Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations, 41586-41603 [05-14269]

Download as PDF 41586 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration 49 CFR Parts 1520, 1540, and 1562 [Docket No. TSA–2005–21866; Amendment Nos. 1520–3, 1540–6, 1562–1] RIN 1652–AA49 Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations Transportation Security Administration (TSA), Department of Homeland Security (DHS). ACTION: Interim final rule; request for comments. AGENCY: SUMMARY: Since September 11, 2001, general aviation aircraft operations have been prohibited at Ronald Reagan Washington National Airport (DCA). The Transportation Security Administration (TSA) is issuing this interim final rule (IFR) to restore access to DCA for certain aircraft operations while maintaining the security of critical Federal Government and other assets in the Washington, DC metropolitan area. This IFR applies to all passenger aircraft operations into or out of DCA, except U.S. air carrier operations operating under a full security program required by 49 CFR part 1544 and foreign air carrier operations operating under 49 CFR 1546.101(a) or (b). The IFR establishes security procedures for aircraft operators and gateway airport operators, and security requirements relating to crewmembers, passengers, and armed security officers onboard aircraft operating into or out of DCA. Although this IFR is effective on August 18, 2005, an aircraft operator may not conduct operations into or out of DCA until it is determined by TSA to be in compliance with the security requirements set forth in this IFR. DATES: This rule is effective August 18, 2005. Submit comments by September 19, 2005. ADDRESSES: You may submit comments, identified by the TSA docket number to this rulemaking, using any one of the following methods: Comments Filed Electronically: You may submit comments through the docket Web site at https://dms.dot.gov. Please be aware that anyone is able to search the electronic form of all comments received into any of our dockets by the name of the individual submitting the comment (or signing the comment, if submitted on behalf of an association, business, labor union, etc.). VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 You may review the applicable Privacy Act Statement published in the Federal Register on April 11, 2000 (65 FR 19477), or you may visit https:// dms.dot.gov. Comments Submitted by Mail, Fax, or In Person: Address or deliver your written, signed comments to the Docket Management System, U.S. Department of Transportation, Room Plaza 401, 400 Seventh Street, SW., Washington, DC 20590–0001; Fax: 202–493–2251. Comments that include trade secrets, confidential commercial or financial information, or sensitive security information (SSI) should not be submitted to the public regulatory docket. Please submit such comments separately from other comments on the rule. Comments containing trade secrets, confidential commercial or financial information, or SSI should be appropriately marked as containing such information and submitted by mail to the individual(s) listed in FOR FURTHER INFORMATION CONTACT. Reviewing Comments in the Docket: You may review the public docket containing comments on this interim final rule in person in the Docket Office between 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays. The Docket Office is located on the plaza level of the NASSIF Building at the Department of Transportation address above. Also, you may review public dockets on the Internet at https://dms.dot.gov. See SUPPLEMENTARY INFORMATION for format and other information about comment submissions. For policy questions, Robert Rottman, Office of Aviation Security Policy, Transportation Security Administration Headquarters, East Building, Floor 3, 601 12th Street, Arlington, VA 22202; telephone: (571) 227–2289; e-mail: Robert.Rottman@dhs.gov. For questions related to Sensitive Security Information (SSI), Keith L. Moore, Director, SSI Program Office, Office of the Chief of Staff, Transportation Security Administration Headquarters, East Building, Floor 7, 601 12th Street, Arlington, VA 22202; telephone: (571) 227–3513; e-mail: Keith.Moore1@dhs.gov. For legal questions, Scott Houston, Office of Chief Counsel, Transportation Security Administration Headquarters, East Building, Floor 12, 601 12th Street, Arlington, VA 22202; telephone: (571) 227–3653; e-mail: Scott.Houston@dhs.gov. FOR FURTHER INFORMATION CONTACT: SUPPLEMENTARY INFORMATION: PO 00000 Frm 00002 Fmt 4701 Sfmt 4700 Comments Invited This IFR is being adopted without prior notice and prior public comment. However, to the maximum extent possible, operating components within DHS provide an opportunity for public comment on regulations issued without prior notice. Accordingly, TSA invites interested persons to participate in this rulemaking by submitting written comments, data, or views. TSA also invites comments relating to the economic, environmental, energy, or federalism impacts that might result from this rulemaking. See ADDRESSES above for information on where to submit comments. Comments that include trade secrets, confidential commercial or financial information, or SSI should not be submitted to the public regulatory docket. Please submit such comments separately from other comments on