[Senate Hearing 111-516] [From the U.S. Government Printing Office] S. Hrg. 111-516 TRANSPORTATION CHALLENGES AND CYBERSECURITY POST-9/11 ======================================================================= HEARING before the COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION UNITED STATES SENATE ONE HUNDRED ELEVENTH CONGRESS FIRST SESSION __________ DECEMBER 2, 2009 __________ Printed for the use of the Committee on Commerce, Science, and Transportation U.S. GOVERNMENT PRINTING OFFICE 55-979 PDF WASHINGTON : 2010 ----------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION ONE HUNDRED ELEVENTH CONGRESS FIRST SESSION JOHN D. ROCKEFELLER IV, West Virginia, Chairman DANIEL K. INOUYE, Hawaii KAY BAILEY HUTCHISON, Texas, JOHN F. KERRY, Massachusetts Ranking BYRON L. DORGAN, North Dakota OLYMPIA J. SNOWE, Maine BARBARA BOXER, California JOHN ENSIGN, Nevada BILL NELSON, Florida JIM DeMINT, South Carolina MARIA CANTWELL, Washington JOHN THUNE, South Dakota FRANK R. LAUTENBERG, New Jersey ROGER F. WICKER, Mississippi MARK PRYOR, Arkansas GEORGE S. LeMIEUX, Florida CLAIRE McCASKILL, Missouri JOHNNY ISAKSON, Georgia AMY KLOBUCHAR, Minnesota DAVID VITTER, Louisiana TOM UDALL, New Mexico SAM BROWNBACK, Kansas MARK WARNER, Virginia MIKE JOHANNS, Nebraska MARK BEGICH, Alaska Ellen L. Doneski, Staff Director James Reid, Deputy Staff Director Bruce H. Andrews, General Counsel Ann Begeman, Acting Republican Staff Director Nick Rossi, Republican Chief Counsel Brian M. Hendricks, Republican General Counsel C O N T E N T S ---------- Page Hearing held on December 2, 2009................................. 1 Statement of Senator Rockefeller................................. 1 Statement of Senator Hutchison................................... 4 Prepared statement........................................... 5 Statement of Senator Lautenberg.................................. 19 Statement of Senator Isakson..................................... 21 Statement of Senator Pryor....................................... 23 Statement of Senator DeMint...................................... 24 Statement of Senator Warner...................................... 26 Statement of Senator Brownback................................... 27 Statement of Senator Snowe....................................... 29 Statement of Senator Cantwell.................................... 36 Statement of Senator Klobuchar................................... 38 Statement of Senator Udall....................................... 47 Statement of Senator McCaskill................................... 57 Witnesses Hon. Janet Napolitano, Secretary, U.S. Department of Homeland Security....................................................... 5 Prepared statement........................................... 7 Appendix Robert A. Voltmann on Behalf of the Transportation Intermediaries Association Concerning the Customs-Trade Partnership Against Terrorism (C-TPAT), prepared statement......................... 59 Response to written questions submitted to Hon. Janet Napolitano by: Hon. John D. Rockefeller IV.................................. 61 Hon. Byron L. Dorgan......................................... 68 Hon. Maria Cantwell.......................................... 68 Hon. Frank R. Lautenberg..................................... 78 Hon. Claire McCaskill........................................ 82 Hon. Tom Udall............................................... 86 Hon. Mark Begich............................................. 88 Hon. Kay Bailey Hutchison.................................... 89 Hon. Olympia J. Snowe........................................ 95 Hon. John Ensign............................................. 96 Hon. Jim DeMint.............................................. 97 Hon. Roger F. Wicker......................................... 100 Hon. Johnny Isakson.......................................... 102 Hon. David Vitter............................................ 103 TRANSPORTATION CHALLENGES AND CYBERSECURITY POST-9/11 ---------- WEDNESDAY, DECEMBER 2, 2009 U.S. Senate, Committee on Commerce, Science, and Transportation, Washington, DC. The Committee met, pursuant to notice, at 10 a.m. in room SR-253, Russell Senate Office Building, Hon. John D. Rockefeller IV, Chairman of the Committee, presiding. OPENING STATEMENT OF HON. JOHN D. ROCKEFELLER IV, U.S. SENATOR FROM WEST VIRGINIA The Chairman. Madam Secretary, people are coming, I promise. And it's just--every day is one of those days, right? Secretary Napolitano. I hear you. The Chairman. You know a little bit about that. Secretary Napolitano. I do, indeed. The Chairman. The--one of the things I wanted to make, which is not in my statement, that Commerce Committee is--we're really glad to have you here, and we do have jurisdiction over a bunch of things, like Coast Guard, TSA, and then there are a bunch of sub-other entities. And, in all, I think we have 49 percent of your full-time employees come under our, quote, ``jurisdiction,'' or ``oversight,'' whatever you--not ``jurisdiction,'' but ``oversight,'' and 35 percent of your discretionary spending. So, it's a chunk, and I think it makes it--it's important that you're here, because they're extremely important subjects to discuss. Secretary Napolitano. Yes, sir. The Chairman. I welcome you, and I thank you again for joining us today. And since the creation of the Department of Homeland Security, 8 years ago, we have, in Congress, passed a lot of important pieces of legislation, to try to make our Nation more safe, more secure. As the former Chairman of the Senate Intelligence Committee, which really helps, actually, in this job, and now, as Chairman of this Committee, I sit at an intersection between economic and national security, in a very, very interesting way, and I have a deep appreciation of the many challenges that we face, that you face, and opportunities either lurking or simply on the horizon. I'm proud to say that the Commerce Committee and its members were deeply instrumental in developing all or part of every major piece of legislation that the Department Homeland Security is responsible for implementing, and we're very acutely aware of that. During that time, our Nation has made a lot of progress in transportation security, but obviously we have a lot of work that remains. A complex goal--global transportation network and supply chain--creates enormous security challenges for our Nation. For whatever reason, we seem to be slow to understand that, as a people. And as a government, I don't think we've done our due diligence in terms of supporting DHS, and giving you the money that you need. The Coast Guard's an incredible example of that, and then all of the harbor problems and everything that you-- you're struggling to--and doing well, but you've got money problems everywhere. We have porous borders, both land and sea; they create a lot of inherent risk. Over the last year, I've had the opportunity to discuss with--the state of maritime and port security with Admiral Allen, Commandant of the Coast Guard. I have an enormous regard for that man; I think he has terrific vision and perspective. And, you know, he's very worried--to, sort of, reinforce my concept on a lot of things, but one of them was just the concept of small vessels. There are so many small vessels out there; What do we do about small vessels? What does he do? What do you do? I'll be introducing legislation early next year on this issue, and I look forward, Madam Secretary, to working with you as we develop that. I also want to highlight that I remain deeply concerned about the state of aviation security, and especially general aviation security and aircargo security. In particular, we remain far too vulnerable in general aviation. I've always felt that. And it's a battle where nobody ever seems to advance the ball, particularly. But, I mean, whenever I've been out to Dulles Airport, I can never remember passing through any metal detector; I never remember having any check on anything. And that should not be. And it's sort of easy; it has--since we all experience that, we notice it, and other people would be inclined to notice that, too, and they may not--they may have ill intent. The--I think your predecessors shared that view--or, your predecessor--shared that view, and I look forward to hearing your views on this specific problem of the state of aviation security. Both Congress and the Administration must balance important but competing needs, maintaining an efficient flow of commerce while ensuring that no terrorists can enter our country by land, air, or sea. And they can. And we all know that. I understand this balance, and I'm committed that we in Congress do all we can to make sure that it's achieved, and work with you to help you to make sure that it's all achieved. I understand the GAO, the Government Accountability Office, is releasing a report for the Committee today about the 100- percent-scanning mandate for maritime cargo. That's something that the House is really up on. I have my questions about whether that's doable, and I want to talk about that with you, because it's very--a very important subject, and you can increase your security, if we had all the machinery for it and could afford it, but you might slow down commerce, which I suppose could happen. But, when you're talking about all the ports around the world, it becomes pretty complex. The GAO highlights the enormous difficulty of meeting this mandate due to the global nature of supply chain logistics and simply a lack of technology, sufficient technology. That does not mean that we should not continue to strengthen our security protocols to prevent high-risk cargo from entering this country, whether by land, sea, or air. That's a big problem. We need to work harder to find ways to balance our security needs with our need to move goods and people efficiently. That's always the challenge. And they are not mutually exclusive. They don't have to be mutually exclusive. I--you know, I--the two DNIs, President Bush's and President Obama's, both, in an Intelligence hearing in the last Administration and this hearing that are sort of global threats, both of them flat out came and said that cybersecurity is the greatest threat to national security. They--everything else was after that. We hear that. It goes right through our head. We don't do that much about it. And--that various agencies do, and there are, you know, 50 Federal agencies claiming jurisdiction, and 20 Congressional committees claiming--or subcommittees--claiming jurisdiction. So, it's a mess, but it's a mess which stands as our major national security threat. To date, Congress has not spent as much time on cybersecurity as transportation security. And that has to change. That's our fault. I'm committed to making cybersecurity a focus for this committee and for this Congress; want to work with you on that. The interconnectedness between government and private industry on this critical issue cannot be ignored in the 21st Century. And again, it's the number-one threat. Two different people, 2 years apart, said exactly the same thing-- two different Administrations, two points of view. Along with Senator Snowe, I've been working on legislation that aims to address the threats that we face from cyberterrorists who intend to wreak havoc on our infrastructure. Madam Secretary, as you and I have discussed, I've called the White House to develop a national security strategy, coordinate new roles, renew responsibilities across all boundaries. And the Congress and the White House and every government agency has to be a part of that solution. And that's very easy to say and extremely tough to get people to acquire the necessary discipline to focus. We call for somebody who reports to the President. Well, that becomes controversial: Is that a czar? And I, sort of, don't worry about that. If people say it's the number-one national security threat, to me that's about all you need to know. Anyway, we have enormous respect for you. I respect you very much. Over the last 8 years, your Department has experienced a lot of growing pains. I know you're the right person to move the agency forward. I'm totally confident of that. I look forward to being your partner--I think we all do-- in solving top security challenges. And I turn now to the distinguished Ranking Member, Senator Hutchison, from the State of Texas. STATEMENT OF HON. KAY BAILEY HUTCHISON, U.S. SENATOR FROM TEXAS Senator Hutchison. Well, thank you very much, Senator Rockefeller, for calling this meeting. Welcome, Madam Secretary. I want to start by saying, securing our transportation network and infrastructure is essential for our national defense as well as our economic prosperity. Texas is home to 29 ports, including the Port of Houston, which is one of the busiest ports in the world. It ranks first in the United States in foreign water-borne tonnage, and is home to one of the world's largest petrochemical complexes, as well as the U.S. Strategic Petroleum Reserve. A terrorist incident at a major U.S. port could cause a devastating loss of life and deliver a huge blow to our economy. For years, I've worked with my colleagues on both sides of the aisle to strengthen our Nation's port security and our transportation network. And, while we have made great strides since 9/11, the Department of Homeland Security faces ever- evolving threats and still must meet numerous challenges. I want to address the transportation security officers, the screeners at airports and other places--in some places--and talk about collective bargaining. While Federal law, of course, prohibits screeners from striking, allowing screeners to collectively bargain through a union could have serious consequences on the Transportation Security Administration's fundamental security mission. I hope that you will talk about that issue and how you intend to address it, because I think it is very important for us to know that our screeners will not able to strike and will not have bargaining that causes work slowdowns and shortages and all of the things that are just short of a strike. Second--and this is something with which you have much familiarity, I know--is the movement of goods across our land borders. This is an integral aspect of our economy, and must be conducted in a secure, and also efficient, manner. Unfortunately, the wait times at many of our border crossings have increased, while the flow of goods has decreased. During the floor debate on the SAFE Port Act, I secured an amendment that increased the number of U.S. Customs and Border Protection officers by 275. Now, this is an issue on our land ports. It's also an issue on our water ports, where, in some cases, we are having to share a screener or a transportation Border Patrol person with a port and an airport in the same area. And that's not a good situation. I welcome your views on how we can meet our resource needs along the Nation's land borders, water borders, and airports, because I think these are the key issues that we must address. I will ask questions. I will not go further in my statement. But, I do also have questions about the screening of cargo at both our airports and our water ports, as well as, of course, the land ports and the technology for that. So, you have a huge job, and we know that. That agency is young, and it is an amalgamation of many of our security agencies. But, your responsibility is also critical. So, I welcome you and look forward to asking you questions and hearing what you have to say. [The prepared statement of Senator Hutchison follows:] Prepared Statement of Hon. Kay Bailey Hutchison, U.S. Senator from Texas Thank you, Senator Rockefeller, for holding this hearing on transportation security. Securing our transportation network and infrastructure is vital for our national defense and our economic prosperity. Texas is home to 29 ports, including the Port of Houston, which is one of the busiest ports in the world. It ranks first in the United States in foreign waterborne tonnage and is home to one of the world's largest petrochemical complexes, as well as the U.S. Strategic Petroleum Reserve. A terrorist incident at a major U.S. port could cause a devastating loss of life and deliver a huge blow to our economy. For years, I have worked with my colleagues on both sides of the aisle to strengthen our Nation's port security and transportation network. While we have made great strides since 9/11 in improving transportation security, the Department of Homeland Security faces ever-evolving threats and still must meet numerous challenges. First, is the issue of allowing transportation security officers (TSOs), or screeners, to collectively bargain for compensation. While Federal law does prohibit screeners from striking, allowing the screeners to collectively bargain through a union could have dire consequences on the Transportation Security Administration (TSA)'s fundamental security mission. Since the inception of TSA, it has been critical that the agency has a nimble and flexible workforce which can react to emerging threats at a moment's notice. How you intend to address this issue, Madame Secretary, will be of great interest to me and many others on this Committee, as well as the traveling public at large. Second, the movement of goods across our land borders is an integral aspect of our economy and must be conducted in a secure and efficient manner. Unfortunately, the wait times at many of our border crossings have increased while the flow of goods has decreased. During the floor debate on the SAFE Port Act, I secured an amendment that increased the number of U.S. Customs and Border Protection (CBP) Officers by 275, and I remain committed to ensuring that CBP has the resources available to carry out a mission that is critical to our Nation's economic and national security. I welcome Secretary Napolitano's views on how the Department and the Administration intend to best meet the resource needs along our Nation's borders. We simply must have a renewed commitment to tackling the pressing issues along our southern border, challenges that I know the Secretary understands very well. Again, thank you, Mr. Chairman, for holding today's hearing. I look forward to hearing from Secretary Napolitano on these very important issues. The Chairman. Madam Secretary--I should say to my colleagues, that--it may be both parties, but, I know, our party--we're having a Healthcare Caucus--I think is our 1,733rd Healthcare Caucus--at 11:30. And so, what I want to do is, with apology to colleagues on both sides, is to head directly to you, so you can make your statement, and then we'll ask you all kinds of questions. Secretary Napolitano. Great. Senator Lautenberg. Mr. Chairman---- The Chairman. We'd be--they're all entered as an-- automatically into the record, but the timing--this is--Senator Lautenberg, this is not unusual; this is the way we usually do it. When we're not pressed, we don't do it; but we do do it usually. Please proceed. STATEMENT OF HON. JANET NAPOLITANO, SECRETARY, U.S. DEPARTMENT OF HOMELAND SECURITY Secretary Napolitano. Well, thank you, Mr. Chairman, Senator Hutchison, Members of the Committee, for the opportunity to testify on the many actions that the Department is taking to secure our country and, at the same time, helping to strengthen the foundation of our economic prosperity. In the interest of time, I have submitted a longer written statement, and ask that it be included in the record. But, I would like to focus my opening remarks today on one particular issue, and that is the security of containerized maritime cargo. For years, the Department of Homeland Security and other Federal agencies have been working to mitigate the threat, particularly, of a nuclear device being brought into the country. That was the intent behind Congress's mandate that the Department scan 100 percent of maritime cargo headed into the United States by the year 2012. Now, when the Department looks to mitigate any threat, we look to two guiding principles: first, a multi-layered approach to security, making us more safe than relying on any single layer; and second, risk management as the best way to make sure that our actions are prioritized and that our resources are focused correctly. Now, for various reasons, it is difficult to measure, in absolute terms, the risk of a threat of a nuclear device being brought into the United States. But, when we look at our vulnerabilities to this threat, it's clear that we are vulnerable across a number of pathways, and one of these pathways is maritime shipping containers. But, there are others. Private airplanes, as you mentioned, Senator, small boats, as you also mentioned, overland smuggling, are just some examples. So, when we think about securing the borders of the United States, one useful analogy is that of a home. A house has a front door, but it also has a number of other possible entryways--other doors, the windows, even the chimney. Now, here security has definitely improved at the front door; in this case, the maritime cargo pathway. But, other possible entryways also merit our attention. So, therefore, we have been building a layered approach to maritime cargo security. We collect advance information on cargo entering the United States--who has it, where it's going, who may have had access to it--so that we can focus on higher- risk cargo. We work with partners in the shipping industry to improve their security. Once we ensure that a company has put strong security measures in place, we focus on higher-risk shipments. DHS personnel right now are located at 58 ports in 44 other countries working with foreign officials to help ensure the security of U.S.-bound cargo. And on top of these measures, there is the 100-percent-scanning requirement being advanced by pilot projects at five foreign ports. Now, DHS learned a great deal from these pilots, but it has also encountered a number of steep challenges. Some of these issues relate to the limits on current technology. Technology doesn't exist, right now, to effectively and automatically detect suspicious anomalies in cargo. This makes scanning difficult and time-consuming. Available technologies are also limited in their ability to see accurately through very dense cargo. And density often can be the measure of something being disguised. Other challenges are logistical. Many ports do not have a single point through which most of the cargo passes, which means that 100-percent scanning would either severely slow trade or require a redesign of the port. And, on that note, the costs of 100-percent scanning are very steep, especially in a down economy. DHS equipment costs, alone, would be about $8 million for every one of the 2,100 shipping lanes at the more than 700 ports that ship to the United States. So, therefore, DHS is compelled to seek the time extensions, authorized by law, with respect to the scanning provision. But, the scanning provision has served and is serving its purpose, allowing DHS to focus on this important issue and to gain expertise in it. And so, in the view of the Department, while we need to continue the current efforts, we need to address the security of maritime cargo through a wider lens, how to mitigate the threat against all potential pathways, including, metaphorically, the other doors, the windows, and the chimney. I look forward to working with you and the Congress on an approach to secure all vulnerable pathways that could be used to smuggle a nuclear device into our country. Let me, if I might, just briefly mention other actions we are taking to help secure some of the other pathways into our country. These include significant strides in ensuring the security of air cargo. These efforts include work by the Coast Guard to collaborate with our partners at other ports, and with the small-boat community, to identify potential dangers and identify a small-boat strategy. Our efforts also include work with the general aviation community to devise rules to help secure the country from a dangerous weapon being smuggled here via private aircraft. So, as you can see, we are taking action, but much work remains. So, I look forward to working with this Committee and with this Congress on addressing this and other threats. I thank you again for the opportunity to testify. I look forward to addressing some of the issues that you have raised in your own statements and to answering, to the best of my ability, the questions that you might have. Thank you. [The prepared statement of Secretary Napolitano follows:] Prepared Statement of Hon. Janet Napolitano, Secretary, United States Department of Homeland Security Chairman Rockefeller, Senator Hutchison, and members of the Committee: Thank you for this opportunity to testify on the efforts of the Department of Homeland Security to improve security for land, sea, and air transportation, and for cargo, while facilitating travel and trade. Ensuring our security and facilitating economic activity are mutually beneficial, not mutually exclusive. A safe and secure homeland requires that we maintain effective control of our air, land, and sea borders. Secure, well-managed borders must not only protect the United States from threats from abroad--they must also permit the expeditious and safe flow of lawful travel and commerce. We are pursuing both of these objectives through a broad array of programs in areas of special interest to this Committee. Today I would like to highlight some particular actions we are taking to address our security challenges, and how we working to develop multi-level, risk-based strategies that strengthen our security to the greatest extent possible. Security Challenges in the Global Supply Chain The Department has focused on securing the United States from the threat of a nuclear device being brought into this country. Because the potential consequences of such an event would be so grave, we need the best possible strategy to prevent it from occurring. We know that al Qaeda has expressed interest in obtaining the materials necessary to perpetrate this kind of attack. To combat this threat regardless of who the malicious actor might be, the U.S. Government has put in place a series of programs and initiatives. These include: gathering intelligence on the intent and capability of terrorists or other adversaries; controlling and securing nuclear material at its source; interdicting illicit acquisition of nuclear material; detecting and preventing smuggling into the United States; and preparing to respond to attacks. The detection and smuggling portions of these programs are the predicate for Congress' requirement to scan 100 percent of cargo headed to U.S. ports, and are one part of this overall strategic effort, addressing only one possible pathway through which nuclear material or a device might be smuggled. We believe that as we look at all the pathways in which nuclear material or a nuclear device might be smuggled, our Nation's security programs should be organized around two fundamental guiding principles: First, that a ``defense in depth,'' or layered, approach is more effective than a single point of security; and second, that efficient and effective risk management is the optimum way to prioritize our actions and allocate our resources. Assessing the risk of a nuclear device being brought into this country presents some difficulties. When considering ``risk,'' we measure threat and the intent, capabilities, resources, and activities of possible threat actors; we look at our vulnerability to the threat; and we look at the consequences if that threat materializes. In the case of a nuclear device, the potential consequences are great, but the likelihood of an attack is difficult to determine. We know that terrorist organizations aspire to attack us in this way, but because there is little evidence our adversaries have made a significant advancement toward that goal, and because the threat environment is constantly changing, we are limited in our ability to assess the likelihood of the threat based on available intelligence. At the same time, it is clear that we could be vulnerable to this threat across a number of potential pathways. One of these pathways is through commercial shipping containers that arrive at our seaports. But there are others: General aviation, small boats, and over-land smuggling are examples of some of these vulnerabilities. When protecting against the threat of a nuclear device being smuggled into this country, we must keep in mind that we are dealing with complex systems that have many points of vulnerability. The matter is not as simple as guarding against a threat at a single entryway or other focal point. The Status of Securing Maritime Cargo DHS and Congress--through both the SAFE Port Act of 2006 and the Implementing Recommendations of the 9/11 Commission Act of 2007 (``9/11 Act'')--have made significant progress in securing maritime shipping containers from being used to smuggle a nuclear device into the United States. Congress imposed multiple requirements--including a mandate to scan 100 percent of containerized maritime cargo \1\--because it saw a vulnerability that needed to be addressed. Because of this mandate, the Department has gained critical knowledge and experience in securing this pathway and has made important progress through a number of initiatives, which are all different layers in our security approach. --------------------------------------------------------------------------- \1\ There are important differences between scanning and screening of maritime cargo, as defined by the SAFE Port Act. ``Scanning'' means utilizing non-intrusive imaging equipment, radiation detection equipment, or both, to capture data, including images of a container. ``Screening,'' on the other hand, means a visual or automated review of information about goods, including manifest or entry documentation accompanying a shipment being imported into the United States, to determine the presence of misdeclared, restricted, or prohibited items and assess the level of threat posed by such cargo. I am using these definitions for these terms for the purposes of discussing maritime cargo. --------------------------------------------------------------------------- First, DHS collects advance information on all containerized cargo entering the United States in order to help assess the threat that each shipment could pose. This process provides critical guidance on where we need to dedicate our security resources. In January 2009, the interim final rule in the marine environment for Importer Security Filing--known as ``10+2''--went into effect. This provides DHS with greater visibility into a container's movements and the parties that may have had access to it. DHS then puts this information through sophisticated, automated analytic systems that identify the shipments that pose the highest relative threats. Progress on 10+2 has been very positive--industry participation has been very strong, and we have already received more than 2.8 million filings representing more than 90,000 importers. We anticipate moving forward with a final rule either soon. Through the Customs-Trade Partnership Against Terrorism (C-TPAT), DHS works with the trade community to encourage them to adopt tighter security measures throughout their supply chains. Once we can certify that these measures are in place, DHS expedites the inspection of goods from these partners. This allows safer cargo to move more quickly and enables DHS to focus on higher-risk shipments. C-TPAT currently has more than 9,300 industry partners. Under the Container Security Initiative (CSI), DHS works with 44 foreign customs administrations to jointly identify and inspect high- risk cargo containers at 58 ports before they are shipped to the United States. This provides DHS critical ``boots on the ground'' at these ports. Importantly, these ports represent about 86 percent of all shipping into the United States. The 100% Scanning Issue In advancing the goal of 100 percent scanning, the Secure Freight Initiative (SFI) deploys networks of radiation detection and imaging equipment at five overseas pilot ports.\2\ This advanced pilot has encountered a number of serious challenges to implementing the 100 percent scanning mandate. --------------------------------------------------------------------------- \2\ These locations are Southampton, United Kingdom; Qasim, Pakistan; Puerto Cortes, Honduras; Busan, South Korea; and Salalah, Oman. --------------------------------------------------------------------------- Certain challenges are logistical. Many ports simply do not have one area through which all the cargo passes; there are multiple points of entry, and cargo is ``transshipped,'' meaning it is moved immediately from vessel to vessel within the port. These ports are not configured to put in place detection equipment or to provide space for secondary inspections. At these ports, scanning 100 percent of cargo with current systems is currently unworkable without seriously hindering the flow of shipments or redesigning the ports themselves, which would require huge capital investment. Other challenges are the limitations that are inherent in available technology. DHS currently uses both passive radiation detection and active x-ray scanning to look for radioactive material in cargo. An important obstacle is the absence of technology which can effectively and automatically detect suspicious anomalies within cargo containers that should trigger additional inspection. Currently, DHS personnel visually inspect screens for possible anomalies, but the scale and the variety of container cargo make this process challenging and time- consuming. In addition, current x-ray systems have limited penetration capability; this can limit their ability to find a device in very dense cargo. While DHS is pursuing technological solutions to these problems, expanding screening with available technology would slow the flow of commerce and drive up costs to consumers without bringing significant security benefits. Finally, and on that note, the costs of 100 percent scanning pose a great challenge, particularly in a struggling economy. Deploying SFI- type scanning equipment would cost about $8 million per lane for the more than 2,100 shipping lanes at more than 700 ports around the world that ship to the United States. On top of these initial costs, operating costs would be very high. These include only DHS expenses, not the huge costs that would have to be borne by foreign governments or industry. It is also important to keep in mind that about 86 percent of the cargo shipped to the United States is sent from only 58 of those more than 700 ports. Installing equipment and placing personnel at all of these ports--even the tiny ones--would strain government resources without a guarantee of results. The Path Forward Thus, in order to implement the 100 percent scanning requirement by the 2012 deadline, DHS would need significant resources for greater manpower and technology, technologies that do not currently exist, and the redesign of many ports. These are all prohibitive challenges that will require the Department to seek the time extensions authorized by law. At the same time, it is imperative that we approach the threat of a nuclear device being smuggled into the United States by addressing all possible pathways. The 100 percent scanning mandate has enabled DHS to focus on this issue, adopt the important tool of cargo scanning, and determine how we can best act to mitigate the threat of a nuclear device being smuggled into the United States. In the view of the Department, however, we need to address this issue through a wider lens: how to mitigate this threat across all potential pathways. I look forward to continuing to work with Congress to address this threat in such a way. Similarly, DHS has been taking action to address our other vulnerabilities to the smuggling of a nuclear device. As I explain later in this statement, we are making important progress in securing air cargo. The Coast Guard and our partners at ports of entry are working with the maritime community and with owners of small boats in order to identify potential threats. The Transportation Worker Identification Credential (TWIC) program is helping to ensure personnel security at our own ports. DHS is continuing to work with the general aviation community to develop rules that address the risk of bringing a nuclear device being brought into the United States by private aircraft. All of these efforts are a work in progress. Thus, it is essential that we look at security in a comprehensive manner and allocate our resources according to a strategy that makes the most sense. We cannot define ``security'' as being able to flip a switch between two options, safe and not safe. Instead, we must evaluate all points of risk and vulnerability, comprehensively across a complex system. Everyone understands the importance of getting it right when it comes to our approach to cargo security. It has long-term and lasting implications for our domestic security, our economy, and our trade relations. I look forward to working with Congress to develop and implement a solution that allocates our resources in a manner that better protects the homeland. Actions and Challenges in Aviation and Surface Transportation Security The Transportation Security Administration (TSA) has made great strides this year in addressing key issues in transportation security, a sector critical both to our country's safety and economic prosperity. In the face of an ever-changing threat environment, TSA is dedicated to adopting new procedures and technologies that will protect the public while respecting individual privacy rights and facilitating travel and commerce. Today I will highlight a few important areas in which TSA has been particularly active. Before I do that, however, I want to express my appreciation to the Committee for supporting the nomination of President Obama's choice to head TSA, Erroll Southers. When he is confirmed, Erroll will bring outstanding leadership to TSA as the agency continues its critical work. Development of a Dedicated, Effective TSA Workforce The effectiveness of TSA's security efforts depends first and foremost upon its people. The TSA workforce is the agency's most valuable asset in preventing, detecting, and deterring threats to our transportation sector. Building the TSA workforce is a major priority, and TSA has initiated innovative programs to attract and retain a motivated and a well-trained work force, including a career progression program for Transportation Security Officers (TSOs) and creative pay incentives for part-time TSOs, such as a split shift differential, Sunday premium pay, and full-time health benefits. TSA has also created programs to address employee concerns. The National Advisory Council (NAC) is a committee of management and TSO representatives from various airports that acts as the liaison for the workforce in presenting to senior leadership new ideas as well concerns relating to existing practices and policies. The Model Workplace program brings staff and leadership together to create a cohesive work environment through local employee councils and training in conflict resolution. These programs also include an award-winning workers' compensation program that has resulted in significant cost savings, an estimated $19.4 million from FY 2007 to FY 2010. This program includes an innovative nurse case management element that ensures affected employees are receiving proper treatment, medication, and related therapy to facilitate their return to duty after injury, thus reducing time off the job. It also includes a review of all cases on the long term workers compensation roles, which has resulted in the resolution of 67 percent of the cases in existence when the review began in 2007. Immigration and Customs Enforcement (ICE) is working to create a similar program, and we moving to implement this program Department- wide. Technology Development The Department is also aggressively moving to improve our technological capabilities in order to address evolving threats to our Nation's security in the air environment. Utilizing the latest technologies allows DHS to more effectively perform its law enforcement and security duties while at the same time facilitating legal travel and trade and expediting security procedures for the traveling public. Aviation security will focus on new technology at airport checkpoints to screen passengers for concealed weapons, explosives, and other prohibited items that might not be detected by a metal detector- providing the capabilities necessary to combat the evolving threats that our intelligence activities have revealed. TSA has gone to great lengths to balance privacy with security in its screening processes, and continues to work on technology enhancements that will offer even greater privacy protections in the future. Pilot Results for a Biometric Exit Program At the recommendation of the 9/11 Commission and the requirement of Congress, since the inception of the US-VISIT program, DHS has prioritized the development of an automated capability to record when visitors leave the United States. This is an important tool to addressing visa overstays. By adding biometrics to the current biographic-based system of recording departures, DHS will be able to more accurately and efficiently determine whether foreign citizens have departed the United States. From May 28 to July 2, 2009, US-VISIT tested biometric air exit procedures at two airports, Detroit Metropolitan Wayne County Airport and Hartsfield Jackson Atlanta International Airport, in accordance with a Congressional requirement that additional biometric collection testing be done prior to publishing a final rule on the topic.\3\ In Detroit, Customs and Border Protection (CBP) officers collected passengers' biometrics at the boarding gate. In Atlanta, passengers' biometrics were collected at a TSA checkpoint. --------------------------------------------------------------------------- \3\ Previously, DHS had proposed a rule in 2008 that commercial air carriers and vessel carriers collect and transmit the biometric information of international visitors to DHS within 24 hours of their departure from the United States. Congress asked DHS to test additional biometric collection before finalizing this rule to ensure that the best available procedures are implemented. --------------------------------------------------------------------------- The Department has submitted an evaluation of these pilots to the Senate and House Appropriations Committees and to the Government Accountability Office. The results of the pilot evaluation, combined with the review of a completed public comment period, will inform the final rule that the Department will issue to cover both airports and seaports. Secure Flight One of the 9/11 Commission's key recommendations was for the Federal Government to check passengers traveling on commercial airline flights against terrorist watch lists, a responsibility that was previously held by the airlines. In January 2009, Secure Flight became operational, prescreening passenger name, date of birth and gender against government watch lists for domestic and international flights. The program makes travel safer and easier by helping to keep known or suspected terrorists from obtaining a boarding pass and preventing the misidentification of passengers who have names similar to individuals on government watch lists. To date, 18 air carriers have successfully switched to Secure Flight, including one international carrier. Testing is underway with an additional 27 air carriers. Implementation for all covered air carriers is scheduled to be completed by the end of 2010. I would like to thank this Committee for your strong support for the Secure Flight program since its inception and the Government Accountability Office (GAO) for its constructive collaboration during its audit of this important program. Foreign Repair Stations Rule TSA is also making progress strengthening aircraft security. On November 18, 2009, TSA published a Notice of Proposed Rule Making in the Federal Register on Aircraft Repair Station security. The proposed rule would establish security requirements for maintenance and repair work conducted on aircraft and aircraft components at domestic and foreign repair stations that are certificated by the Federal Aviation Administration (FAA). It also requires FAA-certificated foreign and domestic repair stations to adopt and carry out a standard TSA security program to safeguard the security of the repair station, the repair work conducted, and all aircraft and aircraft components at the station. The program will require stations to implement strict access controls, provide security awareness training, and allow for DHS inspections. After 60 days of public comment, we look forward to responding to comments, finalizing the rule and moving forward with the required security audits that to date have been conducted with the voluntary cooperation of many foreign partners. Large Aircraft Security Program (LASP) General Aviation (GA) remains a concern to the Department because of its ability to circumvent some of our layers of security and its potential to deliver dangerous people or weapons to the United States. Addressing this concern while maintaining a robust GA sector is one of the purposes of the Large Aircraft Security Program. TSA has sought out input from GA stakeholders throughout its rulemaking process for LASP, receiving 8,000 comments in response to the initial NPRM, conducting five public meetings and holding additional comment outreach sessions with impacted stakeholders to gain further input and feedback. TSA plans to issue a Supplemental Notice of Proposed Rulemaking before the end of 2010 that incorporates this input and addresses some of the concerns of GA stakeholders. Air Cargo Screening \4\ --------------------------------------------------------------------------- \4\ The definition of ``screening'' contained in the portions of the 9/11 Act that cover air cargo differs from the definition in the SAFE Port Act. In this context, screening means ``a physical examination or non-intrusive methods of assessing whether cargo poses a threat to transportation security. Methods of screening include x-ray systems, explosives detection systems, explosives trace detection, explosives detection canine teams certified by the Transportation Security Administration, or a physical search together with manifest verification. . . .'' I am using this definition when discussing air cargo. --------------------------------------------------------------------------- Excellent progress continues when it comes to screening air cargo: More than 50 percent of air cargo is now undergoing screening. More than 95 percent of passenger flights fly each day carrying fully screened cargo on board. TSA is moving forward with its Certified Cargo Screening Program (CCSP), but the program will need greater participation from the air cargo industry in order to meet the August 2010 deadline for 100 percent screening of all cargo that is borne on passenger aircraft for flights originating in the United States. To that end, an industry-wide conference will occur in mid-December to encourage participants in the air cargo supply chain to join the CCSP. Meeting the 100 percent screening requirement for cargo inbound to the United States from foreign countries continues to present challenges. TSA is taking a layered approach to securing this cargo: TSA is increasing security requirements for cargo acceptance, handling, and screening of cargo transported into the U.S. on passenger aircraft. It is strengthening global security standards through collaboration with the International Civil Aviation Organization (ICAO) and through agreements on information sharing and standardization of security with foreign partners. TSA is also working with U.S. Customs and Border Protection (CBP) to examine the feasibility of adapting CBP's automated targeting system (ATS) to provide risk screening on every shipment of cargo. Improvements in Threat Assessments The Department is also making progress in preparing a proposed rule to standardize background checks, standards for redress, and fees among all transportation workers who have access to secure areas of the Nation's transportation system in order to reduce redundant background checks and establish consistent standards across the country. This future rule (Universal Security Threat Assessment/Fee Rule) will cover several existing background check programs, such as the Transportation Worker Identification Credential (TWIC) as well as Hazmat drivers, air cargo, airport and airline personnel, and new populations we are required to vet under the 9/11 Act, such as frontline rail and transit workers. Federal Air Marshal Service I want to recognize the accomplishments of TSA's Federal Air Marshals Service. In the past 4 years, TSA's highly trained Federal Air Marshals have flown millions of missions worldwide and participated in over 4,000 Visible Intermodal Prevention and Response operations (VIPRs)--45 percent in aviation, and 55 percent in surface transportation. Surface Transportation DHS, and in particular TSA, continues to enhance surface transportation security by working with other Federal departments and transportation providers. This will be a major priority of mine during my tenure as Secretary. Nothing is more important to security across all modes of transportation than well-trained employees. The familiarity of employees with the facilities and operating environments of their specific modes and transportation systems put them in an ideal position to identify and prevent threats. Targeted security training for key employees is one of the most effective measures that we can take to enhance security. To pursue this goal, TSA is drafting an NPRM that will institute employee security training program requirements across all surface modes of transportation: freight railroad carriers; public transportation agencies (including rail mass transit and bus systems); passenger railroad carriers; over-the-road bus operators; and motor carriers transporting highway security-sensitive materials. Training elements for these programs will address security awareness, terrorist behavior recognition, and threat and incident prevention and response. Actions and Challenges in Maritime Security In addition to aviation security, maritime security continues to be a major priority for the Department in its overall mission to secure the Nation. Piracy The United States is committed to combating piracy, and DHS plays an essential role in this effort. Currently, U.S. Coast Guard personnel augment Central Command's Combined Task Force 151 as part of a U.S. and international force operating in areas prone to piracy. Because vessel owners and operators have primary responsibility for the security of their vessels and the best defense against piracy is preparedness, DHS has worked with Federal partners to develop guidance for the maritime industry. For example, the Maritime Security (MARSEC) Directive on Vessel Security Measures for High Risk Waters (HRW), which was issued under the authority of the Coast Guard in May 2009 and requires U.S.-flagged vessels to evaluate risk and determine appropriate self protection measures for the vessel when operating in high-risk waters. This directive requires U.S.