. Mr. Reichert. It almost seems as though the local agencies take the lead in this arena. As we in Seattle took a look at the LInX System spearheaded by the U.S. attorney's office, the FBI choosing not to participate in that information-sharing experiment and the U.S. Naval Intelligence then taking the lead with the U.S. attorney's office, finally after a few years we have a system in Seattle now that we have partners. I think one team at a time, one maybe part of the country at a time coming together, being able to showcase a success, would you not agree that might be a way to address this issue? Mr. Agrast? Mr. Agrast. Yes, I very strongly agree. I think pilot programs and State experimentation is really a very useful tool here. When people, as you have heard, are reluctant to change, I think they need to see success stories. They need to see that it can work and that there is a better way to do these things. Mr. Reichert. Ms. Spaulding, you mentioned along the same lines this cultural change, and several of you have. I really see that as really the biggest issue, and it is a leadership concern, you know, from protecting to sharing. Do you have any ideas on how to really jump-start that? Ms. Spaulding. Well, the Markle Foundation talks about creating a culture of distribution. But I think you are right. That is the most important thing. And, as I said, I think there are some suggestions in terms of creating--there is already, as Mr. Leonard pointed out, a huge incentive for classifying documents. It is career ending if you fail to classify something that is then disclosed and causes harm to national security. So there is a huge incentive to classify. It is much easier to classify a document. It is just a safe bet. And we have to create incentives for being more careful about that decision and incentives for creating unclassified documents. You know, as I said, I have got a number of suggestions for that in my testimony. But I do think there are legitimate concerns that present a stumbling block. You asked about what are some of the major stumbling blocks. Having the trust that an agency isn't going to take your information and somehow disrupt your operational activity, and I am sure you understand exactly what I am talking about. Mr. Reichert. Yes, I do. Ms. Spaulding. And it is a legitimate concern, but it is also one of the major reasons why we find problems sharing information, particularly among law enforcement and, you know, agencies that have the ability to take action or are undertaking operations. And I saw this in spades when I was at the intelligence, when I was at CIA, and their relationships with the other agencies, FBI, Customs, whatever, the concerns on both sides of that that one or the other would take the information and run an operation that would mess up what the other agency had going. So the challenge there, the solution there it seems to me has got to be operational coordination. It can't be that you are allowed to withhold that information, and there I think is a place where particularly State and locals can provide excellent models. Mr. Reichert. Those agencies that have ongoing investigations, especially with CIs, are very concerned about sharing information. My time has expired. Mr. Chairman, I yield back. Mr. Carney. Thank you, Mr. Reichert. I will now recognize Mr. Dent from Pennsylvania for 5 minutes, and we will probably do another round. Okay. Mr. Dent. Thank you, Mr. Chairman. Ms. Spaulding, you just brought up an issue that I find interesting, and I wonder if we could talk about this issue. There are incentives to overclassify right now, but the only real control over information resides in the classification realm. Isn't overclassification a natural reaction to unauthorized disclosure of sensitive but unclassified materials? There is no punishment for--serious punishment for releasing sensitive material. Ms. Spaulding. As I said in my testimony, I think that overclassification actually contributes to a lack of respect for the classification mark and therefore actually makes it harder to protect true national security secrets. I think overclassification is a detriment to protecting truly secret information. So I do think that that is also part of the incentive structure in terms of when you are looking at leaks is that overclassification does contribute to that kind of culture as well. I think in addition to clearly trying to find ways to identify people who disclose classified information and take action, firm action against people who disclose classified information, I think it is important also at all levels of Government to reinforce the respect for classification markings. Mr. Dent. Well, I guess as a follow-up, how can the Federal Government really balance the need? You know, how do we balance this need I guess to share information on the one hand, and at this unclassified level, with the knowledge that somebody somewhere continues to leak sensitive but unclassified information? I think that is really the crux of the problem here. Ms. Spaulding. My sense is that trying to hold more tightly to that information within those stovepipes has not been an effective way of preventing those disclosures. And therefore, I think, as I said, in addition to trying to use technology to help us with audit trails to keep track of who is accessing information, who is printing information, who has access to the information that might be disclosed and trying to