the rule. Comments containing this type of information should be appropriately marked and submitted by mail to the individual(s) listed in FOR FURTHER INFORMATION CONTACT section. Upon receipt of such comments, TSA will not place the comments in the public docket and will handle them in accordance with applicable safeguards and restrictions on access. TSA will hold them in a separate file to which the public does not have access, and place a note in the public docket that TSA has received such materials from the commenter. If TSA receives a request to examine or copy this information, TSA will treat it as any other request under the Freedom of Information Act (FOIA) (5 U.S.C. 552) and the Department of Homeland Security’s FOIA regulation found in 6 CFR part 5. With each comment, please include your name and address, identify the docket number at the beginning of your comments, and give the reason for each comment. The most helpful comments reference a specific portion of the rule, explain the reason for any recommended change, and include supporting data. You may submit comments and material electronically, in person, by mail, or fax as provided under ADDRESSES, but please submit your comments and material by only one means. If you submit comments by mail or delivery, submit them in two copies, in an unbound format, no larger than 8.5 by 11 inches, suitable for copying and electronic filing. If you want TSA to acknowledge receipt of your comments on this rulemaking, include with your comments a self-addressed, stamped postcard on which the docket number E:\FR\FM\19JYR4.SGM 19JYR4 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations appears. We will stamp the date on the postcard and mail it to you. Except for comments containing confidential information and SSI, we will file in the public docket all comments we receive, as well as a report summarizing each substantive public contact with TSA personnel concerning this rulemaking. The docket is available for public inspection before and after the comment closing date. We will consider all comments we receive on or before the closing date for comments. We will consider comments filed late to the extent practicable. We may change this rule in light of the comments we receive. Availability of Rulemaking Document You may obtain an electronic copy using the Internet by— (1) Searching the Department of Transportation’s electronic Docket Management System (DMS) Web page (https://dms.dot.gov/search); (2) Accessing the Government Printing Office’s Web page at https:// www.gpoaccess.gov/fr/; or (3) Visiting the TSA’s Law and Policy Web page at https://www.tsa.gov/public/ index.jsp. In addition, copies are available by writing or calling any of the individuals in the FOR FURTHER INFORMATION CONTACT section. Make sure to identify the docket number of this rulemaking. Small Entity Inquiries The Small Business Regulatory Enforcement Fairness Act (SBREFA) of 1996 requires TSA to comply with small entity requests for information or advice about compliance with statutes and regulations within TSA’s jurisdiction. Any small entity that has a question regarding this document may contact the persons listed in the FOR FURTHER INFORMATION CONTACT section for information or advice. You can get further information regarding SBREFA on the Small Business Administration’s Web page at https://www.sba.gov/advo/ laws/law_lib.html. Good Cause for Issuing Rule Without Prior Notice and Comment TSA is issuing this IFR without prior notice and opportunity to comment pursuant to its authority under section 4(a) of the Administrative Procedure Act (APA) (5 U.S.C. 553(b)). This provision authorizes the agency to issue a rule without prior notice and opportunity to comment when the agency for good cause finds that those procedures are ‘‘impracticable, unnecessary, or contrary to the public interest.’’ General aviation and charter operations that are not under full VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 security programs have been prohibited from arriving at or departing from DCA since September 11, 2001. However, regularly scheduled, commercial air carrier operations that had been prohibited at DCA after September 11, 2001, have been restored through issuance of Notices to Airmen (NOTAMs) by the Federal Aviation Administration (FAA). The operators that have not been able to resume flights into and out of DCA have suffered economic hardship. Because the interim final rule establishes a voluntary program that will lift the suspension of general aviation operations for a segment of affected parties, thereby removing an existing restriction on their activities, TSA believes there will be little, if any, objection from these parties to immediate implementation of the interim final rule. Moreover, the economic hardship of the operators would be unnecessarily extended by a notice and comment rulemaking. Therefore, delaying implementation until after a notice and public comment period is unnecessary. If some affected parties believe that changes in the interim final rule are warranted, they will have the opportunity to comment on the rule, while other affected parties that are able take advantage of the benefits of the rule may do so without further delay. Therefore, in recognition of the need to begin to restore