-flagged vessels to use security teams (armed or unarmed) in the high risk waters, and we will continue to work with the commercial shipping industry to develop and implement preventative measures to combat piracy. Pirates have proven versatile in adapting their methods so we will continue to provide guidance based on how this threat evolves. Small Vessel Security DHS has identified small vessels (those under 300 gross tons) as tools that could be used by terrorists to smuggle either weapons or people, as attack platforms, or as waterborne improvised explosive devices. Last year's attacks in Mumbai and the attack on the U.S.S. Cole in 2000 demonstrate how small vessels can be used in terrorist operations. Accordingly, DHS has reenergized the Department Small Vessel Security Strategy, and we are nearing completion on an implementation plan. This implementation plan encompasses programs and actions across Federal agencies, and forms a broad doctrine for reducing this risk. At the same time, we continue to move forward in other important areas of small vessel security. Many of these programs focus on involving the American boating public in helping to ensure our security from potential attacks that can use small vessels. For instance, the Coast Guard America's Waterway Watch program provides a way for the recreational boating public to report suspicious and unusual activity when observed on the Nation's waterways. The Coast Guard is also exploring initiatives such as the Citizen's Action Network to improve communications with the boating public. Our Domestic Nuclear Detection Office (DNDO) has been working on a radiological/nuclear detection pilot program in both the Puget Sound and the San Diego area to strengthen security through existing technology and partnerships with the local maritime community in order to detect vessels which might pose a threat. These steps are greatly expanding detection opportunities and clarifying response roles and options. The path forward on small vessel security is clear: we will continue to establish and strengthen our partnerships with the small vessel community, engage with our international partners, and develop and implement technologies to reduce the potential threats from small vessels. We anticipate these efforts will lead to enhanced counter- narcotics operations, greater safety for both small and large vessels, and reductions in maritime crimes. Interagency Operations Centers/SeaHawk The Interagency Operations Centers (IOC) Project--initiated in response to the requirements of the Security and Accountability for Every (SAFE) Port Act of 2006--has tremendous potential to ensure that our ports are both efficient and secure, and dovetails with one of my major priorities as Secretary: facilitating productive partnerships with state and local government. DHS plans to deploy the first piece of the IOC project, information integration and management software known as WatchKeeper, Segment 1, to all locations by the second quarter of Fiscal Year 2011. This time- frame that allows for the improvement of the project through more operational testing and refinement. As scheduled, on October 1, 2009, the Department of Justice pilot ``Project SeaHawk'' in Charleston, South Carolina was transferred to DHS. The President's FY 2010 Budget provides funding to support the continued operation of IOC Charleston. SeaHawk provides a collaborative, unified command-based work environment to coordinate vessel and intermodal transportation screening targeting in the Port of Charleston. This successful program has received important support from local jurisdictions as well as from Congress. Using SeaHawk as an example, the construction of an IOC in San Francisco is already underway, and plans are under development to expand the model to New Orleans and Houston-Galveston in the future. We are also bolstering efforts among DHS components in order to facilitate this interagency model. In March 2009, Customs and Border Protection (CBP) and the Coast Guard entered into a formal agreement to cooperate on the development and deployment of all aspects of the IOC Project and the Secure Border Initiative (SBI). In addition, Coast Guard Sector Los Angeles/Long Beach is being used as a test site to collaborate with DHS Science and Technology to provide mature technology to the IOC Project. Transportation Worker Identification Credential (TWIC) Program The successful rollout of the Transportation Worker Identification Credential (TWIC) at Maritime Transportation Security Act (MTSA)- regulated facilities and vessels across the country is a direct result of tremendous coordination and preparation by the maritime community with the Department, the Coast Guard, and TSA. DHS components are working every day to implement the TWIC program in a number of ways: To date, DHS has conducted checks for and issued over 1.3 million TWICs nationwide. Today, all credentialed merchant mariners and transportation workers who are seeking unescorted access to secure areas of MTSA-regulated vessels and facilities are required to undergo a security threat assessment and receive a TWIC. The Coast Guard is conducting visual TWIC verification checks as part of annual compliance exams and security spot checks and will soon deploy mobile handheld readers to its inspection field personnel. In addition to reader capabilities being tested by the Coast Guard, a comprehensive TWIC Pilot program is currently underway at various facilities and vessels operations around the country. Laboratory reader tests are largely complete, and 19 readers are approved for use in the pilot. We anticipate a ramp-up of reader installations and installation at all pilot ports January through July 2010, and we are also seeking to augment pilot data by including additional facilities outside those facilities designated as official pilot participants. It is clear that Congress intends for the TWIC Program to use electronic readers to further leverage the security benefits of the program; our goal is to maximize the information learned from the pilot and stakeholder involvement in the rulemaking process. The excellent cooperation among DHS components on TWIC has yielded significant efficiencies. The Coast Guard and TSA established an exchange process that validates whether workers hold a valid TWIC prior to being issued a Merchant Mariner Credential, yielding an estimated $9 million in cost savings over 5 years, starting in FY 2010. The U.S. Coast Guard Over the past year, the men and women of the U.S. Coast Guard have continued their exemplary service ensuring our waterways are secure, both in the interior and along the coasts of the United States and throughout the world. In order to ensure our Coast Guard personnel are able to continue this excellent service, we must procure safe, reliable, and capable equipment and infrastructure for them. Fleet Modernization The Coast Guard's readiness is continually threatened by a reliance on assets, systems, and shore infrastructure that are outdated and rapidly becoming less reliable. The cost of operating major cutters is increasing, while the availability of these cutters continues to decline because of an aging fleet that continually needs repairs. This phenomenon has a direct impact on the Coast Guard's ability to execute its mission. Shortages of parts have caused aircraft availability to dip below the Coast Guard's 71 percent target. During the past 12 months, major unexpected repairs for Coast Guard aircraft and cutters have cost the Coast Guard more than $60 million and resulted in a total loss of over three cutter-years of operational time. Long deferred maintenance backlogs also continue to grow. The Coast Guard has gotten the most out of its aging fleet, but is now being forced to make difficult financial and resource-management decisions to buy down risk in the most critical areas. To overcome these challenges, the Coast Guard must continue efforts to modernize assets and recapitalize its major cutter fleet. In particular, the National Security Cutter, a replacement for the High Endurance Cutter class, is pivotal to ensuring effective enforcement of immigration and narcotics laws. The Response Boats-Medium (RB-M), the replacement for the USCG's disparate collection of mid-size boats, is already underway and the Maritime Patrol Aircraft (MPA) is already proving its operational value on the Gulf Coast. Acquisition Reform Improving acquisition across the Department is a major priority and in the years ahead. These changes will ultimately improve the efficiency and effectiveness of the Coast Guard and the Department. The Coast Guard, specifically, has consolidated acquisition activities and adopted a blueprint for acquisition reform that make the USCG better equipped to manage costs, schedules, and performance. Additionally, in the past year, Coast Guard established the Aviation Logistics Center, Surface Forces Logistics Center and Asset Project Office, all of which have improved critical support services to operational assets Coast Guard-wide. Moreover, the Coast Guard has endeavored to improve its recruitment, development, and retention of a highly qualified acquisition workforce to ensure we are maximizing the use of taxpayer dollars. Because the Department and Coast Guard have focused on ensuring the appropriate training, skills, and career progression for the USCG acquisition work force, we are seeing positive results. For example, all Coast Guard acquisition projects over $1 billion are now led by DHS Level III-certified program managers (the highest level), a major change from only a few years ago. The Coast Guard's Human Capital Strategic Plan outlines further initiatives through which the USCG will continue to strengthen its acquisition work force. DHS Efforts to Combat Cybercrime DHS continues to work extensively with other nations, Federal agencies, state and local law enforcement, the private sector, and our Nation's research and development infrastructure to secure America's cyber networks from a range of threats, including cybercrime. Let me be clear: cybercrime is an evolving and growing threat to our Nation right now, and the Department is working hard to protect the American public, our businesses, and our financial infrastructure from this threat. Law Enforcement Actions and Partnerships Against Cyber-Crime Network intrusions can be devastating to both businesses and individuals. Data theft and loss of customer information to any size company can have serious effects to that business. More often than not, those who suffer the most severe consequences are small or medium-sized companies. These companies often lack the resources or expertise necessary to properly protect their networks and data. Our efforts must become more nimble, and law enforcement agencies must be able to adapt to emerging technologies and criminal methods. Cyber-criminals operate in a world without borders. They can traverse multi-national and multi-jurisdictional boundaries, and the nature of cybercrime cases is becoming more complex. Our response to the growth in cybercrimes and the increasing level of sophistication of this type of threat demands a fully collaborative approach. The U.S. Secret Service has adopted a multi-faceted approach to aggressively combat cyber and computer-related crimes. The Secret Service provides necessary computer-based training to enhance the investigative skills of special agents through the Electronic Crimes Special Agent Program and leads 28 Electronic Crimes Task Forces that collaborate with other law enforcement agencies, private industry, and academia. These approaches exemplify the integrated model that is necessary to combat this threat. The Secret Service works through its Criminal Intelligence Section to identify and locate cyber-criminals and provides state and local law enforcement partners with the necessary computer-based training, tools, and equipment to enhance their investigative skills through the National Computer Forensics Institute. Through international field offices, the USSS maximizes partnerships with international law enforcement, and it uses the US- CERT Liaison Program at Carnegie Mellon University to maximize private- sector support and public outreach. Outreach to the Private Sector The mission of securing the Nation's cyber networks requires active dialogue, collaboration, and information sharing between the public and private sectors. Because so much of our Nation's critical infrastructure is in private hands--including our financial infrastructure--it is critical that private entities and the American public know what cybersecurity means for them. DHS has a number of cybersecurity partnerships underway with the private sector. The Department conducts many of its activities through the Critical Infrastructure Partnership Advisory Council (CIPAC) structure. CIPAC is organized under the National Infrastructure Protection Plan (NIPP) framework to facilitate effective coordination between government infrastructure protection programs and the infrastructure protection activities of the owners and operators of critical infrastructure and key resources (CIKR). To secure critical infrastructure, the NIPP relies on the sector partnership with the Federal Government. This includes Information Sharing and Analysis Centers, technology and service providers, Sector Coordination Councils, specific working groups, and partners from across the 18 CIKR sectors. Recent distributed denial-of-service (DDOS) attacks illustrated how government and industry work together to share information. During the attacks, the National Cyber Security Divisions (NCSD), United States Computer Emergency Readiness Team (US-CERT), the National Communications System (NCS), and the National Coordinating Center for Telecommunications (NCC) partnered very well across government and with the private sector to collect information, to understand what was happening, and to share that information with stakeholders--leading to a swift and effective response. The Department is developing a National Cyber Incident Response Plan. This is an interagency effort in cooperation with state, local, and private sector partners to define the cyber incident roles and responsibilities across all sectors. The Department has also launched the National Cybersecurity & Communications Integration Center (NCCIC), a consolidated 24-hour watch and warning center, to improve coordination between Federal and private sector operations centers. The NCCIC brings together interdependent missions of the NCS, NCSD, US-CERT, NCC, Office for Intelligence & Analysis (I&A), National Cybersecurity Center (NCSC) and the private sector to prepare for, respond to and recover from threats to the Nation's IT and communications infrastructure. Indeed, while DHS works closely with the private sector to share information and to respond to incidents, the private sector also plays another important role. It possesses a great deal of technology and expertise that can help the government in secure its own systems. A vital private-sector partnership can further the development of comprehensive, innovative solutions that improve and expand our Nation's capabilities and keep us ahead of emerging cyber threats. DHS is working with industry to find these solutions. Expanding these partnerships is one of my major priorities as the Department works to secure our Nation's networks from a range of cyber threats. The Recovery Act and Strengthened DHS Efforts Finally, I would like to describe to the Committee how the American Recovery and Reinvestment Act has provided critical funds to DHS components that are strengthening our security efforts, facilitating travel and trade and stimulating the American economy. Congress appropriated $1 billion to TSA to procure and install explosives detection systems and checkpoint explosives detection equipment for checked baggage at airports. TSA will expend around $700 million of these funds to accelerate the modification of existing checked-baggage inspection systems to ``in-line'' baggage handling systems. TSA will also use around $300 million for its Passenger Screening Program to install upgraded screening technologies at more passenger checkpoints. Furthermore, the Recovery Act provided $680 million to Customs and Border Protection and the General Services Administration for greatly needed improvements to aging infrastructure, and for the addition of new technology at our Nation's borders.\5\ These funds support a wide range of activities related to improving our antiquated port infrastructure: the planning, management, design, alteration, and construction of CBP-owned land ports of entry; procurement and deployment of non-intrusive inspection systems; expedited development and deployment of border security technology on the southwest border; and the procurement and deployment of tactical communications equipment. --------------------------------------------------------------------------- \5\ It is important to note that most of the CBP-owned ports of entry are on the northern border, while the General Services Administration controls the facilities of most of the ports on the southwest border. CBP owns 39 northern border ports and four southwest border ports. --------------------------------------------------------------------------- Finally, the Recovery Act provided $98 million to the Coast Guard in order to support shore facilities and aids to navigation, as well as to repair, renovate, assess and improve vessels. Of this funding, $88 million will be used for the construction, renovation, and repair of vital Coast Guard shore facilities. The remaining $10 million will help address the needs of the aging High Endurance Cutters. Conclusion As you can see, the Department of Homeland Security is moving forward in strong, strategic directions to improve the security of our Nation. Developing smart, strategic ways to secure our country will make our efforts more effective. Improving the security of our transportation sector--air, land, and sea--our supply chains, and our cyber networks will help ensure they continue to be engines for our Nation's economic prosperity. Chairman Rockefeller, Senator Hutchison, and members of the Committee: Thank you for this opportunity to testify today. I am happy to take your questions. The Chairman. Thank you very much, Madam Secretary. Let me start out with a relatively small thing, but which is--seems to be very fixable, and we can be a part of that. The drug trade is transporting enormous amounts of cash via vessels on the high seas since our money laundering laws were tightened, post-9/11. I understand, from the Department of Justice--and they had a big conference on this fairly recently, and there was a general agreement that we need to tighten up laws so that we can prosecute. We cannot prosecute, at this point. And so, what I'm asking is that--if you agree that existing laws are insufficient in order to prosecute these criminals, and have you evaluated the threat with the Department of Justice? And do you need additional authority, and can we help with additional authority, so that these criminals can be prosecuted? Secretary Napolitano. Mr. Chairman, I think that, in that connection, I would defer to the Department of Justice, who would have the actual prosecutorial responsibility. But, I would inform the Committee that we have seen an uptick in cash going, by sea, that is being used in the drug trade, proceeds of the drug trade; also, drugs coming in by sea. That may be an indicator that many of the measures we're taking at the land border, particularly the Southwest border, are having an impact, because we are now inspecting so much more of the southbound lanes than--way more than ever previously. And we have dog teams, in fact, down at the Southwest border, that are trained to sniff out bulk cash that would be going south into Mexico as the proceeds of the drug trade. So, if there's any good news there, it may be that we're forcing these drug cartels into the ocean. The Chairman. All right. Well, then---- Secretary Napolitano. The answer is yes. The Chairman. --yes. That's what I wanted. Just one more, and then we'll proceed. Protecting the Nation from security risks posed by nearly 13 million small vessels. I just--I had no idea that there were 13 million small vessels that exist-- is, you know, an absolutely monumental task. There are parallel security threats in the general aviation sector, which I have mentioned, which has been long unaddressed as a matter of vulnerability in our aviation industry. So, I want you to respond to that. I understand that you and Admiral Allen are preparing a revised small-vessel security strategy. When will that be finished? That's one question. It's my understanding that DHS has a number of related, but not coordinated, programs to address small-vessel security. How will you integrate these multiple programs into one comprehensive, layered security approach? Secretary Napolitano. The answer to your question is, the small-vessel strategy--the revised strategy--will be available by the beginning of 2010, so we're well along. We've incorporated comments from the small-vessel community. We are integrating it into our strategy, in particular, for how we secure the ports. And, Senator Hutchison, you mentioned the ports in Texas and other ports. And again, we get to that theory of the layered-risk approach, measuring risk layering of various things. But, for example, having different checks and-- as vessels enter the ports, particularly some of our larger points--ports, are some of the mechanisms that we're now using. The Chairman. All right. And you have the American Waterways Watch. You have the Citizens Action Network, Pleasure Boat Reporting System. Is--and it's all voluntary, of course-- is that in any way helpful? Secretary Napolitano. Those are helpful, yes. The Chairman. But insufficient. Secretary Napolitano. I think we need an overall strategy, and we need to continue to work on the small-boat issue. I would not sit here today and tell you we have solved that problem. The Chairman. I thank you. And--Senator Hutchison. Senator Hutchison. Thank you, Mr. Chairman. Let's start on the collective bargaining issue. What is your view about the effort to have collective bargaining among the Transportation Security Administration screeners and personnel? Secretary Napolitano. Thank you, Senator. I think that we can accomplish collective bargaining, and also do that in such a fashion that we never, at one moment, sacrifice any whit of security, that that can be built into any collective bargaining agreement. By the way, I'd like to thank the Committee for supporting the nomination of Erroll Southers to be the head of TSA. Obviously, he would have a point position on that particular issue. Senator Hutchison. And what would be the safeguards? Secretary Napolitano. Well, you can---- Senator Hutchison. I mean, I mentioned earlier and addressed that the slowdowns, the sickouts, that sort of thing could have terrible consequences on our security. So, what would you do to protect the traveling public from this kind of diminishment of capability if there were collective bargaining? Secretary Napolitano. Senator, now--I speak now as a former Governor and a former State attorney general--there are examples, around the country, of collective bargaining agreements with law enforcement agencies that have similar responsibilities, where you have carve-outs, in effect, in the collective bargaining context, to make sure that those types of things are not part of the collective bargaining agreement. We would anticipate, in this context, with the TSOs, that we would be able to reach such an understanding. I will say, by the way, that I worked as a TSO screener last Wednesday, the busiest travel day of the year, and got a little bit of insight into what their life is like on the line. And I also saw a lot of different kinds of shoes. [Laughter.] Senator Hutchison. Well, let me say, Madam Secretary--I appreciate that--and I think they're doing a great job, because, of course, we all travel so much, and I--I think they are doing a great job. But, what about the need for flexibility? When there is a threat, a crisis, where you have to do something very quickly, is that on your agenda for protection, as well, if you're going to go into collective bargaining, where someone can be called, they can work more than the established number of hours? Do you have that kind of flexibility? And are you going to use it? Secretary Napolitano. Well, the answer is yes, but I would give you an example. Even without a collective bargaining agreement right now, our TSA employees have been very eager to, whenever we've had an emergency and we need to, for example, bring more people down to help staff an airport in a hurricane, when the people who work there have to stay home and work with their families because their house has been destroyed or whatever, and we have never had a problem, in my experience, with employees being willing to move to a place where a crisis is occurring. Senator Hutchison. Well, this is something that we will want to watch very carefully, because I think it has some pretty strong consequences if it's done, and if it's not done right. Let me ask one more question, and then I will be finished, for this round. Guantanamo Bay detainees being tried in New York, we all know that the decision has been made to do that. I have two questions. Number one, were you consulted about the security issues that would surround such a trial, before the Attorney General made that decision? And second, are you going to take extra measures, during that trial, to protect the traveling public while that is going on in New York? Secretary Napolitano. Well, the Department of Homeland Security is part of the review team that President Obama established in connection with closing the prison part of Gitmo--not all of Gitmo, but where the detainees are. And the answer is, that we have been working on a host of security issues, and I would anticipate we will be working, not just with DOJ, but also with the City of New York as they prepare for the trials. Senator Hutchison. So, were you consulted in the beginning, before the decision was made to bring them to New York for trial? Secretary Napolitano. I was not--not in the sense of being consulted as to whether security concerns would preclude the ability to try them in New York, but I'm very comfortable with the decision to try them in New York. Senator Hutchison. Thank you, Mr. Chairman. The Chairman. Thank you, Senator Hutchison. Senator Lautenberg. STATEMENT OF HON. FRANK R. LAUTENBERG, U.S. SENATOR FROM NEW JERSEY Senator Lautenberg. Thank you. Secretary Napolitano, we are very comforted by the fact that you're in charge there. You come with a great record of public service, and you've shown a firm hand since you're here. So, with that, I ask--2 years ago, Congress acted to require 100-percent scanning of all shipping containers. Now, one of the things that we know is that the--our only threat is nuclear, obviously. The worst attack we've had on American shores was not nuclear, but it was devastating. So, we've got lots of places to look. Threats don't only exist in containers, as you have noted. Can--do we see any concrete improvements in cargo scanning that had been made since January of this year? Secretary Napolitano. Well, Senator, I would point to at least two. One is, is that at the end of January of this year, the so-called ``10-Plus-2'' interim rule went into effect. And I look forward to this January, where we will see even more compliance with that rule. This is a rule that really provides shippers to provide more advance information about what is in a container, who's had access to it, who's packed it, and the like, that we can then use and evaluate against a number of risk measures that CBP now has. And in addition, we have seen our ability now, with--particularly with ARRA money and some other of the monies that the Congress has supplied, an ability to buildup even more on some of our port security. And that has occurred since the beginning of the year. Senator Lautenberg. Let me ask you this. Since the task of securing 100-percent scanning is so monumental, is there a linear approach that says, ``Let's look to those ports that come under most concern,'' they're--I'm sure they're--that we have identified those, would we not? And--but, also, one of the things that I'm--I look at--I'm Chairman of the Transportation--Surface Transportation Subcommittee, and when we look at where we have to be concerned, we've got to look at mass transit, passenger rail, frequent targets of terrorist attacks. Last week, a terrorist bombing of a Russian train resulted in the loss of 26 lives. But, those threats have not influenced our transportation security efforts to the level that, frankly, I think ought to be required, in terms of balance. What steps are being taken now by the Administration to protect those millions of Americans who daily travel by mass transit or passenger rail service? Secretary Napolitano. Well, Senator, I'd like the opportunity to provide you with a more detailed answer in writing, because a number of steps have been and are being taken from the deployment of grant monies to localities that operate mass transit--buses, you know, those sorts of things, streetcars and light rail and the like. I think, in terms of grants, in 2010 Congress appropriated $300 million for that purpose, and then the Recovery Act added another $150 million in FY-2010 and those grant monies are being deployed. I think we are also deploying a number of portable monitors, more transit officers, in particularly in large transit hubs; in addition, we have deployed behavioral detection officers under the so-called SPOT program--to give you just an indication of a few of the things that are happening in the land transportation environment where passengers are involved. [The information referred to follows:] TSA has established a five-pronged strategic approach to surface transportation:Protect High Risk Assets and Systems; Elevate the Security Baseline; Build Security Force Multipliers; Assure Information Flow; and Expand Partnerships for Security Enhancement. TSA is completing a comprehensive risk assessment for the rail sector, as required by Section 1511 of the 9/11 Commission Act, is being incorporated into TSA's Transportation System Security Risk Assessment (TSSRA), which considers a wide range of terrorist attack scenarios in each transportation mode and evaluates likelihood, vulnerability, and potential consequences. When complete, the TSSRA will provide the context for TSA to compare railroad risks with risks in other modes of transportation. The national strategies, also required by the 9/11 Commission Act, will be incorporated into the corresponding annexes of the upcoming update of the Transportation System Sector Security Plan (TSSSP). The TSSSP, a comprehensive unifying plan, will supersede separate interim strategies and plans for each mode of transportation. These two efforts are consistent with both the 9/11 Act requirement at section 1511 and a recommendation of the Government Accountability Office in its June 2009 report on mass transit and passenger rail security. TSA comprehensively assesses security in passenger rail through the Baseline Assessment for Security Enhancement (BASE) program, under which Surface Transportation Security Inspectors thoroughly reviews security posture against 17 Security and Emergency Management Action Items that are foundational to an effective security program. More than 120 BASE assessments have been conducted to date. Their results inform development of risk mitigation priorities, security enhancement programs, and resource allocations, notably transit security grants, and enable production and dissemination of a compilation of Smart Security Practices throughout the passenger rail community. Senator Lautenberg. We're out of time, but obviously there's a lot to talk about, and I will take the liberty of inviting you in so that we can have a discussion of some of the issues. And I appreciate your---- Secretary Napolitano. Right. Senator Lautenberg.--good service. Thank you. Secretary Napolitano. Yes. I look forward to that. Thank you, Senator. The Chairman. Thank you, Senator Lautenberg. Senator Isakson. STATEMENT OF HON. JOHNNY ISAKSON, U.S. SENATOR FROM GEORGIA Senator Isakson. Thank you very much, Mr. Chairman. Madam Secretary, first, two compliments. I want to thank you for the tremendous effort you and the Department and FEMA made in Georgia during the recent floods. I appreciate your flying down to Georgia and seeing firsthand--I have to tell you, the response of TSA has been--I mean, of FEMA's been fantastic, and we're very grateful. Second, we had an issue with approvals from your Department with regard to African landings by Delta Air Lines in a number of new locations which ran into a lot of difficulty, but, since that time, I want to thank you for the effort you've paid on that. I understand that things with regard to Angola and Liberia are moving along nicely. And there's another request that's coming--that's all the compliments; the next---- Secretary Napolitano. OK. Senator Isakson.--things are the questions. Secretary Napolitano. OK, now I'm ready. [Laughter.] Senator Isakson. Delta has announced it wants to fly into Malabo at Equatorial Guinea on the west coast of Africa, which is a gateway location. Equatorial Guinea has already issued an advance approval and is doing everything that's been asked of them, but they need assistance, not in terms of money, but in terms of the Safe Skies for Africa Program from FAA and TSA. And in a recent meeting in Atlanta, a TSA official announced that three African countries would get that assistance. I just want to urge you to make sure Equatorial Guinea is one of the three that gets the Safe Skies Africa assistance so that that can, in fact, take place as soon as possible. Secretary Napolitano. Thank you. Senator Isakson. And second, we talked a little bit, on the plane going to Georgia, about AirTran and a preclearance request they'd made in Aruba. As you know, in a number of places it's important for preclearance by Customs and Border Patrol so that people transferring back into the United States are cleared when they leave so they can land at a regular terminal gate and leave without going through Customs and Border Patrol or at the point they leave. That request was rejected, which I have been told--and I don't know this to be a fact, so it's not an accusation, it's a rumor--but, that's the first time preclearance has been rejected by TSA. I would like to ask you--Aruba is a tremendous source of travel back and forth, primarily vacation travel. Atlanta's Hartsfield is a huge point they leave from. There are already 20 to 24 flights on each Saturday, which is the big travel day for tourism, and it would require a little extra personnel, on behalf of the Department, to make the preclearance possible. But, you already have 20 to 24 flights leaving during a 5-hour window on Saturday anyway, so I'd really like for that application to be looked at again, and see if there's anything we can do to facilitate that. Secretary Napolitano. Senator, we'll be happy to review that application again. Senator Isakson. And last, a question. With the US-VISIT program, we require biometrics, primarily in the form of fingerprints, which are validated when someone comes into the United States by air. It's my understanding that it's the third phase of the program that's getting ready to be announced, which will also require, at airports--when leaving the country--a revalidation of the fingerprint to ensure the person leaving is the person, in fact, that is supposed to be leaving, but that that's not going to be required at our seaports or at our border crossings with Canada and Mexico, on the ground. And 80 percent of the people that come to the United States come either by sea or by the Canadian border or the Mexican border, as I am told. Why would we not check at those borders, as well, when they leave, to validate that the person leaving is, in fact, the person we think they are? Secretary Napolitano. Senator, I'll get back to you, but let me just--my guess is--my educated guess is that, with respect to the Mexico and Canadian travelers, that the volume, in terms of number of passengers and number of lanes, is such that the logistics of employing that for the exiting visitors at those land ports would be prohibitive. And that's really the bulk of what we're talking about. So. Senator Isakson. Well, I appreciate the answer, and I appreciate your following up on both Equatorial Guinea as well as the Aruba AirTran flight. Thank you very much. Thank you, Mr.---- Secretary Napolitano. You bet. The Chairman. Thank you, Senator Isakson. Senator Pryor. STATEMENT OF HON. MARK PRYOR, U.S. SENATOR FROM ARKANSAS Senator Pryor. Thank you, Mr. Chairman. And, Madam Secretary, thank you for being here today. It's always good to see you and be with you. Let me ask a few questions, one about trucking; specifically, trucking with Mexico. There has been some news reports recently that have been critical of the Border Patrol's Customs-Trade Partnership Against Terrorism Program. And the gist of these news reports is that some Mexican gun and drug smugglers are actually using this program because it allows the trucks to get through the border quicker and, I guess, with less security. Are you aware of that? Have you--are you aware of those news reports? Secretary Napolitano. I'm not aware of those news reports. I am familiar with the C-TPATs program, however. Senator Pryor. Well, there has been some that basically are saying now that the cartels down in Mexico have figured out that that's a way to get things in and out of Mexico, so I just wanted you to be aware of that and maybe talk to your folks about, you know, how valid that is and if there's anything that Homeland Security needs to do to make sure that we minimize that type of activity. Secretary Napolitano. Oh, absolutely, because those are the kinds of programs--again, we're always looking, you know, to improve security, but we also have the responsibility to help trade and commerce---- Senator Pryor. Right. Secretary Napolitano.--move. And that is a particularly difficult balance to strike at our land ports. So, we will take a look at those news reports, Senator. Senator Pryor. Well, I agree--appreciate that. And I know that we have had some, you know, terrible news out of Russia in the last few days. And Senator Lautenberg asked about that. And it may be a little too early to have lessons learned, based on rail security and bombs on trains or on train tracks, but I would be interested to know, as you follow up with Senator Lautenberg, about, you know, what we can do better, and your assessment of how secure our rail system is in this country. Secretary Napolitano. Indeed. Senator Pryor. And another thing is, there has been some, let's see, DHS IG report that has looked at FEMA's use of four primary sourcing mechanisms: one is warehouse goods; two is mission assignments; three, interagency agreements, and four, contracts. And basically the DHS IG has said that FEMA does not have a clear overarching strategy that can guide decisionmaking on which of these sourcing mechanisms should be used to meet a particular need. Are you familiar with that DHS IG assessment? Secretary Napolitano. Senator, I'm familiar, generally. I have not read the IG report, but I can say with confidence that the current administrator of FEMA is addressing any and all concerns that have been raised by the IG, and he's doing it very rapidly. Senator Pryor. Yes, one of the concerns, I think, that's raised is that, in a disaster, we need to make sure that we can deliver the critical commodities needed in that locality. And I think it raises a question about that. And the other thing I had for you, generally, on that--in that same vein, is--I know one of the things that we've talked about in this committee previously, and in Homeland Security, as well, is trying to make sure that DHS and FEMA are working with local and State leaders, and doing a better job of coordinating with various industry groups, even like the trucking industry or the retailers, or whoever it may be, to try to make sure that we can all interconnect, when we need to, to get what we need done done at a critical moment. Are you comfortable, are you satisfied that we have been making progress there, and there's sufficient cooperation and communication? Secretary Napolitano. Senator, I think, and believe very strongly, that we have improved cooperation there quite substantially, both from FEMA itself and through the Office of Intergovernmental Programs. And it's everything from regular e- mails, conference calls, and all the rest. And that kind of cooperation, that linkage up with State and locals, is absolutely key, not just on the crisis management kinds of issues that FEMA is concerned with, but also with the national and homeland security issues that we also need to be working closely with State and locals on. So---- Senator Pryor. Right. Secretary Napolitano.--the answer is yes. And that continues to be a priority of ours. Senator Pryor. And, of course, that ties in with the H1N1 and other, you know, pandemic threats out there, to make sure we have that coordination, that preparation on the front end. Thank you, Mr. Chairman. The Chairman. Thank you, Senator Pryor. Senator DeMint. STATEMENT OF HON. JIM DeMINT, U.S. SENATOR FROM SOUTH CAROLINA Senator DeMint. Thank you, Mr. Chairman. And thank you, Madam Secretary, for your briefing and your service to our country. I want to focus just a few minutes on TSA workers, and just a few questions related to them that--I guess the group we're most exposed to, as Congressmen and Senators who fly all over the country; we're with them every week. But, do you believe the current labor policies of your agency adequately protects the rights and interests of TSA workers? Secretary Napolitano. Senator, we work hard with our employee workforce to address their issues and their interests. And so, we work hard with them on a whole host of things. Senator DeMint. Well, do you think an outside agency or group is needed at this point to help establish work requirements or staffing--standardize the staffing functions or actually help to prescribe how the workforce is managed? Secretary Napolitano. By ``outside groups,'' Senator, do you mean a union? Senator DeMint. Yes. Secretary Napolitano. Senator, as I mentioned to Senator Hutchison--and again, I go back to my experience as a Governor, as a State attorney general, my familiarity with---- Senator DeMint. Right. Secretary Napolitano.--these issues. The answer is that oftentimes in the process of interaction with the union, there are issues raised that management didn't have prior knowledge of, but, in any event, all the security-type issues can and are addressed. And security, for an agency like TSA, would always come first. Senator DeMint. Well, that's good to hear. And I've certainly seen, the collective bargaining work at the local level, when there's a close working relationship, but we're talking around 50,000 people, here, all over the country. What I've seen since we've implemented the Department of Homeland Security--as you know, in the beginning it was very controversial about unionization, collective bargaining. In fact, we had to suspend all that because there was a belief that, with all the collective bargaining agreements, we could not pull all the agencies together and do all the changes that were necessary. One of the good aspects of TSA has been their flexibility, their ability to change constantly and use a continuous quality improvement model, step by step, making changes. When you see the variety of airports and the different carriers and the different routes all over the country, the need for flexibility at almost every airport is key. That is completely inconsistent with the collective bargaining idea, where you're going to standardize various aspects of work requirements and the functions. I mean, how can unionization and collective bargaining enhance security at our airports? Secretary Napolitano. Well, Senator, the answer is, collective bargaining and security are not mutually exclusive concepts, and they're done--these types of agreements are negotiated all the time, all over the United States. And, as I said before, security always is our number-one interest at---- Senator DeMint. Well--but, the---- Secretary Napolitano.--the Department. Senator DeMint.--concern is--it's easier for us, as a Congress, to start a new agency than to try to get another one to change--a lot of times, because of collective bargaining agreements. So, it's--there's really no example of--up here, that--of the flexibility that would be needed. The types of changes and flexibility that I see continuously going on with TSA is certainly going to change, to a degree, if there is a third party involved in the decisionmaking, which there will be. There's no reason for collective bargaining if there's not some standardization or requirement to appeal to that third party when changes are made. But, my question to you is not whether or not you've seen it work at a State or local level, but the whole point of Homeland Security, and particularly TSA, is the security of the passengers. And if, in the beginning, in our debate--and every previous administrator of TSA has said that collective bargaining is not consistent with the flexibility and the need to change--you are telling us that you're going to collectively bargain, even though there's apparently no reason to protect workers, that there's not any reason to standardize various work requirements. Why do we need to bring collective bargaining into this process, when we see TSA making the improvements that it needs to, to make our passengers more secure? Secretary Napolitano. Well, thank you, Senator for noting the improvements of TSA and the employee workforce we have there. But, again, I'd go back to the basic point, that I do not think security and collective bargaining are mutually exclusive, nor do I think that collective bargaining cannot be accomplished by an agency such as TSA, should the workers desire to be organized in such a fashion. Senator DeMint. OK. Thank you for answering my question. Secretary Napolitano. Thank you. Senator DeMint. Yield back. The Chairman. Thank you, Senator. And now Senator Warner. STATEMENT OF HON. MARK WARNER, U.S. SENATOR FROM VIRGINIA Senator Warner. Thank you, Mr. Chairman. And thank you for holding this hearing. And it's great to see my former colleague, former gubernatorial colleague, Secretary Napolitano, and congratulations. And I'd echo some of my colleagues' earlier comments about the good job you're doing. I want to continue on another line of questioning with TSA. Circumstances happened in my State and, I believe, a number of other States, where airports, if they are going through renovations--in my particular State, the Richmond Airport went ahead, at the encouragement of TSA, when they were doing a renovation, and did a next-generation series of improvement of inline explosive detection equipment. And TSA said, ``Go for it. Do it.'' They went for it, did it, 3 or 4 years ago. TSA promised them a reimbursement of close to $4 billion--$4 million. They're still hanging out, waiting for this reimbursement. And this is not the only airport that's fallen into this circumstance. And I raised this with Mr. Southers, when he came by before his--when he was going through--and is still going through--the confirmation process. But, I just want to raise it again at the secretarial level, that there are--and that Richmond Airport is not alone in this circumstance, where airports, at the instigation of TSA, are going through, putting in next-generation detection equipment, and then if TSA doesn't honor their commitment to do the reimbursement, airports, on a going forward basis, are not going to take this kind of step that I think is necessary. Richmond went beyond what was required, kind of went to next-generation; they did it in a much more extensive way. And I just would ask your office to look into this circumstance. And the more we can get these dollars out so that airports get these commitments honored, would be very, very helpful. I don't know if you're familiar with this or have heard from other airports who have raised this concern, but---- Secretary Napolitano. No, Senator. No other airports have raised that concern, but I certainly will---- Senator Warner. If you could---- Secretary Napolitano.--look into it. Senator Warner.