identify those people and hold them accountable, that it really is important that we indicate that we have taken more care in labeling things. So that when they are labeled, whether it is classified or sensitive, law enforcement sensitive, that in fact there has been a reasoned determination that could be upheld as we look at it after the fact that this would harm national security or homeland security or law enforcement interests. Mr. Armstrong. Mr. Dent? Mr. Dent. Yes. Mr. Armstrong. After three decades as a journalist in this town, I have to recognize that there is an information economy, there is an information currency within secrecy, that every major agency at every senior level leaks classified information, controls and manipulates classified information, and in parallel at other levels, either in other agencies or in the same agencies, other people speak candidly, but they speak in terms of things that aren't genuinely secret. When everything is secret, as Potter Stewart said, nothing is secret. No one knows what to respect. Most senior officials have some criteria, make judgments every day, several times a day, about how to share information that is technically classified but to get it out in some form that it believes the public needs to know or their colleagues need to know, without filing all the forms. It has caused problems from time to time, but there is an ongoing communication about what those standards are. And it is possible, particularly in the form that we are talking about today, to emphasize how to communicate without damaging the national security. Better to do it within the system than have it done without the system. Mr. Dent. I guess you are addressing it, but the question I have, how do we balance this need to share this information at the unclassified level with the knowledge that somebody somewhere continues to leak sensitive but unclassified information? I guess that is the question. How do you balance this? Mr. Agrast. Mr. Dent, one thing I guess I would hope we would do is have these unclassified markings regulated by Congress. They have taken on a life of their own. They are so numerous and so varied, there are so few standards and safeguards. You know, the classification system, with all its problems, looks pretty good compared to the pseudo- classification nonsystem. So rather than have agencies making ad hoc decisions and bringing the entire system of controlled information into disrepute, shouldn't Congress take a look at this comprehensively and decide whether such categories should exist at all? Or whether, instead, if information is truly in need of safeguarding, it ought not to be classified in the first place? Mr. Dent. Yield back. Mr. Carney. Thank you, Mr. Dent. We will start a second round of questions here. Mr. Armstrong, in your estimation, how effective has DHS been in producing reports and products at the unclassified level? Mr. Armstrong. Well, we read unclassified material when it is presented by DHS. But, more often, we read the relevant information when it is put in unclassified form when it is leaked to DHS because of the form of controls that have been established that effectively discourage and inhibit candid communication. The number of inappropriate things that have happened to try and block contractors or the employees of contractors in using information in labor disputes, for example, does not increase respect for the system; and the difficulty we have had is the difficulty of accountability. Mr. Leonard administers some degree of accountability within a classified system, but it is very difficult to do when, effectively, a department has authority to create all sorts of constraints on communication that are not necessarily constraints designed to protect national security; and the farther we move away from those for the original purpose to protect sources and methods, to protect short-term objectives that need to be accomplished, to coordinate at different levels of our government, and we move into areas where political control and sensitivity--it seems to us on the outside that the Secretary of Homeland Security has been virtually unaccountable to Congress, unaccountable to other agencies and ineffective in the administration of his mandates. Mr. Carney. What is the solution to that? Mr. Armstrong. Well, I don't know what you need to do to get him here to talk with you, but I think there are issues that can be addressed about in a public executive session. He has unbelievably large sets of responsibilities, but at various levels throughout the Department there are professionals who would like to do their job properly. I don't believe that they are getting the leadership. The leadership sometimes emerges when it is variegated by questions. The truth--the most important purpose, Woodrow Wilson said, for Congress is not to pass legislation but to inquire into how government is effectively being done; and it is that process that needs to occur and occur more publicly. Mr. Carney. Thank you. Mr. Agrast, in your estimation, how much information is being withheld by DHS and its private contractors that is unclassified and non-FOIA exempt? Mr. Agrast. I actually have no idea how much is being withheld. We have indications that, to the extent there are standards, they aren't being followed. I will give you one example, if I may, from my prepared testimony. The GAO, the Government Accountability Office, issued a report in June of 