general aviation operations in a manner that will neither give rise to security risks, nor prolong the economic hardship to affected parties, TSA finds good cause to forgo prior notice and public comment in issuing the interim final rule. As previously noted, TSA requests comment on all aspects of this rule and will modify the rule if warranted. Abbreviations of Terms Used In This Document ADIZ—Air Defense Identification Zone ASOP—Armed Security Officer Program ATSA—Aviation and Transportation Security Act CHRC—Criminal history records check DASSP—DCA Access Standard Security Program DCA—Ronald Reagan Washington National Airport DHS—Department of Homeland Security FAA—Federal Aviation Administration FAM—Federal Air Marshal FAMS—Federal Air Marshal Service FBI—Federal Bureau of Investigation FBO—fixed base operator FRZ—Flight Restricted Zone LEOSA—Law Enforcement Officers Safety Act NOTAM—Notice to Airmen PO 00000 Frm 00003 Fmt 4701 Sfmt 4700 41587 PCSSP—Private Charter Standard Security Program SSI—Sensitive Security Information TFR—Temporary Flight Restriction TFSSP—Twelve-Five Standard Security Program TSA—Transportation Security Administration I. Background A. Operations at DCA After the September 11, 2001, terrorist attacks against four U.S. commercial aircraft resulting in the tragic loss of human life at the World Trade Center, the Pentagon, and in southwest Pennsylvania, the FAA immediately prohibited all aircraft operations within the territorial airspace of the U.S., with the exception of certain military, law enforcement, and emergency related aircraft operations. This general prohibition was lifted in part on September 13, 2001. In the Washington, DC metropolitan area, however, aircraft operations remained prohibited at all civil airports within a 25 nautical mile radius of the Washington DC Very High Frequency Omnidirectional Range/ Distance Measuring Equipment (VOR/ DME). This action was accomplished via the U.S. NOTAM system.1 Limited commercial air carrier operations were permitted to resume at DCA on October 4, 2001, and through a series of emergency air traffic rules issued by the FAA under 14 CFR 91.139 and NOTAMs that followed, other restrictions were eliminated. Currently operations to and from DCA by aircraft operators that hold a certificate under 14 CFR part 121 and operate under a full security program approved by TSA in accordance with 49 CFR 1544.101(a), or a foreign air carrier security program approved by TSA in accordance with 49 CFR 1546.101(a) or (b), are permitted under NOTAM 3/2126. Generally these are regularly scheduled, commercial, passenger operations. General aviation operations and other operations that are not under one of these security programs under part 1544 or 1546 are prohibited. As a result of this prohibition, many operators and the businesses they serve have experienced economic hardship. According to estimates prepared by the DCA Fixed Based Operator,2 1 NOTAMs are used by the FAA to notify pilots of important information, including airspace restrictions. The FAA issued several NOTAMs regarding the restricted airspace over the Washington, DC, metropolitan area. The current NOTAM restricting aircraft operations in the Washington, DC, Flight Restricted Zone is NOTAM 3/2126. 2 A Fixed Base Operator is an airport-based commercial enterprise that provides support E:\FR\FM\19JYR4.SGM Continued 19JYR4 41588 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations approximately 660 general aviation and charter flights occurred per week prior to September 11, 2001. The majority of these were corporate aircraft accommodating business travelers in the Washington, DC, area. It is important to resume these operations at DCA to permit these operators, their customers, and affected local businesses to recover from the adverse economic impacts brought on by the events of September 11, 2001. However, DCA is located in close proximity to critical Federal Government assets, infrastructure, and functions. Any aircraft arriving at or departing from DCA will fly very near several significant government office buildings and national monuments. It would take very little time for such aircraft to inflict serious damage to any number of buildings in Washington, DC, and the surrounding area. Such an event could occur so quickly that it may not be possible to prevent. Therefore it is necessary to balance the economic interests of operators against the legitimate governmental security risks that exist. After discussions with the United States Secret Service, the Federal Air Marshal Service (FAMS), the Department of Defense, the Homeland Security Council, and other Federal agencies, it has been determined that the national security concerns surrounding operations at DCA can be addressed effectively by requiring operators to comply with the security procedures set forth in this IFR. Applying these procedures to operations arriving at and departing from DCA will help to protect the critical national assets in the Washington, DC area from an airborne terrorist act. TSA has consulted with the associations that represent the operators subject to this rule, and they understand the need for special procedures at DCA. These operators are prepared to undertake special security procedures in order to recommence operations at DCA. B. Statutory Background On November 19, 2001, Congress enacted the Aviation and Transportation Security Act (ATSA),3 which created TSA, and transferred civil aviation security functions from the FAA to TSA. TSA transferred the bulk of FAA’s civil aviation security regulations (in Title 14, Code of Federal Regulations) to TSA (in Title 49, Code of Federal Regulations) in a separate rulemaking services to aircraft operators, such as maintenance, overnight parking, fueling, and deicing. 