--look into it. It's--the Richmond circumstance has been now hanging out for a number of years. We found a series of other airports that--this was not a one-off circumstance, but it would be something I'd love to get some feedback on. Secondarily, I'm--again, on a parochial basis, and--but an airport that many of my colleagues fly in and out of, Dulles, where we went through an entire new passenger screening system, and put in that, but TSA staffing shortages still make it--we put in the new system; staffing shortages are there, so that folks are not being served in a timely manner. I don't know if that's kind of raised to your radar screen, as well, but I'd ask you to look into that circumstance, as well. When an airport goes ahead and upgrades their system, they've got to make sure they've got personnel to go along with that. Secretary Napolitano. Indeed. I'll be happy to look into that. Senator Warner. All right. One that--a final point I wanted to raise, and this is one that I know you would be--will be sensitive to, as a former Governor--perhaps not completely applicable, in terms of Arizona--but, one of the things, in terms of vessel escorts, you know, the Coast Guard has been successfully partnering for a number of years with State and local law enforcement to do vessel escorts as we've come into ports. I know, in our major port, in Port of Hampton Roads, the port down in Norfolk, literally 60 percent of the vessel escorts have not been provided by the Coast Guard, but have been provided by State and local law enforcement as transports come in. State and local governments are under enormous financial stress. And I'm just hoping that if this kind of ratio is maintained, not only at Norfolk, but at other ports around the country, that next year's financial budgets at most State levels are going to be even worse than the last couple of years, as you, I know, are well aware. My hope would be that there could be some level of financial support still given to the State and local areas that are clearly doing part of what would normally fall within the Coast Guard's responsibility, to make sure that this very successful Federal/local--Federal/State/local partnership, in terms of vessel escorting, is maintained. Secretary Napolitano. Senator, yes, I'll be happy to flag that, as well. That activity may already be covered under some of our existing grant programs, but I'll flag it as a concern. Senator Warner. We've heard concerns from, again, our local folks, that they may be concerned--that they're not sure, if they get cutbacks in their local and State budgets, that they're going to be able to maintain this kind of partnership. And that would be to the detriment of all of us. So, I appreciate your attention. And again, thanks, to the Chairman, for holding this hearing. The Chairman. Thank you, Senator Warner. And Senator Brownback. STATEMENT OF HON. SAM BROWNBACK, U.S. SENATOR FROM KANSAS Senator Brownback. Thank you, Mr. Chairman. Secretary, welcome. Good to see you here. Look forward to continue working with you on the NBAF facility. Got through this year, and we'll be focusing on next year and continuing that program to build it and to get it up and running. It seems like, to me, the type of hearing that we're doing now lends itself to that much more credence for a program like that, where you're trying to protect domestic industry and do the research that's necessary to be able to protect against bioterrorism, agroterrorism, and some other facilities and things. I want to direct your attention to general aviation, if I could. It's one of the main legs of the Kansas economy. It's really been decimated lately, with this economy. Hopefully, it's starting to come back a little bit. The industry is very concerned about how it is, then, you regulate general aviation, and whether or not you're going to do it in such a fashion that it can no longer really provide the service that it needs to. GA flies all over--90 percent of the airports don't receive commercial flights; they only are reached by general aviation. And so, there's a real convenience factor, and there's a need; and yet, if it's over-regulated at a point that they can't provide that service in a small airport somewhere simply because of cost--it's cost prohibitive--it shuts it down and it makes it less viable. I know you're aware of this. In October 2008, there was a proposed rulemaking by TSA on the creation of a large aircraft security program intended to strengthen GA security. There was a strenuous reaction from general aviation on that. I think---- Secretary Napolitano. That would be an accurate characterization. Senator Brownback. Good, I'm glad you got the message, because they were deeply concerned about it, at a time when, already, their sales and problems were mounting, and they constantly say to me, ``Just don't kill us. OK? I mean, yes, we need to address security--and we will work with you on common- sense things we can do.'' They've put forth, already, seven areas of suggested improvements for that rulemaking: identification of appropriate weight threshold is one that's key to them; possibility of a ``trusted pilot'' card, if you can look at that and review in it; review of passenger watch lists matching procedures; and prohibited items--that's another one. They've got several others, but--the thing they need is to have balance. Security is the key thing, and we've got to provide the security, but if you do it in such a fashion that they just can't cost comply with it, you're just going to shut down a bunch of airport services, because they just don't have the ability to match the cost of the security with providing the service. There's only so much freight that it can carry. And I really hope you can work with the general aviation industry on this, because it's just--they view it as life and death to them on the industry in the United States, whether or not they're going to be able to continue to serve 90 percent of the markets that don't have commercial aviation. I don't know if you have any thought or response to that. I would appreciate your thoughts on it. Secretary Napolitano. Well, yes--and this was an area, actually, the Chairman pointed out in his opening comments--it has been, in a way--when we look at vulnerability, risk threat, general aviation is a concern that an aircraft could be weaponized or used to bring something into the country. In terms of that, the comments that we have received from GA have been very useful. We have been working very closely with that community. We've also been doing some reexamination of the modeling that was used, for example, on the weight threshold. The concern there, quite frankly, is, What is the weight by which, if an aircraft were to be flown again into a building, weaponized, how much fuel would be necessary to cause a building to implode, as we saw, tragically, on 9/11? So, they've been looking at remodeling on that, and taking into account some of the concerns or information brought forth by the GA community. Also, how do you regulate who gets to fly these aircraft around the country? Because of the possibility of bringing in material that would be of danger. So, I think that working with the GA community, taking into account their legitimate concerns about the industry and the airports and the transportation needs of the country, but also taking into account the very significant security issues, we're hoping to get to the right place. Senator Brownback. We need you to work with us, if you can, because it's an industry that's very dependent upon sensible regulations that can work, but still let the industry be able to fly. Secretary Napolitano. Indeed. Senator Brownback. Thanks. Thanks, Chairman. The Chairman. Thank you, Senator Brownback. Senator Snowe. STATEMENT OF HON. OLYMPIA J. SNOWE, U.S. SENATOR FROM MAINE Senator Snowe. Thank you, Mr. Chairman. And welcome, Secretary Napolitano. In fact, one of my staff people witnessed your work at TSA firsthand, as a screener. They said you did an excellent job. Secretary Napolitano. Thank you very much. [Laughter.] Senator Snowe. I would like to address the issue of air cargo screening. I know that the deadline for reaching 100 percent of screening of air cargo is scheduled for August of 2010. And I'd like to have your reaction to the report issued last week by the Department's Inspector General concerning air cargo screening, because raises some significant issues, particularly with respect to securing air cargo. At this point, your Department has said that more than 50 percent of air cargo has been screened. Is that correct? Is that the figure being screened? Secretary Napolitano. That is correct. Senator Snowe. Because it wasn't clear in the Inspector General's report as to whether or not that had reached the 50- percent level. They also talked about the fact that there are insufficient, or lack of, background checks or training with respect to the personnel handling or accessing that cargo. The report also indicated--but didn't give the number of--drivers were handling or transporting air cargo without the required background checks; the IG also reviewed the drivers' records and identified that 23 percent did not satisfy the required training and testing requirements. So, have you had a chance to review this report? Secretary Napolitano. I have not personally read the entire report. I've read the summary of the report. I've met with TSA about the report, as well as other members of my staff. Many of the recommendations, or many of the concerns, raised in it are things that we are working on right now. And I'll be happy to provide you with kind of a progress report as to where we stand, Senator. [The information referred to follows:] Department of Homeland Security--Office of Inspector General Security of Air Cargo During Ground Transportation (Redacted)--November 2009 Appendix B--Management Comments to the Draft Report U.S. Department of Homeland Security, Transportation Security Administration, Arlington, VA, October 5, 2009 INFORMATION MEMORANDUM FOR: Richard Skinner Inspector General Department of Homeland Security FROM: Gale D. Rossides Acting Administrator SUBJECT: Draft Report: ``Security of Air Cargo during Ground Transportation,'' July 2009 Purpose This memorandum constitutes the Transportation Security Administration's (TSA) formal agency response to the Department of Homeland Security (DHS) Office of Inspector General (OIG) draft report; ``Security of Air Cargo during Ground Transportation'' dated July 2009. Background The Office of the Inspector General conducted this investigation to evaluate the effectiveness of TSA's efforts to secure cargo while it is handled or transported on the ground, prior to being shipped on passenger aircraft. OIG found that TSA's inspection process has focused on quantity rather than outcomes and ensuring corrective actions. Automated tools to assist inspectors in analyzing results and focusing their oversight efforts on high-risk areas in air cargo security were not adequate. OIG makes six recommendations to strengthen the security of air cargo ground transportation. Discussion The Implementing the Recommendations of the 9/11 Commission Act of 2007 requires TSA to establish a system for industry to screen 100 percent of cargo transported on passenger aircraft in the United States to provide a level of security that is commensurate with the level of security for the screening of passenger baggage. The legislation also set an interim milestone of 50 percent screening to be reached by February 2009. By August 2010, cargo not screened in accordance with TSA-approved processes and procedures cannot be uplifted to a passenger aircraft in the United States. This is an extensive requirement and, TSA understands there is simply not sufficient capacity or space in airports to meet its demands without carrier delays, cargo logjams, and increased transit times. Therefore, TSA has established a multi-dimensional strategy to reconcile the requirements of the mandate, the security needs of passengers, and the needs of a U.S. economy reliant upon the air cargo industry. In addition to TSA's existing security regime, we have established three programs to assist in meeting the 100 percent screening mandate and have made excellent progress: 100 Percent Narrow-Body Screening--100 percent of cargo uplifted on narrow-body passenger aircraft has been screened since October 2008. This program accounts for 96 percent of passenger flights originating in the U.S. and its territories, and covers approximately 25 percent of the cargo uplifted in the US. The Certified Cargo Screening Program (CCSP)--A voluntary program designed to enable certain vetted, validated, and certified facilities to screen cargo prior to delivering the cargo to the air carrier. To date, the majority of air cargo screening is done by air carriers through CCSP. TSA has certified 477 cargo screening facilities through the program. An interim final rule to accelerate the deployment of the program was published in the Federal Register on September 16, 2009, and will take effect on November 16, 2009. During initial deployment of CCSP, the onsite facility assessment has been performed by a TSA Field Team staff. TSA expects that during full rollout, assessments will be performed by a TSA-approved validation firm. Indirect Air Carrier (IAC) Screening Technology Pilot--an initiative established to test screening technology in a live environment. Participants in this program are working directly with TSA to provide information and data on cargo, commodity- types, and a certain cargo screening technology. Information collected from this pilot will impact future TSA decisions on acceptable screening technologies. There are 91 participating locations receiving approximately $40.6 million in technology assistance. TSA Explosives Detection Canine Programs--TSA certified explosives detection canine teams are available to screen cargo throughout the network. 465 law enforcement partner canine teams devote a part of their time to screening cargo; 6 additional teams will graduate in Fiscal Year (FY) 2009. 84 TSA proprietary canine teams are fully dedicated to screening cargo. 36 more teams are authorized and planned for deployment in FY 2010, 19 of which have been hired and are currently in training. TSA agrees that access control is a vital part of air cargo security. In addition to our operational oversight, we will continue to work to address access control vulnerabilities through clear policy requirements for securing air cargo while it is being stored, sorted, screened, and transported. We are in agreement that the concerns that have been identified with the agency's security threat assessment process should be addressed, and we are providing more guidance and tools to standardize training. TSA's Office of Security Operations (OSO) FY 2010 Regulatory Activities Plan (RAP) incorporates a risk- based approach to inspections. In FY 2009, OSO Air Cargo Compliance has continued to perform Quality Control (QC) and review audits of Performance and Results Information System (PARIS) entries submitted by field elements. Last, TSA will provide cargo inspectors with automated tools that will allow them to dedicate more time with regulated entities. Overall, we believe that the recommendations contained in the report will provide additional benefit to TSA. TSA has already begun to formulate plans to implement the recommendations contained in the report. Our specific response to each recommendation follows. Recommendation #1: Mitigate access control vulnerabilities by: a. Requiring more tests for access vulnerabilities and provide corrective actions to the regulated entities; b. Placing more focus on entities that are not following the access control requirements; and c. Requiring inspectors to spend more time promoting awareness of access control vulnerabilities and their impact on cargo security. TSA Concurs: TSA agrees that access control is a vital part of our layered approach to air cargo security. a. TSA's Office of Security Operations (OSO) intends to incorporate additional access control testing protocols in the FY 2010 Regulatory Activities Plan (RAP). The RAP is the basis for a Transportation Security Inspectors (TSIs) annual work plan. These additional tests will augment the current system in place. OSO will continue to inspect drivers on their training and knowledge of their security functions. Inspectors verify compliance with TSA's access control requirements during all comprehensive inspections. In addition, TSA performed a special emphasis inspection (SEI) during FY 2009 Q2 specifically concentrated on access control. The objective of this SEI was to determine, through realistic testing, if foreign air carriers, aircraft operators, and indirect air carriers (IACs) properly control access to cargo as required under transportation security regulations in 49 Code of Federal Regulations (CFR) and appropriate cargo security programs. Aircraft operators, foreign air carriers and IACs must prevent unauthorized access to cargo in accordance with 49 CFR Sections 1544.205*), 1544.228, 1546.205*), 1546.213, 1548.5, and 1548.15. Additionally, specific requirements regarding access control for employees or authorized representatives are outlined in the applicable cargo security programs. The SEI protocol stipulated that all instances of non-compliance receive a formal investigation. Cases could be resolved with either administrative or civil penalty action. Counseling alone could not be used as a means to close any violations discovered. Finally, SEI results are being used to identify trends in vulnerabilities, assist in identifying corrective measures (e.g., policy or operational), and formulate additional access control testing protocols. b. TSA is working with our partners to identify new access control mechanisms. Through partnership with outside vendors we are exploring new conveyance security technology. For instance, TSA has authorized a pilot at Detroit Metropolitan Wayne County Airport called M-lock. The M-lock is an electronically serialized locking mechanism which TSA is testing as a tamper evident seal. This device is equipped with programmable specific serial numbers which are displayed on an LED screen with GPS tracking capability, thereby providing enhanced conveyance-level security to Certified Cargo Screening Facility (CCSF)-screened cargo.Currently, TSA is conducting Cargo Vulnerability Assessments at all Cat X and Cat I airports. TSA is committed to mitigating these vulnerabilities. Vulnerability assessment results are being used to improve policy and operational procedures. In addition to our operational oversight, TSA has worked to address access control vulnerabilities through clear policy requirements for securing air cargo while it is being stored, sorted, screened, and transported. Entities participating in the Certified Cargo Screening Program (CCSP), for instance, have strict facility and conveyance access control procedures that include physical security measures (e.g., fences, cameras), employee identification media, chain of custody technology applied to the screened cargo, and secured conveyances (e.g., locked, sealed, or vehicles under escort). c. As of the date of this report, TSIs have conducted over 2,060 outreach efforts directly related to air cargo security. TSIs currently spend a significant portion of time providing outreach to Indirect Air Carriers and CCSFs both prior to their becoming certified and after. Prior to an IAC becoming approved, they must submit to a TSI Outreach visit. During this visit the TSI reviews all requirements of the applicable Code of Federal Regulations and the Standard Security Program itself. This includes ground movement and access control to air cargo. TSIs review the facility and trucks to determine if in their current state, they would adequately be able to meet requirements. If not, the TSI will work with the entity to achieve the appropriate level of ground movement and access control security prior to approval. In regard to CCSFs, TSA also has a lengthy application process that requires constant interaction and outreach provided by Principal Cargo Security Analysts (PCSAs). These TSA personnel work with an entity to help them achieve the required security level through outreach and education. A CCSF must be ``certified'' by a PCSA prior to entrance into the program Recommendation #2: Improve the security threat assessment process by: a. Requiring regulated entities to maintain copies of documents reviewed for authenticating the identity of an applicant; b. Revising the application form to include language noting that failure to provide a social security number may delay or prevent completion of the security threat assessment process and; c. Requiring TSA's Office of Transportation Threat Assessment and Credentialing to vet applicants. TSA Concurs: TSA agrees that the concerns that have been identified with the agency's security threat assessment process should be addressed and partially concurs with the recommendations on social security number (SSN) a. TSA concurs. TSA has just published an Interim Final Rule on Air Cargo Screening, 74 FR 47672, 47701 (September 16, 2009) (Air Cargo Screening IFR) that requires that each aircraft operator maintain copies of the applicant's documents used to verify identity and work authorization. b. Currently, language in the Privacy Act Notice found in 49 CFR 1540.203(b)(2)(viii) regarding security threat assessments provides that: ``Failure to furnish your SSN may result in delays in processing your application, but will not prevent completion of your Security Threat Assessment.'' However, TSA's recently published Air Cargo Screening IFR contains the language that the IG recommends: ``Failure to furnish this information, including your Social Security Number (SSN) will result in delays in processing your application and may prevent completion of your security threat assessment.'' 74 FR at 47683. c. TSA recognizes the importance of utilizing the best method possible to capture and evaluate the history of those who will have ready access to our Nation's air cargo transportation system. TSA will evaluate the process to require for air cargo populations, the costs of necessary system/data base changes that would capture biometrics, and the number of new-hire adjudicators to execute the evaluation process. Additionally, we will review the required increase of fees to cover the vetting process. Recommendation #3: Enhance training and testing requirements by providing more specific guidance to regulated entities regarding the training and testing requirements. Additionally, TSA should revise the Regulatory Activities Plan to allow more time for inspectors to review these requirements. TSA Concurs: TSA specifies training and testing requirements in the aircraft operator, IAC, and CCSP security programs. The security programs clearly stipulate the minimum training content, frequency of training, training log requirements, testing frequency, and passing scores for tests. In addition, TSA provides the IACs with TSA-approved training materials and tests for their Security Coordinators, direct employees, and authorized representatives. We are currently developing comparable materials for the aircraft operators and CCSFs. In addition, TSA is beginning the process of developing standardized training and testing, which it plans to require for all regulated parties. TSIs verify compliance with TSA training and testing requirements during inspections. Noncompliant entities are counseled on how to obtain the proper security training and testing. In addition, TSIs routinely conduct outreach to the regulated air cargo community. TSA will be revising the FY 2010 RAP. TSA concurs that training and testing of air cargo security requirements are important and will continue to ensure proper regulatory oversight as such. TSA cargo inspectors verify compliance with training and testing requirements as part of all comprehensive air carrier, IAC, and CCSF inspections. Recommendation #4: Revise the Regulatory Activities Plan to allow more time for inspectors to: a. Incorporate a risk-based approach that emphasizes the use of historical data and analysis. b. Provide support and education to the regulated entities to ensure that cargo security requirements are understood and implemented. TSA Concurs: TSA's FY 2010 RAP addresses these concerns. a. TSA's FY 2010 RAP incorporates a risk-based approach to inform inspections. We have developed a risk score for every entity regulated under a TSA air cargo security program. Our approach provides a risk score per regulated entity per location, which means that Regulatory personnel will be able to access risk scores specific to their airport. Risk scores are updated quarterly. Inspections will be driven based on the entities score: red, yellow, or green indicators. Inspections will also be driven by local and national intelligence as well as responses to significant national events or identification of systematic vulnerabilities; and b. TSA will continue to work closely with aviation industry stakeholders to provide support and education. Recommendation #5: Provide better guidance, training and awareness to all users of the Performance and Results Information System, especially the Transportation Security Inspectors for Cargo. Specifically, develop an action plan for the TSA officials responsible for the Performance and Results Information System to educate the inspectors and ensure optimal use of the available data and analysis. The action plan should also describe: a. The quality and quantity of information that should be collected and reported to promote data consistency among field locations; b. Types of information and reports available for inspectors to generate from the system as an effective management tool; and c. The available analysis in Share Point to improve risk-based planning reporting capabilities. TSA Concurs: a. In FY 2009, TSA's OSO Air Cargo Compliance has continued to perform Quality Control (QC) review audits of PARIS entries submitted by field elements. Each quarter, OSO Cargo Compliance selects PARIS inspection reports for airports and Cargo TSIs in each area to review for QC. The inspection QC reviews focus on compliance with the National Inspection Manual (NIM) and RAP requirements. The goal is to review at least one report from each Cargo TSI at each airport by the end of the Fiscal Year. Headquarters (HQ) shares this information with Assistant Federal Security Director's for Inspections upon request and allows them to take appropriate actions when necessary to ensure the PARIS entries submitted by their staff are in compliance with the NIM and RAP requirements. b. In addition, TSA's OSO Compliance Programs provide PARIS training and guidance materials. This training involves tips on how to more efficiently use PARIS and on generating reports on data contained in PARIS. Training is also provided on the conversion of data extracted from PARIS into Excel Spreadsheet ``Pivot Tables.'' This training provides TSIs with the ability to generate more useful reports on inspection, investigation outreach and incident data, and analyze and organize the reports in a fashion tailored to their needs. This is primarily facilitated through three efforts. First, newly hired TSIs receive PARIS training during the ``Transportation Security Inspector Basic Training Program,'' a comprehensive 4-week training regime at TSA's Security Enforcement Training Academy. This training is conducted via presentation and hands on exercises. This training is continued during the new TSIs official on the job training (OJT). Second, experienced TSIs receive a refresher during recurrent training. Recurrent training is held at least once a quarter at various airports throughout the country with the goal of all experienced inspectors attending at least one session a year. Third, the PARIS program office has developed a comprehensive series of user guides and on-line demos. Furthermore, in the interest of facilitating swift and effective communications between the PARIS User Community and the PARIS Support staff at HQ, TSA OSO, Inspection Enforcement and Analysis Branch established a PARIS application Help Desk Phone Line in the TSA Phone Network. Field personnel can call HQ personnel and speak to a PARIS support staff member. This additional communication channel is intended to offer an additional convenient means for PARIS users to talk to one of the experts who supports the PARIS program. It does not replace the agency's information technology (IT) single point of contact (i.e., SPOC) and the contractor-based support system that TSA uses for its enterprise IT applications. Rather, it is an opportunity for us to bring increased support to the PARIS user community as it relates to the PARIS application itself. The SPOC remains the first contact for any functional anomalies. Field Inspectors can also reach the help desk support through the PARIS Blog. c. The Office of Compliance publishes periodic reports into Sharepoint, an internal electronic tracking system. This system is available to all inspectors who perform oversight as well as staff who analyze inspection reports. Recommendation #6: Provide Cargo Inspectors with automated tools that will allow them to dedicate more time with the regulated entities. Specifically, establish an action plan, with performance milestones, to address the issues preventing the agency from using the personal digital assistant devices to provide more efficient inspection activities. TSA Concurs in Part: TSA believes that the personal digital assistant devices (PDAs) are antiquated technology and are not efficient. We are moving forward with a plan to provide more modern and advanced tools to our regulatory workforce to improve productivity. These include, but are not limited to: Blackberries, with camera feature, for all inspectors. Document hand scanners. This device allows TSIs to make copies of records. We have secured one per airport. Test phones for special emphasis inspections and small package testing. One test phone per airport with assignment of a new number every 6 months. Laptops for all cargo inspectors. Dedicated cargo vehicles. We improved the ratio of one vehicle for every two inspectors at the airport. One GPS unit per cargo vehicle. Air cards for communal use among Regulatory personnel. These tools have already been procured and will be dispersed to the TSIs by the conclusion of FY 2009. In addition to securing new productivity tools, TSA's OSO has been working to streamline the record keeping requirements associated with documenting inspections. For instance we revised the PARIS prompts for the passenger and all cargo air carrier and IAC inspection types. Specifically we reduced the number of prompts by 40-50 percent while still capturing all the requirements. This reduces the amount of entry time per PARIS inspection record, and allows the Inspector more discretion on the level of detail to input. Senator Snowe. Do you think it's possible to reach the 100- percent deadline for air cargo screening, by August of 2010? Secretary Napolitano. Well, we're at about 98 percent-- we're going to be at about 98 percent, so I think that we'll be very close to it, yes. Senator Snowe. Even though the Inspector General indicated that there there's a shortage of TSA personnel, in regard to the screening program? Secretary Napolitano. Senator, again, subject to something that I'm unaware of, sitting here right now, but I believe we will be able to accomplish that. Senator Snowe. The Inspector General's report indicated to me--and this has been a concern of ours, obviously, since September 11 and the 9/11 Commission's recommendations on securing air cargo, that we are still not meeting our goals on an issue that has languished over the years. We've been determined to close this loophole, so it really is important. And I understand that there has been considerable progress made toward this. And we appreciate it, but we want to make sure that we stay on target. And so, given these identifiable deficiencies in the Inspector General's report, it does raise some concerns. And the Inspector General indicated, as well, that the process is focused on quantity rather than outcomes and ensuring corrective actions. As a result, air cargo is vulnerable to the introduction of explosives and other destructive items before it's loaded onto planes, creating risk for the traveling public. Secretary Napolitano. Senator, yes, that's what the report says. We have made, I think, even before the report was issued, significant progress on many of the things that are identified in there, because, as you know, reports often lag behind when the concerns were actually raised. And so, we will be happy to provide you with a briefing on the status, but we are making great progress there. Senator Snowe. OK. No, I appreciate that. And one further point on this, because I think it's so essential, is that this report indicates that TSA is unable to properly identify and address vulnerabilities which continue to occur year after year without an effective inspection process for ensuring compliance of air cargo, and went on to say that TSA misses opportunities to strengthen aviation security against the introduction of unauthorized explosive, incendiary, and other destructive substances of items into aircraft cargo. So, that's obviously quite serious. Secretary Napolitano. No doubt. We have, again, some responses on that, but, again, I think that the key point is, Are we moving to where there is a 100-percent, or close to it, assurance of air cargo screening in the air environment? And the answer is, we are making significant progress there, that's going to continue to be a priority. And again, I look forward to the confirmation of the new TSA administrator. Obviously, having an administrator in place would be very helpful. Senator Snowe. Thank you. Thank you, Mr. Chairman. The Chairman. Thank you, Senator Snowe. Senator Cantwell. STATEMENT OF HON. MARIA CANTWELL, U.S. SENATOR FROM WASHINGTON Senator Cantwell. Thank you, Mr. Chairman. And, Secretary Napolitano, thank you for being here, and thank you for your hard work and dedication. I think the President chose well when he put you into this position, and your background and history and experience, I'm sure, has come into use every single day that you've been in this position. I think I could ask you questions all day. I think that is probably the result of a State that has something like 75 different ports, you know, 15 of them which are probably working ports for the interests that you care about, a border crossing at Blaine that is probably one of the busiest border crossing between U.S. and Canada in the country, and obviously many other related issues to that. So, I'm going to try to get through these, and if you could---- Secretary Napolitano. I'll keep my answers short. Senator Cantwell. Thank you. The first one has to do with, obviously, the Border and Custom agents, which--you know, we were involved here in increasing the funding to the northern border. We were very--we worked very hard, as a delegation and a group of people, to work on that, for many years, and we were glad we got it. You may remember the Ressam case in which a Port Angeles border agent was able to stop Mr. Ressam, who was the Millennium Bomber, who came through. So, that was before we had the resources. And we're very well aware of dangers there. But, we've also had these incidents--and this weekend's paper, I think, said it best, ``Illegal Immigrant Gets $48,000 in Lawsuit Against Border Agents.'' And so, that's what's going on, that we have this--I appreciate that Alan Bersin visited the State. And so, he's had a lot of meetings, and he's had a lot of discussions with our stakeholders, and we really appreciate that. But, we just have a lot of the Border Patrol acting very far away from the border, in plain clothes, catching people by surprise. In this case, the border agents, you know, in a plain car, plain clothes, came up to these two individuals who were at a bus stop. Now, it's probably within that 150 miles from the border, but it definitely is not next to the border. It was in Mount Vernon, Washington. So, a good-- you know, a good 45 minutes, probably, at least, from the border. And so, what I'm asking is, What steps are we taking to ensure that the border agents don't engage in racial profiling and that all the Department of Homeland Security agencies are targeting the most significant threats at the northern borders? Secretary Napolitano. Well, obviously, racial profiling is repugnant to the law, and we do not racially profile. And that is part of our training, it's part of our supervision, and it's part of the ethos. Second, a good border policy requires several things. It requires trained personnel on the ground who are properly supervised. It requires technology. And, in some instances, it requires infrastructure. And so, both at the northern and the southern borders, what we are about is having strategies for those borders, that meet--the fact that they're different types of borders, different terrain, and all the rest--but, nonetheless, that combine, in a strategic fashion, those three elements. Senator Cantwell. Well, I think we need to continue to have a dialogue in the Northwest of what's going on, because I think when we--I think when we end up seeing lawsuits being settled against border agents, I think we have issues here that we need to address. And we appreciate your cooperation in working on that. A second issue, if I could, is obviously that that--that U.S./Canadian border is very important for shipping. And we've had my colleagues talk about security and safety of cargo and container traffic. What are we doing to help ensure that all of North America adopts a regime for border security so that we don't have Asian traffic deciding to go to Canada because they can skip the regime that the United States sets up for border security, only to have that cargo travel all the way across the country and maybe enter, you know, someplace else that doesn't have that border security that you were establishing? So, how do we get that North America regime established? Secretary Napolitano. Well, if you're talking about, Senator, having almost like a perimeter policy around the continent, obviously that's somewhat difficult. But, I meet---- Senator Cantwell. I'm saying there are billions of dollars of business of cargo container going in--we're probably--you know, 20 percent of all traffic coming from China. Now, if, just up the road in Vancouver, they decide they're not going to need a security regime, and it's cheaper and faster to go through Vancouver, all that traffic is going to go there, and the U.S. is going to lose that transportation business. So, what are we doing to help make sure that those ports adopt the same kind of regimes? Secretary Napolitano. Well, Senator, I am meeting regularly with my colleague, my counterpart on the Canadian side, as to what is necessary for security at those ports, because there are certain things that are constants with respect to--be it integrated port security, be it air security, be it land border security, there are certain things that need to be done and need to be accomplished. But, there are differences, and there are very real differences, between the two countries, and I think part of that gets beyond my lane and gets into other departments, in terms of negotiations, as well. Senator Cantwell. Thank you. I see my time is expired, Mr. Chairman. Thank you. The Chairman. Thank you, Senator Cantwell. Senator Klobuchar. STATEMENT OF HON. AMY KLOBUCHAR, U.S. SENATOR FROM MINNESOTA Senator Klobuchar. Thank you very much, Mr. Chairman. Thank you, Madam Secretary, for being here. I was just thinking of how full your plate is with H1N1 and the many other issues that you've had, the Fort Hood shooting investigation and a lot of other ongoing changes with our security. So, I thank you for your leadership, and also the leadership you showed when we had the floods in the Red River Valley, which, you remember, involved not just North Dakota, but Minnesota. Secretary Napolitano. Minnesota. Senator Klobuchar. Very good. Secretary Napolitano. Right across the river. Senator Klobuchar. Exactly. I'm actually going to mostly focus on the secure watch issue and some of the terrorist watch lists, and the misidentifications on those lists. But, I wanted to start with one quick question about the Canadian baggage rescreening. And this is something that affects my State. We have a state-of- the-art airport and the requirement that checked luggage at appropriately cleared Canadian airport facilities be rescreened before the transfer to a U.S.-based connecting flight, it has frequently caused delayed connections for our passengers arriving, since Canada--because their baggage has to be physically transported from the arrival. And I know that TSA has been working with Canadian authorities for well over a year to reach an agreement that could put in place new technologies for Canadian baggage screening that would meet our own United States security standards. And I wondered if you have any sense of when that agreement will be reached. Secretary Napolitano. I know about the issue, I know about the discussions, and I don't know when they will come to a conclusion. But, Senator, if you're asking me to see if I can prompt them to hurry up, I'll be happy to do so. Senator Klobuchar. That's a great answer, thank you. The watch list redress problems--one of my primary concerns--and I get to know the TSA people very well at my airport, and have had very good relations with them, since I have a hip replacement; so I talk to them every time I'm through the airport, and they do a good job--but, my question was about the No-Fly List. And last year, in response to reports that thousands of U.S. travelers experienced misidentifications each year, I introduced legislation to require the Department of Homeland Security to establish a comprehensive cleared list for innocent travels. The implementation of the Secure Flight Program has been underway for nearly a year now, and TSA officials continue to stress that, once the program is fully operational, these misidentifications will be minimized. And you say, in your testimony, that 18 air carriers have successfully switched to Secure Flight, and that testing is underway with an additional 27 air carriers. For the air carriers that have not fully switched to Secure Flight, how are passengers being screened against the watch lists? How do you think this is going? We are still, obviously, having some problems. Secretary Napolitano. Well, Senator, if they're not in Secure Flight--and again, that is a successful program, and I think it demonstrates how, as our Department matures, but also as technology gets better, and also as we get a better sense of what actually needs to be done and what's value added to security, some of these things do get dealt with. But, Secure Flight is going to cover the vast majority of passengers by the time of its full implementation. Right now, we're in that transitional status, and those passengers that are not on a--in a carrier that has moved over are still being measured the old-fashioned way. But, we've also implemented some computer software, for example, that helps us segregate out often misidentified names, misspellings of names, and things of that nature. And we have also worked to speed up the--and make easier--the appeal process so people can get de- watch-listed. Senator Klobuchar. Right. And--but, one issue that still remains, the Department of Homeland Security inspector general recently reported that passengers who encounter misidentifications and seek to use the Traveler Redress Inquiry Program--named TRIP--to clear these problems, they said, generally do not benefit from their participation in TRIP. Their cases often languish for extended periods of time. The IG made 24 recommendations. And one of the main problems highlighted was that the cleared list of travelers who have gone through the TRIP process is used by airlines only sparingly to rule out false positives on the watch lists. You have to understand, in our State we have a kid that was going to Disneyland who couldn't go. He was, like, 2 years old-- because of--his name was on the watch list. So, we've had a lot of concerns. We--I think we have a lot of common names in Minnesota. We have a lot of Johnsons and things like that. So, we continue to be concerned. So, do you know what's happening with the IG's recommendations on the TRIP program? Secretary Napolitano. Senator, let me get back to you on that. I know that we constantly are working to make those sorts of things more consumer friendly, more passenger friendly. But, I'll get back to you specifically on that. [The information referred to follows:] U.S. Department of Homeland Security, Washington, DC, January 19, 2009 Memorandum For: Richard L. Skinner, Inspector General, Department of Homeland Security, From: David Heyman Assistant Secretary for Policy Subject: 90-Day Response to the Office of Inspector General's Final Report Entitled: Effectiveness of the Department of Homeland Security Traveler Redress Inquiry Program (DHS TRIP) (OIG-09-103) This memorandum is in response to your request that the Department of Homeland Security (DHS) Office of Policy (PLCY), in coordination with Transportation Security Administration (TSA) and Customs and Border Protection (CBP), provide your office with an update on the actions taken or planned to implement the recommendations contained in the Office of Inspector General's (OIG) report entitled ``Effectiveness of the Department of Homeland Security Traveler Redress Inquiry Program (DHS TRIP) (OIG-09-103).'' The OIG had 24 recommendations directed to the Screening Coordination Office (SCO) in PLCY, TSA, and CBP. OIG has previously closed recommendations #3, 8, and 14. DHS requests closure for recommendation #2, 6, 7, 10, and 23. DHS and OIG consider recommendations #1, 11, 12, 13, 15, 16, 17, 18, 19, 20, 21, 22, and 24 to be resolved but open until implementation is complete. DHS requests that OIG classify Recommendations #4, 5, and 9 as resolved but open until implementation is complete due to the considerable progress that Secure Flight has made toward implementation. Recommendations Recommendation #1: Replace TRIP's current case management system with a system that fully meets the program's functional requirements for case management and workflow, document management, interoperability, and reporting. (TSA) Update: Implementation is currently underway. It is occurring in two phases: design and acquisition/implementation. TSA is fully funding these phases through a combination of Secure Flight resources and appropriations from the Fiscal Year (FY) 2010 budget. On September 22, 2009, TSA and IBM Global Business Services began work under a contract to perform the requirements analysis and deliver the solution design for the design phase of the new system. TSA held the kick-off on October 28, 2009 with the IBM team and component stakeholders. IBM submitted the Project Plan deliverable on October 30, 2009 and the Vision Statement on December 4, 2009. Future deliverables for the design phase are: (1) Current process assessment (``As-Is''); (2) New end-to-end processes (``To Be''); (3) ``As Is-To Be'' gap analysis; (4) ``To Be'' system requirements and new system design; and (5) Change Management Roadmap. This phase is scheduled for completion by April 16, 2010. The Phase 2 target completion date is March 31, 2011. Depending on the results of Phase 1, DHS may be able to accelerate the completion date of the overall project to December 31, 2010. While DHS believes that a successor case management system will create new efficiencies and improvement metrics reporting, the current system remains operational and sufficient to meet mission requirements for serving the public. The current system allows DHS to receive, process, and respond to redress cases in a timely fashion. Its continued operation mitigates mission-related risks from the duration of this schedule, allowing DHS to follow best practices in designing and implementing the successor system. Due Date: March 31, 2011 Recommendation #2: Define and communicate strategic and operational management roles for TRIP, and participant and program manager responsibilities, roles, and authorities. (SCO) Update: DHS has implemented this recommendation through the issuance of the ``Charter for DHS Appeals and Redress Process'' (Redress Charter), DHS has attached a copy to this letter for your reference (see attachment A). A working group of Subject Matter Experts (SMEs) from the PLCY/SCO. DHS Privacy Office (PRIV), DHS Office of Civil Rights and Civil Liberties, Office of the General Counsel (OGC), TSA, CBP, Citizenship and Immigration Service (USCIS), and Immigration and Customs Enforcement (ICE) met to develop the Redress Charter. The working group also consulted with the Terrorist Screening Center (TSC) and incorporated TSC's feedback into the final product. The SME working group completed the review draft on October 5, 2009, and PLCY/SCO sent the review draft to the DHS TRIP Governance Board, which is comprised of DHS and component leadership. The Governance Board members completed their reviews of the draft charter on October 22, 2009. PLCY/SCO issued the charter as a memo on December 10, 2009. Due Date: DHS requests that this recommendation be closed. Recommendation #3: Seek independent funding for TRIP through a line item in the department's budget or that of one of its components. (SCO) Update: Funding for DHS TRIP was included in the DHS Appropriations Act, 2010 (P.L. 111-83), signed into law on October 28, 2009. PLCY/SCO confirmed with TSA that the funds have been allocated as planned. Due Date: Closed Recommendation #4: Revise aviation security directives to specify how air carriers are to use the cleared list, and develop and apply inspection protocols that monitor air carriers' use of the cleared list. (TSA) Update: TSA has developed and applied inspection protocols that monitor air carriers' use of the Cleared List. TSA has updated its Transportation Security Inspector (TSI) handbook and issued it to the TSIs in the fall of 2009. Relevant excerpts from the TSI Inspection Handbook on the sections dealing with No-Fly list inspections will be provided to 01G. Please note that these excerpts contain Sensitive Security Information (SST) and should not be released or disclosed without prior approval from TSA. TSA will address the first part of this recommendation through implementation of Secure Flight, which will transfer the watchlist matching function from the air carriers to TSA. Due to the impending cutover to Secure Flight, TSA opted to develop and apply protocols that monitor aircraft operators' use of the Cleared List in lieu of issuing new security directives. The Secure Flight Final Rule went into effect on December 29, 2008. In May 2009, the Government Accountability Office (GAO) audit of DHS certification conditions confirmed that TSA generally achieved 9 of 10 statutory conditions and conditionally achieved the 10th condition.\1\ In November 2009, after the release of the final GAO report, TSA provided GAO with the additional documentation to demonstrate that Secure Flight has generally achieved Condition #10. --------------------------------------------------------------------------- \1\ For generally achieved, TSA has completed all key activities which should reduce the risk of the program experiencing cost, schedule, or performance shortfalls. For conditionally achieved, TSA has completed some key activities and has defined plans for completing remaining activities, that if effectively implemented as planned. should result in a reduced risk of the program experiencing cost, schedule or performance shortfalls. Table 1: List of 10 statutory conditions for implementation of Secure Flight assessed by GAO ------------------------------------------------------------------------ ------------------------------------------------------------------------ Statutory Conditions ------------------------------------------------------------------------ Condition 1: System of Due Process (Redress) Condition 2: Extent of False-Positive Errors Condition 3: Performance of Stress Testing and Efficacy & Accuracy of Search Tools Condition 4: Establishment of an Internal Oversight Board Condition 5: Operational Safeguards to Reduce Abuse Opportunities Condition 6: Substantial Security Measures to Prevent Hacking Condition 7: Effective Oversight of System Use and Operation Condition 8: No Specific Privacy Concerns with the System's Technological Architecture Condition 9: Accommodation of States with Unique Transportation Needs Condition 10: Appropriateness of Life-Cycle Cost Estimates and Program Plans ------------------------------------------------------------------------ The Secure Flight program began operational cutover to certain aircraft operators beginning on January 27, 2009. As of October 31, 2009, all airlines were required to request and collect Secure Flight Passenger Data (SFPD) including full name, gender, date of birth, and Redress Control Number (if available). Secure Flight is being phased-in gradually with implementation for all covered aircraft operators scheduled to be completed by the end of 2010. As of December 4, 2009, twenty aircraft operators have successfully cutover to Secure Flight, including one international carrier. Furthermore, eight additional aircraft operators are in parallel operations with Secure Flight (i.e., aircraft operator is sending passenger to Secure Flight, but not applying Secure Flight Boarding Pass Printing Results), and testing is underway with twenty-nine aircraft operators. TSA has implemented a public awareness campaign that communicates the benefits of the program as well as the changes it will bring for passengers, aircraft operators, and other members of the travel industry. DHS understands that, at the time of its field research in 2008, there were considerable unknowns surrounding the schedule for implementing Secure Flight. In the intervening year, Secure Flight has made considerable progress and is on schedule to complete implementation with domestic and foreign aircraft operators by the end of calendar year 2010. Given these changed circumstances since the time of DHS OIG's field research, DHS asks that DHS OIG re-categorize this action as resolved but open until implementation is complete. Due Date: December 31, 2010 Recommendation #5: Provide more of the cleared list to air carriers, at minimum ensuring that they receive all cleared list records that match the current No Fly and Selectee lists using all required matching routines. (TSA) Update: The full implementation of Secure Flight in 2010 will transfer the watchlist matching function from the air carriers to TSA, eliminating the need to distribute the lists to the carriers. Per the Secure Flight Final Rule, during normal Secure Flight operations, Secure Flight matches limited passenger information to government terrorist watchlist maintained by the Terrorist Screening Center (TSC). Given the changed circumstances since the time of DHS OIG's field research (as discussed in Recommendation #4), DHS asks that DHS OIG re- categorize this action as resolved but open until implementation is complete. Due Date: December 31, 2010 Recommendation #6: Develop and implement a plan for the Office of Transportation Security Redress to address Secure Flight requirements that, at minimum, provide for notifying current redress applicants that their redress control numbers may be useful in future air carrier reservations, and establishes how TSA will incorporate redress control numbers into the cleared list. (TSA) Update: The DHS TRIP Program Office has sent letters to all aviation-related redress requestors notifying (or reminding) them of their Redress Control Number (RCN) and explaining how the traveler can use the RCN to help avoid misidentifications when traveling by air. TSA approved the letter in September 2009. TSA mailed this letter to 56,000 individuals, including both persons who received redress through DHS TRIP and who received redress through other means prior to the establishment of DHS TRIP in February 2007. The DHS TRIP Program Office began mailing it out in weekly increments starting in October 2009 and completed the mailings on December 15, 2009. The RCN is a mandatory field on the Cleared List that is provided to the Secure Flight program. The Cleared List (along with the RCN information) is used within the Secure Flight matching engine. If a passenger is found to be a possible match to the watchlist, the passenger's information, including their RCN (provided at time of flight reservation) will be made available to the Secure Flight Analyst (SFA) so the SFA can clear the passenger accordingly. Due Date: DHS requests that this recommendation be closed. Recommendation #7: Use all cleared list records to assist in ruling out all possible passenger data matches to the watch lists identified through Secure Flight, and evaluate options for applying matching thresholds for cleared list matches to account for possible cleared- list passenger data entry errors. (TSA) Update: As noted above, Secure Flight currently utilizes all Cleared List records to assist in ruling out all possible passenger data matches that were identified through Secure Flight. These Cleared List records were incorporated into Secure Flight on December 15, 2008. Further, Secure Flight works with the Office of Transportation Security Redress (OTSR) and DHS TRIP Program Office in evaluating all other options to clear passengers. The Secure Flight matching engine already uses `near match' matching logic when matching against the Cleared List so that possible data entry errors do not prevent the SFA from reviewing near Cleared List matches during the review process. Due Date: DHS requests that this recommendation be closed. Recommendation #8: Establish a process to monitor the currency of Primary Lookout Over-Ride record owner status, and institute periodic inspections to determine whether record owner notifications about changes made to an underlying subject record are acted on appropriately. (CBP) Update: A process is in place to send notifications to the responsible officer for disconnected Primary Lookout Over-Rides (PLOR) that require attention. CBP field offices monitor a daily report on disconnected PLORs, and these daily reports are also actively reviewed by CBP headquarters personnel. In addition, CBP conducts an annual nationwide review of all PLORs. OIG has closed this recommendation. Due Date: Closed Recommendation #9: End the practice of singling out passengers with terrorist watch list lookout-related Primary Lookout Over-Rides for selectee security screening when they are identified as possible No Fly list matches during Advance Passenger Information System vetting. (CBP) Update: Secure Flight will assume all No Fly and Selectee watchlist matching for international flights for all covered aircraft operators, and travelers will be able to provide their Redress Control Number at booking. TSA is scheduled to complete implementation of Secure Flight by the end of calendar year 2010. Given the changed circumstances since the time of DHS OIG's field research (as discussed in Recommendation #4), DHS asks that DHS OIG re- categorize this action as resolved but open until implementation is complete. Due Date: December 31, 2010 Recommendation #10: Ensure that final determinations on whether to create a Primary Lookout Over-Ride in response to a redress complaint reside with employees unaffiliated with field offices that made the original screening or admissibility determination. (CBP) Update: The redress unit reviews, in coordination with CBP PLOR managers, redress cases in which the field office did not implement a PLOR to determine whether it might be appropriate to overturn that field determination. The relevant excerpts from the Executive Communications Unit's desk guide detailing the procedure will be provided to the OIG. Please note that these excerpts contain For