If the Deputy Administrator determines that the individual poses a security threat, the Administrator reviews the Initial Notification, the materials upon which the Initial Notification was based, the individual's reply, if any, and any other materials or information available to him.