3 Pub. L. 107–71, November 19, 2001, 115 Stat. 597. VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 (see docket number TSA–2002–11602, 67 FR 8340, February 22, 2002). On December 12, 2003, Congress enacted the Vision 100-Century of Aviation Reauthorization Act.4 Section 823 of Vision 100 requires the Secretary of Homeland Security to develop a security plan to permit general aviation aircraft to resume operations into and out of DCA. cover the costs of using TSA screening personnel and equipment at DCA and the gateway airports. III. Discussion of the Interim Final Rule A. Scope and Definitions II. Summary of the Interim Final Rule For affected aircraft operators to fly into and out of DCA, they must designate a security coordinator and adopt a DCA Access Standard Security Program (DASSP). As part of the DASSP, they must ensure that all flight crewmembers have undergone a fingerprint-based criminal history records check (CHRC). Once aircraft operators have complied with those requirements, they will be eligible to apply to the FAA for a reservation, and to TSA for authorization, to operate specific flights into and out of DCA. To receive authorization for a flight, aircraft operators must have name-based threat assessments conducted by TSA on their flight crewmembers and passengers. They must carry an armed security officer who also must have a threat assessment conducted by TSA, as well as specialized training and authorization from TSA. The operators must have their last point of departure from a Fixed Base Operator (FBO)5 that holds a security program issued by TSA at an airport designated by TSA (referred to in the IFR as a ‘‘gateway airport’’). At each gateway airport, TSA will inspect the aircraft and will screen the passengers, their carry-on property, and property carried in the cargo hold of the aircraft, before it departs for DCA. The aircraft operator must also comply with all applicable FAA rules, including those rules for operating in the Flight Restricted Zone (FRZ).6 The aircraft operator must reimburse TSA for any costs associated with carrying out this subpart. These costs include $15 for the threat assessment TSA will conduct for each passenger and crewmember whose information the aircraft operator submits to TSA as part of the flight approval process, and $296 per round trip into and out of DCA to This IFR creates a new subpart B in part 1562 of Title 49 of the Code of Federal Regulations (CFR). Subpart B applies to FBOs located at DCA and the gateway airports. It also applies to all aircraft operations into or out of DCA that are conducted under subpart B. The IFR also applies to passengers, crewmembers, and armed security officers onboard aircraft operations operated in accordance with the IFR. Finally, the IFR applies to individuals designated as security coordinators by aircraft operators in accordance with the IFR. Section 1562.21(b) provides that each person operating an aircraft into or out of DCA must comply with this subpart, with certain exceptions. The exceptions include (1) military, law enforcement, or medivac aircraft operating into or out of DCA; (2) Federal and State Government aircraft operating under an airspace waiver approved by TSA and authorized by FAA; 7 (3) all-cargo aircraft operations; and (4) passenger aircraft operations conducted under a full security program approved by TSA in accordance with 49 CFR 1544.101(a) or a foreign air carrier security program approved by TSA in accordance with 49 CFR 1546.101(a) or (b). This IFR does not apply to operations into or out of any airports other than DCA and gateway airports. Similarly, this IFR does not alter or suspend other regulations that TSA has issued or may issue that apply to aircraft operations. Further, this IFR does not affect the FAA’s rules for operating into DCA, such as its rules relating to the allocation of reservations under the High Density Rule (14 CFR part 93, subpart K) and the Perimeter Rule (14 CFR 93.253), which prohibits a nonstop commercial aircraft operation to DCA from an airport that is more than 1,250 miles away from DCA.8 The IFR specifies that any aircraft operation into or out of DCA under the IFR must be conducted in accordance 4 Pub. L. 108–176, December 12, 2003, 117 Stat. 2490. 5 An FBO is an airport-based commercial enterprise that provides support services to aircraft operators, such as maintenance, overnight parking, fueling, and de-icing. 6 The FRZ is an airspace ring centered on the Washington DC VOR/DME with a radius of approximately 15 nautical miles. In order to enter and operate in FRZ airspace, an operator must comply with certain access and security procedures implemented by FAA and TSA. 7 TSA will continue to coordinate with FAA, which authorizes waivers into and out of DCA for these and other certain operations, including Elected Official Operations, Government Operations, and Special Operations, in accordance with established policy. 