2005 evaluating the use of the SSI designation by the TSA, which is of course a unit of the Department; and they found significant deficiencies in TSA's management of SSI information and recommended that the Secretary direct the Administrator to take a number of remedial actions. One is to establish clear guidance and procedures for using the regulations to determine what constitutes SSI. The second is to establish clear responsibility for the identification and designation of information that warrants SSI protection. The third was to establish internal controls that clearly define responsibility for monitoring compliance with regulations, policies and procedures governing the designation process and to communicate that responsibility throughout TSA. And, finally, to establish policies and procedures within TSA for providing specialized training to those making SSI designations on how information is to be identified and evaluated for protected status. Clearly, those recommendations have yet to be implemented in a proper way; and it is surely within the purview of this subcommittee to inquire as to the progress that is or is not being made. Mr. Carney. How should DHS implement the new control of unclassified information originating from CUI that Ambassador McNamara developed? Mr. Agrast, sorry to interrupt your drink there. Mr. Agrast. You know, I would have to give more consideration to how they ought to go about it on an agency basis. Certainly there are some of these areas that are interdepartmental in nature, and some of these kinds of policies and practices require coordination. I am not sure that a single agency can do it. Mr. Carney. So you don't think it is something that DHS could do quickly or necessarily? Mr. Agrast. Not sure. Mr. Carney. Ms. Spaulding, do you have any idea? Ms. Spaulding. Certainly one thing to consider, and particularly when you are talking about these pseudo- classifications, is requiring that they be done at a fairly senior level. Mr. Leonard touched on this both with respect to classification and pseudo-classification, having people well- trained and certified with the authority to, you know, put that stamp on the document. But particularly in this area I think it would be helpful to move those decisions to a more senior level. Mr. Carney. Thank you. Mr. Reichert, any more questions? Mr. Reichert. Thank you. I will just make mine pretty quick here. Last year, we passed a bill that directed some cooperation in fighting terrorism, cooperating at the international level, mostly through technology, those countries like Israel and Canada and the U.K. and others who have been--Australia--who have been kind of dealing with this a little longer than we have, a lot longer in some cases. They have developed some technologies and some systems. Would you consider that we should consult these countries who have had this experience in classifying and unclassifying and overclassification and pseudo--classification? Should we be looking for leadership from those other countries? And do you have any information or knowledge about that occurring now? Anybody. Mr. Leonard. I don't have any knowledge, direct knowledge in terms of whether it is occurring or not, Mr. Reichert. But something along those lines, that definitely has merit, if only from the perspective of ensuring that we have congruous systems. Because I know that we do that on the classification level where we routinely, especially with our close allies and friendly nations, work to ensure that we have congruous systems that facilitate the sharing of classified information, especially when we are in a coalition environment and things along those lines. So those types of efforts clearly could bear fruit on the unclassified level. Now to the extent of whether they are occurring or not, I really don't know. Mr. Reichert. Anyone else have-- Mr. Armstrong. Most of the technologies that I think to which you are referring that would be helpful here are employed in the business realm already and for different reasons and with different levels, obviously, of security and devotion to principles. But we are talking about techniques. The notion of embedding metadata begins to track intellectual product and the ability to not only determine where it has gone or how it has been used or whether it has been appropriately dealt with but also to automatically begin to alert people to the fact that it is no longer controlled or it requires additional controls for an additional reason. All of those things are present at high levels in certain business environments, but they are expensive, and the incentives have to be high. Capitalism tends to find some degree of incentives. One would think that homeland security and anti-terrorism measures could find at least as high a level. Mr. Reichert. Mr. Agrast, did you have-- Mr. Agrast. Congressman, I think it is an extraordinarily thoughtful question. There has been a tendency not to look abroad for answers, and I think that has demonstrated itself to be a mistake. We don't have to do what other countries do, but we should at least learn what we can from them. Mr. Reichert. Yes. Thank you. One last thought. With this new world of technology and our soldiers fighting around the world and their access to various communication devices, cell phones and cameras in their cell phones and computers, they are communicating back to their families and friends real-time info on battles occurring