I would add that, in terms of when the file comes to us, as suggested, as part of our comprehensive security process, in addition to understanding who the applicant is, what their travel history and work history are, who they are and whether their story makes sense, we review their name against all of our internal intelligence and enforcement databases.
Thinking of some previous questions, we also have information sharing agreements with our Five Eyes partners and are able to make requests for information to partners around the world in order to gather information about people. For some of the systems—and I can't talk about the specific systems we have, again, because we don't want to give those adversaries information about what we do and how we do it—I can assure members of the committee that we do have access to information from international partners.