8 Due to slot control restrictions under the High Density Rule and the need to limit traffic volume in the FRZ for security purposes, it is expected that unscheduled aircraft operations into and out of DCA will be capped at 4 per hour for 12 hours a day, for a total of 48 operations daily. PO 00000 Frm 00004 Fmt 4701 Sfmt 4700 E:\FR\FM\19JYR4.SGM 19JYR4 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations with the DASSP and any other TSAapproved security program that covers that operation. If any requirements of the DASSP conflict with the requirements of another TSA-approved security program, such as a Twelve-Five Standard Security Program (TFSSP) or Private Charter Standard Security Program (PCSSP), the aircraft operation into or out of DCA must be conducted in accordance with the requirements of the DASSP. For purposes of the IFR, the following definitions apply: ‘‘Armed Security Officer Program’’ is defined as the security program approved by TSA, in coordination with the FAMS, for armed security officers authorized to carry a firearm in accordance with the IFR. ‘‘Crewmember’’ is defined as a person assigned to perform duty in an aircraft during flight time. This includes pilots and flight attendants, but does not include armed security officers authorized to carry a firearm in accordance with the IFR. ‘‘DCA’’ is defined as Ronald Reagan Washington National Airport. ‘‘DASSP’’ (DCA Access Standard Security Program) is defined as the aircraft operator security program approved by TSA under part 1562 for aircraft operations into and out of DCA. ‘‘FBO’’ is defined as a fixed base operator that has been approved by TSA under part 1562 to serve as a last point of departure for flights into or out of DCA. The approved FBOs are located at either DCA or one of the gateway airports. ‘‘FBO Security Program’’ is defined as the security program approved by TSA under part 1562 for FBOs to serve flights into or out of DCA. ‘‘Flightcrew member’’ is defined as a pilot, flight engineer, or flight navigator assigned to duty in an aircraft during flight time. This is the same definition provided under 49 CFR 1540.5. ‘‘Gateway airport’’ is defined as an airport that has been approved by TSA as a last point of departure for flights into DCA. More information on the gateway airports is provided below. ‘‘Passenger’’ is defined as any person other than a flightcrew member on an aircraft. A ‘‘passenger’’ includes armed security officers authorized to carry a firearm in accordance with the rule. B. Aircraft Operator Requirements To operate into or out of DCA under part 1562, an aircraft operator must comply with the following requirements. VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 1. Security Coordinators The aircraft operator must designate an individual as a security coordinator responsible for implementing the DASSP and other security requirements under the IFR. The aircraft operator must provide TSA with the security coordinator’s contact information and availability in accordance with the DASSP. The security coordinator must undergo a fingerprint-based criminal history records check (CHRC) that does not disclose that he or she has a disqualifying criminal offense as described in 49 CFR 1544.229(d).9 The IFR provides that this requirement is met if a security coordinator has already undergone a fingerprint-based CHRC in accordance with 49 CFR 1542.209, 1544.229, or 1544.230, with his or her current employer. The security coordinator also must undergo a security threat assessment performed by TSA. To initiate the CHRC, the security coordinator must submit his or her fingerprints and required information to a fingerprint collector approved by TSA. The collector will forward the information to TSA, and TSA will forward the information to the Federal Bureau of Investigation (FBI). The FBI will conduct the CHRC and send the results to TSA, and TSA will adjudicate the results to verify that the security coordinator does not have a disqualifying criminal offense described in 49 CFR 1544.229(d). This process is similar to the process used for aircraft operators with a Twelve-Five Standard Security Program (TFSSP) or a Private Charter Standard Security Program (PCSSP). If TSA informs the security coordinator that the CHRC discloses a disqualifying offense, he or she may seek to correct the record in accordance with the procedures set forth in 49 CFR 1544.229(h) and (i) regarding notification and correction of records. These procedures require an aircraft operator to notify an applicant when the applicant’s FBI record discloses information that would disqualify the applicant, and provide the applicant with a copy of the FBI record if the applicant requests it. The applicant may contact the local jurisdiction responsible for the information in the record and the FBI to complete or correct the information, provided that the applicant notifies the aircraft 9 These are the same disqualifying crimes used for TSA screeners, individuals with unescorted access to secured areas of an airport, and crewmembers employed by an aircraft operator operating under a TFSSP or PCSSP. PO 00000 Frm 00005 Fmt 4701 Sfmt 4700 41589 operator in