or briefings that are occurring. How do you see that issue being addressed in the sharing of information that could be critical to our operations in fighting terrorism? Mr. Leonard. Well, what I see that is emblematic of a challenge we always have, and that is we are playing catch-up to technology all the time, especially from the point of, A, leveraging it but, B, understanding the ramifications from a security or vulnerability point of view as well. And then when we attempt to address it, we usually do it in a hand-fisted way, which is sometimes analogous to trying to repeal gravity. So the challenge is to somehow, some way get in front of that curve all the time and fully understand the capabilities and the limitations of the technology and try to keep our policies abreast of it, rather than being in that proverbial catch-up mode which we seem to be in. Ms. Spaulding. I don't think there is a technological solution, whether it is some new technology or shutting down some of those technology outlets, because you will never get them all. I think the only solution to that particular issue is training. I mean, you have simply got to sensitize, you know, those folks to what they can and should not be sharing and disclosing publicly. And you will never have perfect success with that, but it seems to me that trying to attack that, the basis of technology, is not going to be very successful. Mr. Reichert. Yeah. You know--one of the experiences I will share real quick--in the Green River investigation in 1987, the search warrant to be served on the suspect who we finally arrested years, years later--we had a meeting on the service of the search warrant. I was the detective in charge of the search of this subject's house; and, as I arrived, standing on the front porch was a reporter from our local newspaper to greet me. So someone within the meeting immediately shared the information. That is really one of the frustrations I think in this whole thing. You talked about building trust and in those local agencies and within those agencies within the Federal Government, too, in having the knowledge that their information is protected as the investigation is ongoing. The firewalls that can be built in a system to protect that information is a huge hurdle I think to overcome and also plays into the cultural change. So I appreciate you being here this morning, and thank you so much for your testimony. Mr. Carney. Well, I want to thank the witnesses as well for their invaluable testimony. This truly is an issue that we have to further explore to shed light on the classification issue. It is absolutely essential. The members of the subcommittee will probably have additional questions for the witnesses, and we ask that you respond expeditiously in writing. Hearing no further business, the subcommittee stands adjourned. [Whereupon, at 11:15 a.m., the subcommittee was adjourned.] For the Record Prepared Opening Statement of the Honorable Jane Harman, Chairman, Subcommittee on Intelligence, Information sharing, and Terrorism Risk Assessment March 22, 2007 Good morning. I'd like to welcome you all to this hearing on the increasing problems of over-classification and pseudo- classification and their impact on what is the lifeblood of our homeland security: effective information sharing with our State, local, and tribal law enforcement officers. The United States has had a classification regime in place for decades: information and intelligence typically falls into one of three categories: Top Secret, Secret, or Confidential. Our nation adopted this regime for one reason: to protect sensitive sources and methods. Contrary to the practice of some in the federal Intelligence Community, classified markings are NOT to be used to protect political turf or to hide embarrassing facts from public view. Indeed, a recurrent theme throughout the 9/11 Commission's report was the need to prevent widespread over-classification by the Federal government. The Commission found that over-classification interferes with sharing critical information and impedes efficient responses to threats. The numbers tell us that we are still not heeding the Commission's warning. Eight million new classification actions in 2001 jumped to 14 million new actions in 2005, while the quantity of declassified pages dropped from 100 million in 2001 to 29 million in 2005. In fact, some agencies were recently discovered to be withdrawing archived records from public access and reclassifying them! Expense is also a problem: $4.5 billion spent on classification in 2001 increased to $7.1 billion in 2004, while declassification costs fell from $232 million in 2001 to $48.3 million in 2004. In addition, an increasing number of policies to protect sensitive but unclassified information from a range of Federal agencies and departments has begun to have a dramatic impact. At the Federal level, over 28 distinct policies for the protection of this information exist. Unlike classified records, moreover, there is no monitoring of or reporting on the use or impact of protective sensitive unclassified information markings. The proliferation of these pseudo-classifications is interfering with interagency information sharing, increasing the cost of information security and limiting public access. Case in point: this document from the Department of Homeland Security (HOLD UP RADICALIZATION IN THE STATE OF CALIFORNIA SURVEY). In a few weeks, I will be leading a