Thank you, Madam Chair.
Thank you to our witnesses for being here today.
Mr. McDonell, I want to pick up on the open-source check again and get some clarification on what would normally be done.
You mentioned an open-source check being done pertaining to physical security or threats to members, and not so much for background. You said that normally that would have been done.
In this rushed time frame, what were you not able to do in the vetting of the guests? Were you able to go through each guest for those threats? Would you normally have done more? What more would you normally have done in the time frame?