writing, within 30 days of receiving notification that the applicant’s FBI record discloses a disqualifying criminal offense, of his or her intent to correct the record. TSA notes that the procedures set forth in 49 CFR 1544.229(h) and (i) apply to the aircraft operator. Since TSA will be adjudicating the CHRC results for security coordinators under this IFR, TSA will perform the functions required of aircraft operators by 49 CFR 1544.229(h) and (i). For purposes of the security threat assessment, the security coordinator must submit to TSA: his or her (1) legal name, including first, middle, and last; any applicable suffix, and any other names used; (2) current mailing address, including residential address if different than current mailing address; (3) date and place of birth; (4) citizenship status and date of naturalization if the individual is a naturalized citizen of the United States; and (5) alien registration number, if applicable. The security operator also may voluntarily provide his or her social security number. Using that information, TSA will conduct a security threat assessment and inform the aircraft operator of the results. If TSA determines that the security coordinator may pose a security threat, the aircraft operator may not designate the individual as a security coordinator. Failure to provide the social security number may result in delays in processing the application. Failure to provide the other information may result in the applicant being denied the request to serve as a security coordinator. 2. DCA Access Standard Security Program (DASSP) The aircraft operator must adopt and carry out the DASSP. To receive the DASSP, an aircraft operator must contact TSA through TSA’s Office of Aviation Programs and request the DASSP. TSA will verify that the aircraft operator is a valid operator and then provide the aircraft operator with a nondisclosure agreement that the aircraft operator must sign, as the DASSP contains sensitive security information (SSI) that must be protected in accordance with TSA’s SSI regulation at 49 CFR part 1520. TSA then will provide the DASSP to the aircraft operator. Once the aircraft operator implements the requirements of the DASSP, the aircraft operator must notify TSA. TSA will then inspect the aircraft operator to ensure that the program requirements have been implemented in accordance with the DASSP. Upon a satisfactory inspection, the aircraft operator will be eligible to apply to TSA E:\FR\FM\19JYR4.SGM 19JYR4 41590 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations for approval to operate flights into and out of DCA in accordance with the requirements in the IFR, explained in further detail below. 3. Flightcrew Members The aircraft operator must ensure that each flightcrew member 10 who will be assigned to an aircraft operating into or out of DCA complies with the requirements of the IFR. Each flightcrew member must undergo a fingerprintbased CHRC, using the same process and list of disqualifying criminal offenses used for the designated security coordinator. If a flightcrew member is informed that the CHRC discloses a disqualifying offense, he or she also may seek to correct the record in the same manner as the designated security coordinator. The IFR provides that the CHRC requirement is met if a flightcrew member has already undergone a fingerprint-based CHRC in accordance with 49 CFR 1542.209, 1544.229, or 1544.230, with his or her current employer. Each flightcrew member also must undergo a check of their FAA record. A flightcrew member may not have a record on file with the FAA of a violation of: (1) A prohibited area designated under 14 CFR part 73; (2) a flight restriction established under 14 CFR 91.141 (flight restrictions in the proximity of the President and certain other parties); (3) special security instructions issued under 14 CFR 99.7 (air defense identification zone or defense area); (4) a restricted area designated under 14 CFR part 73; (5) emergency air traffic rules issued under 14 CFR 91.139 (emergency conditions); (6) a temporary flight restriction designated under 14 CFR 91.137 (vicinity of a disaster or hazard area), 91.138 (national disaster area in the State of Hawaii), or 91.145 (management of aircraft operations in the vicinity of aerial demonstrations and major sporting events); or (7) an area designated under 14 CFR 91.143 (flight limitations in the proximity of space flight operations). These violations also are considered disqualifying for pilots who apply for approval to operate to and from the Maryland Three Airports, which are located in the FRZ.11 4. Flight Approvals The aircraft operator must apply for and receive a reservation from the FAA and authorization from TSA for each 10 These requirements do not apply to cabin crewmembers. 