field hearing to Torrance, California, to examine the issues of domestic radicalization and ``home grown'' terrorism. This DHS document--a survey on radicalization in the State of California--is marked ``Unclassified/For Official Use Only.'' On Page 1 in a footnote, the survey states that it cannot be released ``to the public, the media, or other personnel who do not have a valid ?need to know' without prior approval of an authorized DHS official.'' Staff requested and was denied that approval. Staff also asked for a redacted version of the document so we could use at least some of its contents at the coming California hearing. DHS was unable to provide one. Let me be clear: I'm not denying that there may be sensitive information included in this survey, but it illustrates my point: what good is unclassified information about threats to the homeland if we can't discuss at least some of it at a hearing? How can we expect DHS and others to engage the public on important issues like domestic radicalization if we hide the ball? Unfortunately, this is nothing new. In 1997, the Moynihan Commission stated that the proliferation of these new designations are often mistaken for a fourth classification level, causing unclassified information with these markings to be treated like classified information. These continuing trends are an obstacle to information sharing across the Federal government and with State, local, and tribal partners--including most especially with our partners in the law enforcement community. Unless and until we have a robust intelligence and information sharing system in place in this country, with a clear and understandable system of classification, we will be unable to prevent a terrorist attack on the scale of 9/11 or greater. That is why this Subcommittee will focus its efforts in the 110th Congress on improving information sharing with our first preventers--the men and women of State, local, and tribal law enforcement who are the ``eyes and ears'' on our front lines. And it's why we will pay particular attention to the issues of over-classification and pseudo-classification of intelligence--and what we can do to ensure that we err on the side of sharing information. We'll do this work in the right way--partnering with our friends in the privacy and civil liberties community who want to protect America while preserving our cherished rights. I would like to extend a warm welcome to our witnesses who will be talking about these issues. On our first panel, we have assembled an array of experts who will be testifying about the extent of these problems and where things are trending. Our second panel of law enforcement leaders will talk about how over-classification and pseudo-classification are impacting their ability to keep our communities safe. In addition, I hope the witnesses will provide the Subcommittee with a sense of how we might solve the challenges ahead of us, with the goal of ensuring the flow of information between the Federal government and State, local and tribal governments. Welcome to you all. Prepared Statement of the Honorable Bennie G. Thompson, Chairman, Committee on Homeland Security March 22, 2008 Thank you, Madame Chair, and I join you in welcoming our distinguished witnesses today to this important hearing on the problem of over- and pseudo-classification of intelligence. Information sharing between the Federal government and its State, local and tribal partners is critical to making America safer. But we won't get there if all we have is more and more classification, and more and more security clearances for people who need access to that classified information. The focus should be different. The Federal government instead must do all it can to produce intelligence products that are unclassified. Unclassified intelligence information is what our nation's police officers, first responders, and private sector partners--need most. They have told me time and time again that what they DON'T need is information about intelligence sources and methods. An officer on patrol in Jackson, Mississippi, or Des Moines, Iowa, has no use for the name of the person in Afghanistan, Africa, or elsewhere who provided the information or whether it was obtained from an intercepted communication. What he or she wants to know is if the information is accurate, reliable and timely. If so, police chiefs and sheriffs can use it to drive their daily operations--especially when it comes to deciding where to put their people to help prevent attacks. That's what intelligence is all about: if it can't tell an officer on the beat what to prepare for and how, what good is it? Over-classification and pseudo-classification are nothing new, but 9/11 has made these problems worse. It's my understanding that security concerns after the September 11th attacks prompted some agencies and departments to shield whole new categories of information with Confidential, Secret or Top Secret markings. What might have started as a noble intention to protect the homeland has broken down into a system of often excessive, abusive and/or politically motivated classification decisions. It's time to fix things. This hearing will be the first of several on over- and pseudo-classification and will help us get a handle on the scope of the problem. I hope each of the witnesses will be forthcoming in their assessments of these issues and how we can help. Welcome to you all. I look forward to your testimony.