Official Use Only (FOUO) information and should not be released or disclosed without prior approval from CBP. Due Date: DHS requests that this recommendation be closed. Recommendation #11: Develop and implement a process for the independent review and adjudication of redress cases related to DHS criminal investigations. (SCO) Update: The Redress Charter includes a provision that Component Redress Offices ensure the ``independent review of cases assigned by the Executive Agent'' (i.e., DHS TRIP Program Office). In December 2009, PLCY/SCO launched the Redress Review. Following the model of previous PLCY/SCO reviews for credentialing and vetting programs, the Redress Review is a cataloguing of programs that have or may be candidates for redress throughout DHS, including but not limited to programs tied to DHS TRIP. It will include the development of recommendations for the enhancement and further coordination of redress services. Relevant to this recommendation, the Redress Review will provide a process to validate that independent review and adjudication of redress occurs and that standard operating procedures (SOP) document the process. Due Date: April 30, 2010 Recommendation #12: Use TECS Primary Lookout Over-Rides related to terrorist watch list lookouts to help rule out possible No Fly and Selectee list matches identified through the Secure Flight program's automated passenger data vetting process. (TSA) Update: TSA and CBP are in the process of exploring how to share information about the results of screening encounters as reflected in the Primary Lookout Over-rides (PLOR) and Cleared List. Discussions have occurred among program and information technology subject matter experts to identify and rectify barriers to sharing as appropriate. PLORs and the Cleared List are tools designed to meet the screening environment in which they are used. For this reason, Secure Flight currently uses the DHS TRIP Cleared List to clear individuals with names or identifying information similar to that of individuals on the No Fly or Selectee List in advance of passenger travel. While PLOR and the Cleared List are both used to clear individuals, they serve two distinctly different purposes. The DHS TRIP Cleared List is focused on clearing those individuals associated with threats to aviation rather. CBP, on the other hand, is responsible for conducting a much broader mission at the border; consequently PLOR records will be a result of a much broader screening activities. The subject matter experts are engaged in identifying a path forward to enhance information sharing. Finding a solution has proven more complex than the initial expectations that DHS expressed in its Management Comments due to asymmetrical elements in each process related to their respective screening objectives. CBP and TSA are exploring the feasibility of developing the operational and technical solutions needed to meet the intent of the recommendation. Due Date: March 31, 2011 Recommendation #13: Use the TSA's cleared list data to assist in ruling out possible No Fly and Selectee list matches identified in Advance Passenger Information System (APIS) vetting. (CBP) Update: In the long term, Secure Flight will assume the watchlist matching function of Advance Passenger Information System (APIS), taking advantage of the already established integration of the Cleared List into the Secure Flight process. As stated in the response to Recommendation #12, in the meantime, CBP and TSA subject matter experts are engaged in identifying a path forward to enhance information sharing relating to PLORs and the Cleared List. To mitigate any potential negative impact on effectiveness, CBP will continue its current practice of communicating directly with TSA Office of Intelligence to confirm the status of No Fly and Selectee list passengers to resolve potential watchlist matches through APIS. Due Date: December 31, 2010 Recommendation #14: Create a procedure for officers at ports of entry to learn whether Transportation Security Administration Office of Intelligence analysts have ruled out passengers as the target of a watch list lookout. (CBP) Update: OIG has stated that CBP's procedures fully address this recommendation and has withdrawn the recommendation. Due Date: Closed Recommendation #15: Enhance internal controls on the electronic and manual processes for adding records to the cleared list, ensure that all records considered for addition to the cleared list are subject to identity document verification checks before addition, and conduct intelligence analyst reviews of all possible watch list matches before related redress records are added to the cleared list. (TSA) Update: DHS TRIP is addressing this recommendation in three ways: 1) a case-by-case quality assurance review of the watchlist; 2) incorporating redundant manual quality assurance reviews of a case prior to inclusion on the Cleared List; and 3) hiring a full-time vetting analyst to focus on internal controls as cases are processed. The DHS TRIP Program Office has completed a manual review of the Cleared List to ensure its quality over two stages. First, in December 2008 prior to submitting the Cleared List for integration into Secure Flight, DHS TRIP personnel reviewed every record on the Cleared List to verify the presence of required identity documents and to reconfirm that none of the records on it were possible matches to the watchlist. Second, between March and June 2009, DHS TRIP personnel conducted a comprehensive review of all redress records to ensure that all records were accurate and that the appropriate DHS component or State Department office had adjudicated the case. The DHS TRIP Program Office has incorporated a regime of redundant quality assurance checks into its standard practices. DHS TRIP personnel review all Cleared List records are reviewed a minimum of three times prior to final processing. Reviews occur at the initial triage, quality assurance, and archive stages. Additionally, management conducts spot checks of individual records to ensure that the triage process is working properly. For 2010, DHS requested and received funding for a Transportation Security Specialist (Vetting Analyst) for the DHS TRIP Program Office. This individual will be located in a TSA Operations Center with close proximity to Intelligence Analysts and will have access to secure data sources. This access to all available data will allow the analyst to verify document submissions, view source data for potential watchlist matches, and work with appropriate intelligence and law enforcement personnel before recommending process adjudication. DHS TRIP has developed a Job Analysis Tool (JAT), which is under review for TSA Human Capital Approval prior to competitive recruitment via USA Jobs. Due Date: March 31, 2010 Recommendation #16: Automatically compare the cleared list against the No Fly and Selectee lists when changes are made to any list, and institute a process whereby intelligence analysts immediately review matching cleared list records for possible removal from the cleared list or refer them to the Terrorist Screening Center. (TSA) Update: DHS has taken 2 steps in addressing this recommendation. First, TSA is hiring a DHS TRIP Transportation Security Specialist (Vetting Analyst) to be located in a TSA Operations Center. This individual will be located in a TSA Operations Center with close proximity to Intelligence Analysts and will have access to secure data sources, enabling DHS TRIP to access all available data when verifying document submissions. viewing source data for potential watchlist matches, and working with appropriate intelligence and law enforcement personnel before recommending process adjudication. DHS TRIP has developed a Job Analysis Tool (JAT), which is under review for TSA Human Capital Approval prior to competitive recruitment via USA Jobs. Second, DHS TRIP is in the process of upgrading its Information Technology capability (currently projected to be complete by 2Q FY2011). One of the upgrades includes the ability to automatically run a daily comparison of the watchlist and the Cleared List that would result in a conflict report for review by the Transportation Security Specialist (Vetting Analyst). The vetting analyst will be able to quickly determine if a change in the status of any Cleared List individual should be changed. Due Date: Hire vetting analyst by March 31, 2010. IT upgrade by March 31, 2011. Recommendation #17: Develop and promptly publish the required System of Records Notice and Privacy Impact Assessment for its redress case management system. (CBP) Update: CBP has drafted a System of Records Notice (SORN) and Privacy Impact Assessment (PIA) for the Complaints Management System (CMS) to cover CBP redress functions and activities that exceed the scope of traveler redress covered by DHS TRIP and its privacy compliance. These activities include officer professionalism complaints, various ``wait time'' and other service-related complaints, submitted through the CBP Info Center web page. Final clearance of these documents through CBP is pending completion of initial IT system security requirements for the hosting environment for the CBP Info Center web presence. Due Date June 1, 2010 Recommendation #18: Prepare and revise TRIP-specific standard operating procedures that describe all redress office requirements in intake and triage; coordination and prioritization; review and adjudication; and closeout, response and reporting. (SCO) Update: PLCY/SCO conducted a data call for all component SOPs relating to DHS TRIP. PLCY/SCO has also obtained a copy of TSC's SOP to serve as a comparable model. PLCY/SCO created a standardized SOP format to improve transparency and assist in comparability among the component SOPs. The tool allows PLCY/SCO to highlight the gaps in SOP documentation and develop a questionnaire to assist the components in documenting their processes and decision-making criteria for redress. As discussed previously, PLCY/SCO has launched its Redress Review project. Relevant to this recommendation, the Redress Review will provide a process to validate that SOPs fully document redress processes. Due Date: April 30, 2010 Recommendation #19: Devise and institute quality assurance checks using the 2007 TRIP quality assurance plan as a resource. (SCO) Update: OTSR instituted a process where all inquiries received are subject to 100 percent quality assurance check prior to final processing (Cleared List, incompletes, or component/TSC referral). Further, automated and manual Quality Assurance checks will be included in the requirements for the new DHS TRIP case management system. PLCY/SCO has provided the 2007 TRIP Quality Assurance Plan to inform the work of the design team for Phase I. See Recommendation #1 for additional details about the deliverables and schedule for designing and implementing a successor case management system. Due Date: March 31, 2011 Recommendation #20: Develop and apply TRIP response letter templates that more fully acknowledge the basis for traveler difficulties, note what actions the government took to review the case, and address the underlying cause for the travel difficulty; but do so without compromising law enforcement investigations or revealing redress-seekers' status in the TSDB. (SCO) Update: PLCY/SCO led a SME group from PLCY/SCO. TSA, CBI:). OGC, DHS CRCL, and DHS PRIV to review the response letter and recommend changes to improve transparency and customer service. The group also consulted with the Department of Justice's (DOJ) Terrorist Screening Center (TSC) in the course of its work. In reviewing the current letters, the working group has as its mandate to make the tone and content more customer-friendly and transparent without compromising law enforcement investigations or revealing redress-seekers' status in the Terrorist Screening Data base (TSDB). The SME group reached preliminary consensus on a new draft of the core response letter. It also generated scenario-specific variants of this letter to meet the most common types of situations encountered by redress. The SME group engaged with TSC in November 2009 to confer on the letter package and met with representatives from the TSC, FBI, and DOJ to discuss the proposal in detail on December 16, 2009. The meeting generated some additional clarifications which will be integrated into the proposal. The package was sent to DHS leadership for approval on December 19, 2009. The package is scheduled to begin the formal DHS approval process on January 15, 2010. Department of Justice will also be approving in accordance with the interagency Memorandum of Understanding on Terrorist Watchlist Redress Procedures. The group briefed the TSC on its proposal. TSC agreed that the changes seemed useful and consistent with past direction but indicated that their leadership and legal counsel would need to review the final product before formal concurrence could be reached. Due Date: February 26, 2010 Recommendation #21: Develop TRIP case disposition reporting categories that reflect the full range of government efforts to resolve redress-seekers' travel difficulties, and report on this information on a regular basis. (SCO) Update: Developing disposition reporting categories are part of the Phase I design of a successor case management system for DHS TRIP. PLCY/SCO has provided TSA with its observations about lessons learned from current operations and continues to work with TSA on this effort. See Recommendation #1 for additional details about the deliverables and schedule for designing and implementing a successor case management system. This recommendation would be implemented as part of Phase II scheduled to be completed no later than March 31, 2011. Due Date: March 31, 2011 Recommendation #22: Collect individual TRIP redress case information on the date completed redress petitions are received, and use this information to calculate overall TRIP case processing times. (TSA) Update: The current case management system is insufficient for implementing this recommendation for the purposes of calculating overall DHS TRIP processing time. It does not have the necessary fields to distinguish between the dates that a case is opened and when the triage review demonstrates that sufficient information and documentation has been provided to begin the redress review process. The system currently sacrifices that capability in order to ensure that all cases are tracked whether the file has been completed with the applicant's documentation or not. If additional information is necessary, the cases are tracked as ``Pending Paperwork'' or, if the applicant has not responded to our request after a significant amount of time, ``No Paperwork.'' If and when the necessary information is received, its status is changed to ``In Process.'' The capability to implement Recommendation #22 will be included in the requirements document scheduled to be completed February 19, 2010 as part of Phase I of the acquisition of an improved Case Management System (See Recommendation #1). It would be implemented as part of Phase II scheduled to be completed no later than March 31, 2011. The risk related to the due date is mitigated by continuing to use the current system for calculating processing time. While inexact due to inclusion of the time spent by cases in ``No Paperwork'' and ``Pending Paperwork'' status, it still provides useful data for managing the process. Due Date: March 31, 2011 Recommendation #23: Develop timeliness targets for each redress processing stage, and case review and processing activities for each participating agency and DHS component; and report to participating agencies regularly on the achievement of these targets. (SCO) Update: DHS has issued interdepartmental policy guidance through the DHS TRIP Governance Board to establish timeliness targets for DHS TRIP and related offices, as well as threshold and goal metrics for meeting those targets. The guidance memo was issued on December 10, 2009. The guidance memo is attached for your reference. Due Date: DHS requests that this recommendation be closed. Recommendation #24: Collect and report on redress-seeker impressions of the TRIP website, different aspects of the redress experience, and their overall satisfaction with the program, with the aim of using this information to identify areas for improvement. (TSA) Update: DHS uses the American Customer Satisfaction index to capture statistically reliable data that can be used to improve the effectiveness of DHS.gov, including web-based information about DHS TRIP. The tool prompts individuals who use the DHS website to provide feedback on their experience. It includes several open-ended questions that allow respondents to comment when they are having issues finding information. DHS's current response rate (through November 2009) is 15 percent on exit response, which is high compared to most websites. In November 2009, this tool indicated that members of the public were unable to find information describing the Redress Control Number. People were searching for this information because the airlines were mentioning it in their communication efforts related to Secure Flight as new optional field for reservations. As a result of this feedback, DHS updated the website to explain the facts about the Redress Control Number and reassure people that most travelers do not have nor need one. DHS is in the process of launching a customer satisfaction index specific to the DHS TRIP website. PLCY/SCO, in consultation with TSA and the components, drafted two surveys. One is specific to the redress application process and the other asks questions about the overall redress process. The first survey includes four multiple choice questions to gather statistical information on user satisfaction and three open-ended questions to solicit qualitative information that can help identify areas for improvement. The second survey has five multiple choice and one open-ended questions. Because the surveys are a ``collection of information'' from more than 10 members of the public, it is subject to the requirements of the Paperwork Reduction Act (PRA). The PRA process includes submitting an analysis to the Office of Management and Budget (OMB) to obtain an OMB Control Number, publishing a notice in the Federal Register with a 60 day comment period, adjudicating the comments, and publishing a 30-day notice in the Federal Register before the surveys can go live. The PRA clearance process began on December 15, 2009 and is expected to be complete no later than May 31, 2010. A copy of the proposed surveys are attached. Due Date: June 30, 2010. If you have any questions regarding this response, please have a member of your staff contact Ted Sobel in DHS/PLCY/SCO at 202-282-9570. cc: Marcia Hodges, Supervisory Auditor, DHS GIG Attachments: A. Charter for DHS Appeals and Redress Process (re: #2) (Source: PLCY/SCO) B. Redress Control Number letter (re: #6) (Source: TSA) C. Timeliness Targets Guidance Memo (re: #23) (Source: PLCY/SCO) D. Website/Redress Experience Survey (re: #24) (Source: PLCY/SCO, TSA, CBP) Senator Klobuchar. All right, thank you very much, again. And thank you for your leadership. Secretary Napolitano. You bet. The Chairman. Thank you, Senator. Senator Udall. STATEMENT OF HON. TOM UDALL, U.S. SENATOR FROM NEW MEXICO Senator Udall. Thank you, Mr. Chairman. And thank you for holding this hearing. Good to see you here, Secretary Napolitano. We both share the Southwest as home, and I think you're doing an excellent job with a very, very difficult department there to manage. I'd like, in my time, to hit a couple of areas. One is REAL ID, and then the TSA approach to whole-body imaging. As you know, more than 30 States, including New Mexico, are unlikely to meet the December 31st deadline to become materially compliant with the REAL ID Act of 2005. While I understand the Administration would prefer to enact PASS ID Act in lieu of granting an additional extension, the uncertainty surrounding what your Department may or may not do if the legislation is not signed into law is creating confusion for people in the State that are not in compliance. This is--and I'm sure you've heard a lot about this, too-- this is causing a great deal of anxiety with constituents, who are seeing news reports they'll need a passport in order to travel on a commercial airline in the U.S. after the 1st of the year. I believe Senator Bingaman and I sent you a letter on this issue, on Monday. Will you commit, now, to extending the deadline for compliance with REAL ID if Congress has not addressed the issue by December 31? Secretary Napolitano. Well, Senator, thank you, and yes, here is the problem. Congress passed REAL ID as a footnote in an appropriations bill, that did not have the benefit of hearings, nor consultation with the States, which caused vast revolt among the States, of which Arizona was one. And so, we went and worked with the Governors, on a bipartisan basis, to fix REAL ID, and that gave birth to a piece of legislation known as PASS ID. It has been through committee, it has been marked up, it is ready for floor action. It deals with a lot of the issues that--it solves the Governors' problems with REAL ID. I would--before I get to the question of extensions--you know, one of the reasons we had REAL ID, and now PASS ID, is because the 9/11 Commission had a recommendation that we improve the security quality of drivers' licenses. And because REAL ID has been rejected by the States, just by granting extension after extension after extension, we're not getting to the pathway to have more secure drivers' licenses. PASS ID helps us meet the 9/11 Commission recommendations and, at the same time, addresses issues that were legitimately raised by the states. And so, what I would prefer to urge the Senate to do, and use this hearing as an opportunity to really urge it to do, is to move to floor action and move PASS ID through so we can get it over to the House. I think it could go very quickly over there. And we could solve this issue, as opposed to extension after extension, which not only doesn't deal with the 9/11 Commission recommendation, but it's just another year of uncertainty. Senator Udall. Yes. Well, as you are probably aware, the situation that we're in now, we have healthcare on the floor, where if we tried to move to anything else, I think it would make it much more difficult, procedurally. So, I think if--I don't see us getting to PASS ID on the Senate floor between now and the end of the year, so I think it would be very helpful for you to issue a statement--you might use this as an opportunity to do it--to assure people that, after December 31, they will be able to travel with something other than a passport. I don't know if you want to do that, at this point, but--if you decline, that's fine. Secretary Napolitano. I think I will not accept that---- Senator Udall. OK. Secretary Napolitano.--invitation---- Senator Udall. OK. Secretary Napolitano.--at this point in time. Senator Udall. Thank you. The--I probably don't have enough time to get you to answer the question, but on whole-body imaging, let me just lay it out a little bit here. You're--TSA is greatly expanding its use of whole-body imaging for primary passenger screening at airports. And Albuquerque is one of the airports where it's doing that. And although TSA has voluntarily taken certain measures to protect passenger privacy, I believe several serious questions should be answered before TSA deploys these whole-body imaging machines more widely. And one of the issues, really, is, if you decline the machine, you get a full-body patdown. And, as you can see, that could--you either--one or the other--that could be very intrusive. So, I--I'm going to submit the questions to you, because my time's up and I know the Chairman may want to get to other Senators here. But, I hope that you'll give us a prompt response on that. Secretary Napolitano. Right. And, Senator, in the airports I've been at, observing how that technology is used and that technology is much different than as portrayed in the press but, in any event, it hasn't been a patdown, but you go through the standard magnetometer process. We'll be happy to answer the questions that you have. Senator Udall. We'll get you all that information. Thank you very much. Thanks for your service. The Chairman. Thank you, Senator Udall. Madam Secretary, I'm going to ask you a question which you can't answer, but you want to, desperately. But---- [Laughter.] The Chairman. But, you can't, because OMB won't let you. OK? I just---- Secretary Napolitano. I'll---- The Chairman.--thought I'd catch your attention---- Secretary Napolitano. Yes. The Chairman.--by saying--OK? Secretary Napolitano. Yes, you have. The Chairman. The--to me, one of the most enormous problems of your extraordinarily important agency--I mean, the President spoke last night, and he kept coming back to what--``The economy I really want to build is my country's economy,'' and he really had to do that. And I sort of wanted him to say, ``And, by the way, in protecting security, we really need to do much more with the Department of Homeland Security, and give it more resources.'' I think it's one of the great anomalies--and, frankly, embarrassments to us, in the Congress, and to appropriators-- that they have underfunded you. I mean, everybody loves to pick on FEMA or whatever is going on, but often the reason is--or they give you--they say you've got to have 100-percent container scanning, air cargo, maritime cargo, you know, and the--10,000 more rules and regulations have to pour out of your organization, and it's just--it's an awful way--and you are responsible, in so many ways, for our national security. I mean, the intelligence people aren't. You are. They're meant to, you know, provide information; and you have your own intelligence folks. But, you need money. And my question I want to ask you for is, How much money do you need, and what do you need it for, to be able to do what you are required to do and what you want to do? You'll never get another question so wonderful as that. [Laughter.] Secretary Napolitano. Thank you, Mr. Chairman. Let me just address it in the following fashion, which is to say, one of the things that I have set about to do as the Secretary is to identify the major mission areas of the Department, to align our budget requests with those major mission areas, and to create a longer-term vision for the Department through the Quadrennial Homeland Security Review process. Congress asked us to complete that QHSR by December 31. We are on track to do so. But, I--here's--you know, the major mission areas of the 23 agencies--22 agencies that we're--combine--really involve counterterrorism, securing the air, land, and sea borders, immigration enforcement while we work for immigration reform, and preparation for, and the ability to respond to, disasters of any type--natural disasters. And what we have been about doing is prioritizing, under each of those, and aligning our budget requests accordingly. And I hope---- The Chairman. I know what you're doing, and I applaud you for it, but it's not helpful. I mean, you're laying out your priorities, and what I would say is that you're then applying totally inadequate resources to your priorities, because you don't have any choice. And you can't say much, because OMB vets your testimony, as they do with any Cabinet Secretary--and way on down, too--and most people don't know that, that you can't speak your mind. Well, I don't want to get you fired, but I really do want to--Homeland Security to have the money it needs. And, at some point, maybe we'll have--maybe you can leave a private letter and stick it under my---- [Laughter.] The Chairman.--my office door or---- Secretary Napolitano. Over the transom, right. The Chairman.--something. But, it counts, to us. It counts, so that we can put pressure on appropriators to be helpful to you. I'll just leave it there. Secretary Napolitano. Thank you, Mr. Chairman. The Chairman. Because you're in an impossible situation. I wanted to--did not want to leave Senator Brownback's--you know, if you do any regulation of general aviation--the business will go out of--it'll collapse. I just can't let that pass. I think you mentioned, 90 percent of airports in Kansas, or whatever it was, were small airports, and they're for the use of general aviation, and its convenience. Yes, it certainly is convenient. It's probably convenient to a lot of people who are running drugs and running guns and all kinds of things. And-- but, we can't do anything to increase their screening. Again, I've--out at Dulles, the idea of walking through something, which--you know, a machine that that lady, I guess, walked through, crashed the White House party the other night. No, they don't even have them out there. They don't even have them. So, they--there are two--at any given moment, two-thirds of the airplanes in the air are general aviation. They get all of this attention from air traffic control, just as much as any commercial air passenger and--yes, Kansas, you know, makes a lot of general aviation aircraft, but there's also the question of national security of them. You pointed that out, that they could have fuel on them, they could run into buildings. I'm pointing out that they could be running drugs, they could be running guns, and we don't know about it. We're just--and so, we can't touch them; they're untouchable, because if they--you touch them, they call up all the Senators, who--and Congressmen--who ride on their general aviation things, and say, ``Don't you dare do anything with it.'' And that's exactly the way it works. I mean, I tried to put a 25-cent-per-trip tax on them last year to help pay for our air traffic control system. That got 4 inches down the football field. The telephone calls just quashed it immediately. And at some point, this becomes a--just a little bit more than annoying, when they become somehow sacred because they're fragile. They're not fragile; they're doing very well. And whether they're doing well or not is secondary to the national security concerns that you would have, and that I certainly do have, about them. And I just wondered if you would comment on that. Secretary Napolitano. Well, Senator, as I suggested to Senator Brownback, the security issues involving GA--general aviation--need to be addressed. There was a proposed rule. It had a strong reaction from that community. We have worked with that community. We are in the process of finalizing that rule. But, I agree with you that, when I look at the overall kind of vulnerabilities and threats involving threats to the homeland, particularly with respect to the larger general aviation aircraft, there are security interests that must be protected, and we are moving to do just that. The Chairman. How do you do that? They resist that. Secretary Napolitano. We do it by--through the regulatory process, and we do it---- The Chairman. Then how come I don't see it? Secretary Napolitano. Well, because we haven't finished---- The Chairman. I see no sign of it. Secretary Napolitano. Well, we haven't finished the rule yet. But, we will be doing it through a variety of mechanisms. The Chairman. I advise you to be bold. My time has run out. Senator Hutchison. Senator Hutchison. Thank you. I wanted to go back to the border wait times. This is something that I know you are familiar with, as well, having been the Governor of Arizona. And my question is, How can you address the border wait times? Because there are trucks backed up for miles, taking hours to get through, and it does make a difference in commerce and people being willing to come across. How are you going to address it, keeping security in mind as well as efficiency of commerce, on our land borders? Secretary Napolitano. Well, a couple of things. And first of all, between Fiscal Year 2008 and Fiscal Year 2009, we actually saw a reduction in wait times, according to the data I have, a 12.3-percent reduction. And the wait times for commercial trucks--and I think that's what you're focused on, Senator--went from, in 2008, 10.6 minutes to 9.3 minutes on the U.S. side of the border. Where the wait times can add up is on the Mexican side of the border. And so, working with Mexico, they are now establishing their own customs capacity on that side of the border, which I think will do a great deal to resist--because, as you know, when you go through a land port, you're actually going through two borders; you're going through the Mexican side and the U.S. side. So, the U.S. side, the wait times have gone down, and, I think, will continue to go down, with our greater use of technology. The Mexicans---- Senator Hutchison. I really am referring to the Mexican side, because that affects so many of our border retailers, and it's--it's commercial, but it's also people who will shop in the---- Secretary Napolitano. In those areas---- Senator Hutchison.--yes. Secretary Napolitano. Indeed. And so, Mexico is now developing its own customs agency, and deploying them to the border, which they really had not had before, as well as we build out our ports on the northern side of the border, we are working with them to build their infrastructure to match our ports so that they're paired up appropriately. Senator Hutchison. So, we do have an ongoing effort to coordinate better the Mexican side with our side so that we can get some of those wait times down for commerce? Secretary Napolitano. Yes. Senator Hutchison. OK. It's a big deal on our border. It must have been, in Arizona, as well. Because border retailers on our side get a lot of business from that land traffic; and if you have to wait an hour or two, or more sometimes, it's a problem. Is there something we need to do to increase coordination? Because there has been a complaint, that's ongoing for a long time, of coordination of working hours between DEA, Customs, and Border Patrol, so that sometimes one group is off on a coffee break while the other group is on, but you have to have all of them. Is there an effort in your Department to address that kind of coordination to better utilize our resources? Secretary Napolitano. Senator, that coordination should already be occurring under the direction of whoever is the manager of the port. If you have a specific instance or a specific port where you are getting reports that that is not happening, I hope you would let me know about it, and we will follow up. Senator Hutchison. OK. I will do that. Thank you very much. Thank you, Mr. Chairman. The Chairman. Thank you, Senator Hutchison. And Senator Cantwell. Senator Cantwell. Thank you, Mr. Chairman. And thank you for allowing me to ask a second round of questions. And, Secretary Napolitano, again, thank you for your service and all your hard work. I'd like to submit a question, if I could, to you about semisubmersible vehicles that are being used in the drug trade. And my understanding is they're growing in numbers. I don't know if we've thought about that as it relates to security, since these are one-way vessels and they can be used for drugs; they could be used for other things. But, I'm going to submit that for the record and maybe get an answer from you. But, I'd like to bring up two specific cases that are--been really receiving national attention, and see if I could get your help on that. The first is Ernesto Gamboa. He was an individual who served as a confidential informant, and, for the past 14 years, assisted law enforcement in the dismantling of large and dangerous drug operations. He frequently put himself at risk. He worked with the Washington State Patrol, the Federal Bureau of Investigation, the DEA, and INS, and with the Bureau of Immigration and Customs, ICE. So, his cooperation was critical to the success of Federal prosecutors in seizing hundreds of pounds of cocaine and methamphetamine, as well as large seizures of money and weapons. During all the time that he was cooperating with law enforcement over that time period, he was promised that he would get help with his immigration status; but, instead, in July he was detained by ICE and placed on removal, despite all of the good work that he had been doing previously for these various agencies. And so, I'm expressing concern over this case, because he's kind of in limbo; he can't work, because he doesn't have paperwork, and he can't get--if he is returned to El Salvador, I'm sure he will likely be killed. And so, if we don't help the Gamboas, who have been the informants for us, how are we going to recruit other people to helping us with finding drug traffickers and criminals? And so, I would, you know, ask for your help in this case, in understanding what we should do with Mr. Gamboa. Secretary Napolitano. Be happy to look into it. This goes to the intersection between the Department of Justice and the Department of Homeland Security, where Department of Justice DEA doesn't have authority to make immigration representations. Sometimes that gets lost in the shuffle. DEA needs to bring ICE in, or vice versa sometimes. So, I think that illustrates, perhaps, what is happening with Mr. Gamboa. I'll be happy to look into the situation. Senator Cantwell. Thank you. The second one is a case, Alonso Chehade, who--you know, we talked about this border issue in my first round of questioning, and Senator Murray and I have asked you to defer the removal of Alonso Chehade until the end of the 111th Congress. He is a case that would be--if the DREAM Act was law, he would obviously have the relief of that legislation. But, he's a 22-year-old Peruvian national who resides--who's resided in the United States since childhood. And earlier this year, he literally took a wrong turn on I-5 and was detained when he accidentally crossed into Canada. And so, now he faces deportation. He graduated from high school with honors, attended Olympic Community College, earned his bachelors degree from the University of Washington. And so, it has generated a lot of media attention in our State. And so, I'm hoping that we can defer action on his case until the 11th--111th Congress--to see if we can get the DREAM Act passed. And so, maybe Mr. Chehade, who has come to the United States as a child, not of his own doing, but has now been through our whole education system, will not, because he took a wrong turn on a freeway-- will be able to stay in the United States. Secretary Napolitano. I think his removal will be, or has been, deferred. I will double check on that, Senator. Secretary Napolitano. But, the situation you describe illustrates why President Obama is eager to have the Congress take up the whole issue of immigration and immigration reform. These situations happen in my Department every day, day in and day out. Senator Cantwell. Well, I appreciate that. And I appreciate you looking into this further. I think he's gotten a temporary deferral, but I think that'll run out in January. Secretary Napolitano. That may be right. I'll take a look. Senator Cantwell. If you could, thank you. I thank you, Mr. Chairman. The Chairman. Thank you, Senator Cantwell. Senator McCaskill may be on her way. In the meantime, I have one more question to ask. The--are you OK on time? Secretary Napolitano. I'm fine. The Chairman. OK. The--this is cybersecurity. And this doesn't appear to be a very important question, but it is to me. Again, I go back to George Bush's Director of National Intelligence, Barack Obama's Director of National Intelligence, saying the number-one threat to this country is not al Qaeda, it's not dirty bombs, it is cybersecurity. Huge importance. More or less ignored by the press, a somewhat disinterested public in that, because they can't wrap around those two words. And you have some responsibility for that. Now, my question is very specific, and you may not want to answer it, but it's--I think we--I don't--I'll tell you how I feel about it. You all had a big conference, and you decided that you'd get somebody who would report to be responsible for cybersecurity but who would report to the National Security Council and to the National Economic Council, to which I say, ``Goodbye focus on cybersecurity.'' I mean, I've been through that trip before. I've seen what happens. It just--you know, by the time the Pentagon takes their chunk and--you know, it's--it just--it won't work. Senator Snowe and I, working on--are working on legislation. We'd like to work with you on it. We say that there ought to be somebody who reports only to the President. Now, there's that part of this world which, ``Oh, there's another czar,'' to which I would say, ``Well, if that's another czar, then that's the one you want to have, because that's the number-one national security threat to our country, and will remain so.'' People have no idea what they can do. They read about it. It hasn't happened in their community, so they forget about it and go on, concentrate on al Qaeda and Taliban, and, you know, all kinds of things, but not on cybersecurity, which is the main threat. So, I want to say to you that I feel very strongly that there ought to be somebody who reports directly to the President, who has that responsibility, who doesn't try to mix the military and the intelligence and the National Economic Council, because that will--he'll wander off into nothing being done or money not being spent. I think, when you have somebody who reports to the President, it's like the Office of Science and Technology. That's a--he's not a--that's not an--Dr. John Holdren is not an agency, he's a free-floater; he can walk in and out of the Oval Office anytime he wants. But, he's doing science and technology, which you just--affects everything we do in our country, including cybersecurity. Secretary Napolitano. Indeed. The Chairman. And I think that--I think that we ought to have somebody who reports to the President. I want to say that loudly and clearly to you. You don't have to respond, if you don't want, to that view. I think the idea of having it at a lesser stature with a more diverse number of bosses is a very bad idea, and that we won't make progress, because it's the one area of national security where the public really isn't there yet. The press isn't there; they're not interested. It's yesterday's news story. Somebody hacks into something, and then you get 2 or 3 days, and it's gone. And that's a terrible threat--a terrible thing to do to this Nation. So, I just--I want to make that statement. If you'd care to respond to it, I'd be happy. But, that's what our legislation is going to say. Secretary Napolitano. Well, Mr. Chairman, I would be happy to work with you on that legislation. I think your assessment of cybersecurity as a threat is an accurate one. I would be happy to brief you and your staff on the extensive efforts we have taken within DHS to deal with the civilian side of government and the protection of that, the .gov side, as well as our interaction with the private sector. You know, 85 percent of the critical infrastructure in the country is in the hands of the private sector, and they're totally network- dependent. You think of utilities, water companies--and I could go on and on and on. I know you understand what I'm addressing. And so, we have been involved in a series of critical infrastructure meetings over the last 2 months, myself included, with the private sector, with respect to their own network security, and how we work together to improve that. So, I couldn't agree with you more about the severity and nature of the threat, and I think it is going to be part of our ongoing threat environment. The Chairman. I think the private sector will be helpful, but I have to--and this is not really quite fair of me, but-- about 10 years ago, I was worried about that and about-- generally, about powerplants and chemical plants that had-- backed up to the Ohio River. And if you go between--from Pittsburgh, in the Allegheny River, down to Cincinnati, that's about 200 miles--or maybe it's 300 miles, I have no idea, but it's a long way--and there are hundreds and hundreds of powerplants and chemical plants. And three Coast Guard cutters that have, you know, machine guns on the front, heavy machine guns--three--now, they can't go 24 hours a day, so that means there's an average of one every 8 hours--to do--patrol all of the Ohio River. This is what I'm talking about when I say, ``Please ask me. Do you need more money for that?'' So--because it's--obviously can't do the job. Anyway, I got them together, and I said, ``You've got to improve your security. You're backed up against the water. That's exactly where the terrorists will come at you.'' You have--if you're a powerplant, you have these big cooling things, they can drop things into that--the way for chemical companies to be blown up. I mean, we've had instances in West Virginia that have nothing to do with terrorism; they're just accidents, and they're just massively threatening. And so, they agreed to do something, and then they--this is slightly cynically put, but it's the way I look at it--they came back a year later, and they said that they'd given everybody who lets--admits people into the workspace--that is, where their cars pass through--a sidearm. Well, of course, that's the opposite side of the plant; the river is on the other side of the plant. It has nothing to do with what I'm talking about. So that what--to the extent that the private sector is willing to be helpful on something like cybersecurity, or other forms of security--always makes me just a little bit suspicious, because, as Senator Brownback said, it costs, and everybody's feeling very fragile, and everybody is very fragile, but this is--you know, this is the big one, as far as the Director of National Intelligence says. I don't know if you have any comments. Secretary Napolitano. Our interactions on the cyber side with the private sector to date have been, I think, very productive. And perhaps it's because the economic costs of a major denial-of-service attack or virus is substantial enough that there are incentives there for everyone to work together. But, this is an evolving field, it's an ever changing threat environment. And again, it's something that I think we will be dealing with for months and years to come. The Chairman. OK. Yes, OK. Well, let--it appears that Senator McCaskill may not be coming, so I will---- Secretary Napolitano. Do you want to---- The Chairman.--use her time. So just bear---- Secretary Napolitano. OK. The Chairman.--bear with me one more time. Can you please walk me through the challenges that you face as you attempt to implement the 100-percent-scanning requirement? And I have these photographs. And, you know, I'm talking now about maritime air--I mean, water cargo containers. And some of them, you know, they want--everybody want--in the House--wants them scanned 100 percent. You're doing it at about 5 percent, I think. And some of them--there has to be more than that, but--for example, just to pick out a Home Depot--I mean, maybe every--probably every Tuesday, at about seven different ports around the country, massive cargo containers of lumber come in. And that's predictable. It's totally predictable. So, can somebody hide something inside--a dirty bomb inside that? And does that require scanning? Then you have the--you--things are wrapped in plastic, and then they're--then they have-- wrapped in metal, and they have locks. And people say, ``Well, that's good,'' except you can blow up the locks. Well, to blow up the locks, I think, would probably be a fairly noticeable event. And so, help me understand your view of what you can responsibly, and should responsibly, do, and what you should not cost-effectively and potentially responsibly do. Secretary Napolitano. Thank you, Mr. Chairman. I--well, I'd begin by saying that we should not believe that 100-percent scanning equates to 100 percent security. And that is because, as I mentioned before, the 100-percent- scanning rule only focuses on one method of delivery and in one place. And there are numerous methods of delivery in numerous places. And so, that is why we really have to take a more-- ``nuanced'' is probably not the right word, but a layered, risk-based approach to these issues. But, for example, the technology really isn't currently available. To name just one problem, we have a high rate of false positives. The logistical challenges and cost to deploy it---- The Chairman. You mean because the technology is insufficient, or because it reads and confuses? Secretary Napolitano. It reads and confuses. You have a high level of false positives. The speed of the through-port is very slow. You have lack of adequate anomaly detection. Even if you had a good technical system, recognize that you're dealing with 700 different ports around the world; having an adequately trained workforce and the maintenance of these systems is an issue. You've got a trade issue. Many countries around the world are very--not just resistant to, but, in some respects, almost offended by the notion that we would install--you know, require this at their port, in their country. So, you have to negotiate each of those agreements separately. So, there's always the possibility of a retaliatory type of approach. There's the additional cost to the shipping system. There was a study done recently, in the EU, that this could add as much as 10 percent to shipping costs, which, in an era of a fragile global economy, is a significant add-on. So, I hope that gives you some picture of the difficulty that we have implementing a 100-percent-scanning rule. The Chairman. No, it's very helpful. And I asked that question, actually, because it was so important that Senator McCaskill get here, and that, therefore, I had to tread water as best as I could. Secretary Napolitano. Oh. The Chairman. So, she can now ask a couple of absolutely brilliant questions. Secretary Napolitano. Well, I'm glad you asked it, because I studied my answer really hard. I wanted---- [Laughter.] Secretary Napolitano.