11 See 70 FR 7150, February 10, 2005. VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 flight into and out of DCA.12 The aircraft operator first must apply to the FAA for assignment of a tentative reservation to operate into and/or out of DCA. The FAA will produce a tentative reservation based on air traffic scheduling and other relevant factors. Then the aircraft operator must apply for TSA authorization for the flight by submitting to TSA the following information at least 24 hours prior to aircraft departure: (1) For each passenger and crewmember (both flightcrew and cabin crew) on the aircraft: legal name, including first, middle, and last; any applicable suffix, and any other names used; current mailing address, including residential address if different than current mailing address; date and place of birth;; citizenship status and date of naturalization if the individual is a naturalized citizen of the United States; and alien registration number, if applicable; (2) the registration number of the aircraft; (3) the flight plan; and (4) any other information required by TSA.13 TSA will conduct a name-based security threat assessment for each passenger and crewmember. If TSA notifies the aircraft operator that a passenger or crewmember may pose a security threat, the aircraft operator must ensure that the passenger or crewmember does not board the aircraft. TSA’s ability to conduct a security threat assessment will be facilitated by the use of social security numbers and asks that passengers and crew consider voluntarily submitting social security numbers to TSA. Failure to provide the social security number may result in delays in processing the application. Failure to provide the other information may result in the applicant being denied the request to be a passenger or crewmember. If TSA authorizes the flight, TSA will transmit its authorization to the FAA for assignment of a final reservation to operate into or out of DCA. Once FAA assigns the reservation, TSA will notify the aircraft operator. The IFR specifies that TSA may, at its discretion, cancel any or all flight approvals at any time without prior notice to the aircraft operator. For example, if the threat level in the Washington, D.C., area or in the vicinity 12 As noted above, we expect that the total number of takeoff and landing reservations at DCA under the IFR will be limited to 48 per day. 13 The aircraft operator is required to submit the required information for each passenger and crewmember only once per round trip flight. If any passengers or crewmembers are added on the flight out of DCA, the aircraft operator must submit the required information for those individuals at least 24 hours prior to the aircraft departing DCA. PO 00000 Frm 00006 Fmt 4701 Sfmt 4700 of any of the gateway airports is set at ORANGE or RED, TSA is likely to cancel any and all flight approvals into and out of DCA. The IFR also specifies that TSA may, at its discretion, permit a flight to or from DCA to deviate from the requirements of the IFR, if TSA finds that such action would not be detrimental to transportation security or the safe operation of the aircraft. TSA will consult with the U.S. Secret Service, FAMS, Department of Defense, FAA, and other relevant government agencies prior to approving a flight to deviate from the requirements of the IFR. Finally, the IFR provides that TSA may, at its discretion, require any flight into or out of DCA under this subpart to comply with additional security measures. For instance, for certain operations, such as those with a large number of persons on board, TSA may require additional armed security officers onboard the aircraft. 5. Operating Requirements For each flight into and out of DCA, an aircraft operator must comply with the following operating requirements specified in the IFR. The aircraft operator must ensure that each flight into DCA departs from a gateway airport and makes no intermediate stops before arrival at DCA. More information on the gateway airports is provided below. The aircraft operator must ensure that the aircraft has been searched in accordance with the DASSP, and that each passenger and crewmember and all accessible property and property in inaccessible cargo holds on the aircraft has been screened in accordance with the DASSP prior to boarding the aircraft. TSA personnel will conduct the aircraft searches and screening of passengers, crewmembers, and property. The aircraft operator must ensure that each passenger and crewmember on the aircraft provides TSA screening personnel with a valid governmentissued picture identification. If the aircraft is equipped with a cockpit door, the aircraft operator must ensure that the door is closed and locked at all times during the operation of the aircraft to or from DCA, unless FAA regulations require the door to remain open.14 The aircraft operator must notify the National Capital Region Coordination Center prior to departure of the aircraft from a gateway airport or DCA. The aircraft operator must ensure that each aircraft operating into or out of DCA has onboard at least one armed security officer who meets the 14 TSA notes that FAA regulations require that some cockpit doors remain open during takeoff and landing for safety reasons. E:\FR\FM\19JYR4.SGM 19JYR4 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations requirements specified in the IFR, which are discussed in greater detail below. For some flights, such as flights with a large number of passengers, TSA may require more than one armed security officer to be onboard the aircraft. In addition, if TSA or the FAMS requires that the aircraft have one or more Federal Air Marshals (FAMs) on board, the aircraft operator must allow the FAM(s) onboard, at no cost to the Federal Government. The aircraft operator must ensure that