--to be able to give it to you. The Chairman. Senator McCaskill. STATEMENT OF HON. CLAIRE McCASKILL, U.S. SENATOR FROM MISSOURI Senator McCaskill. Thank you, Mr. Chairman. I appreciate you holding the hearing open until I had a chance to get here. I was over in Armed Services, as we were dealing with the President's speech on Afghanistan last night, and it took a while for me to get my questioning done there. I wanted to briefly bring up with you, Secretary Napolitano, something that I have been working on for a number of years now, and that is foreign repair stations as it relates to airline maintenance. I know this is not necessarily in your lane, but, in the long run, it needs to be on your radar-- pardon the pun--because we have, increasingly in this country, turned to foreign repair stations for, not just kicking the tires, but significant maintenance and repair work for our domestic airline industry. It--FAA is--from many different hearings in this room, we have figured out we're not really sure why we certify certain repair stations but we allow noncertified repair stations to do the work. We're not really sure why we don't have the same kind of standards at foreign repair stations, in terms of background checks, in terms of perimeter security. And I bring it up to you because I think this is something that we could benefit from you--your people taking a look at this. We had foreign repair stations doing significant work on some of our airlines in countries that were on the State Department's terrorist watch list. So, meanwhile, I--with a smile on my face, get wanded every time I get on an airplane, because I have one artificial knee, and they go through my mom's stuff, because she has two artificial knees. We have repair work, significant repair work, being done in places around the globe where I don't think the American people would be comfortable with the level of security and oversight that we're providing them. And I wanted to bring that up to you, because it's something that I had worked on--and I know we haven't had a chance to visit about it before--but would like your reaction to that and whether or not you think that some of your obligation, as it relates to homeland security, could reach out to at least do an assessment, in your view, whether or not this is something we should be worried about. Secretary Napolitano. Well, thank you, Senator. And the foreign repair issue really reveals something which I say often, which is that homeland security does not begin at the borders of the United States. You really have to think of it in a global context and then bring it home, so to speak. On November 18 of this year, so just a few weeks ago, we issued an actual Notice of Proposed Rulemaking on foreign repair stations, and it builds on the certification requirements that the FAA uses. But, it would require such things as making--requiring that they be open to audits by the Department of Homeland Security on a random and surprise basis. It requires certain types of recordkeeping. It requires certain types of other types of checks in the stations themselves. The comment period on the notice, I think, closes, I want to say, the third week of January. So, it is something that has occupied our attention, and we're moving forward in that fashion. Senator McCaskill. That is terrific. I know you've got to go, and I appreciate you sticking around until I got here. I also do want to bring up--I am hopeful that you all are looking at the security clearinghouse contracting issue as it relates to a recompete. Those costs have gone up, I'm sure you're aware. A security check has risen from $3-a-head to $27- a-head. For many of our airports, that are struggling right now in this economy, it has gotten to be a very expensive proposition. And I know you all have--TSA has not gone on record yet affirming that it will open the contract to competition, but I am--wanted to go on record as saying I'm hopeful that you all will move toward a competitive contract as quickly as possible. I think this has been a sole source for way too long, and I think we're paying more than we need to pay. Secretary Napolitano. Duly noted. Senator McCaskill. Thank you very much. And thank you, Mr. Chairman. The Chairman. Thank you, Senator McCaskill. And you have an appointment and a flight to catch. I totally thank you for being here. It's very important to us, as a committee. We respect what you're doing, and we want to be your partner. Secretary Napolitano. Thank you. Thank you, Mr. Chairman, for the opportunity to be here today. The Chairman. Thank you. The hearing is adjourned. [Whereupon, at 2 p.m., the hearing was adjourned.] A P P E N D I X Prepared Statement of Robert A. Voltmann on Behalf of the Transportation Intermediaries Association Concerning the Customs-Trade Partnership Against Terrorism (C-TPAT) The Transportation Intermediaries Association (TIA) is the leading education and policy organization for North American third party logistics professionals (3PLs). TIA is the only organization representing 3PLs doing business in both domestic and international commerce. With over 1200 members, TIA is the voice of 3PLs to shippers, carriers, government officials, and international organizations. As a condition of membership, all TIA members are required to sign and adhere to the TIA Code of Ethics. The members of TIA include property brokers, domestic freight forwarders, international forwarders and NVOCCs, airfreight forwarders, logistics management companies, and intermodal marketing companies. TIA is the U.S. member of FIATA (International Federation of Freight Forwarders Associations) representing more than 40,000 3PLs around the world. TIA supports the government's effort to involve industry in the security of the supply chain. We support opening the C-TPAT Program to all companies with a significant involvement in the international supply chain willing to submit to the rigors of the program. We believe that the C-TPAT program must be run in a non-discriminatory, mode neutral manner. TIA supports mutual recognition of similar supply chain security initiatives by our major trading partners, and the steps being taken in that direction by the Department of Homeland Security. However, TIA is concerned that: C-TPAT is currently not open to all companies with a significant involvement in the international supply chain willing to submit to the rigors of the program. C-TPAT eligibility criteria discriminate against a significant segment of the third party logistics industry licensed by the Department of Transportation. C-TPAT rules do not comport with Federal law under Section 212 of the SAFE Port Act. C-TPAT is currently not open to all companies with a significant involvement in the international supply chain willing to submit to the rigors of the program-- C-TPAT excludes Department of Transportation licensed brokers and forwarders involved in cross-border trucking. The Customs and Border Protection agency (CBP) of the Department of Homeland Security (DHS) has opened the C-TPAT program to the following types of third party logistics companies: customs brokers licensed by CBP, indirect air carriers authorized by the Transportation Security Administration (TSA) of DHS, and non-vessel operating common carriers (NVOCCs) and freight forwarders licensed by the Federal Maritime Commission (FMC). CBP has not however, opened the C-TPAT program to brokers and forwarders licensed by the Federal Motor Carrier Safety Administration (FMCSA) of the Department of Transportation (DOT) involved in the selection and management of cross-border truck and rail carriers. This exclusion has created a hole in the security network and discriminates against a significant market sector involved in the international supply chain. 3PLs assess and maintain qualification files on thousands of motor carriers engaged in cross-border traffic. Access to this capacity through C-TPAT would allow CBP another window into the small to medium sized motor carrier industry. Yet, rather than utilize a Federal license as a requirement and develop a generic set of rules for all non-asset based 3PLs, CBP has instead staked out a confusing and discriminatory position that causes harm, confusion, and ultimately, a gap in our supply chain security network. C-TPAT rules discriminate against a significant segment of the third party logistics industry and do not comport with Federal law. Criteria being followed by CBP for third party logistics companies do not properly reflect the nature of the industry as third party companies that select carriers, arrange for transportation and oversee the end-to-end movement of cargo in a mode neutral manner. Instead, the proposed rules would exclude third party logistics companies that do not own equipment or take possession of freight involved in the international supply chain. If ownership of transportation assets is to be a key qualification, it is unclear why CBP has allowed into C-TPAT customs brokers, indirect air carriers, NVOCCs, and FMC licensed freight forwarders that do not meet these equipment ownership requirements, but has singled out FMCSA licensed brokers and forwarders for exclusion. In any event, the existing rules applicable to 3PLs do not comport with Federal law. The SAFE Port Act of 2006 (Public Law 109-447) states at Sec. 212 ``Eligible Entities'' Importers, customs brokers, forwarders, air, sea, land carriers, contract logistics providers, and other entities in the international supply chain and intermodal transportation system are eligible to apply to voluntarily enter into partnerships with the Department under C-TPAT. While the Secretary is vested with the responsibility to draft rules, the existing rules are too narrow to comport with the law. DHS inexplicably has refused to admit non-asset based truck brokers ``who perform duties such as quoting, booking, rating and auditing,'' in clear violation of the statutory mandate. Mutual Recognition between the United States and Canada appears to continue the discrimination against segments of the third party logistics industry. It is our understanding from Canadian officials that U.S. CBP has urged Canada to bar FMCSA licensed brokers and forwarders from the Canadian Partners In Prevention (PIP) program. There are scores of Canadian companies licensed by U.S. FMCSA to operate as brokers and forwarders in the United States. These companies and their American counterparts select trucking companies and arrange for the transport of millions of trucks across the U.S.-Canadian border each year. The effort by CBP to bar these licensed companies that want to participate in C-TPAT from the C-TPAT program is discriminatory and endangers the security framework of the United States. Mutual Recognition Must Include Mexico. U.S. DOT licensed brokers and forwarders select and manage millions of trucking movements across the U.S.-Mexican border. These companies must be able to join the C- TPAT program like all other 3PLs. As Mexico develops its own system, there needs to be mutual recognition between the U.S. and Mexican programs. Mutual Recognition between the United States and the European Union is a good first step, but more work is necessary. TIA endorses the position and concerns expressed by the International Chamber of Commerce (ICC) with regard to C-TPAT and mutual recognition. TIA echoes the ICC's concern that mutual recognition validation is welcome, but that the need for duplicative registration processes on both sides of the Atlantic need to be eliminated. The Customs Advisory Committee on Commercial Operations (COAC) must be opened up to 3PLs and made more representative and transparent. COAC, as the industry liaison to CBP, played a central role in CBP's consideration of eligibility criteria for third party logistics providers. For reasons unknown, property brokers were excluded from the C-TPAT process while virtually all other members of the global supply chain were included. As noted, property brokers assess and maintain qualification files on thousands of motor carriers engaged in cross- border traffic. They are in an ideal position to check on the security qualifications of those carriers as well, but COAC apparently recommended against including them in the program. Apart from these security concerns, exclusion from C-TPAT eligibility has put property brokers, many of whom are small businesses, at an unfair competitive disadvantage in bidding against those already in the program for business from large shippers, such as automobile manufacturers, box store retailers and others who require their transportation and supply chain service providers to be C-TPAT qualified. TIA believes that CBP may have adopted the unreasonable restrictions on 3PL participation in C-TPAT in part because it relied on faulty advice from the COAC, which is unrepresentative of the property brokerage community. Simply put, while COAC does not include property brokers, it does include members who may have a competitive interest in excluding property brokers. TIA urges the Congress to mandate that membership in COAC must include non-asset based 3PLs. We also believe that Congress should explicitly require CBP to open the C-TPAT program to non-asset based 3PLs, as the SAFE Port Act originally intended. We would be pleased to work with the Committee in drafting legislative language to achieve those objectives. ______ Response to Written Questions Submitted by Hon. John D. Rockefeller IV to Hon. Janet Napolitano Question 1. The Government Accountability Office (GAO) is releasing their report on the Secure Freight Initiative and Department's attempts to implement 100 percent scanning today. The GAO asserts that you plan to issue a blanket extension to all foreign ports. Is this correct? Answer. The Implementing Recommendations of the 9/11 Commission Act (``9/11 Act'') of 2007 mandates that, by July 12, 2012, any container loaded on a vessel in a foreign port cannot enter the United States unless it has been scanned by non-intrusive inspection technology (NII) and radiation detection equipment before being loaded onto the vessel at the foreign port. The 9/11 Act provides the Secretary with flexibility to extend the 2012 deadline in two-year increments provided two of six pre-defined conditions exist. The extension criteria within Section 232(b) permits the certification of extensions for individual port facilities, groups of individual port facilities, or all global port facilities from which U.S. bound-containers originate. The mandate to scan all U.S. bound containers with non-intrusive equipment at the overseas port of loading has now been extended by 2 years to July 2014. Question 2. Can you please walk me through the challenges you face as you attempt to implement the 100 percent scanning requirement? Answer. In April 2008, CBP submitted a report to Congress titled ``Report to Congress on Integrated Scanning System Pilot (Security and Accountability for Every Port Act of 2006, Section 231)'' and subsequent semi-annual update reports, CBP identified several technical, logistical, and diplomatic challenges associated with scanning containerized cargo at foreign ports. These challenges include but are not limited to: Technical --Enhancing current technologies to effectively scan transshipped cargo; --Sustaining equipment operations in extreme weather conditions and certain port environments (politics, cultures); --Addressing health and safety concerns of host governments and respective trucking and labor unions, specifically with respect to imaging systems that use a radioactive source; --Protecting data privacy concerns. Logistical --Re-configuring port layouts to accommodate the equipment without affecting port efficiency; --Persuading the foreign customs service and terminal operator to meet additional staffing requirements; --Developing and implementing local response protocols for responding to alarms. Diplomatic --Concluding agreements with partnering nations and terminal operators; --Addressing the potential requirement for reciprocal scanning of U.S. exports; --Addressing the sensitivities of scanning cargo within a sovereign nation. Question 3. What lessons have you learned in implementing the pilot program since this law was enacted? Answer. CBP reported valuable lessons learned from the 100 percent scanning pilot program as well as the significant costs associated with procuring and deploying scanning systems. These lessons learned indicate that scanning 100 percent of all U.S.-bound containers is possible on a limited scale in low volume ports processing primarily gate traffic, but it would be difficult to achieve at ports that receive transshipped containers delivered to the port facility from the waterside. CBP's reports detailed that deploying current scanning technologies at high volume and transshipment ports threaten to negatively impact port operations which would significantly delay cargo shipments, increase operating costs, and infringe on the sovereignty of foreign nations. While CBP continues to identify enhancements to current scanning technologies to strengthen cargo scanning and risk assessment capabilities, meeting the challenges of scanning 100 percent of all U.S. bound cargo by July 2012 would be difficult to achieve and the use of the extensions provided in the 9/11 Act will be required. The April 2008 U.S. Customs and Border Protection initial Report to Congress on Integrated Scanning System Pilot can be found at http:// commerce.senate.gov/public/_files/ SFIReport_PublicRelease_FINAL_Consolidated.pdf. Question 4. So all of us here today can understand it, please explain the Department's layered strategy for port and cargo security? Answer. CBP implements a multi-layered, risk-based enforcement strategy designed to maximize security without causing economic disruption. This strategy encompasses the following security programs in the maritime environment: The ``24-Hour'' Manifest Rule: Advance manifest information provided 24 hours prior to lading at the foreign port; Container Security Initiative (CSI): Stationing CBP Officers at overseas ports to identify/examine high risk shipments; Customs-Trade Partnership Against Terrorism (C-TPAT): Industry partnership aimed at securing the supply chain; Use of Non-Intrusive Inspection (NII) Technology: Utilized for examining containers with limited impact to the port operations; Automated Targeting System (ATS): CBP's automated system for screening data and analyzing potential risks; National Targeting Center for Cargo (NTC-C): Centralized targeting center to support maritime cargo enforcement activities; Secure Freight Initiative's International Container Security program (SFI/ICS): Deploys scanning technology (non-intrusive imaging equipment from CBP and radiation detection equipment from Department of Energy/National Nuclear Security Administration) in support of 100 percent scanning requirement; Importer Security Filing ``10+2'': Requiring additional advanced data to enhance targeting efforts. CBP's multi-layered, risk-based enforcement strategy relies on collecting advanced information, which is screened using automated systems and analyzed by trained personnel, to provide actionable information to CBP Officers. The screening and analysis of this information allows CBP to focus its resources on those shipments of concern, while facilitating the movement of legitimate cargo. In addition to receiving advanced information, CBP partners with industry members to enhance their own security practices throughout the supply chain. Foreign government partnerships also provide invaluable insight into potentially harmful shipments and, in some locations, have allowed CBP to deploy scanning systems to scan containers for radiation, including both imaging systems provided by CBP and radiation detection equipment provided by the Department of Energy's National Nuclear Security Administration. Finally, CBP has positioned technology at all ports of entry that serve as a force multiplier for officers in the field. Taken in combination, these layers provide meaningful supply chain security. Question 5. Do you concur with the GAO's finding that the 100 percent scanning requirement could present challenges to the existing container security programs such as the Customs Trade Partnership Against Terrorism (C-TPAT) program and the Container Security Initiative (CSI)? Answer. The Secure Freight Initiative (SFI), CBP's program to comply with the 100 percent scanning requirements, represents one layer of CBP's multi-layered, risk-based enforcement strategy and is not intended to replace other CBP programs and initiatives, such as CSI and C-TPAT, which represent additional layers of CBP's enforcement strategy. In the April 2008, Report to Congress referenced in Question #1, CBP included letters and correspondence from members of the local and foreign trade community as well as Foreign Governments expressing concerns regarding 100 percent scanning to include referencing the need to continue partnering with CBP in programs such as CSI and C-TPAT. Question 6. Some foreign governments have stated that they may adopt a reciprocal requirement that all U.S.-origin containers be scanned. Would the United States be able to comply with such a mandate? Do you have any sense of what it would cost to do so? Answer. Some Foreign Governments have suggested that they may consider adopting a reciprocal requirement that all U.S. origin containers be scanned, but no official request has been made to CBP. Question 7. In April of this year, Acting Commissioner Jay Ahern testified that much had been done to enhance the security of cargo containers relative to other modes of transportation. He added that maritime security should not be overemphasized to the detriment of other modes of transportation. Also, he requested that the scanning requirement be thoughtfully reconsidered by Congress. Do you believe Congress has imposed a goal on the maritime sector that is draining limited resources from other more high risk threats to our national and economic security? Answer. A significant amount of attention and resources has been applied to the scanning of cargo containers in the maritime and land border environment which was emphasized due to the high risk threat potential of cargo containers and also to the availability of suitable commercial equipment. CBP is rapidly approaching the point where this scanning capability has been implemented for cargo containers that satisfies the mandates of the Security and Accountability For Every Port Act of 2006. However, challenges remain within the maritime environment surrounding bulk, break bulk and roll on roll off (RORO) shipments. Technical challenges and resource limitations remain to find effective, suitable solutions for many other high risk vectors (e.g., air cargo, general aviation, rail cargo inbound from Canada and Mexico, and between the Ports of Entry). Currently many resources have been directed toward improving the capabilities within the maritime sector that, in the future, could perhaps be better directed toward developing initial capabilities for these other high risk venues. Question 8. I have several questions regarding DHS's chemical/ biological detection capabilities for the transportation sector. First, what has the Department done to develop chemical and biological detection technologies for cargo? Answer. The Detect-to-Protect (D2P) Triggers and Confirmers Project has been developing and testing biological detection sensor systems for high confidence detection of prioritized threat agents that have been released into the environment. These sensors are designed to be used in a variety of operational situations, with one possible deployment scenario in cargo screening environments to provide rapid warning of a semi-concealed or leaking threat, or to be used when inspecting high risk or suspicious cargo. DHS has been conducting on-going testing of these new sensors in operational environments. DHS also has tested prototype bio-detection sensors in cargo screening environments and plans on conducting further tests as the technology matures. Currently, the device's confirmer sensor is undergoing further development and live agent testing is being conducted by the U.S. Army. DHS is also running a test of the trigger and confirmer sensors in the DC metro to see how they perform in that operational environment. Additional tests are planned for other CBP operational environments. The goal of the Non-Intrusive Container Monitor project is to develop a sensor (or suite of sensors) that can target suspicious cargo for chemical, biological, explosives, or contraband threats, and then identify the material without exposing the public or CBP officers to the hazard. DHS released a call for proposals for a ``secondary screening'' technology that can address a broad range of threats-- chemical, biological, explosive, and contraband--in one device, or one suite of devices that are all inter-operable. The Autonomous Rapid Facility Chemical Agent Monitor (ARFCAM) project has been developing and testing chemical detection systems for high confidence detection of prioritized threat agents that have been released into the environment. These sensors are designed to be used in a variety of operational situations, with one possible deployment scenario in cargo screening environments to provide rapid warning of a semi-concealed or leaking threat, or to be used when inspecting suspicious cargo. These sensors have recently been evaluated in a mass transit facility. Question 9. Do you have a deployment/implementation plan for these technologies? Answer. CBP has devices for use in the field by scientists for chemical, explosives and hazmat detection. However, at this time there is no similar hand-held tool that can properly be used by CBP officers in the field. For biological detection CBP currently uses detection paper in the field for certain biological agents. DHS continues to work on the development of technologies for use by CBP officers in the field. Question 10. Has the Department conducted a risk assessment of the key pathways that pose the highest risk in order to focus technology deployment once they have been determined to be operational effective? Answer. CBP's Office of Intelligence and Operations Coordination currently is conducting this assessment and reporting the status of this work to the DHS Office of the Inspector General on scheduled intervals. Question 11. Finally, does DHS have sufficient resources allocated in its budget for these initiatives? Answer. DHS will continue to conduct its consolidated research program supporting chemical and biological detection systems. To date the program has yet to yield field operational devices to enhance operational detection capabilities. Question 12. Members of Congress and the general public have significant concerns about the transportation of hazardous cargo in the maritime sector. Coast Guard protocols require vessel escorts for certain `Especially Hazardous Cargo'. On the Ohio River Valley in West Virginia, the Coast Guard has only three small boats to protect dozens of chemical facilities and the hundreds of vessels that transport ton chemicals to them every year. The Government Accountability Office (GAO) reported that the Coast Guard has significant resource limitations in many locations such as: a shortage of boats, a lack of qualified personnel, and unmet armament requirements, all which hinder the agency's ability to fulfill its mission requirement. Have you conducted as assessment of the assets and personnel that are needed to adequately address this core mission function? If yes, what were your findings and how can we help you? If not, could you please do so and report back to the Committee? Answer. The Coast guard leverages intelligence, Maritime Domain Awareness and operational planning guidance to allocate assets/ resources across its portfolio of 11 statutory missions to reduce safety, security, and environmental stewardship risk in the maritime domain. On a daily basis, Coast Guard operational commanders assess all mission requirements of their respective areas of operations, including consideration of Especially Hazardous Cargo escorts, and allocate available resources to the highest priority needs. Continued support for the Coast Guard's recapitalization programs (e.g., National Security Cutter, Fast Response Cutter, Response Boat- Medium, and Maritime Patrol Aircraft), consistent with annual budget requests, is essential to sustaining the Coast Guard's ability to manage risk within the maritime domain. Question 13. How do you guarantee that intelligence information sharing and coordination processes work properly? Answer. A series of processes and interconnected systems ensure the intelligence components of the Department of Homeland Security share and receive critical information. Our most effective tool is the execution of a ``hot wash'' following an incident to document the flow of information, identify the successes, the shortcomings, and make recommendations for improvements. Question 14. Let's take the example of port security. Can you walk me through how the Coast Guard, Customs and Border Patrol, Immigration and Customs Enforcement, the Bureau of Intelligence and Analysis, local authorities, and other DHS and U.S. Government entities share information to prevent attacks, or investigate suspicious activity? Answer. Our processes continue to evolve and improve; in response to several recent Homeland threats, I&A created a tiger team comprising representatives from each of the Department's intelligence component, including USCIS, TSA, USCG, CBP, ICE, and our IC colleagues, called the DHS Terrorism Task Force (DTTF). The DTTF represents a significant evolution of the DHS Intelligence Enterprise by substantially increasing the thoroughness of DHS support to FBI investigations, enhancing Departmental collaboration, providing more comprehensive intelligence support to DHS leadership decisionmaking, and building toward a departmental Intelligence Enterprise. The DTTF serves as a select group of appropriate cleared individuals from across the Department. As evidenced by its activities during the past several months, the DTTF has demonstrated to our partners at the National Counterterrorism Center (NCTC) and the Federal Bureau of Investigation (FBI) that it can properly handle sensitive information while simultaneously exploiting DHS data bases to generate additional lead information. Specifically, during the threat environment from August through October 2009, the DTTF's value was demonstrated by better support to: --The DHS leadership by leveraging the full benefit of DHS Intelligence Enterprise capabilities daily, and sometimes under significant time constraints. This support made for more informed DHS operational decisions in response to fast-breaking threat information. The DTTF also provided the DHS leadership for the first time a daily window into the full extent of DHS support to investigations from the perspective of the field, various Component agency headquarters, and from DHS employees embedded at the FBI and agencies of the Intelligence Community. --The Intelligence Community by making informed inputs regarding the broad scope of DHS actions in response to threat information reported in the DNI Homeland Threat Task Force updates. These updates were used to brief the President and key cabinet officials about the threats and actions taken by various departments and agencies in response. --The National Counterterrorism Center by illustrating the utility of expanding the dissemination of Restricted Handling material which allowed for a more Department-wide view of the threat and provided a more informed and collaborative interaction with the NCTC. --The nation's broader Homeland Security defense network by ensuring that DHS outreach to our state, local, tribal, and private sector (SLTP) stakeholders was carried out in accordance with White House guidance and in close coordination with the FBI. --The State and Urban Area Fusion Centers by providing greater context to the evolving threat and directing state and local partners to the information necessary for their leadership to make more informed decisions about the prevention and identification of additional threats. In the context of recent threat streams, DHS I&A has issued a number of bulletins and Roll Call release products to our state and local partners to sensitize them to the threat and to terrorist tactics and procedures. Zazi's activities, for example, prompted DHS to issue an advisory, Terrorist Tactics Against Mass Transit and Passenger Rail, to alert the transportation sector to possible plotting. In addition to bulletins and Roll Call release products, DHS I&A conducted teleconferences with State and Local Fusion Center Directors and State Homeland Security Advisors, and will conduct table-top exercises with private sector partners. Question 15. What if actionable intelligence on an imminent threat were to come in through the wider Intelligence Community? How does that information get disseminated to these various entities, some of which have personnel who may need to act but who do not have security clearances? Can you walk me through a scenario in which the pieces of DHS along with other Federal and local authorities would share information and work together to address an imminent threat? Answer. Actionable intelligence on an imminent threat is immediately distributed through a variety of information sharing mechanisms; including dissemination by our various IT systems, working directly with our state and local partners, our Departmental personnel in the states and with our operational components. Many of our state and local partners, as well as private sector partners have security clearances, but the Department has developed procedures to declassify critical information. For example, In the context of recent threat streams, DHS I&A has issued a number of bulletins and Roll Call release products to our state and local partners to sensitize them to the threat and to terrorist tactics and procedures. Zazi's activities, for example, prompted DHS to issue an advisory, Terrorist Tactics Against Mass Transit and Passenger Rail, to alert the transportation sector to possible plotting. In addition to bulletins and Roll Call release products, DHS I&A can conduct teleconferences with State and Local Fusion Center Directors and State Homeland Security Advisors, and can conduct table-top exercises with private sector partners. Question 16. What about Transportation Security Administration (TSA) and other agencies, including those within DHS that it works with on a daily basis. Agencies like CBP and ICE to the Federal Aviation Administration (FAA) to local authorities? Please tell me, specifically, what you do on a daily basis to promote and ensure information sharing and cross-agency coordination on addressing threats. Answer. The Transportation Security Administration (TSA) is an active participant in intelligence information sharing and coordination. TSA's Office of Intelligence (TSA-OI) interacts daily with members of the Intelligence Community, DHS components, governmental agencies with intelligence functions like the Federal Aviation Administration and other agencies within the Department of Transportation, Law Enforcement, and international partners. TSA-OI is an all source intelligence office with a 24x7, 365 days- a-week intelligence watch. The Watch provides real time warning and notification for TSA/DHS Leadership, TSA Federal Security Directors, their staff, and Coordination Centers, Federal Air Marshals, and the Intelligence Community on all threats related to the transportation sector. This sector is comprised of international and domestic commercial civil, commercial cargo and aspects of general aviation. It also includes mass transit systems, passenger and freight rail, pipelines, the U.S. highway system including commercial buses and motor coaches, and a joint responsibility with United States Coast Guard for maritime issues involving ferries systems. TSA-OI also has a professional cadre of all source intelligence analysts who provide value added intelligence analysis of transportation-related information to a broad range of TSA stakeholders in the form of briefings and written products. To support this analysis TSA-OI has analysts embedded at the CIA, the National Counterterrorism Center (NCTC), the NSA, the FBI's National Joint Terrorism Task Force (NJTTF), and FBI's Terrorist Screening Center (TSC). TSA-OI analysts are also assigned to DHS Intelligence and Analysis and located at CBP's National Targeting Center (NTC). TSA-OI's Field Intelligence Officer program provides intelligence support to over 25 of the Nation's busiest airports. Field Intelligence Officers (FIOs) support the Federal Security Directors and their staffs, interact with the local FBI JTTF, and communicate with state and local law enforcement and security officials responsible for transport security. While physically located at a major airport, all FIOs have regional responsibilities. FIOs are responsible for all modes of transportation. FIOs interact with Federal, State, and local aviation, modal authorities, law enforcement, fusion and intelligence centers, JTTFs, etc. At the local port level, leveraging the Interagency concept of operations, the Coast Guard Sector works with law enforcement partners to increase and improve the sharing of actionable law enforcement information between the Coast Guard, CBP, ICE, TSA, FAA and other Federal, state and local law enforcement partners, for more efficient and effective coordinated operations and response to threats and incidents. Coast Guard Sectors also lead Area Maritime Security Committees (AMSCs) and Harbor Safety Committees and sometimes additional locally- unique Federal/state/local/international organizations. At the national level, the USCG Headquarters Command Center in Washington, D.C. and the Coast Guard Intelligence Coordination Center (ICC) in Suitland, MD conduct direct coordination regarding suspicious activities with DHS and other Federal partners, appropriate to the nature of the activity. Both units have 7x24 watchstanding operations. The National Response Center (NRC), collocated with the USCG Headquarters Command Center, is the interagency Federal nexus for suspicious activities reported by critical industries in our ports and waterways. Industry reports which meet Federal Bureau of Investigation (FBI) criteria are forwarded by the NRC directly into the FBI Guardian system, where the reports are accessible by the Joint Terrorism Task Force (JTTF) units nationwide and all JTTFs have a variety of DHS members. ICE Intel disseminates vital information to the Intelligence and Law Enforcement Communities through the production of Homeland Intelligence Reports (HIRs). In FY 2009, ICE disseminated over 600 HIRs containing information relating to national security, Southwest Border security, transnational criminal activity, and threats to public safety. HIRs produce and incorporate information from open sources, law enforcement data bases, and classified information. They are disseminated to the appropriate parties as based on content. Question 17. Protecting the Nation from security risks posed by the nearly 13 million small vessels that exist is a monumental task. There are parallel security threats in the general aviation sector, which has been a long unaddressed vulnerability in our aviation industry. I understand that you and Admiral Allen are preparing a revised Small Vessel Security Strategy. When will that be finalized? It is my understanding that DHS has a number of related programs to address small vessel security but they do not coordinate with each other. How will you integrate these multiple programs into one comprehensive, layered security approach? Answer. The Small Vessel Security Strategy was published in April of 2009. The DHS Small Vessel Security Implementation Plan is expected to be released by the Department in 2010. The Plan is being developed through an integrated DHS component small vessel security working group. The small vessel security initiatives of component agencies are being coordinated to eliminate redundancies and ensure coordinated implementation actions among Federal partners. Question 18. TSA has not conducted a national railroad risk assessment as required by the 9/11 Act. As a result, TSA has been unable to assess the potential consequences of certain proposals, such as allowing guns on Amtrak trains, on the security of the passenger rail network. What are you doing to guarantee that TSA completes the risk assessment, as required? Answer. As required by the 9/11 Act, the Transportation Security Administration (TSA) has conducted the Transportation System Sector Risk Assessment (TSSRA), which encompasses railroads and other surface transportation modes. Through TSSRA, TSA has evaluated threat, vulnerability, and consequence in a wide range of terrorist attack scenarios for each mode of transportation. For mass transit and passenger rail, this assessment considered more than 200 scenarios, rating threat capabilities and likelihood of execution; vulnerabilities of rail and bus systems and infrastructure; and potential consequences in casualties, property damage, and impacts on the transportation network. The resulting risk ranking enables setting of informed mitigation priorities, both across the sector and by individual mode, for collaborative security strategies, program development and resource allocations. The TSSRA is in the final stages of review at TSA. Question 19. The Visible Intermodal Prevention and Response (VIPR) program works with local law enforcement to serve as a deterrent to potential terrorist attacks. However, a recent GAO report found that some VIPR teams do not have sufficient training or enough radios and other communication equipment to coordinate effectively with local law and surface transportation officials. What are you doing to ensure that TSA provides sufficient training and resources so that VIPR teams can help protect our transportation networks? Answer. The Transportation Security Administration (TSA) routinely works with local transportation and law enforcement stakeholder/ partners to train and familiarize TSA deployable assets that are used on Visible Intermodal Prevention and Response (VIPR) operations. Much of this training is completed at the local level and is specific to particular modes of transportation. One such example is TSA's continuing initiative to train Federal Air Marshals (FAMs) and Transportation Security Officers (TSOs) to work in mass transit environments alongside local transportation and law enforcement stakeholder/partners. Both FAMs and TSOs receive training directly from the partnering transportation authority on safety matters, the transit agency's physical structure, and specific operating procedures. TSA also sends its personnel to numerous anti-terrorism training courses that have specific application in the transportation domain. TSA plans to develop an agency-wide VIPR specific training curriculum for all TSA deployable assets that participate in VIPR operations. In addition, TSA's Office of Law Enforcement/Federal Air Marshal Service (OLE/FAMS) has developed specific VIPR law enforcement training that is instructed at its training academy and field office level. TSA's OLE/FAMS has provided the necessary interoperability communication equipment for the 10 dedicated VIPR teams. Additionally, in Fiscal Year (FY) 2010, TSA received funding for an increase of 15 VIPR teams, dedicated to the surface domain. The FY 2010 funding provides the necessary radio communication equipment and training. Question 20. What else can be done to improve our protection of critical infrastructure from cyber attacks and what can be done to improve public-private partnerships between government agencies and critical infrastructure providers? Answer. The National Cyber Security Division (NCSD) within the Department of Homeland Security (DHS) engages in a wide variety of initiatives designed to improve the protection of critical infrastructure from cyber attacks. Many of NCSD's ongoing initiatives illustrate areas where NCSD is pursuing improvements to current processes and practices. Generally, however, improvements in the protection of critical infrastructure from cyber attacks could be gained from implementing appropriate security measures and effective partnerships across the Critical Infrastructure and Key Resources (CIKR) sectors. Initiatives such as the development of improved national cyber incident response, multi-directional information sharing, improved national capability and capacity to detect, prevent, respond to, and mitigate disruptions of voice and cyber communications, and increased security for CIKR industrial control systems are ready examples of areas where additional efforts will improve CIKR cybersecurity. Question 21. What can be done to improve public-private partnerships between government agencies and critical infrastructure providers? Answer. Public-private partnerships between government agencies and critical infrastructure providers are key to improved cybersecurity for the Nation's CIKR. NCSD works closely with private-sector representatives from each of the CIKR sectors and is actively engaged in strengthening and expanding those relationships. Partnerships are based on trust, which is enhanced through continued mutual engagement between and among public- and private-sector partners. Initiatives currently being pursued to improve public-private partnerships include: increasing collaboration with industry on key plans such as the National Cyber Incident Response Plan; integrating private-sector involvement in cyber operations centers, including the new National Cybersecurity and Communications Integration Center; expanding the services of existing cyber operations centers such as the Industrial Control Systems Cyber Emergency Response Team; and continuing to protect the Nation's CIKR networks through risk-mitigation efforts conducted in full partnership with industry as outlined in the Information Technology Sector Baseline Risk Assessment. ______ Response to Written Question Submitted by Hon. Byron L. Dorgan to Hon. Janet Napolitano Question. I understand that the Transportation Security Administration (TSA) is actively examining the current process for facilitating background checks for aviation workers in an effort to enhance competition. I fully support the principle of competition, so long as the high standards set by the current system are maintained and security is never compromised. I hope you will adequately assess the key capabilities necessary to maintain a successful process, including the ability to instantaneously determine the status of any individual worker in the system and to quickly respond to evolving TSA requirements and directives. Maintaining the highest bar for security must be your goal. As you contemplate changes in this area, I urge you to pursue a careful and informed course that ensures: Today's high security standards are not diminished and all vendors qualified by TSA meet the same high standards required today of the Transportation Security Clearinghouse (TSC). Airports have the ability to select a qualified entity to provide these services at their facility. The current TSC services, developed at no cost to the Federal Government, remain available to airports and other users without disruption. With that in mind, I would like your answer to the following questions: What safeguards do you have in place to ensure that the existing process and high standards are not disrupted as you pursue competition for background screening services? What safeguards will be in place to ensure that existing security capabilities are not diminished as changes in this area are implemented? Does TSA intend to require that all service providers are capable of monitoring the status of all workers it processes prior to their assumption of these services at airports? Answer. In examining the current aviation worker screening process, a primary objective of the Transportation Security Administration (TSA) is to maintain or improve upon existing security standards and practices. TSA hopes that competition in this area will yield process enhancements and security capabilities that operationally improve aviation worker background checks. As part of this process, TSA is establishing data submission standards and will include best practices for data security. The provider(s) selected to provide aviation screening services would be expected to adhere to these standards and undergo periodic reviews. ______ Response to Written Questions Submitted by Hon. Maria Cantwell to Hon. Janet Napolitano Question 1. Madam Secretary, as you know, there is a one-hundred percent screening requirement for all cargo placed on commercial passenger flights that goes into effect next August. In some instances, meeting this mandate without causing undo economic harm is going to be challenging. Let me give you an example. In Washington State, the fresh cherry season is very short and cherries need to be picked, packed and shipped within twenty-four hours. During the season, fresh cherries are flown from SeaTac to Asian markets on anywhere between eighty to one hundred dedicated freight aircraft flights as well as in the cargo hold of numerous commercial passenger flights. To help Washington State cherry growers meet the current fifty percent inspection requirement, this summer TSA provided K-9 units to help scan the cherries shipped on these commercial passenger flights. I thank the Department for doing that. But everyone recognizes this is not a viable long term solution to meet my growers need to have fruits shipped on commercial passenger flights and TSA's need to ensure the security of our skies. I have been told that equipment is being tested that would allow freight forwarders to scan full pallets and containers at airports before they are loaded onto planes. The availability of this technology would greatly improve the ability of Washington cherry growers to get their highly perishable product to Asian markets quickly and efficiently, and eliminate the need for dogs. What is the status of the technology and what is the status of the testing? When do you believe freight forwarders will be able to begin utilizing these scanners? To meet the one-hundred percent scanning requirement will it be possible to accelerate the rollout of these scanners? If the scanning technology is not widely available by the beginning of next cherry season, will the Department continue to provide K-9 units? Answer. Electronic metal detector technology that may offer the potential to screen individual boxes and skids (up to 40 inches by 48 inches in size), provided that no metal is used in packaging, is currently being tested in the laboratory and in the field. Testing is being conducted using as aggressive and expedited a schedule as is possible consistent with good test practices and concern for security. If testing shows that systems using this technology are effective and suitable, freight forwarders will be able to purchase and use such systems immediately upon notification of system qualification. The Transportation Security Administration (TSA) expects that notification of system qualification will be provided not later than end of March 2010, before the start of the cherry season. Explosive detection canine units will remain an integral portion of air cargo security screening and TSA's program was expanded by an additional 35 teams in 2009. Although TSA will continue to facilitate these situations with canines as much as possible, TSA will not be able to fully alleviate the need for screening this cargo each time due to limited resources and the increased amount of cargo to be screened across the Nation once the 100 percent mandate becomes effective. Alternatively, businesses such as the cherry growers can participate in TSA's Certified Cargo Screening Program, which would permit these entities to physically search the cargo as they build it up and offer it for transport as screened cargo given all required security measures of the program are adhered to. This program is available for participation now and is being used by shippers of various time sensitive and high value goods, perishable goods or goods that require very special handling. Question 2. Madam Secretary, roughly seventy percent of container ship traffic entering the Port of Seattle and the Port of Tacoma is discretionary. That is, only thirty percent of the contents of these containers ``remain'' in Pacific Northwest. The ``vast majority'' gets transported to points east, primarily by rail. Washington State Ports compete with Canadian ports in Vancouver and at Prince Rupert for discretionary container traffic. Asian shippers decide where to ship to, based on price and schedule. I understand that the statutory mandate to scan all U.S. bound containers with non- intrusive equipment at the overseas port of loading has now been extended by 2 years to July 2014. Madam Secretary, do you know if container ships bound for Western Canadian ports will have similar security requirements for in-bound containers? For example, if containers arriving in Western Canadian ports from country ``A'' are placed on rail and are transported across the U.S.-Canadian land border, will the U.S. security of these containers be equivalent to containers arriving at a Washington State port directly from country ``A''? If that is not the case, do you think that this difference in requirements present an increased level of security risk to the U.S.? Also would this place U.S. west coast ports at a competitive disadvantage? More broadly, do you see a need to harmonize policies and practices with respect to ensuring the security of in-bound containers across North America? Answer. CBP has developed a multi-layered process to target and examine high-risk shipments while simultaneously facilitating legitimate trade and cargo. We are accomplishing this through legislative initiatives, use of advance information, risk-management targeting systems, detection technologies, extended border strategies and the human factor. CBP screens the data and information for all cargo containers arriving in the United States from foreign locations, regardless of the country of origin or the mode of transportation (e.g., sea or rail); and closely scrutinizes and examines all shipments identified as high risk. CBP employs its layered enforcement process to thoroughly screen and ultimately examine 100 percent of the shipments that pose a risk to our country. Question 3. Madam Secretary, the semi-submersibles vessels used by Central and South American drug-runners are typically built in the jungles of Columbia, only built for a one-way trip, and are designed to be scuttled (sunk) once either the delivery is made or the vessel is detected by law enforcement. This is an extremely effective method for drug-runners, but is there any evidence that groups or individuals have considered using semi-submersible vessels for something other than the drug trade? Are our drug enforcement officials, law enforcement officials, and intelligence agencies actively communicating to make sure that if there is interest among terrorist groups or others for using semi-submersible vessels for things beyond drug transport, our Nation's homeland security system will pick up on that? Answer. Available reporting indicates Self Propelled Semi- Submersibles (SPSS) are built for the express purpose of transporting cocaine from South America to off-load sites on or near the coasts of Central America, Colombia, and Mexico. No available reporting indicates SPSS operations have occurred in U.S. territorial waters. Moreover, little to no evidence indicates groups outside the drug trade have used SPSS vessels in any capacity. Question 4. I know that your department and the Coast Guard are working on the problem of small vessel security, and developed a Small Vessel Security Strategy in April of 2008. Semi-submersibles vessels are not mentioned in that strategy, though. Should they be, or are semi-submersibles a separate threat demanding a separate strategy? Answer. The DHS Small Vessel Security Strategy characterizes small vessels as any pleasure or commercial watercraft regardless of method of propulsion that is less than 300 gross tons. Although there is no exact correlation between a vessel's length and its gross tonnage, a vessel of 300 GT is approximately 100ft in length. This definition was used to ensure that all potential small vessel threats, including SPSS vessels, were covered. Question 5. Is the Department of Homeland Security currently developing a semi-submersible vessel security strategy? If not, why not? Answer. The Department of Homeland Security is developing a submersible vessel strategy, which describes the Department's strategic approach for countering the increased usage of self-propelled semi- submersible (SPSS) vessels, as well as the potential use of self- propelled submersible (SPS) vessels (submarines) to smuggle illegal drugs. Question 6. Madame Secretary, as you know, the 2010 Winter Olympics in Vancouver, Canada will occur this coming February. First, I want to thank you for your leadership and support in developing the 2010 Olympics Coordination Center in Bellingham and your agency's strong partnership over the last 5 years in the 2010 Olympics Security Committee. The facility is providing a location for inter-agency training, coordination, meetings, and exercises that has significantly strengthened overall preparedness in the region. It has proven its utility during the Police and Fire Games completed this summer and I know will do so once again during the upcoming Olympics. I believe the Coordination Center is capable of continued operations beyond the games with local Emergency Management and homeland security activities in the region continuing to operate out of the facility. I believe this capability is valuable for increasing the region's overall preparedness along our northern border. Madam Secretary, are you willing to work with me to see how the Department can maintain the Coordination Center as a legacy preparedness facility into the future? Answer. The Olympic Coordination Center has proven invaluable for various events, notably: local tabletop exercises; ``Gold,'' the largest National Level Exercise ever undertaken by Canada and a real- world event; and the World Police and Fire Games. We are looking forward to achieving the same level of success for the 2010 Olympic and Paralympic Games in early 2010. As with any facility that DHS operates, continued management of the Coordination Center will be evaluated strategically and weighed against operational and resource constraints. Question 7. On page 42, of the April 2007 GAO report entitled ``First Responders: Much Work Remains to Improve Communications Interoperability'' (GAO-07-301), the GAO recommended that DHS ``develop and implement a program plan for SAFECOM and other OEC interoperability programs that includes goals focused on improving interoperability among all levels of government''. Currently, are DHS entities in the field required to develop radio communications plans for specific areas of operation? If so, are these plans cross walked with the plans of all of the state, local, and tribal governments the DHS entities in the field work with on a day-to- day basis in order to identify gaps in multiple agency communications? Answer. Currently, there is no Federal or Department-wide policy that requires Department of Homeland Security (DHS) field components to develop radio communications plans for specific areas of operation. However, the Office of Emergency Communications (OEC) does have a strong day-to-day working relationship and feedback mechanisms with State, local, and tribal governments concerning strategic planning activities. In several instances, DHS entities have developed radio communications plans for specific areas of operations. For example, the Federal Emergency Management Agency Disaster Emergency Communications Division has undertaken an extensive effort to develop 27 State, 14 Emergency Support Function, and four regional emergency communications plans. These plans provide guidelines for pre-positioning and deploying communications resources during catastrophic incidents to support emergency communications needs in the event of a loss of local and regional communications services. DHS and its Federal, State, and local partners do work collaboratively to build and implement the national policy framework, governance structures, and operational capabilities to make the development of operational plans easier, more effective, and better integrated. These activities take into account the unique missions and geographies of DHS components, Federal agencies, and State and local agencies, as well as the varying requirements of those components for radio communications and interoperability. They include the following: National Emergency Communications Plan (NECP)--In July 2008, DHS released the first National Emergency Communications Plan in accordance with Congressional direction. In developing this plan, DHS and OEC worked closely with stakeholders across all levels of government to develop a measurable, actionable national strategy to better coordinate and guide efforts to improve nationwide operability, interoperability, and continuity of communications across levels of government and public-safety disciplines. The NECP complements and supports overarching homeland security and emergency communications legislation, strategies, and initiatives, including the National Response Framework (NRF), the National Incident Management System, the National Preparedness Guidelines, and the Target Capabilities List. Taken together, the implementation of the goals and objectives of the NRF, NECP, and other DHS strategy documents will improve nationwide response efforts and bolster situational awareness, information sharing, and on- the-ground tactical communications. State, local and tribal Integration--OEC has strong day-to-day working relationships and feedback mechanisms with State, local, and tribal governments concerning strategic planning activities. OEC works with the 56 States and territories, and several tribal nations, to implement existing strategic plans through statewide planning workshops and technical assistance. OEC also encourages the States, through their Statewide Interoperability Coordinators, to maintain representation by all levels of government on their statewide interoperability governing bodies and coordinate their strategic and tactical activities across all relevant partners. Question 8. My understanding is that the majority of the State, Local, and Tribal Law enforcement agencies operating on the Olympic Peninsula utilize the UHF band for communications. I am told most Federal agencies (including DHS) operating on the Olympic Peninsula are utilizing VHF band radios for their communications. DHS communications are primarily conducted on the Department of Justice, Integrated Wireless Network (IWN)--an encrypted VHF trunking system. Operationally, CPB agents need to be able to scan the radios of State, Local, and Tribal law enforcement, to know if they need to respond to a call for mutual aid, and more generally, to maintain situational awareness . These trunked VHF radio systems cannot scan the UHF band. And here lies the problem. It is somewhat mitigated at Blaine because the CPB and local law enforcement share a common dispatch center. On the Olympic Peninsula, though, dispatchers for local law enforcement agencies and CPB are geographically dispersed which make the coordination all that more challenging. Is DHS aware of the challenges of trunking radio systems and the barriers they present to multi-agency day-to-day field communications, particularly in more rural communities? Answer. There are two dimensions of the technical communications challenge represented in this question: (1) dealing with multiple radio technologies (trunked/non-trunked, analog/digital, proprietary/ standards-based), and (2) dealing with multiple frequency bands. The biggest technology challenge is interoperating with proprietary systems rather than standards-based systems. The only methods currently available to achieve interoperability between multiple proprietary systems or from proprietary to standards-based systems are either carrying multiple radios, or using a gateway device or audio switch technology that bridges systems together by connecting a radio or each system to the gateway. If you are dealing with standards-based systems (i.e., Project 25 (P25)), the trunked/non-trunked and analog/digital issues become much more manageable. All P25 digital radios are required to be backward compatible with analog systems. In addition, all P25 trunked radios are compatible with non-trunked P25 systems. Therefore, if an emergency responder needs to connect to multiple networks, it is recommended that they specify and purchase standards-based trunking capability in their radios and ensure that they are programmed appropriately for each network that it must operate on. In regard to the challenge of dealing with multiple frequency bands, there are gateway devices available that can enable a UHF network to communicate with the Integrated Wireless Network (IWN), which communicates on the VHF band. For example, in the greater Seattle metropolitan area, it is possible to set up radio gateways with local and state agencies via the Tri-County Radio Interoperability System (TRIS), which includes King County, Pierce County, Snohomish County, the Port of Seattle, and IWN. In areas not covered by the TRIS, interoperability switches are available and can be used to establish interoperability among disparate networks. The IWN's trunking system equipment (e.g., portables, mobiles, and consolettes) is capable of operating in both P25 trunking and conventional narrowband and conventional wideband modes in the VHF spectrum, 136-174 MHz. These radios only operate in the VHF band but some local agencies in the State of Washington operate in the VHF band as well, and if authorization is obtained, these frequencies can be programmed into the VHF equipment listed above. Another alternative for local agencies operating in the UHF 400 MHz band or 700/800 MHz bands is a multi-band radio (MBR). The Department of Homeland Security (DHS), Science and Technology Directorate's (S&T's) MBR project hosted a short-term demo in Whatcom County and Blaine, WA, between 12 local, state, and Federal agencies in the summer of 2009 that enabled communications between UHF (400, 700/800 MHz) and VHF (138-174 MHz) bands. In preparation for and during the 2010 Winter Olympics in Vancouver, British Columbia, Canada, DHS S&T will conduct a more detailed MBR pilot in that region from January 30-March 1, 2010, to assess cross-border, rural and multi-agency emergency communications and interoperability. Question 9. As you may know, Assistant Secretary Bersin and I, working with State, Local, and Tribal officials on the Olympic Peninsula, created the Multi Jurisdictional Task Force to improve communications between CPB and local law enforcement stakeholders on the ground regarding a range of issues that impact our northern border. The group identified a number of areas where more work is needed and made a number of recommendations. Are you aware of the Multi Jurisdictional Task Force and its short-, mid-, and long-term recommendations? How does the Department intend to follow up on these recommendations? Answer. CBP is fully aware of the task force and the concerns that it has identified with regard to radio interoperability. The overarching concerns are: The majority of the Olympic Peninsula's state, tribal and local (STL) law enforcement agencies/departments utilize Ultra High Frequency (UHF) band communications. Most Federal agencies operating on the Olympic Peninsula are utilizing Very High Frequency (VHF) band, while incorporating digital encryption or trunking. Within DHS, communications are primarily conducted on the Department of Justice, Integrated Wireless Network (IWN), an encrypted VHF trunking system. In response to these concerns, the Office of Border Patrol and the Office of Information Technology are actively working with STL law enforcement partners on the Olympic Peninsula and have developed a path forward which addresses the short-term, mid-term, and long-term goals of radio interoperability. The short-term goal is to establish an effective radio communications capability prior to the beginning of the 2010 Winter Olympic and Paralympics Games. To date the following actions have been taken: Clallam County Sheriff's Department has loaned five mobile radios, which were installed in Border Patrol vehicles to assist in radio interoperability until a long-term solution is implemented. Blaine Border Patrol Sector has loaned 15 portable (hand held) VHF radios to Clallam County SO and other local law enforcement agencies (LEA) to improve interoperability on the Olympic Peninsula. An ACU-1000, which provides a single UHF/VHF radio channel for emergency radio interoperability on the Olympic Peninsula has been installed at the Port Angeles Border Patrol Station. The ACU-1000 will be utilized during the 2010 Olympic Games and beyond, until a long-term interoperability solution can be implemented. The Clallam County Sheriff's Department has a Mobile Command Center (MCC), which has an ACU-1000 installed in it, and can also be utilized in the event of a large scale emergency. To address interoperability concerns after the 2010 Winter Olympic and Paralympic Games, and until a long-term communications solution can be developed and implemented, the following courses of actions are being pursued: Continue to utilize short-term options beyond the Olympic timeframe, until a long-term solution can be implemented. Continue reassessing communications interoperability based upon the needs of the Olympic Peninsula law enforcement community. In looking forward, CBP is actively pursuing a long-term communications solution for the Olympic Peninsula by taking the following actions: Implement the CBP communications modernization effort in the Olympic Peninsula. Procure dual band VHF/UHF portable radios so that Border Patrol Agents can communicate directly with other STL law enforcement officers at the lowest level. This technology will not be available until as late as 09/2010. Procure and install UHF capable vehicle mounted radios in CBP law enforcement vehicles so that Federal law enforcement can communicate ``car to car'' with STL partners. Procure and install dual-band VHF/UHF base station radios to increase communications between departments, vehicles, and law enforcement personnel. Question 10. Madam Secretary, one issue this Committee examined in 2007 with respect to the preparedness and coordination of first responders across multiple jurisdictions and multiple agencies is interoperable communications. It is still a work in progress. Washington State's long-term approach is to use Radio over Internet Protocol (RoIP). The Olympic Public Safety Communications Alliance Network (OPSCAN) consists of over 40 local, state, Federal, and Canadian public safety agencies, including DHS. OPSCAN has a fairly extensive footprint in my state's Region 1. One key advantage with using RoIP is that first responders, when responding to an incident, in principle, can use their existing radios. And with budgets being stretched as they are, it is especially hard for smaller communities, especially where first responders are volunteers, to afford purchasing new radios. Another approach the Department is looking at to achieve interoperability is to develop multiband radios. First, the Department has been looking at the use of radio over IP and VOIP for interoperable communications for several years. What do you consider to be the barriers for technology's widespread adoption by first responders? Answer. Although based on Internet Protocol (IP) standards, Voice Over IP (VoIP)/Radio Over IP (RoIP) technology is not always interoperable because it can be implemented in a number of different ways by manufacturers. As a result, there is no guarantee that one manufacturer's equipment will successfully interface with another's, even though they may both use the same standards. To address these interoperability gaps, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) is assisting in the development of VoIP specifications. The Olympic Public Safety Communications Alliance Network (OPSCAN) network uses a product from a Seattle-based company that implements a Bridging Systems Interface (BSI) to help provide connectivity between the agencies involved in the program. The BSI is an interoperability specification developed by DHS S&T in partnership with the Department of Commerce's Public Safety Communications Research (PSCR) program. DHS S&T and PSCR worked with emergency responders as well as this company and others during the development of this specification. This specification is currently implemented by 12 companies in their commercially available products and is a big step toward addressing the technical barriers to implementing interoperable RoIP solutions. Further, DHS is producing a BSI Best Practices Guide aimed at administrators and technicians that will provide guidance on procuring and establishing interoperable communications using the BSI. The largest barriers remaining for widespread implementation of RoIP as an interoperability connectivity technology are related to demonstration and knowledge dissemination. Most RoIP demonstration projects, including OPSCAN, use a single-vendor solution to provide the RoIP connectivity. A specific effort toward demonstration projects that use multi-vendor RoIP equipment would be very helpful toward demonstrating the viability of the technology. Further, more effective means of disseminating the successes and challenges of implementing such a system would also be helpful. Question 11. What more needs to be done to evolve OPSCAN and OPSCAN-like networks from a pilot project into a system for everyday use, and is that something the Department is willing to consider pursuing in partnership with the State of Washington? Answer. The largest remaining barriers for widespread implementation of Radio Over Internet Protocol (RoIP) as an interoperability connectivity technology are related to technology demonstration and knowledge dissemination. Most RoIP demonstration projects, including the Olympic Public Safety Communications Alliance Network (OPSCAN), use a single-vendor solution to provide the RoIP connectivity. A specific effort toward demonstration projects that use multi-vendor RoIP equipment would be very helpful toward demonstrating the viability of the technology. Further, more effective means of disseminating the successes and challenges of implementing such a system would help in the development of products such as best practices, lessons learned, and user guides that provide emergency responders and other stakeholders with a better understanding of the benefits and challenges they are likely to encounter when implementing a technology. Question 12. Does the Department intend to conduct a pilot of the Bridging Systems Interface program in Washington State's Region 1 during the time of the Winter Olympics to see whether it does improve interoperability under real world conditions? Answer. Because the Olympic Public Safety Communications Alliance Network (OPSCAN) network uses the Bridging System Interface (BSI); the BSI will be piloted by proxy in any activities that involve the OPSCAN network for the Winter Olympics. DHS will work with its partners in Washington State to obtain any after-action reports from these activities to help validate the application and use of the BSI in real- world scenarios. Question 13. The Department is currently conducting a series of Multiband Radio Project pilots. How will the Department know if the pilots are successful and what would be the next steps? Answer. The Department of Homeland Security (DHS), Science and Technology Directorate (S&T) is initiating Phase III of a three-phase, multi-band, portable radio (MBR) project. Phase I was the laboratory testing phase, which included emergency response agencies conducting limited in-house laboratory testing in their radio facilities and laboratory testing conducted by the Department of Commerce Public Safety Communications Research Program located at the National Institute for Standards and Technologies in Boulder, Colorado Phase II was the test-demonstration phase that included an evaluation of the prototype radios by emergency response agencies during training exercises and some use in the field. Phase III is the actual pilot testing by multiple agencies across the Nation using pre-production prototype radios. Upon completion of the pilots, participating practitioners will be interviewed by an independent party to help understand how well the pilot achieved its goals and how well the product met the expectations of emergency responders. All three phases of the project include the documentation of results, which will be compiled into a detailed final report on the mission impact and the improvement and enhancement of radio communications interoperability. DHS S&T undertook the MBR project to equip emergency responders with the unprecedented capability of operating across the entire range of public safety radio bands. Another goal of this project was to encourage additional manufacturers to develop portable radio equipment of similar capabilities with a future goal of seeing those manufacturers develop and produce a similar mobile, multi-band radio for installations in vehicles and mobile command centers (higher power version). These efforts have sparked industry's decision to invest in similar technologies; thus far, DHS has identified a total of four different companies that have developed or are currently developing a version of a MBR. Looking ahead, software-defined radio technology could provide an alternative solution that is expected to advance to a cognitive radio technology in the future. A cognitive radio solution would not be restricted to specific radio bands allocated to emergency response agencies and could therefore access any available unused/authorized spectrum available within the region. Ongoing research and development initiatives are underway but there are numerous regulatory issues as well as technical issues that must be resolved before this type of technology will be available. Question 14. Our borders and homeland security systems are being tested every day by illegal drug smugglers. The illegal drug trade uses every tool at its disposal, transporting massive quantities of drugs by land, air, and sea. For example, international drug smuggling between Washington State and Canada is often done covertly using helicopters. And in the eastern Pacific Ocean, drug smugglers are now using increasingly sophisticated and hard-to-detect semi-submersible vessels. If drug smugglers are able to transport tons of drugs into our country each and every day, what does this say about our Nation's ability to detect and stop the smuggling of people and weapons for other purposes like terrorism? Do you believe that use of increasingly sophisticated transport methods like helicopters and semi-submersibles are a potential threat to homeland security? Wouldn't an increased crackdown against international drug smuggling by agencies like the Coast Guard also have a side-benefit of strengthening our Nation's anti-terrorism presence? Answer. Your question identifies critical issues. It is the primary mission of the Department to prevent terrorist attacks within the United States and to reduce the vulnerability of the United States to terrorism. The illicit drug trade is a vast and lucrative enterprise. While it is a practical impossibility to stop all illicit trafficking, DHS commits nearly four billion dollars a year to support the national drug control program, including approximately three billion dollars for drug interdiction. DHS works in collaboration with its partners in the Departments of Justice, Defense, and State, and with our partner nations to most effectively target our intelligence, interdiction, and investigations to mitigate the threat posed by illicit drug trafficking to the homeland. I share your concerns that terrorist organizations may employ the means and methods of drug traffickers to move terrorists or weapons of mass destruction into the United States. One example of the Department's vigilance to reduce the vulnerability to these threats is the response to self-propelled semi-submersible (SPSS) vessels. As the threat posed by SPSS vessels developed, the Department proactively sought legislation to designate the operation of SPSS vessels without nationality as illegal and a threat to the security of the United States. The resulting Drug Trafficking Vessel Interdiction Act established civil and criminal penalties for persons using, navigating, or operating SPSS vessels without nationality. In the last part of your question, you ask if ``an increased crackdown against international drug smuggling by agencies like the Coast Guard also have a side-benefit of strengthening our Nation's anti-terrorism presence?'' While the reallocation of resources to support one mission may result in a ``side-benefit'' to another mission, it is important to understand possible detrimental consequences--direct and indirectly--of any reallocation of resources on efforts to battle terrorism. DHS is committed to identifying the appropriate allocation of resources amongst its various missions to maximize the ability of the Department to mitigate threats to the homeland, and particularly those posed by terrorists and weapons of mass destruction. Question 15. Given ongoing concerns about cost, schedule, and performance issues with major acquisitions such as Deepwater and SBInet, what progress has DHS made and what more can be done to ensure that DHS acquisitions stay within cost, on schedule, and perform as intended? Answer. DHS has developed a comprehensive approach that establishes acquisition management standards and oversight. Directive 102-1, Acquisition Management was issued November 2008 establishing acquisition program processes and formal acquisition review boards (ARBs) that oversee major departmental programs. During an ARB, the program manager (PM) summarizes program status relative to cost, schedule and performance. The ARB serves as a forum to assess acquisition program progress and bring essential issues to the Acquisition Decision Authority (ADA). The ARB also performs a staffing function to recommend, along with the PM, decisions and courses of action for the ADA who exercises final authority for the ARB. Once each ARB is completed, DHS documents it in a formal Acquisition Decision Memorandum (ADM) and actively monitors the completion of assigned ADM action items. DHS also tracks program manager certifications and ARB progress and approval. Since the directive was issued, over fifty ARBs have been held, of which five were with SBI and six with USCG programs. Additionally, ten USCG Acquisition Program Baselines (APBs) were approved by the Departmental ADA. To complement the ARB process, Component Portfolio Reviews were implemented. This process, jointly executed by the Component and the Department, supports management of the Component's acquisition portfolio and strengthens Departmental governance and oversight. These reviews also provide insight as to systemic acquisition risks across the Department. DHS has designated six Component Acquisition Executives (CAEs) who are responsible for program execution at their respective Components. The CAE can chair decision meetings for specific programs as delegated by the Under Secretary for Management (USM) who is the Department's Chief Acquisition Officer (CAO). Seven Independent Expert Program Reviews (IEPRs) have also been conducted on programs of senior leadership interest that have cross cutting areas pertinent to acquisition. In particular, an IEPR for SBInet was conducted in FY 2008 and the USCG National Security Cutter (NSC) in FY 2009. In the future, DHS will continue to expand the oversight and governance efforts listed above, as well as taking actions to strengthen the acquisition enterprise (such as analyzing the adequacy of program staffing for its major program portfolio). Question 16. Improving the acquisition workforce has been noted as a key acquisition management priority at DHS for the past several years. What steps has the department taken to build and sustain a sufficient, capable, and properly trained workforce to support DHS's acquisition portfolio? What additional actions does the department plan to take to strengthen its acquisition workforce? Answer. To improve DHS's ability to effectively manage its current initiatives and plan strategically for our acquisition work force, the Department has taken the following steps: 1. We established an interim working definition (positions within the Department that devote a minimum of 50 percent of time and responsibilities to performing acquisition duties) of the acquisition workforce that more accurately reflects the number of employees performing acquisition-related functions to guide current efforts, while continuing to formally add career fields to the definition. Currently, DHS has established two acquisition workforce career fields and one acquisition workforce assignment specific specialty: (1) Contract Officers and specialists, (2) program managers, and (3) contracting officer's technical representatives. Further, the Department has initiated the expansion of the acquisition workforce to include Test and Evaluation, Logistics, Systems Engineering, and Program Cost Estimating. 2: We have leveraged the successful execution of the Department-wide Acquisition Professional Career Program (APCP). This program serves as one initiative to address the Department's shortage of acquisition professionals by recruiting highly motivated and intelligent individuals into entry level acquisition career fields. In addition to growing the Department's acquisition talent, the program also serves to develop a pipeline of future acquisition leaders and to facilitate the goal of establishing the culture of One DHS. The APCP program began in 2008 and since that time has grown to 109 participants. By the end of FY 2010 program will grow to 200 positions and in FY 2011 the program expects to reach its full end strength of 300 positions. Since 2008, the program has focused on recruiting contract specialists, but, in September 2009, DHS hired its first ``technical cohort'' that consisted of 13 participants to include acquisition program managers and systems engineers. In Fiscal Year 2010 and 2011, the program will expand to other acquisition career fields to include Business Cost Estimators, Information Technology Specialists, and Logisticians. This program is expected, once fully implemented, to add up to one hundred fully trained and certified new acquisition professionals to the DHS Acquisition workforce every year to offset losses from retirements and transfers to non DHS agencies. 3. We have developed a comprehensive implementation plan to execute the existing DHS acquisition workforce initiatives, including: Developing and executing a Department-wide Acquisition Workforce Human Capital and Succession Plan in accordance with the FY 2008 National Defense Authorization Act. Continuing the successful use of the direct hire and reemployed annuitant hiring flexibilities to expedite hiring and to fill critical vacancies. Implementing the centralized hiring concept through assumption of the lead role in all Department-wide acquisition- related vacancy announcement postings. 4. The Chief Procurement Officer has coordinated with the Department's Chief Human Capital Office to establish a joint process for coordinating future acquisition workforce planning efforts with the components for the purposes of informing Department-wide planning efforts. 5. Improving the collection and maintenance of data on the acquisition workforce by the following: Assessing what additional data on current acquisition workforce members, such as attrition data, would help inform workforce planning efforts and then developing a strategy to collect that information. Expanding the collection of acquisition workforce data from the appropriate component point of contact to include all positions that DHS determines to be acquisition-related. Conducting an assessment of options for creating systems to maintain comprehensive acquisition workforce data and selecting the appropriate system. 6. The Office of the Chief Procurement Officer, Acquisition Workforce Branch is responsible for providing career development training for the entire DHS acquisition work force. Future acquisition workforce growth and succession requirements as well as competition for talent between other agencies and the components has raised concerns that reliance on these outside training sources will not satisfy DHS's long-term needs to train and retain employees. To that end, DHS has established a centralized DHS Acquisition Workforce Training and Certifications Offices to meet the expanding requirements and has increased throughput of students completing certification training to fill operational positions within the DHS headquarters and Components. Since its establishment in 2007, the Acquisition Workforce Branch (AWF) Training Team has relied on various sources for the development and delivery of acquisition-related training as a means to satisfy its certification training and continuous learning requirements. The goals of these offices are to: Develop and execute a centralized acquisition workforce training program comprised of certification, targeted, and continuous learning developmental training opportunities. Further expand, in addition to Contracting, Program Manager, and Contracting Officers Technical Representative certification programs, the DHS definition of the Acquisition Workforce by developing the Test and Evaluation career field by the end of the 2009 calendar year and begin drafting the Logistics and Systems Engineering career field certification programs. Publish a DHS course catalog and acquisition training curriculum. Implement a DHS wide online central registration and certification system. The Acquisition Training Office was established near the end of the 2007 Fiscal Year. In its first full training year, approximately 1,200 seats were available to be allocated for training. The FY 2010 training program is projected to offer over 8,000 training seats. This represents almost a 1000 percent increase in training throughput capacity in two short years. Student training and certification figures; FY08 Training Catalog and Calendar 14 = Total number of titles in FY08 catalog 47 = Total number of classes scheduled 1,200 = Approx. number of seats available for all of FY08 820 = Approx. number of students enrolled FY09 Training Catalog and Calendar 42 = Total number of titles in FY09 catalog 293 = Total number of classes scheduled 7,900 = Approx. number of seats available for all of FY09 6,785 = Approx number of students enrollments processed to date FY10 Proposed Catalog and Calendar 52 = Total number of titles in proposed FY10 catalog 283 = Total number of classes proposed to be scheduled 8,500 = Approx. number seats available for all of FY10 FAC-C Certifications Issued (Levels I, II, and III) FY2007: 163 FY2008: 450 FY2009: 478 DHS Program Management Certifications Issued (Levels I, II, and III) FY2007: 279 FY2008: 517 FY2009: 694 COTR Certifications Issued FY2007: 2,199 FY2008: 2,281 FY2009: 2,116 Average Cost per Student Through the use of consolidated training contracts and a centralized reservation system, the Acquisition Workforce Training Team decreased the average training cost from approximately $2,000 per student to approximately $250 per training seat. Further consolidation efficiencies will continue to drive cost lower while standardizing the acquisition workforce training requirements to meet the departments' needs. Question 17. The Coast Guard Authorization Act for Fiscal Years 2010 and 2011, of which I am the lead sponsor, includes numerous provisions to strengthen the Coast Guard, including a significant overhaul of the Coast Guard's acquisition programs. I strongly believe that we need to end the misuse of lead systems integrator approaches to acquisition and build a system of serious accountability. How important is it for the Coast Guard Authorization bill to be enacted this Congress? Can you please comment on the importance of the bill's Coast Guard acquisition reforms to help protect taxpayers, end wasteful spending, and provide the Coast Guard with the assets it needs to protect our Nation? Answer. Enactment of an Authorization Act for the Coast Guard is essential. I believe that such legislation must include provisions-- such as section 301 (Vice commandant; vice admirals) of S. 1194--that would enhance the efficiency and effectiveness of the Coast Guard and, by extension, the safety and security of the United States. The Department and the Coast Guard remain committed to adopting and implementing the acquisition reforms contained in S. 1194--the evidence of which is the significant department-wide improvements already implemented in acquisition policy, processes, and execution. I believe that such reforms could strengthen and solidify these improvements; thus, these reforms are important, not only to the Service, the Department, and the Government, but ultimately to the American people. Broadly speaking, I believe that acquisition reform, particularly those for an individual component, must not have a deleterious effect on either the Department's ability to manage and oversee component acquisition activities or my authority to unify departmental policies and practices. I stand ready to assist in whatever manner to ensure the swift enactment of an Authorization Act for the Coast Guard, and I look forward to working with you, this Committee, and Congress to ensure that these acquisition reforms are included--specifically, in a manner consistent with departmental policy and guidance. ______ Response to Written Questions Submitted by Hon. Frank R. Lautenberg to Hon. Janet Napolitano Question 1. Two years ago, Congress acted to require one hundred percent scanning of all shipping containers coming to the U.S. However, right now we are only scanning less than 5 percent of all U.S.-bound containers and the GAO found that one hundred percent screening has not been achieved at even one port. Can you identify any concrete, specific improvements in cargo scanning that have been made by this Administration since January? Answer. CBP's Secure Freight Initiative (SFI) is the Agency's program to deploy scanning and imaging systems overseas to meet the 100 percent scanning mandate of the 9/11 Commission Recommendation Act. SFI has produced positive results in identifying needed improvements to current technologies to enable CBP to detect anomalies in containerized shipments via imaging systems. CBP continues to work with the vendors of imaging systems to integrate these upgrades into the next generation scanning systems. SFI has scanning systems deployed at the Ports of Qasim, Pakistan; Southampton, United Kingdom; Puerto Cortes, Honduras; and Busan, Korea and anticipates being fully operational at the Port of Salalah, Oman in April 2010. SFI operations at these ports continue to provide CBP with data to enhance risk targeting, the ability to test system and scanning technology enhancements, and experience and lessons learned to evaluate potential additional locations that would strategically enhance CBP's targeting efforts. Question 2. The 9/11 Commission highlighted the importance of securing mass transit and passenger rail. The 9/11 Act we passed in 2007 set deadlines for securing our surface transportation networks, but TSA has missed many of these deadlines. How much longer will it take for TSA to meet these deadlines, including the comprehensive risk assessment and national security strategy for the rail sector that is due this month? Answer. The Transportation Security Administration (TSA) is currently working on a set of risk assessments in response to several congressional mandates and Government Accountability Office recommendations. These reports, including the freight rail risk assessment and national security strategy required by section 1511 of the Implementing Recommendations of the 9/11 Commission Act of 2007, are expected to be completed and submitted to the Department of Homeland Security (DHS) and the Office of Management and Budget (OMB) in the near future. TSA is also working on a Notice of Proposed Rulemaking (NPRM) that would require employee security training program requirements for surface modes of transportation. These include freight railroad carriers, public transportation agencies (including rail mass transit and bus systems), passenger railroad carriers, over-the-road bus operators, and motor carriers transporting Highway Security- Sensitive Materials. Question 3. Worldwide, mass transit and passenger rail have been frequent targets of terrorist attacks. Just last week a terrorist bombing of a Russian train resulted in the loss of twenty six lives. Yet our transportation security efforts have focused almost exclusively on aviation. What immediate steps is this Administration taking to protect the millions of Americans who travel by mass transit and passenger rail? Answer. The Administration is advancing a multi-faceted strategy to protect passengers traveling in mass transit and passenger rail systems through the following priority areas: Rail Transportation Security Rule--The Transportation Security Administration (TSA) issued a final rule to enhance the security of our Nation's rail transportation system, which included requirements for intercity, commuter, and short-haul passenger train service providers and rail transit systems. See 73 FR 72130, November 26, 2008. The rule codifies the scope of TSA's existing inspection program and requires regulated parties to allow TSA and Department of Homeland Security officials to enter, inspect, and test property, facilities, conveyances, and records relevant to rail security. The rule also requires that regulated parties designate rail security coordinators and report significant security concerns. Security Training Programs for Surface Mode Employees-- Pursuant to the Implementing Recommendations of the 9/11 Commission Act of 2007, TSA is developing a Notice of Proposed Rulemaking (NPRM) that would require employee security training program requirements for surface modes of transportation. The NPRM would cover public transportation agencies (including rail mass transit and bus systems) and passenger railroad carriers, as well as freight railroad carriers, over-the-road bus operators, and motor carriers transporting Highway Security-Sensitive Materials (HSSM). The NPRM will propose minimum elements for the training programs addressing security awareness, terrorist behavior recognition, and threat and incident prevention and response for frontline employees. Protect High Risk Assets and Systems--Targeting grant investments through the Transit Security Grant Program for Fiscal Year (FY) 2009 and the American Recovery and Reinvestment Act (ARRA) of 2009, totaling nearly $525 million, for expanded operational capabilities and enhanced protection of critical infrastructure. Of note, nearly $78 million of the $150 million awarded under ARRA specifically focuses on expanding capabilities for visible, unpredictable deterrence through the funding of dedicated law enforcement anti-terrorism teams, including explosives detection canine teams and mobile explosives detection screening, and reducing risk in transit systems. TSA augments these growing capabilities with deployment of Visible Intermodal Prevention and Response (VIPR) teams. Through a joint planning process between TSA, the transit or rail agency's law enforcement and security team, and local law enforcement officials, the VIPR team's composition and activities are tailored to the needs of the participating system. VIPR teams provide a range of capabilities to enhance detection and deterrence in mass transit and passenger rail, including surveillance detection, behavior observation, mobile explosive trace detection for random bag inspections, explosives detection canine teams, specialization to resolve suspected explosive devices, and other visible, random, and unpredictable security activities. During 2009, TSA conducted more than 1,050 VIPR operations with mass transit and passenger rail systems across the Nation. Amtrak and TSA have jointly planned and executed large-scale, integrated rail security operations in the Northeast Corridor, which encompasses the largest concentration of passenger rail services and highest volume of passengers in the Nation. The most recent operation unified law enforcement officers from 149 departments in an unannounced surge to 157 passenger rail stations from Richmond, VA, to Portland, ME, during morning rush hours of September 9, 2009. These operations have provided a foundation for recurring, joint security activities between Amtrak and law enforcement partners throughout the Northeast Corridor. TSA coordinates with mass transit and passenger rail systems in a risk-based approach in other metropolitan areas to advance similar approaches. Elevate the Security Baseline--Pursuing continuous improvement through comprehensive security assessments under the Baseline Assessment for Security Enhancement (BASE) program, use of the results to inform security enhancement priorities, follow-up to assist in security enhancement with the assessed agencies, and broad sharing of the most effective practices identified in the assessments. TSA surface transportation security inspectors conducted more than 40 BASE assessments during 2009. In December, TSA distributed an updated compilation of smart security practices drawn from the assessment results to law enforcement chiefs and security officials in mass transit and passenger rail agencies. This compilation consists of 80 smart security practices, many of which focus on regional partnerships, random security patrols, sweeps, and surges, and intelligence and security information sharing, and training and public awareness. Its specific purpose is to foster communication among security professionals in mass transit and passenger rail nationally with the specific objective of expanding adoption of these most effective practices, tailored as necessary to each agency's operating environment. Build Security Force Multipliers--Expanding informed, capable ``eyes and ears'' for security through targeted grants awards during FY 2009 for employee security training, anti- terrorism exercises, and public awareness campaigns, and specially trained and equipped anti-terrorism law enforcement teams and technological systems to enhance detection and deterrent capabilities. TSA augments these capabilities through focused support programs, including the following conducted during 2009: Intermodal Security Training and Exercise Program (I- STEP), designed specifically to enhance capabilities of regional security partners to work collaboratively to enhance capabilities to prevent acts of terrorism through joint workshops conducted over a period of months and a regional table top exercise. Bomb Squad Response to Transportation Systems--Mass Transit, which uses training and scenario-based exercises to expand regional capabilities to respond to a threat or incident involving a suspected explosive device in mass transit and passenger rail systems by placing bomb technicians from law enforcement forces in a transit or rail system's operating area in situations requiring coordinated planning and execution of operations to identify, resolve, and, if appropriate, render harmless improvised explosive devices. Employee Vigilance Campaign, which, under the theme of ``NOT ON MY SHIFT,'' employs professionally-designed posters to emphasize the essential role that mass transit and passenger rail employees play in security and terrorism prevention in their systems. Adaptable templates enable each transit agency to tailor the product to its operations by including the system's logo, photographs of their own agency's employees at work, and quotes from the senior leadership, law enforcement and security officials, or frontline employees. The unified Federal/local message is conveyed by the inclusion of the Department of Homeland Security seal alongside the agency's logo. Lead Information Assurance--Employing the full range of capabilities to ensure timely delivery of intelligence and security information, at classified and unclassified levels, to mass transit and passenger rail security officials. During 2009, a joint DHS Office of Intelligence and Analysis, TSA Office of Intelligence, and Federal Bureau of Investigation effort provided classified intelligence and analysis presentations to mass transit and passenger rail security directors and law enforcement chiefs in more than 20 metropolitan areas simultaneously through the Joint Terrorism Task Force (JTTF) network's secure video teleconferencing system. These briefings, held in July and December 2009, advance two key strategic objectives-- providing intelligence and security information directly to mass transit and passenger rail law enforcement chiefs and security directors and enhancing regional collaboration by bringing these officials together with their Federal partners to discuss the implications for their areas and coordinate to implement effective security solutions. The briefings will continue on approximately a quarterly to semi-annual basis, with additional sessions as threat developments may warrant. At the unclassified level, TSA periodically produces and disseminates Mass Transit Security Awareness Messages that address developments related to terrorist activity and tactics against mass transit and passenger rail. Expand Partnerships for Security Enhancement--Engaging continuously with senior executives, law enforcement chiefs, and security managers for mass transit and passenger rail agencies; State and local government officials, law enforcement, and emergency responders; and Federal partners to foster regional security coordination and to integrate the spectrum of available resources for enhanced deterrent and response capabilities. In the Department, the Office of Inter-Governmental Programs oversees this outreach, ensuring close coordination at all levels of government on security enhancement activities and actions to address a threat or incident. TSA has made outreach to, and cooperation with, governmental and industry partners the central element of its security enhancement activities. In 2009, TSA, with its Federal partners, most notably the Federal Transit Administration (FTA) and the FBI, held two joint meetings with the Mass Transit Sector Coordinating Council (SCC), which represents corporate and employee interests through representatives from the American Public Transportation Association (APTA), the Community Transportation Association of America (CTAA), Amalgamated Transit Union (ATU), Amtrak, and individual transit agencies representative of the community in system size and geographic spread, as well as representation of business organizations providing support services to the public transportation industry. These sessions streamline the coordination process between government and the transit industry, helping to advance a partnership in developing and implementing security programs. TSA also consulted extensively with the Transit Policing and Security Peer Advisory Group (PAG), which consists of law enforcement chiefs and security directors from 15 mass transit and passenger rail agencies of varying size, types of services, and locations. The collective expertise and diverse experiences of the Group provide invaluable practical context to TSA's policy and program development and implementation, assuring that developing security enhancement programs and initiatives align with operational realities in mass transit and passenger rail systems. Ten teleconferences and one joint meeting were held with the Group during 2009. Finally, TSA and DOT's Federal Transit Administration (FTA) jointly sponsored two Transit Security and Safety Roundtables, which brought together law enforcement chiefs, security directors, and safety directors from the Nation's 50 largest mass transit and passenger rail agencies and Amtrak with Federal security partners. In a workshop format, the participants discuss specific terrorism prevention and response challenges and work collaboratively in developing effective risk mitigation and security enhancement solutions. The Roundtables also enabled the transit agencies safety and security officials to share effective practices and develop relationships to improve coordination and collaboration. Question 4. Maritime workers are required to go through background checks and obtain biometric I-D cards to gain access to our ports. Now that the deadline for workers to obtain these TWIC cards has been met, TSA must focus on deploying technology that can be used to accurately read the cards. How long will it be before our ports have the technology in place to read TWIC cards? Answer. As required by the Security and Accountability For Every Port Act of 2006, DHS will implement final reader requirements through the rulemaking process. DHS intends to issue regulations that require owners and operators of MTSA regulated vessels and facilities to have and use TWIC readers in access control systems. The law requires DHS to conduct a card reader pilot program to test the business processes and technology required to deploy transportation security card readers. The pilot also will examine operational impacts for vessel and facility owners and operators. Currently there are a total of 24 participants in 9 different geographic locations representing a broad sampling of MTSA-regulated facility and vessel operations (EOA/ST&E start dates included): Port Authority of Brownsville, TX (early April 2009). Watermark Cruises, Annapolis, MD (early May 2009). Magnolia Marine, Mississippi (mid-May 2009). Staten Island Ferry (early June 2009). Clipper Navigation, Seattle, WA (late August 2009). Port Authority of New York and New Jersey (planned February 2010). Port Authority of Los Angeles (planned February 2010). Port Authority of Long Beach (planned January 2010). APM Terminal, Portsmouth, VA (planned January 2010). Exxon/Mobil, Baton Rouge, LA(planned January 2010). Shell Norco, Norco, LA (planned January 2010). The statute further requires that any final TWIC card reader rule be consistent with the findings of the pilot program. DHS intends to issue a rule after the final TWIC card reader pilot program report is made public, incorporating the data and conclusions into the rule and its supporting analyses. This will ensure the public has ample time to review both the rule and the report before DHS implements a final rule. At this time there is no requirement for ports to use readers and the TWIC reader pilot program has not been completed. Once a final rule is published, DHS anticipates a phase-in period at the ports with the reader technology. Question 5. In its last budget submitted to Congress, the Administration requested two-hundred and fifty million dollars for port security grants, a one hundred fifty million dollar cut from the program's authorized level. As the President formulates his budget for next year, will you recommend that he request the full authorized amount of funding for the Port Security grant program? Answer. Section 112 of the Security and Accountability for Every Port Act of 2006 (SAFE Port Act) amended 46USC 70107 and authorizes $400,000,000 for the Port Security Grant Program (PSGP) for Fiscal Years (FY) 2007 through 2011. Although there was a reduction in the President's budget between FY 2009 and FY 2010, the PSGP was appropriated at its full authorized amount for FY 2009 and received an additional appropriation of $150,000,000 through the American Recovery and Reinvestment Act of 2009, providing a total of $550,000,000 for the program. Further, while the SAFE Port Act establishes a maximum amount for PSGP, other factors including the ability of grantees to absorb additional funding affect our ability to allocate funds responsibly and effectively. ______ Response to Written Questions Submitted by Hon. Claire McCaskill to Hon. Janet Napolitano Question 1. I realize that your agency is not directly responsible for inspection or overseeing foreign repair stations. But what is your view on how we certify and inspect foreign repair stations? Does the lack of regular inspections of foreign repair stations raise security concerns for your department? Aren't proper inspections and review also paramount for aviation security so that we have a better handle on the process and people involved in maintaining airplanes? Answer. The Transportation Security Administration (TSA) published a Notice of Proposed Rulemaking (NPRM) on November 18, 2009, which proposes to issue regulations to improve the security of Aircraft Repair Stations as required by Public Law 108-176: The Vision 100-- Century of Aviation Reauthorization Act of 2003. The NPRM proposes to establish requirements for aircraft repair stations to adopt and implement a standard security program, and to comply with security directives issued by TSA. This rule also proposes to codify the scope of TSA's existing inspection program and to require regulated parties to allow TSA and Department of Homeland Security officials to enter, inspect, and test property, facilities, and records relevant to repair stations. The comment period for the NPRM was extended to February 19, 2010. Question 2. I'm aware that putting in security measures for the airline operations has been a significant challenge because of the diversity of aircraft, airports and operations across the country. I'm aware that there are increased background checks for pilot training. What about for airline mechanics? What can be done to check the backgrounds of mechanics at foreign repair stations? Is there any good way to track this? Answer. The Transportation Security Administration's (TSA) proposed security regulations will require repair stations certificated by the FAA under 14 CFR part 145, to adopt a security program that will include the measures by which the repair station verifies the employment history of its employees and conducts background checks to the extent permitted by the laws of the country in which the repair station is located. TSA will use the inspection process to make sure that the verification measures listed in the security program are adequate. Question 3. Regarding the sole-source agreement with the American Association of Airport Executives (AAAE) to process security data for airport workers, are you planning to compete this contract when it expires in October 2010? If not, why not? It seems clear this sole- source justification is, in the nicest terms, a stretch: We are requiring a simple transactional service--about 4 secure e-mails to be exact--and there are plenty of other players in the field. Isn't this a no-brainer? In this economic climate, how can we not be doing everything in our power to get the best value for our already struggling airports? Answer. In examining the current aviation worker vetting process, a primary objective of the Transportation Security Administration (TSA) is to maintain or improve upon existing security standards and practices. In furtherance of this objective, TSA is currently establishing data submission standards and data security requirements. TSA expects that multiple companies will qualify to meet the submission and security requirements. TSA is supportive of a model that promotes competition and airport choice and is currently evaluating several options that would achieve this. TSA anticipates that competition and airport choice in this area will yield process enhancements and security capabilities that operationally improve aviation worker background checks. TSA plans to engage industry in the first quarter of CY 2010 regarding its plans. Question 4. You've had almost a year now to get a handle on the contracting environment at DHS. Do you know about how many other sole- source contracts like this exist? What's your plan to root out the ones that are not mission-critical and promote full and open competition across the Department? Answer. While securing the Homeland through the acquisition of products and services is essential to our mission, executing contracts that represent good business is a priority as well. This includes maximizing competition and small business opportunities. We believe that the practices we have instituted in past years, coupled with new initiatives being implemented in FY2010, provide a strong mitigation strategy for reducing and/or eliminating the use of inappropriate sole source contracts. A summary of our recent achievements and our key initiatives in the area of competition are discussed below. I. Competition at the Department of Homeland Security The strength of DHS's Competition Advocacy Program is reflected in continuing improvement in the Department's level of competition. As indicated in the table below, Fiscal Year (FY) 2007 marked a recovery by DHS to pre-Katrina levels of competition. Further in FY 2008 and FY 2009 DHS achieved a level of competition equaling or exceeding 70 percent, well above the Government wide average of 64 percent. Seven out of eight DHS Components met or exceeded their FY 2009 competition goals, and six out of eight DHS Components achieved a competition rate (in terms of competitive obligations) of 70 percent or greater. DHS Summary Competition Data: Fiscal Years 2003-2009 Percentage of Contract Fiscal Year Dollars Competed Competed Dollars FY03 71% $2,771,342,335 FY04 72% $5,116,950,676 FY05 56% $5,945,514,066 FY06 48% $7,353,642,377 FY07 69% $8,144,115,845 FY08 75% $10,208,340,211 FY09 76% $10,130,114,603 Source: FPDS-NG, FY 2009 Data as of 11/30/2009. II. Competition Program Monitoring and Oversight The Chief Procurement Officer (CPO) and the DHS Competition Advocate monitor competition data as reported to the Federal Procurement Data System on a monthly basis. Mid-year reports are provided to the Chief Procurement Officer and to Heads of the Contracting Activities regarding year-to-date competitive accomplishments versus established goals. Corrective action plans are requested of Components with mid-year goal/achievement gaps greater than 10 percentage points. In addition to monitoring Component competitive accomplishments versus competitive obligation goals, progress related to two new metrics will be monitored as part of the Competition Advocate's monthly, quarterly, and mid-year reports beginning in Fiscal Year 2010. These new metrics, reducing by 10 percent the percentage of noncompetitive and one bid contracts, are being added consistent with Office of Management and Budget (OMB) Memorandum M-09-25, Improving Government Acquisition, dated July 29, 2009, and Office of Federal Procurement Policy (OFPP) memorandum Increasing Competition and Structuring Contracts for the Best Results, dated October 27, 2009. As part of this effort, the Office of the Chief Procurement Officer has established individual goals for each component and is providing monthly updates to each component on their progress to date. DHS is also involved in several post-award internal reviews of noncompetitive contract awards. The DHS oversight division of the Office of the Chief Procurement Officer recently completed a review of sole source awards made during the period of April 1, 2008 through March 31, 2009. The purpose of this review was to determine whether DHS components are awarding noncompetitive contracts in accordance with the provisions at Federal Acquisition Regulation (FAR) Part 6.3, the Homeland Security Acquisition Regulations (HSAR), the Homeland Security Acquisition Manual (HSAM) and DHS acquisition policies and guidance. Also considered was a focus on the components' use of good business judgment and adequate supporting rationale. The final report for this review, including identification of opportunities for improvement and associated recommendations, will be issued in February, 2010. Furthermore, in accordance with DHS appropriations requirements, the DHS Office of Inspector General is directed to audit and report annually on contracts awarded during the previous Fiscal Year through other than full and open competition to determine compliance with applicable laws and regulation. In October 2009, the DHS Office of Inspector General began conducting simultaneous audits of DHS competition for FYs 2008 and 2009. The reports for both FY2008 and 2009 are anticipated to be issued in February, 2010. In addition, the Government Accountability Office (GAO) recently opened an engagement assessing the extent of noncompetitive contracting, including sole source, in the Federal Government's procurement of goods and services (GAO Code 120850) to include review of the Department of Homeland Security Competition Program. III. Policies and Processes The DHS competition policy conforms with that of the Federal Acquisition Regulation and the Homeland Security Acquisition Manual. OCPO Regulatory Advisories and Acquisition Alerts provide DHS Components with accurate and timely information regarding new regulatory, data collection and reporting, and procedural requirements affecting Federal, Department wide, and Component competition programs. On October 1, 2009, the third edition of the HSAM was issued containing comprehensive and updated policy guidance related to competition. Included in the HSAM are a new comprehensive DHS Market Research Guide, an expanded and revised Acquisition Planning Guide, and a Guide for Justification and Approval for Other Than Full and Open Competition (including the requirement to post noncompetitive J&As to FedBizOpps.gov). In accordance with FAR 6.5 and Homeland Security Acquisition Manual (HSAM) 3006.5, annual Procuring Activity Competition Advocate competition reports are submitted to the DHS Competition Advocate. The reports describe Component accomplishments over the past Fiscal Year and plans for the upcoming Fiscal Year including those for increasing competition, the acquisition of commercial items, challenging barriers to competition and commercial item acquisition, and initiatives that ensure task and delivery orders over $1,000,000 issued under multiple award contracts are properly planned and issued. Component competition reports are reviewed and used to support compilation of the DHS Competition Advocate Report to the Senior Procurement Executive and the Office of Federal Procurement Policy. Instructions for preparing FY 2009 Procuring Activity Competition Advocate Reports integrates requirements associated with OMB Memorandum M-09-25, Improving Government Acquisition, DHS implementing instructions dated October 14, 2009, and OFPP memorandum Increasing Competition and Structuring Contracts for the Best Results, dated October 27, 2009. IV. Awards, Incentives, and Outreach In July 2007, the DHS Competition Advocate established the DHS Competition and Acquisition Excellence Awards Program as a means of renewing and increasing acquisition workforce interest in competition and related innovative procurement practices by recognizing and rewarding individuals and teams for outstanding contributions to the enhancement of competition and the use of innovative and best procurement practices. Thirteen nominations were received from across the DHS organization during the award program's inaugural year. Seven teams and individuals were selected for recognition, their efforts collectively resulting in estimated cost avoidance/cost savings of over $5.2 million. In a July 18, 2008 memorandum, the Office of Federal Procurement Policy (OFPP) cited the DHS FY 2007 Competition and Acquisition Excellence Awards Program as an example for agencies considering establishment of programs to recognize employee contributions to improving competition. Six out of eight DHS Components submitted nominations for the DHS FY 2008 Competition and Acquisition Excellence Award. Two individuals, one contracting activity, and three teams were recognized for outstanding results in competition and the use of innovative and best practices. The DHS Competition and Acquisition Excellence Awards Program call for nominations recognizing FY 2009 accomplishments was issued on December 4, 2009. In numerous cases, including but not limited to the DHS Competition Program, issuance of revised acquisition policy or regulations is accompanied by specialized training provided to Components. For example, in anticipation of implementation of the interim FAR rule on the public disclosure of Justification and Approval (J&A) documents for noncompetitive contracts (FAR Case 2008-003), Justification and Approval development, review, and posting training was provided to 75 ICE participants in two 90-minute sessions on February 12 and 17, 2009. The DHS Chief Procurement Officer hosts an annual DHS Industry Day in Washington, DC to provide a forum to better communicate DHS requirements and increase competition and use of commercial items by sharing information with Federal contractors and other business representatives interested in DHS contracting and subcontracting opportunities. V. Summary We believe that our established policies, continued monitoring of component progress, upfront and post award reviews, and proven management commitment provide a strong deterrent against and timely identification of potentially inappropriate sole source contracts. DHS's focus on its Competition Advocacy Program through closer coordination with Components, expanded Department wide policy, tailored training, recognition programs and enhanced oversight has resulted in a robust program in which the Department takes pride. The FY 2009 level of competition, at 76 percent, is a testament to the Competition Advocacy Program's success. DHS is committed to building upon this foundation by continuing to strongly implement our current initiatives and seeking new initiatives to best promote full and open competition across the department. ______ Response to Written Questions Submitted by Hon. Tom Udall to Hon. Janet Napolitano Question 1. As you can see, there is a great deal of confusion about what the policies are and how they should be implemented. In order to clarify the current WBI policy, please answer the following: If a passenger walks up to a WBI machine, realizes what it is, and tells a Transportation Security Officer that he does not want to go through the WBI screening, what is the correct procedure for the TSO to follow? Answer. If a passenger gets in line for advanced imaging technology (AIT), formerly referred to as whole body imaging, screening without being directed by the Transportation Security Administration (TSA) to do so and then realizes that he or she is in the wrong line, TSA will allow that passenger to undergo walk-through metal detector screening. If TSA directs a passenger to the AIT for screening and the passenger then refuses, TSA will conduct a pat down of the passenger as an alternative to the AIT. Question 2. If a TSO directs a passenger to a WBI machine because it is the shortest line, and the passenger states that she wants to go through a metal detector, what is the correct policy for a TSO to follow? Answer. This will be treated as a passenger opting out of advanced imaging technology screening, and the passenger will be required to undergo a pat-down search. Question 3. If there are both metal detectors and WBI machines being used as primary screening devices at the same checkpoint, do passengers who go through the metal detector without setting it off receive any secondary screening, such as a pat-down? Answer. A passenger undergoes screening via the primary screening device as directed by the Transportation Security Administration (TSA). For instance, if a Transportation Security Officer (TSO) directs a passenger to advanced imaging technology (AIT) screening, that passenger will undergo the AIT screening standard operating procedures (SOP). If a TSO directs a passenger to the walk-through metal detector (WTMD), that passenger will undergo the WTMD screening SOP. A passenger who does not alarm the WTMD may receive a pat down if random screening protocols are being conducted at that time or if the passenger is wearing bulky clothing that the TSO believes could conceal a non-metal prohibited item. Question 4. If a secondary pat-down is not mandatory for all passengers going through a metal detector at check points with both WBI and metal detectors, how does this prevent terrorists from simply choosing to go through a metal detector? Answer. Passengers who go through the walk-through metal detector may receive a pat down, which is conducted to detect non-metallic threat items. A pat down may be conducted on a random basis or if the passenger is wearing bulky clothing that the Transportation Security Officer believes could conceal a non-metallic prohibited item. Question 5. TSA stated policy--Passengers who do not wish to utilize this screening will use the walk-through metal detector and undergo a pat-down procedure to ensure they receive an equal level of screening. I do not believe these are acceptable options--either go through a machine that allows a TSO to see under a highly invasive image of the passenger or have a TSO give a passenger a full pat-down. What steps is TSA taking to accommodate passengers who have legitimate concerns that either option is an unreasonable privacy violation? Answer. The Transportation Security Administration (TSA) has evaluated the privacy implications of the advanced imaging technology and screening process, and has incorporated features that effectively protect the privacy of the individual. TSA has provided the greatest level of choice consistent with the need to provide adequate security. TSA has determined that threats to the aviation domain do not remain static and are currently evolving to include non-metallic threat objects and liquids (e.g., explosives) carried on persons. Given the known risk, TSA cannot accommodate passengers who are unwilling to undergo screening. Question 6. In October 2008, TSA released a Privacy Impact Assessment for Whole Body Imaging. That assessment outlined many of the policies TSA would use with WBI machines to protect passenger's privacy. Would you support a follow up report, either by GAO or the DHS Inspector General, to assess whether those policies have been followed and that they adequately protect passenger privacy? Would you support stricter guidelines from Congress on how TSA should safeguard passenger privacy at airport screenings? Answer. The Transportation Security Administration (TSA) would welcome a review by the Government Accountability Office (GAO) or the Department of Homeland Security Inspector General to assess whether the policies outlined within the Privacy Impact Assessment have been followed. TSA has welcomed and considered input on ways to improve the protection of passenger privacy consistent with its underlying security mission, but believes existing privacy frameworks adequately safeguard passenger privacy at airport screenings. Question 7. Members of the general aviation community have expressed concerns about TSA's Large Aircraft Security Program (LASP) proposed rulemaking. My understanding is that TSA is already addressing these concerns by issuing a supplemental Notice of Proposed Rulemaking (NPRM). Could you share your view on how DHS should engage and work with stakeholders from the general aviation community when developing and promulgating aviation security requirements? Answer. The Transportation Security Administration (TSA) is in the process of developing a Supplemental Notice of Proposed Rulemaking (SNPRM) to address general aviation security. The SNPRM will take into account our security partner input gathered during the public comment period. Based on this input, TSA anticipates that the proposal in the SNPRM will provide an effective and feasible security program for the general aviation community to implement, while maintaining an appropriate level of security. In Spring 2009, TSA implemented a new stakeholder outreach strategy. This strategy includes monthly stakeholder teleconferences, the designation of TSA representatives for various regions of the United States to increase outreach capabilities to non-trade association stakeholders, and the future establishment of a sub-working group under the Aviation Security Advisory Committee. This strategy bolsters TSA's industry/stakeholder communications framework and forms the foundation for current and future interactions with the stakeholder community on the development of general aviation security policies and programs. Question 8. As you may know, Sandia and Los Alamos National Laboratories operate the National Infrastructure Simulation and Analysis Center (NISAC) for the Department of Homeland Security. This Center has provided important consequence analysis of the impact on critical infrastructure from threats ranging from terrorism to natural disasters. The work of NISAC has been important in the national prioritization of infrastructure and our response to issues such as H1N1. Have you considered using NISAC to analyze and prioritize the consequences of a cyber attack on the U.S. infrastructure? If not, will your Department explore how NISAC can assist in this important area of national security? Answer. The National Cyber Security Division (NCSD) met with representatives of the National Infrastructure Simulation and Analysis Center (NISAC) to discuss potential areas of support for the Information Technology (IT) sector but determined that NISAC's work does not fit with planned IT sector activities. Currently, NCSD's needs in this area are met through other means; however, NCSD will continue to consider NISAC for future activities. For cross-sector cybersecurity work, NCSD receives support from Idaho National Laboratory and will receive new support from RTI International. Additionally, NCSD is under contract with the Software Engineering Institute/Carnegie Mellon University to conduct a study on cyber interdependencies across critical infrastructure and key resources; and with Sandia National Laboratories to assess the risks associated with control system components that have long manufacturing lead times or are only manufactured overseas. The first part of this study will look at the energy and water sectors and is intended to determine if the Nation needs a ``critical spares'' mitigation plan. NCSD plans to expand to other sectors in 2010. This effort addresses a deliverable assigned to the Department as part of Initiative 10 of the Comprehensive National Cybersecurity Initiative. Question 9. In the hearing, you discussed the fact that good border policy is complex, balancing trained personnel, technology, and infrastructure, and must account for the differences in types of border (terrain, etc.) along both the northern and southern borders. Over fifteen years ago, Sandia National Laboratories conducted an archival mile-by-mile border study for INS that resulted in technology and infrastructure recommendations. Has that study been updated and does a similar study for the northern border exist? If not, will you consider working with Sandia National Laboratories to update the southern border study and to conduct a study of the northern border? Answer. Since the Sandia National Laboratories study was completed, CBP has since developed an internal planning process which replaces the need for studies involving resource deployment strategies for infrastructure and technology enhancements. As part of the most recent congressionally mandated fence effort, CBP was required to develop Analysis of Alternatives (AoA) to determine if a fence was the most viable solution with consideration to operational effectiveness and cost. Subsequent to the fence effort, H.R. 2638 was passed directing CBP to conduct an AoA for all tactical infrastructure construction projects funded under Border Security Fencing, Infrastructure and Technology (BSFIT) appropriations. CBP has complied with this law and uses AoAs as the basis for tactical infrastructure and non-SBInet related technology deployment decisions along the northern and southern borders. The AoA solutions are determined by Field Commanders with engineering, environmental and real estate support provided by the CBP Office of Administration. ______ Response to Written Questions Submitted by Hon. Mark Begich to Hon. Janet Napolitano Question 1. Tourism is one of our Nation's greatest renewable resources, yet overseas tourists coming to the U.S. have declined since 9/11 and have not yet recovered. Secretary Napolitano, would you be supportive of creating a Tourism Liaison within DHS to coordinate and interact with the travel and tourism industries? Answer. I have designated the Private Sector Office led by Assistant Secretary Douglas Smith to work closely with the travel and tourism industry. We would welcome your support for more resources to enhance our capabilities to address tourism. We agree with you that tourism is a vital part of our Nation's economy. On October 1, 2009, I met with private sector leaders from the travel and tourism industry at a meeting hosted by U.S. Representatives Roy Blunt (R-MO) and Sam Farr (D-CA) where we discussed how the travel industry can work more collaboratively with the new Administration to improve the industry's future and strengthen the American economy. On October 22, 2009, I met with CEOs from the travel and tourism industry where I emphasized the shared responsibility between the private sector and DHS for protecting our Nation. For all private sector related issues, Assistant Secretary Douglas Smith and his office serve as the contact point. In the Homeland Security Act of 2002, the Private Sector Office was designated as advisor on the impact of the Department's policies, regulations, processes and actions on the private sector and will continue this work. Question 2. While we can all acknowledge Transportation Security Officers and other front-line DHS personnel primarily serve a security function, their interaction with the traveling public has inescapable customer service aspects. Just as it has been demonstrated that law enforcement personnel are most effective when they treat citizens with respect, the performance of DHS security employees might be improved with a less-adversarial, more passenger-friendly approach. Do you believe DHS should provide additional customer service training to frontline security and transportation personnel to help increase their people skills and provide for a more open and welcoming environment for our international visitors and domestic travelers? Answer. The Department of Homeland Security (DHS) continues to develop training for frontline security personnel that enables them to assess risks posed by travelers and control the environment to better secure transportation. Our training also directs our Transportation Security Officers to treat the traveling public with respect during any security procedure. For example, TSA is now developing its training to strengthen technical skills as well as skills to promote passenger understanding of the screening process. Question 3. After the September 2001 terrorist attacks, Anchorage International Airport (ANC) was one of several airports required by the Transportation Security Administration (TSA) to invest in Explosive Detection Systems (EDS) with the understanding the TSA would reimburse the airport for at least 75 percent of the allowable costs. After installation of the EDS was complete the TSA determined there was insufficient funding and withdrew its commitments to reimburse ANC, as well as several other airports. Congress tried to address this issue with passage of the Implementing the Recommendations of the 9/11 Commission Act of 2007, which clarified airports should be reimbursed by the TSA for eligible past costs (Public Law 110-53, Section 160). ANC has still not been reimbursed because installation of the EDS was completed before implementation of this Act. Secretary Napolitano, what will you do to address the commitment for reimbursement originally made by the TSA to airports such as ANC? Answer. The Implementing Recommendations of the 9/11 Commission Act of 2007 (P.L. 110-53, Section 1604) required TSA to create a prioritization schedule inclusive of airports that have commenced projects and incurred eligible costs in anticipation of receiving reimbursement. TSA uses a risk-based schedule that focuses first on those airports with sub-optimal solutions to ensure the most effective security solutions are in place for screening checked baggage. Competing priorities such as recapitalization of equipment that is reaching the end of its useful life and completion of optimal solutions have also precluded TSA from acting on reimbursement requests. Question 4. The United States' Arctic border used to be impenetrable, locked in ice for most of the year. A warming climate is changing this scenario, with expectations that the Arctic Ocean will be substantially ice free during summer months in 20 years. Recent summers have already seen an increase in cruise ship and marine cargo traffic in these waters and this increase is expected to expand as the ice pack withdraws. Secretary Napolitano, what do you see as the security implications of an ice-diminishing Arctic? What does Congress need to do to respond to these concerns? Do you support investment in the needed infrastructure such as aircraft facilities, vessel monitoring systems, better communications, icebreakers, and other needs to maintain a full time national presence in the Arctic? Answer. NSPD-66/HSPD-25, Arctic Region Policy, January 2009, affirms our Nation's broad and fundamental interests in the Arctic and guides the Department of Homeland Security's current operational activities in the region. As the Arctic becomes more critical to the U.S. and global economies and our national and homeland security posture, NSPD-66 notes that it is imperative that the U.S. maintain the operational ability to:
Control U.S. borders and areas under our national jurisdiction; Protect against all kinds of attacks across and from the Arctic; Increase Arctic maritime domain awareness; Protect the global mobility of U.S. vessels and aircraft and freedom of navigation and overflight under the principles of customary international law; Ensure the operational security of the maritime transportation system; Address hazards in the Arctic, including response to environmental disasters and search and rescue requirements; and Carry out all required military activities in the region, including strategic sealift. NSPD-66/HSPD-25 requires the heads of Executive Departments and Agencies with responsibilities relating to the Arctic region to work to identify future budget, administrative, personnel, or legislative proposal requirements to implement the elements of the U.S. Arctic Policy. Working with the Congress and OMB, the Department will continue to seek to integrate the operational requirements and goals of NSPD-66/ HSPD-25 with its other budget imperatives. DHS and the Coast Guard will continue to further define the requirements for infrastructure support in this region. Toward this end, the Coast Guard has contracted for a ``high latitude study'' to assist in determining mission and infrastructure requirements to properly carry out its eleven statutory missions in the Arctic (and Antarctic) now and in the future. Currently, DHS has all of the statutory authorities it requires to implement the tasks outlined in NSPD-66/HSPD-25 and any other legislation imposing mission requirements applicable to the Arctic region. Finally, the Department and the Coast Guard continues to support U.S. ratification of the 1982 Convention on the Law of the Sea. ______ Response to Written Questions Submitted by Hon. Kay Bailey Hutchison to Hon. Janet Napolitano Question 1. In response to my question regarding border wait times, you responded that wait times at CBP crossing facilities on the Texas- Mexico border had actually decreased 12 percent. However, these figures only account for time spent inside the CBP facility and not the long lines waiting to get in. At nearly all border crossings in Texas, bridge operators and owners and local officials consistently tell me that wait times outside CBP facilities can be 30 to 90 minutes or longer for freight and/or passenger vehicles. The reason they have provided to me is that there are not enough CBP staff to operate all available lanes or to expand hours of operation at congested crossings. How do you plan to supplement your measurement methods to reflect wait times outside facilities and to gauge the necessary staffing levels, number of open lanes and operating hours to decrease total wait times at CBP crossing facilities to shorter and more acceptable levels? Answer. In addition to recording and tracking our transaction time of processing vehicles and travelers through primary checkpoints, CBP also reports on wait times at our land border ports of entry. These wait time reports include the wait times outside CBP facilities. While in FY 2009 in Texas CBP saw an improvement in peak wait time averages of 14 percent compared to FY 2008, wait times outside CBP facilities can often be 30 to 90 minutes or longer. Wait times are publicly reported on the CBP web page http://apps.cbp.gov/bwt/. Wait times are an important concern for travelers and those involved with or affected by international travel and trade. A proactive approach to increasing public awareness of our mission responsibilities plays a vital role in helping raise public awareness and understanding of factors influencing wait times. Before anticipated high volume holiday traffic and high anticipated wait times our field offices provide public advisories. Additionally, our CBP port managers are directed to prepare in advance of peak travel periods and staff accordingly. Many of our locations have wait times as a result of traffic volume exceeding port infrastructure limitations. Impediments include insufficient access roads, road infrastructure, buildings, bridges, and tunnels which are beyond the control of CBP. Additional focus is necessary to address these issues in many locations. With regard to measurement methods, CBP is planning to coordinate a test of land border wait time measurement technologies (loops, GPS, RFID, Bluetooth, video imaging, etc) later this year, with the objective of enhancing wait time measurements. Although the initial tests will be on the northern border, the analysis and best practices identified will improve our methodologies. CBP prepares a Workload Staffing Model (WSM), which is used as a decision-support tool to assist in strategically determining CBP officer manpower requirements. The Port of Entry volume, number of lanes, and workload factors at each POE are drivers in this model. The WSM is consulted as OFO applies its Resource Allocation Model (RAM) process, which integrates operational and budgetary decisions on where available resources will go. Wait times are also used as a factor in helping to prioritizing funding of infrastructure construction projects. Last year, in the commercial truck environment, CBP implemented extended hours pilot programs in both El Paso/Ysleta and Laredo/World Trade Bridge. These pilot programs were discontinued after about 6 months, as there was very little volume during the additional hours. CBP continues to address staffing and infrastructure issues and continuously work toward improving wait times. Question 2. The Transportation Worker Identification Credential, known as TWIC, has been in development for 7 years, and although the card has been issued to over 1.4 million transportation workers, without the installation of the necessary card reader systems at our Nation's ports, the TWIC is currently an expensive ``flash pass''. When does DHS anticipate that TWIC will be a viable and complete security program? Answer. DHS has issued over 1.4 million Transportation Worker Identification Credentials (TWIC) leading up to and since the national compliance date of April 15, 2009. All personnel requiring unescorted access to secure areas of the Maritime Transportation Security Act of 2002 (MTSA) regulated facilities and vessels, and all mariners holding Coast Guard issued credentials are required to possess a TWIC. Prior to receiving a TWIC, all personnel are vetted to verify they do not pose a potential security threat to the maritime transportation system. The TWIC is currently used as a proof of identification and furthers DHS's multi-layered approach to the safeguarding of our Nation's ports and critical maritime infrastructure by ensuring only vetted individuals have unescorted access to secure areas. DHS intends to issue regulations that will require owners and operators of MTSA regulated vessels and facilities to have and use TWIC readers in access control systems. MTSA requires DHS to conduct a card reader pilot program to test the business processes and technology required to deploy transportation security card readers. The pilot will also examine operational impacts for vessel and facility owners and operators. The pilot, currently underway at multiple facilities and vessels around the country, is critical to informing future rulemaking on the operational impacts to affected facility and vessel owners and operators. MTSA also requires that any final TWIC card reader rule be consistent with the findings of the pilot program. DHS intends to issue a proposed rule in Spring 2011, after the final TWIC card reader pilot program report is made public this winter. Data, supporting analyses, and conclusions from the report will be incorporated in the proposed rule. DHS has a legal obligation to permit the public to comment on the methodology and data underlying any final rule. This will ensure the public has ample time to comment on both the proposed rule and the report before DHS publishes a final rule. A final rule requiring ports to use readers could publish the following year assuming there are no significant issues raised during the comment period. An ample phase-in period is anticipated after publication. Question 3. TSA has told the Committee that it is considering harmonizing its credentialing programs with the aim of greater flexibility and fee fairness for transportation workers. Given the disparity of the various credentialing programs across DHS, how and when does the Department plan to achieve this interoperability, so that a truck driver carrying hazardous materials into ports or across borders would not have to apply for two or three separate DHS programs, each with its own fee structure and background check? Answer. The Transportation Security Administration's (TSA) Office of Transportation Threat Assessment and Credentialing (TTAC) is leading an Integrated Project Team (IPT) to harmonize security threat assessments and fees across all modes of transportation. To the extent possible, TSA is developing a universal framework to harmonize the nature of the threat assessment processes and security fee schedule. The universal framework is being developed in alignment with the TTAC Infrastructure Modernization initiative, an initiative to enhance TSA vetting and credentialing programs that affect the security of all critical transportation sectors. TSA is modernizing its business processes and systems to improve and maintain the effectiveness and efficiency of transportation security threat assessments. Regulated TSA populations will incrementally transition to the universal modernized platform as quickly as possible consistent with government operational requirements and Federal rulemaking procedures. Therefore, the harmonization of background checks and associated user fees will be possible after the necessary regulatory changes have become final, the supporting infrastructure has been modernized, and all populations have been transitioned from current acquisition contracts to the new platform. While TSA is finalizing an integrated schedule, it is expected that the universal framework will become effective during the second or third quarter of 2012, and that TSA programs will be incrementally added to the framework thereafter. Note that this framework is for TSA regulated programs only, and will not cover CBP, ICE, Secret Service and many other DHS programs. It is DHS's goal, in partnership with the private sector and state/ local agencies, to reduce redundant activities and leverage investments wherever possible. To this end, DHS led a government-wide effort, in partnership with the private sector, to build an interoperable framework for credentialing across the spectrum. This framework allows for credentials to be reused--by establishing common rules for levels of trust and uses associated with each type of credential, interoperability across populations, common processes for physical and logical access control systems. This effort is directly in line with the policy established through the DHS Credentialing Framework Initiative (CFI). The CFI established several guiding principles-- including ``enroll once, use many'' for information reuse for individuals applying for multiple DHS privileges and associated credentials and vetting, associated with like uses and like risks, should be the same. The CFI provides a cohesive framework, with consideration for privacy, security risks, mission requirements, information sharing and other capabilities incorporated to ensure common strategies and objectives across DHS programs. TSA has worked hard to align programs' security threat assessments by establishing the same eligibility requirements, offering a standard waiver and appeal process, and leveraging the same fingerprint-based criminal history records check to reduce redundancy and costs for workers. For example, the Transportation Worker Identification Credential (TWIC) program is able to offer TWIC applicants a reduced cost, from $132.50 to $105.25, when the applicant already has received a comparable security threat assessment, such as: Hazardous Materials Endorsement (HME). Merchant Mariner Credential/Document administered by the United States Coast Guard. Free and Secure Trade (FAST) card administered by United States Customs and Border Protection. Another example is that the Air Cargo worker requirements for a security threat assessment accepts as comparable a valid Commercial Drivers License (CDL) with HME, TWIC, and FAST, as well background checks associated with Security Identification Display Area (SIDA) badges. Question 4. There are approximately 150,000 miles of freight railroad tracks in the United States, on which many commodities, crucial to our Nation's economy, are carried. Maintaining the security of our Nation's railroad system, by monitoring the transport of security sensitive materials, or mitigating threats of terrorist attacks, is an important area for DHS and TSA to address. The 9/11 Act required DHS to develop a National Strategy for Railroad Transportation Security and submit a report to Congress by August 2008, detailing security assessments and the cost to implement the strategy. When will this report be submitted and will you commit to focusing the Department's efforts on our Nation's surface transportation security? Answer. The Transportation Security Administration's (TSA) report entitled the ``Railroad Transportation Security Risk Assessment and National Strategy'' in response to the requirements in section 1511 of the Implementing Recommendations of the 9/11 Commission Act of 2007 (9/ 11 Act) is in the final stages of review at TSA. The Railroad Security Risk Assessment (RSRA) will describe the strategic level risks to the freight rail mode. TSA will provide context for rail risk in the transportation sector in the Transportation System Security Risk Assessment (TSSRA), which is a comprehensive national risk assessment that is required by both the Fiscal Year 2009 and Fiscal Year 2010 Appropriations language. Both reports are nearing completion. The RSRA will also include a National Strategy for Railroad Security. This strategy has been synchronized with the upcoming update of the Rail Annex to the Transportation System Sector Security Plan (TSSSP), as part of the National Infrastructure Protection Plan required by Homeland Security Presidential Directive 7. In order to streamline and coordinate strategic planning, it is intended that the updated TSSSP Rail Annex will supersede the RSRA report's rail strategy. Both strategic planning documents will reflect the currently assessed risk in the rail system and the larger transportation system. DHS also employs a variety of programs and policies that are focused on ensuring the security of the Nation's railroad transportation system. On November 26, 2008, TSA issued a final rule (73 FR 72130) for rail transportation security. The rule requires freight and passenger rail carriers, as well as shippers and certain receivers of rail security-sensitive materials (RSSM), to appoint a primary, and at least one alternate, rail security coordinator to serve as TSA's main point of contact, available on a 24/7 basis, to receive intelligence information and coordinate security-related activities. These covered entities are also required to report significant security concerns to TSA. Freight railroad carriers, as well as certain rail hazardous materials shippers and receivers, are also subject to the chain of custody provisions (49 C.F.R. 1580.107), which requires a positive and secure transfer of custody of a rail car containing RSSM at points of origin, delivery, and interchange, and includes certain requirements for physical security inspections of RSSM rail cars. Pursuant to the 9/11 Act, TSA is required to issue a regulation that would require an employee security training program for surface modes of transportation. Under the 9/11 Act, the rules cover freight railroad carriers, as well as public transportation agencies (including rail mass transit and bus systems), passenger railroad carriers, over-the- road bus operators, and certain motor carriers).''] The rules would establish propose minimum elements for the training programs addressing security awareness, terrorist behavior recognition, and threat and incident prevent and response for frontline employees. As also required by the 9/11 Act, TSA is developing regulations for railroad carriers to conduct vulnerability assessments and develop security plans. TSA, in conjunction with the private sector, has also developed a list of 24 Security Action Items (SAIs). Distributed in June 2006, these security guidelines identified best practices, which freight railroads and their employees should implement to reduce the risk associated with the transportation of toxic inhalation hazard (TIH) materials. TSA also conducts Rail Corridor Assessments (RCAs), which focus on assessing the vulnerabilities of high-population areas where TIH materials are moved by rail in significant quantities. The RCAs provide site-specific mitigation strategies and lessons learned, and supported the development of the SAIs. These vulnerability assessments have also led to the implementation of a TIH Risk Reduction Project. Implemented in 2007, the Project focuses on objectively measuring the risk reduction associated with the rail transportation of TIH materials through 46 High Threat Urban Areas. As of October 2009, the objectively-measured risk has been reduced 80 percent as compared to the base measurement year (2006). The agency will continue to measure the ongoing risk associated with the movement of TIH shipments by rail, with the goal of a 10 percent risk reduction over the previous year. Comprehensive Reviews conducted by TSA also provide a thorough evaluation of the security of a specific rail corridor and a comparative analysis of risk across transportation modes and critical infrastructure sectors in a specific geographic area. Additionally, TSA's Corporate Security Review program, an ``instructive'' review of a company's security plan and procedures, provides the government with a general understanding of each company's ability to protect its critical assets and its methods for protecting hazardous materials under its control. The Intermodal Security Training and Exercise Program (I-STEP) is also being utilized by TSA to enhance the preparedness of the Nation's surface transportation network. I-STEP has been used by the TSA Freight Rail Security Division to facilitate discussions regarding the information-sharing processes and coordination between the Federal Government and the freight rail industry, particularly during heightened states of alert. The TSA Freight Rail Security Division has also developed a critical infrastructure risk assessment tool for freight rail bridges. This tool is designed to measure the criticality and vulnerability of freight rail bridges in the United States, and will serve as the factual and analytical baseline to develop and propose security enhancements and mitigation strategies for critical railroad infrastructure. In Washington, D.C., DHS has also funded the National Capital Region Rail Security Pilot project to demonstrate the effectiveness of a suite of intrusion detection technologies in a freight railroad environment, specifically the D.C. Rail Security Corridor (DCRSC). The DCRSC is a seven-mile long corridor extending from the Anacostia River across the Potomac River. This pilot project included numerous components, including a virtual security fence that will detect moving objects, perimeter breaches, left objects, removed objects, and loitering activity. Data from the fence and the gates will be encrypted and transmitted simultaneously to multiple locations, such as the U.S. Capitol Police, U.S. Secret Service, other applicable Federal or local agencies, and CSX Transportation. Additionally, TSA is initiating a pilot project in FY 2010 to test security technologies on critical railroad bridges and tunnels. The DHS National Protection and Programs Directorate--Office of Infrastructure Protection has also engaged the Rail Subsector in activities, projects, and initiatives, including conducting 55 Enhanced Critical Infrastructure Protection Initiative visits, 10 Computer-Based Assessment Tool visits, 39 Site Assistance Visits, 121 Buffer Zone Plans, and provided $15,171,500 in Buffer Zone Protection Program grant funding to local law enforcement to increase preparedness capabilities in communities surrounding high priority Rail Subsector infrastructure. The TSA Freight Rail Security Grant Program also makes funds available for security training of frontline employees, the completion of vulnerability assessments, the development of security plans within the freight rail industry, and the installation of tracking systems for railroad cars containing TIH. Question 5. Earlier this year, the House passed a TSA Reauthorization bill. This Committee will likely work on a TSA Reauthorization proposal sometime in the coming year. Does DHS/TSA intend to submit a formal reauthorization proposal for the Committee to consider? Answer. The Department of Homeland Security is reviewing a number of legislative proposals that may be appropriate for consideration in a Transportation Security Administration (TSA) authorization bill and looks forward to assisting the Committee in promoting a package of proposals that advance security in all modes of transportation. Among other things, the legislative proposals considered by the Committee in 2010 should consider the need for implementing new technologies in aviation security and ensuring that individuals who present a threat to our Nation's security are not permitted to board overseas flights to the U.S. Additionally, I hope the Committee would act upon the legislative proposal forwarded to the congressional leadership in May 2009 to authorize the Transportation Security Administration to incrementally adjust the aviation passenger security fee to cover a larger share of the cost of aviation security. I look forward to working with the Committee on any authorization language they will be introducing during the Second Session of the 111th Congress. Question 6. It has come to my attention that only a small percentage of the Port Security Grant funding from Fiscal Years 2007, 2008, and 2009 have made it to the facilities that have been awarded grants. Can you explain where the delay has been in distributing these funds, and what steps are in place to ensure timely distribution? What percentage of the grant funding has actually made it to the recipients? Answer. Since Fiscal Year (FY) 2007, the Department of Homeland Security (DHS) has awarded over $1.2 billion in Port Security Grant Program (PSGP) funding. Of this amount, approximately $49 million has been drawn down by recipients through FEMA's electronic Payment and Reporting System (PARS). This equates to approximately 4.1 percent of the total awarded funds drawn down by recipients. Although this is a relatively low percentage, drawdown figures should not solely be used to gauge program progress or lack thereof. Each PSGP award has several special conditions that must be formally accepted by the recipient, some of which place holds on funds until met. The two special conditions that most significantly impact releasing funds and drawdown rates are the requirements for budget reviews and Environmental and Historic Preservation (EHP) reviews. These reviews take time and can vary by grant based on dollar amount, complexity of projects, grantee responsiveness, department priorities, workload, and staffing. In FY 2007 and FY 2009, the PSGP received additional appropriations, essentially making two rounds of grants for these years. In addition, beginning with the FY 2007 Supplemental round, the highest risk port areas were required to assign a ``Fiduciary Agent'' (FA), who serves as FEMA's grantee and point of contact for all grant matters. The FA works at the local level with the Captain of the Port (USCG) to foster regional collaboration and prioritize projects for submission to FEMA. A series of deliverables are required to be submitted to FEMA and must be approved prior to submitting projects. These include a Concept of Operations (CONOPS) document and a Port-Wide Risk Management Plan (PWRMP). These deliverables can take 12-18 months to complete and grant funds may be used in their development. Once these deliverables are submitted and approved by FEMA, the FA submits projects for review and approval. Even before FEMA receives the projects, they are reviewed and prioritized at the field level by the local Captain of the Port. Because each FA is on a different timetable, FEMA continually receives projects for review and must convene review panels of subject matter experts from across DHS. These panels take all of our grants staff away from their regular duties for many hours to review projects. If projects are not approved, they must be sent back to the FA for resubmission, causing further delay. Once projects are approved, they are submitted for budget and EHP clearance to release funds. Once FEMA releases funds (either partial by project or the entire award), the recipient is notified and may drawdown against the grant through PARS. Of the $1.2 billion in PSGP funding awarded from FY 2007 to present, $223.5 million or 18.1 percent of total funding has been released to grantees. FEMA does not control or dictate when recipients must drawdown funds. Each recipient follows their local protocols. Funds may be drawn down anytime during the award period and up to 90 days following the end of the award period. FEMA routinely engages with port stakeholders to listen to concerns and suggestions for improving the program. This past fall, FEMA invited all of the PSGP FAs to Washington, D.C. for a two-day workshop on how to improve the efficiency of the program. One significant change with the FY 2010 PSGP is that all FA projects are due to FEMA 45 days after application close date. All projects will be reviewed at one time by one panel of subject matter experts. This will put all FAs on the same timetable and will eliminate the current practice of reviewing projects on a rolling basis and expedite the release of funds. For existing awards (FY 2009 ARRA and prior), FEMA has made significant strides in releasing PSGP funding. Thanks to dedicated contract support personnel, the EHP backlog has been cleared. Additionally, it has been a priority of PSGP staff to review projects in a timely manner, release partial funds as projects are approved, and provide feedback to FAs as to status, particularly if projects are sent back requiring additional work. Finally, the majority of CONOPS and PRWMPs have been submitted and approved by FEMA, which now allows FEMA to concentrate on reviewing and approving projects. FEMA continues to work to strengthen the PSGP, a complex program, with a multi-stage review process, co-managed with the subject matter expertise provided by the USCG. Question 7. The Coast Guard uses a Marine Security Risk Analysis Model (MSRAM) to assess threats to critical infrastructure. However, the Department of Homeland Security still does not have one model of risk analysis that could be used by all agencies. Is there a plan to do so? Can we establish a quantifiable risk analysis tool for the Department that is adaptable for all DHS agencies? Answer. The Department of Homeland Security (DHS) assesses homeland security risk by evaluating the potential for an unwanted outcome as a function of threats, vulnerabilities, and consequences associated with all hazards to the homeland. No single assessment of homeland security risks, such as the Marine Security Risk Analysis Model, will provide all the answers to the multitude of challenges the Department faces. As of now, there is no plan to develop one model or tool for risk analysis across DHS and other agencies. The goal of risk analysis is to inform decisionmaking, but since decisions at different agencies and within different sectors are unique, with different requirements, subject to different constraints, and based on various degrees of information, it would be counter-productive to attempt to develop a single tool. Homeland security risks are so complex and cross-cutting that our ability to manage risk effectively depends on our ability to integrate and manage a wide range of homeland security activities with Federal, State, local, tribal, territorial, and private-sector partners. A unified effort focused on integrated risk management concepts within the Department is essential to understanding and effectively managing homeland security risks. Building and institutionalizing integrated risk management concepts and practices for homeland security takes time. DHS, however, has taken several critical first steps. The Department established the Office of Risk Management and Analysis (RMA) on April 1, 2007. RMA's mission is to enable and advance the effective management of risk by the homeland security enterprise. In April 2007, RMA created a departmental risk governance process by establishing the DHS Risk Steering Committee (RSC), which ensures collaboration, information sharing, and consensus building across the Department as we identify and integrate best practices for risk management and analysis. In September 2008, the RSC published a DHS Risk Lexicon, which establishes a common language for discussing risk-related concepts and techniques, and released an Interim Integrated Risk Management Framework in January 2009 that sets the foundation for a common approach to homeland security risk management. ______ Response to Written Questions Submitted by Hon. Olympia J. Snowe to Hon. Janet Napolitano Question 1. Madam Secretary, as you know, the Department has embarked upon an approximately 10M square feet headquarters consolidation at the St. Elizabeth's campus. How has the Department worked with the private sector to develop and implement an action plan? Answer. The Department of Homeland Security (DHS) National Capital Region (NCR) Housing Master Plan was developed to provide the strategic vision for facilities that support a unified department, organizational structure, operations and culture. The plan outlines priorities of implementation and addresses the mission fragmentation caused by the Headquarters (HQ) elements being scattered in over 46 locations throughout the NCR. To meet the component office space requirements through FY 2011 for headquarters facilities, the Department will require about 8 million gross square feet (GSF) of office space in the NCR with the potential to grow to 10 million GSF by FY2015. While St. Elizabeths will accommodate the main Department and Component HQ mission execution functions with 4.5 million GSF of office space, it does not have the capacity to accommodate all of the DHS mission support elements. Therefore, the DHS NCR Housing Master Plan also proposes to consolidate the mission support elements that are currently dispersed throughout the NCR to support functional integration, improve effectiveness and efficient management of the real estate portfolio. The end state real estate portfolio will include St. Elizabeths as the center of gravity for the Department Headquarters and federally owned locations at the Nebraska Avenue Complex (NAC), the U.S. Secret Service HQ and the DHS space at the Ronald Reagan Building. DHS has two long-term leases that will also be retained--the TSA location in Arlington, VA and the ICE space in SW Washington, D.C. A Mission Support Consolidation Prospectus for lease authority was submitted by General Services Administration (GSA) to Congress on October 18, 2009 to acquire a 1.2 million Rentable Square Feet (RSF) lease to consolidate the remaining locations. The Department and GSA have coordinated with the private sector throughout the past four and a half years. We've received many capabilities briefs from private sector entities with an interest in the headquarters consolidation initiative including both the St. Elizabeths Campus and the Mission Support Consolidation initiatives. GSA also engaged the market in development of the mission support lease prospectus to verify DHS requirements could be achieved while ensuring competition among the private sector offerors. On October 26, 2009, GSA and DHS sponsored an Industry Day at the Ronald Reagan Building to inform the business community on upcoming opportunities that will be available with the St. Elizabeths development. Approximately 1000 people attended the forum which provided opportunities for networking, sessions on DHS and GSA Small Business goals and practices. In addition, the GSA Federal Acquisition Service held a pre-solicitation conference in Washington, D.C., on December 14, 2009, for the St. Elizabeths Campus Technology Integration Program (TIP). The GSA acquisition strategy for the TIP is to provide an Information Technology (IT) contractor to supply materials and installation services for an enterprise wide IT campus infrastructure. Question 2. How does the Department intend to facilitate interaction across all DHS sites in the region through this consolidation? Answer. The establishment of St. Elizabeths as the Consolidated DHS HQ with all component leadership/mission execution functions represented and collocation of Component Operations Centers with the NOC, will form the foundation for building a department that is culturally, operationally and administratively unified. The campus structure optimizes our prevention and response capabilities though enhanced communication, coordination and cooperation and promotes interaction through shared use of common support and administrative facilities. The Technology Integration Program (TIP) being developed for St. Elizabeths is also being designed to consider the overall headquarters consolidation initiative and provides an enterprise wide IT infrastructure to promote and enhance communications across the consolidation sites. In addition, lessons learned with the St. Elizabeths development will be leveraged across the entire consolidation effort. Execution of the St. Elizabeths development without addressing the rest of the mission support functions will continue to impact the effective communications, coordination and cooperation among the headquarters and components due to the increasingly scattered nature of the portfolio. Question 3. As you may know, Saint Elizabeths could become a security technology corridor that advances the mission of Department of Homeland Security while simultaneously driving innovation and private sector commercialization. How does the DHS intend to advance the Department's mission while driving innovation and private sector commercialization at the Saint Elizabeths campus? Answer. The Department and GSA are closely coordinating with the District of Columbia, the National Capital Planning Commission, the Council on Environmental Quality/Office of the Federal Environmental Executive, the White House Office of Urban Affairs and organizations such as the Chesapeake Crescent Initiative (CCI) to explore opportunities to promote sustainability and innovation in conjunction with the St. Elizabeths development (DHS and DC's efforts on the West and East Campus). There are also opportunities to link to broader community revitalization efforts with the Sustainable Communities and Neighborhood Revitalization initiatives. The CCI is a regional collaborative effort formed by the Federal Government, the District of Columbia, and the state governments of Virginia and Maryland. CCI's goal is to focus on four areas: Regional Collaboration; Environment/Energy; Innovation/Economy; and Secure and Sustainable Development. CCI established the St. Elizabeths/Security Working Group to address three specific objectives: (1) Convening stakeholders--Federal, State and City governments, the private sector, non-profit organizations, universities across the region, DHS employees and the community of citizens in Ward 8; (2) Communicating progress and identifying challenges that require collaboration to achieve success-- through meetings, events and academic research support; and (3) Serving as a catalyst for action--to set new environmental standards with renewed historic resources, improve transportation, build new commercial and residential communities, foster education and workforce development and identify and deploy innovative solutions to advance our Nation's security capability--all in support of a new home for DHS, a revitalized community and a stronger regional economy with 21st Century jobs. The Department supports this effort with participation by our Headquarters Consolidation Program Office and the Chief Commercialization officer. Along with GSA, we will continue to work with CCI and our District partners as they transform their approved high level East Campus Redevelopment Framework Plan into specific development initiatives. ______ Response to Written Question Submitted by Hon. John Ensign to Hon. Janet Napolitano Question. Following the release of the TSA screening document entitled ``Screening Management Standard Operating Procedures'' dated May 28, 2008, that was placed on a website and contained Sensitive Security Information including the identification cards of Members of Congress earlier this week, I submit the following questions: How high up did the authorization have to go before the document was placed on the website? Did the authorization go as high as the political appointees or was it just a career employee that placed the document online for all to read? I understand that people were put on Administrative Leave following this release of TSA security sensitive information. Were the people who authorized the release of this information also put on Administrative Leave? I understand that there are currently 2 simultaneous investigations ongoing with regard to the release of this information, an Inspector General review and an Office of Investigations review. How long will it take to complete the review process? Can you provide a timeline as to when people can be held accountable for this release? When policies may be changed? Answer. After conducting an Executive Leadership conference call on the night of December 6, 2009, the Transportation Security Administration (TSA) Acting Administrator implemented a number of actions to address the breach of Sensitive Security Information (SSI), including a directive to the TSA Office of Investigations (OI) to investigate the cause and circumstances of the breach of SSI. The OI began to investigate the matter until TSA was notified that the Department of Homeland Security Office of the Inspector General (OIG) would be investigating the same matter at my direction. As required by a DHS Management Directive, OI suspended its investigation and deferred the matter to OIG. Because these questions are the subject of the OIG investigation, I am not able to provide specific responses until the OIG completes its investigation and issues a final report. ______ Response to Written Questions Submitted by Hon. Jim DeMint to Hon. Janet Napolitano Question 1. When will you repeal the current prohibition on collective bargaining at TSA (ADM Loy Memorandum of January 8, 2003 Subject: Determination Regarding Collective Bargaining TSA Security Screeners)? Secretary Napolitano I was disappointed to hear this morning that you had decided to agree to a collective bargaining agreement with the TSA Screeners, overturning a policy which has kept the traveling public safe for close to 7 years. At the hearing you stated, there are examples around the country of collective bargain agreements with law enforcement agencies that have similar responsibilities where you have carve-outs in effect, in the collective bargaining context to make sure those types of things are not part of the collective bargaining agreement. We would anticipate in this context with the TSOs that we will be able to reach such an understanding. Please provide a detailed plan outlining the carve-outs you will insist upon in a collective bargaining agreement including a rationale for the carve outs. Are there any workers who you believe should not be allowed to be included in a collective bargaining agreement? Answer. As I stated in my testimony, I am waiting for the confirmation of a nominee to head the Transportation Security Administration (TSA). I expect any future nominee to make a thorough review of the matter, including the alignment of any decision about collective bargaining with our profound commitment to maintain and continue to improve transportation security, before presenting recommendations to me on collective bargaining at TSA. With regard to which positions might be included in a bargaining unit of Transportation Security Officers afforded collective bargaining rights, although no decision has been made, I would expect that such a unit determination would follow prevailing law covering Federal employees which excludes those employees deemed to be supervisory or confidential employees. Question 2. At the hearing you stated, ``I will give you an example, even without a collective bargaining agreement right now, our TSA employees have been very eager to, whenever we've had an emergency and we need to, for example bring more people down to help staff an airport in a hurricane, when the people who have to work there have to stay home and work with their families because their houses have been destroyed or whatever. We have never had a problem, in my experience, with employees being willing to move to a place where a crisis is occurring.'' Will you insist that as a condition of repealing the collective bargaining agreement prohibition that any collective bargaining agreement empower the Administrator of the TSA to have the authority to transfer and reassign personnel in response to security threats for the duration of the threat without first getting the approval of their union? Answer. As stated, I am awaiting the confirmation of a nominee to head the Transportation Security Administration (TSA). It is my expectation that any future nominee will conduct a thorough review of all matters concerning collective bargaining at TSA prior to making recommendations to me. I will ensure that any decision that is made takes full account of security concerns, and enables TSA to continue to maintain and improve transportation security on a daily basis. Question 3. Madam Secretary, for several years your department has been trying to address ways to better coordinate or harmonize credentialing and background check processes. Today, for example, we know that truck drivers can undergo up to four separate costly background checks* through agencies within your department to perform their job duties. Are you aware of this issue? If so, please tell us what DHS is doing to coordinate or consolidate these multiple screening and credentialing processes. --------------------------------------------------------------------------- \*\ DHS Background checks: Hazardous Materials Endorsement (HME), Transportation Worker Identification Credential (TWIC), Free and Secure Trade (FAST) program and Air Cargo Security Threat Assessment. --------------------------------------------------------------------------- Answer. It is DHS's goal, in partnership with the private sector and state/local agencies, to reduce redundant activities and leverage investments wherever possible. To this end, DHS led a government-wide effort, in partnership with the private sector, to build an interoperable framework for credentialing across the spectrum. This framework allows for credentials to be reused--by establishing common rules for levels of trust and uses associated with each type of credential, interoperability across populations, common processes for physical and logical access control systems. This effort is directly in line with the policy established through the DHS Credentialing Framework Initiative (CFI). The CFI established several guiding principles--including ``enroll once, use many'' for information reuse for individuals applying for multiple DHS privileges and associated credentials and vetting, associated with like uses and like risks, should be the same. The CFI provides a cohesive framework, with consideration for privacy, security risks, mission requirements, information sharing and other capabilities incorporated to ensure common strategies and objectives across DHS programs. DHS has begun efforts on a number of initiatives to implement this streamlined process and reuse of vetting results: Reusing Assessments Conducted. TSA is working hard to align the programs' security threat assessments (STAs) by establishing similar eligibility requirements; offering a standard waiver and appeal process; and leveraging the same fingerprint-based criminal history records check to reduce redundancy and costs for workers. There are several examples of where this is apparent today: The Transportation Worker Identification Credential (TWIC) program is able to offer TWIC applicants a reduced cost, from $132.50 to $105.25, when the applicant already is receiving a comparable security threat assessment, such as one for: --Hazardous Materials Endorsement (HME). --Merchant Mariner Credential/Document administered by the United States Coast Guard. --Free and Secure Trade (FAST) card administered by United States Customs and Border Protection. Another example is that the Air Cargo worker requirements for a security threat assessment accepts as comparable a valid Commercial Drivers License (CDL) with HME, TWIC, and FAST, as well background checks associated with Security Identification Display Area (SIDA) badges. Establishing ability to electronically verify person's license, status, or privilege. In order to issue fewer documents and reuse existing cards, the various organizations interacting with these populations must be able to electronically authenticate the credential presented and that the person is authorized access. For example, in order for DHS to stop issuing separate HME endorsements to the holder of a TWIC, law enforcement must have the ability to electronically validate that TWIC, an ability they do not currently have. TSA TTAC Modernization. The TSA modernization effort, an initiative to enhance TSA vetting and credentialing programs that affect the security of all critical transportation sectors, will play a critical role in achieving these goals. TSA is modernizing its business processes and systems to improve and maintain the effectiveness and efficiency of transportation security threat assessments. Question 4. As I'm sure you are aware, my amendment requiring the completion of 700 miles of reinforced double-layer fencing along the U.S. Southern border by the end of next year was stripped from the Department of Homeland Security Appropriations bill just a few weeks ago. How do you propose we move forward and solve the border security problems our Nation is currently facing without completing this fence and giving the law we passed a chance to work? Answer. First and foremost, all efforts aimed at addressing threats to U.S. border security must occur within an institutionalized concept of operations that consistently leverages the proper, integrated mix of Department of Homeland Security (DHS), other Federal, State, tribal and local resources to gain effective control, or situational awareness, where applicable, in prioritized areas of greatest threat, vulnerability and risk. As a stakeholder, CBP Office of Border Patrol continues to implement the following: Focusing on the capability to rapidly deploy personnel/ resources to areas deemed highest risk through intelligence and predictive analyses along the Southern and Northern borders. For example, state-of-the-art enforcement technology, such as Mobile Surveillance System vehicle(s). Expanding partnerships with other Federal, state, tribal and local agencies to develop, refine and institutionalize a nationwide collaborative, cooperative enforcement approach such as the Alliance to Combat Transnational Threats (ACTT). Combines capabilities and resources of Federal, state, tribal and local law enforcement agencies to deny, degrade, disrupt and dismantle criminal organizations. Leveraging participation in fusion centers to institutionalize intelligence-driven operations. Question 5. Related to border security, one of the greatest threats currently facing our Nation and our Southern border in particular is the presence of violence and illegal drug trafficking taking place between the U.S. and Mexico. Back in March, you announced a ``Comprehensive Response'' border security policy that: Invested $700 million this year under the Merida initiative to work with Mexico on law enforcement and judicial capacity, Increased DOJ, DHS, and Treasury personnel and efforts directed at the Southwest border, and Renewed the U.S.' commitment to stemming the demand for illegal drugs here at home. Now that we are approaching the end of the year, can you provide for us a brief update on the implementation of this plan, and describe what impact this money and these efforts have had on the present situation along the southern border? Answer. The Department of State (DOS) is the overall U.S. Government (USG) lead for Merida Initiative activities including the acquisition of all technology equipment and software, such as Non- Intrusive Inspections Equipment (NIIE). DOS also coordinates and obtains all licenses or permits associated with the acquisition, transportation, delivery and or shipment of equipment and software to be donated to the receiving governments. CBP has established an inter- office Merida Committee to coordinate with DOS, DHS and others and to steer CBP implementation actions. CBP and DOS established an Inter-Agency Agreement (IAA) to fund a CBP Advisor to the Narcotics Affairs Section (NAS) of the State Department at the U.S. Embassy in Mexico responsible for providing technical assistance and expertise related to purchases under the Merida Initiative in Mexico. The advisor is now working in this capacity. CBP developed an IAA with DOS to provide training and technical support for Merida Initiative activities. This IAA was awarded on September 30, 2009. Specifically, this IAA provides for the training of 44 dogs for Mexico Customs, scheduled to occur in 2010. The training consists of 3 classes, each 11 weeks long. The program includes the curriculum for train-the-trainer as well. The first class will begin January 18, 2010. The IAA also provides for the training of 50 SSP Officers on five ZVB X-ray vans (vans already purchased by NAS) which will occur via five, ten-student classes held in or around Mexico City. CBP will continue to work with Mexico Customs on their curriculum to assist in moving from a revenue- based to a law enforcement-based agency. Additionally, CBP conducted an assessment of Mexico Customs basic academy training. The resulting gap analysis will be a road map to guide Mexico Customs in changing their curriculum from revenue- based to law-enforcement based. CBP will continue discussions of the way forward on geographical expansion of the Operation Against Smugglers Initiative on Safety and Security (OASISS) program. OASISS is a binational prosecutorial program focused on combating human smuggling across the Southwest Border by identifying and prosecuting Mexican nationals arrested for alien smuggling in the U.S. A memorandum of understanding for information sharing with Mexico is being reviewed by the Office of Border Patrol. CBP, in coordination with DHS, has partnered with Department of Defense (DoD) Joint Task Force North, and other border security entities in the U.S. and Mexico to develop a plan to gain greater control over the Arizona Border. The plan is called the Operational Alliance to Combat Transnational Threats (ACTT), though originally designated the Arizona Operational Plan (AOP). A key component of the plan is to operate collaboratively with the Mexican SSP Federal Police to obtain greater operational control of the Arizona/Sonora border. A Declaration of Cooperation with the SSP has been drafted for the purpose of illiciting a sustained commitment of resources from the Government of Mexico to control the Arizona/Sonora border. The Declaration institutionalizes lessons learned from the ACTT bilateral cooperation efforts and expands these collaborative efforts along the entire Southwest border, closing smuggling corridors that impact upon both countries' national security. Question 6. As part of any collective bargaining agreement, will you require that the agreement allow any TSOs to withhold the portion of their union dues that finances lobbying and political activity? Answer. Unlike the private sector, employees in the Federal Government are not required to pay union dues or agency fees, even when there is a collective bargaining agreement in effect. Accordingly, there would be no reason to include such a provision in a collective bargaining agreement at the Transportation Security Administration (TSA). ______ Response to Written Questions Submitted by Hon. Roger F. Wicker to Hon. Janet Napolitano Question 1. I understand the Department has unmanned aerial system (UAS) assets through Customs and Border Protection (CBP). Opportunities for use of these systems could expand in the future to other components of DHS and assist the Department in carrying out its significant mission. The Air Force has acknowledged the difficulty of coordinating with the Federal Aviation Administration (FAA) regarding the operation of DOD-related UAS assets in domestic airspace. It is important that we ensure a strong partnership between your Department and the FAA on similar efforts. Please explain the process between DHS and FAA to utilize domestic airspace for the UAS activities. Answer. Currently, CBP Office of Air and Marine submits, through an online process, an application for a Certificate of Authorization (COA). COAs are required due to current Federal Aviation Regulations (FARs) written only for manned aircraft and that no UAS standards have been developed and codified through rulemaking. The COA application is very in-depth and contains detailed information concerning the UAS aircraft operating location and altitudes; supporting equipment and systems. The application also solicits information on personnel and pilot qualifications. Last, the application requires aircraft airworthiness information; potential impact to other airborne aircraft; people and property on the ground; communication requirements; and emergency aircraft procedures. Risk mitigation is a paramount factor. If the COA application is approved allowing the CBP UAS to operate in the National Airspace System (NAS), it is disseminated to CBP and to the FAA facilities whose airspace the UAS will operate within. FAA facility air traffic controllers are trained on the operational capabilities and limitations of the UAS as well as the restrictions and operational parameters within which the UAS must operate. Continuing coordination and collaboration exists to amend, if necessary, a provision contained within the COA. COAs are currently issued by the FAA from a one-time authorization to standing authorizations, but not to exceed one calendar year. Standing authorizations can be renewed after undergoing the same scrutiny as an original application. Though there are various sizes of UASs in use, CBP operates the second largest UAS in service today--the MQ-9 Predator B. At 10,000 lbs and with a wingspan of 66 feet, it is the size of a large general aviation aircraft and is flown by CBP and USCG personnel, all with FAA pilot licenses. The pilots of the UAS communicate with and receive air traffic control instructions from FAA controllers exactly as any aircraft would be controlled and operate within the NAS. Question 2. Must DHS work with any other Federal entities to fully utilize the Departments UAS assets? Answer. Yes, first and foremost with the Federal Aviation Administration (FAA) for permission to fly in the National Air Space through the Certificate of Authorization process. Though CBP operates the MQ-9 Predator B, it is a DHS and national asset. CBP is continuously partnering within DHS and other government agencies in an attempt to demonstrate the capabilities this asset provides for law enforcement, incident management, search and rescue, DoD support, etc. No manned aircraft in the U.S. Government inventory provides the persistent and sustained surveillance that the Predator is capable of. Question 3. How can the relationship between DHS and FAA regarding the use of UAS in domestic airspace improve? Answer. Language in Section 1036 of the Duncan Hunter National Defense Authorization Act for Fiscal Year 2009 (Public Law 110-417) called for a more cooperative relationship between DoD and the FAA in obtaining access to the NAS with UASs and as such the establishment of a joint Executive Committee (EXCOM) to resolve conflicts and disputes. Recognizing that DHS has a major role and requirement in obtaining access to the NAS, DHS was invited to participate in the EXCOM. DHS, DoD, NASA, and FAA are currently cooperating and collaborating on a process to safely, efficiently, and timely gain increased and routine access to the NAS. Question 4. Are you aware of any instances where the Department was delayed in utilizing UAS assets as a result of interagency coordination? Answer. Ad-hoc, non-routine access to the NAS by CBP UASs have been processed by the FAA in an expeditious manner and ultimately never denied. CBP operates under one of four types of COAs; mission (operational), training (pilots), emergency, and disaster (FEMA or Federal or State support). Through the EXCOM, shortfalls have already been identified within the COA application process. Corrective actions have been recommended by a COA interagency working group which address FAA resource issues, reduced COA processing timelines, standardized application information, etc. If implemented, perceived delays should be minimized and COA processing burdens on the FAA and proponents will be greatly reduced. Question 5. Congress recently passed the Consolidated Appropriations Act of 2010, which was subsequently signed into law by the President on December 16, 2009. The law includes a mandate that Amtrak consult with the Transportation Security Administration (TSA) on developing and implementing guidance and procedures to provide for checked firearms on Amtrak routes that permit checked baggage. The law also requires for consultation with TSA in reporting to Congress on these efforts within 180 days of enactment. Amtrak's consultation with the TSA is not only mandated, but it is vital to the successful implementation of this important program. What steps will you pursue to ensure timely and effective consultation with Amtrak on these directives? Answer. In accordance with section 159 of the Consolidated Appropriations Act, 2010 (Pub. L. 111-117), the Transportation Security Administration (TSA) has initiated consultation with Amtrak to develop and implement guidance and procedures to provide for checked firearms on Amtrak routes that permit checked baggage. Consistent with the statutory mandate, Amtrak and TSA will continue to consult thoroughly on security matters implicated by the requirement to develop and implement a program for transport of firearms and ammunition in checked baggage. Amtrak and TSA have agreed to form a joint working group for this purpose. Question 6. The President's budget request for Fiscal Year 2010 included $856 million for Explosives Detection Systems (EDS), which is a needed increase from the previous enacted level in Fiscal Year 2009 of $294 million. Even with the increase for EDS that was recently passed by Congress, the need of airports across the country to recapitalize checked baggage screening equipment and accelerate the deployment of in-line systems remains of the upmost importance. Without continued funding it will be impossible to provide the latest, cutting- edge technology necessary to keep the aviation sector secure from the threats of terrorism. As you know, many of these checked baggage screening systems that were deployed immediately after September 11, 2001 have reached the end of their life cycles and the costs to keep these older technology systems functioning with minimal down time is becoming prohibitive. Will you support maintaining the Fiscal Year 2010 EDS procurement and installation funding levels at our Nation's airports in Fiscal Year 2011 necessary to maintain the Electronic Baggage Screening Program (EBSP)? With the threat of new explosives evolving rapidly how do you see this factoring into the replacement of older equipment such as Explosive Trace Detection (ETD) with newer equipment that is equipped to change with these continued new threats? Answer. The funding level for Fiscal Year 2011 will be released in the President's budget in February. The threat of new explosives and new threats to aviation security continues to evolve. The Transportation Security Administration (TSA) has developed a Strategic Plan for the Electronic Baggage Screening Program, which includes a central goal of replacing Explosive Trace Detection (ETD) equipment used for primary screening with Explosives Detection Systems (EDS) machines at airports. There is currently an on-going effort to replace primary-screening ETD machines with Reduced-Size Explosive Detection System (RSEDS) at Category X-III airports. In Fiscal Year 2010, from January to September, TSA plans to deploy on average 20-25 RSEDS units per month to airports nationwide. RSEDS provides a less intensive manpower approach, plus the increased screening capabilities of EDS relative to ETD equipment for primary screening. Please note that ETD equipment will continue to play a critical role in assisting Transportation Security Officers in resolving suspect baggage that have alarmed the EDS equipment (referred to as secondary screening). Among the actions being taken to address evolving new threats, TSA is taking steps to pursue a full and open competitive procurement for reduced-size, medium-speed, and high-speed EDS technologies. This procurement will segment the technologies into distinct system types, provide for increased competition, enhance detection and operational capabilities, and provide for a reduced total cost of ownership. Question 7. Continued efforts by the Transportation Security Administration to enhance security at our Nation's airports remain vital to our Nation's security. The Administration's focus on the top 20 to 25 airports to enhance security for 95 percent of passengers in the United States is not reflective of the true situation since a significant majority of passengers begin their trips at medium and small airports. According to figures from the Department of Transportation's Bureau of Transportation Statistics, 54 percent of the passengers begin their trips at the Nation's top 25 airports, while 46 percent of the passengers begin their air travel at the next 225 airports. Since checked baggage is screened at originating airports, medium and small airports cannot be neglected if aviation security is truly to be enhanced. In knowing that two of the highjackers on 9/11 began their flight at a small airport in Bangor, Maine, what steps are you taking to ensure that the need for medium and small airports to receive the latest explosives detection systems is as important as the Category X airports? Answer. The needs of small and medium airports are taken into consideration by the Transportation Security Administration (TSA) to enhance security at our Nation's airports. The Fiscal Year (FY) 2009 budget included $87 million for medium- and small-sized airports for the procurement and deployment of certified Explosive Detection Systems. The FY 2010 budget includes an additional $218 million for the needs of medium- and small-sized airports. In addition, up to $50 million of the Aviation Security Capital Fund is used to make discretionary grants, including Other Transaction Agreements for airport security improvement projects with priority given to small and non-hub airports. ______ Response to Written Question Submitted by Hon. Johnny Isakson to Hon. Janet Napolitano Question. Will the Department of Homeland Security plan to launch the US-VISIT Exit program, and if so, will DHS plan to check departures on the Canadian and Mexican borders, as well as in seaports? Answer. It should be noted that the Department of Homeland Security (DHS) currently has biographic exit information; however, the Department is currently weighing several options for adding biometrics based on pilots conducted over the past 6 years. The infrastructure at land borders does not easily lend itself to any consistent form of exit based on current technology. Air/Sea DHS has performed significant planning and testing over the past 3 years to examine possible solutions for integrating US-VISIT biometric exit requirements into the international air departure process. For more than 2 years, US-VISIT ran biometric exit pilots at 12 airports and two seaports. These pilots evaluated the use of both automated kiosks and mobile devices in port terminals. When the pilots ended in May 2007, an evaluation determined that the technology worked effectively but traveler compliance was low. DHS determined that biometric air exit needs to be integrated into the existing international traveler departure process. On April 24, 2008, DHS published a notice of proposed rulemaking (NPRM) proposing that commercial air carriers and vessel carriers collect and transmit the biometric information of aliens to DHS within 24 hours of their departure from the United States. In the Consolidated Security, Disaster Assistance, and Continuing Appropriations Act of 2009 (Public Law 110-329), Congress required DHS to test additional biometric collection before finalizing the Air-Sea Exit NPRM to ensure that the best available procedures are implemented. From May 28 to July 2, 2009, US-VISIT tested biometric air exit procedures at two airports: Detroit Metropolitan Wayne County Airport and Hartsfield-Jackson Atlanta International Airport. In Detroit, DHS tested the collection of alien passengers' biometrics at the boarding gate by U.S. Customs and Border Protection officers. In Atlanta, DHS tested the collection of alien passengers' biometrics at Transportation Security Administration checkpoints. Consistent with Public Law 110- 329, the Department has submitted an evaluation report of these pilots to the House and Senate Committees on Appropriations, as well as to the Government Accountability Office. The results of the pilot evaluation, combined with the review of public comments submitted in response to the NPRM, will inform the decision on the option to be selected for publication in the final rule. Land Biometrically recording the departures of aliens at U.S. land border ports of entry poses significantly greater challenges. Each year, our land border ports of entry see more than 300 million crossings at 170 port locations, including seasonal and other ports that are not open year round. Due to variations in infrastructure, environment, and traffic volume from port to port, a one-size-fits-all solution to acquiring biometrics from aliens crossing the border will be difficult. The Department is examining options for the land border environment that will not negatively impact the economy, the environment, or traveler safety. Canadian and Mexican Borders Seeking to maximize biometric information-sharing efforts in support of its exit program, US-VISIT took the lead in forming a Technical Working Group on Biometric Identity Management with the Canada Border Services Agency. The working group has established joint biometric principles and is working on a framework to share biometric information related to third- country nationals entering Canada to establish exit from the United States. This work will progress over the next few years as Canada implements biometric capture capabilities for visa and port-of-entry operations. Canada plans to complete implementation of its biometric program by 2013. Since Mexico is in the initial stages of developing its biometric capabilities for border and immigration control, there has not yet been an opportunity to share biometrics for exit purposes. US-VISIT continues to provide technical assistance in support of Mexico's efforts to incorporate biometrics into its immigration process under the Merida Initiative. ______ Response to Written Questions Submitted by Hon. David Vitter to Hon. Janet Napolitano Question 1. Please provide information on actions the Department is taking to ensure that ports that handle primarily oil and gas, not cargo, will remain secure. Answer. The Coast Guard has a multi-tiered approach to ensuring the safety and security of ports which handle oil and gas. The Coast Guard's Operation Neptune Shield identifies the Maritime Security and Response Operations (MSRO) activities which the Coast Guard Sectors will conduct and establishes their performance standards. The MSRO activities identified in this self-imposed operation are intended to deter, detect, prevent, protect against, interdict, and/or aid the recovery from attacks and include but are not limited to: waterborne, aerial, and shoreside patrols; security boardings; moving security zone enforcement (vessel escorts); and fixed security zone enforcement. As mandated by the Maritime Transportation Security Act (MTSA), all oil and gas facilities and vessels calling upon them are required to maintain and implement approved security plans to ensure appropriate measure are taken to deter, prevent and respond to security threats and incidents. The Coast Guard verifies the adequacy of these security plans by conducting periodic plan review, compliance examinations and unannounced spot checks. As part of the mandated Area Maritime Security Committee (AMSC) process, strong partnerships have been formed with key stakeholders from state and local agencies and the maritime industry. These partnerships have facilitated information sharing and a risk based approach to address maritime security. The Coast Guard's International Port Security (IPS) Program, also required by the MTSA, assesses the effectiveness of anti-terrorism measures in foreign ports including those which primarily handle oil and gas. The IPS Program conducts visits to those ports to verify the adequacy of the security measures using the International Ship and Port Facility Security Code as the primary basis to determine if a country has effective anti-terrorism measures. The Coast Guard has visited the ports in approximately 150 countries which trade with the U.S. For those ports with inadequate security, the Coast Guard imposes ``Conditions of Entry'' on vessels arriving to the U.S. from them. These conditions of entry require these vessels to take additional security measures overseas or upon arrival to the U.S. to reduce the risk to U.S. ports. The Coast Guard's Maritime Security Risk Analysis Model (MSRAM) is a terrorism risk analysis tool used to perform detailed risk analysis of the maritime transportation system and port critical infrastructure, including oil and gas facilities. MSRAM provides a means to use security assessments, consequence models, and threat information to numerically quantify risk across all ports and industry sectors. MSRAM identifies and prioritizes infrastructure based on defined terrorist attack scenarios, and informs the Coast Guard Captains of the Port (COTPs) and their Area Maritime Security Committees (AMSCs) on the highest risk critical infrastructure within their ports. Based upon this information, the COTPs and AMSCs have modified their Area Maritime Security Plans and prioritized Coast Guard and other law enforcement resources to protect the highest risk critical infrastructure in their ports. Question 2. Many from Louisiana's maritime industries have voiced concerns about bureaucratic delays when their employees obtain TWIC cards. What is DHS doing to alleviate unnecessary delays while maintaining and improving security measures? Answer. Since the national implementation of the Transportation Worker Identification Credential (TWIC) program, the Transportation Security Administration (TSA) has enrolled over 1.4 million workers associated with our Nation's maritime ports and vessels and issued credentials to those individuals who have been found eligible to receive a TWIC. With the rollout of any program of this size and complexity, there are always challenges to meet and process improvements to make. TSA is continually reviewing its enrollment, adjudication and credentialing issuance processes and procedures to improve efficiencies wherever possible and expedite the issuance of these credentials. An example of these efforts is our continual communications with stakeholders via the TWIC Stakeholder Communication Committee used to provide program updates and receive stakeholder input. Also, we have added new personnel and resources to facilitate the redress process for those individuals who have been deemed ineligible to hold a TWIC as a result of the security threat assessment. If there are any specific Louisiana Maritime Industry concerns, TSA would be more than happy to address them. Question 3. While protecting vital American jobs, the Jones Act also serves to enhance maritime security. Please provide a status update regarding deliberations by CBP and DHS, underway since July, about whether to modify or withdraw several letter rulings concerning the transportation by foreign vessels of cargo to offshore energy sites. Answer. Based on several substantive comments CBP received, both supporting and opposing the proposed action, and CBP's further research on the issue, CBP determined that the proposed modification and revocation of ruling letters relating to the Jones Act published in the Customs Bulletin on July 17, 2009, should be reconsidered. To that end, the proposal was withdrawn by a notice dated September 15, 2009, and published in the Custom Bulletin of October 1, 2009. Deliberations are still underway on this matter. Question 4. My understanding is that CBP has been presented with at least two complaints of Jones Act violations occurring offshore in recent months. Please provide the Committee with an update on the status of those investigations. Also, please provide a full report at such time as any action is taken in those cases. Answer. This case alleges that on two separate occasions certain merchandise was transported between Louisiana ports and locations on the Outer Continental Shelf by non-coastwise-qualified vessels. In consideration of the potential penalty assessment in these allegations (at least $2 million for each case), it has been our recommendation that no penalty action be pursued until the specific facts of these alleged violations can be verified.