the aircraft operates under instrument flight rules only. Finally, the aircraft operator must ensure that each passenger complies with any security measures mandated by TSA, and that no prohibited items are onboard the aircraft. TSA intends to use the same list of prohibited items that is currently used for regularly-scheduled commercial aircraft operations. In addition, as explained in greater detail below, TSA rules for aviation security, including the rules prohibiting interference with security measures and screening personnel and requiring individuals to submit to screening and inspection, will apply to passengers and crewmembers on aircraft operated into and out of DCA in accordance with the IFR. 6. Costs The aircraft operator must pay any costs and fees required under this part. As explained in greater detail below, the aircraft operator must pay a $15 threat assessment fee for each passenger and crewmember whose information the aircraft operator submits to TSA as part of the flight approval process. In addition, the aircraft operator must reimburse TSA for additional costs TSA will incur in carrying out the requirements of the IFR. On October 1, 2003, Congress enacted legislation directing TSA to collect reasonable fees to cover the costs of providing credentialing and background investigations in the transportation field.15 Section 520 of the Department of Homeland Security Appropriations Act of 2004 (2004 Appropriations Act) authorizes TSA to collect fees to pay for the following costs: Conducting or obtaining a criminal history records check (CHRC); reviewing available law enforcement databases, commercial databases, and records of other governmental and international agencies; reviewing and adjudicating requests for waivers and appeals of TSA 15 Department of Homeland Security Appropriations Act, 2004, Section 520, Pub. L. 108– 90, October 1, 2003, 117 Stat. 1156 (6 U.S.C. 469) (2004 Appropriations Act). VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 decisions; and any other costs related to performing the background records check or providing the credential. Section 520 of the 2004 Appropriations Act mandates that any fee collected be available for expenditure only to pay for the costs incurred in providing services in connection with performing the background check or providing the credential. The fees collected shall remain available until expended. Under the IFR, each aircraft operator must remit to TSA a fee of $15 per person to defray the costs of the security threat assessment performed for passengers (including any armed security officers) and crewmembers on each flight operated into or out of DCA. The aircraft operator is required to pay this fee each time the aircraft operator submits the manifest to TSA for the required security threat assessments. In addition, each aircraft operator must reimburse TSA for the costs TSA incurs in carrying out the requirements of the IFR. Population The number of security threat assessments performed as a result of this IFR is drawn from general aviation industry data as well as TSA operational assumptions. The total figure is roughly equivalent to the product of two separate estimates: Total Round Trips Through DCA is the number of available general aviation slots divided by half (4 slots/hour × 12 hours/day × 365 days/ year)/2 departures/round trip = 8,760), taking into account that round trips account for two allocated slots. This analysis assumes 100 percent capacity utilization of the available 48 daily slots, a premise based on pre-September 11, 2001, general aviation flight throughput of approximately 30,000 annual round trips through DCA. The second component is Average Persons Per Flight. Based on National Business Aviation Association (NBAA) analysis of pre-September 11, 2001, general aviation traffic at the airport, TSA has estimated that the Average Persons Per Flight is 6 persons (2 crewmembers and 4 passengers).16 The product of these two numbers is 52,560 (8,760 round trips * 6 persons per flight). Operational Assumptions To develop its cost estimate, TSA has assumed the following procedures for general aviation flight authorizations and security threat assessments: Step 1: An aircraft operator approved by TSA under the DASSP will apply to 16 According to the NBAA, over 90% of preSeptember 11, 2001 general aviation traffic at DCA was corporate. A similar ratio is assumed for the current rollout. PO 00000 Frm 00007 Fmt 4701 Sfmt 4700 41591 the FAA for assignment of a tentative reservation to operate into and (typically) out of DCA. FAA will produce a tentative reservation based on air traffic scheduling availability and other relevant factors. Step 2: The aircraft operator will apply to TSA for a flight approval and submit the names and other required information of all crewmembers and passengers. Step 3: TSA will conduct namechecks against multiple government watch lists and other terrorist threat sources. Step 4: Once TSA clears the crewmembers and passengers and approves the flight, TSA will transmit its approval to FAA for assignment of a final reservation to operate into and/or out of DCA. Step 5: Once FAA assigns the final reservation, TSA will notify the aircraft operator. Step 6: TSA will coordinate the aircraft operator’s flight schedule with appropriate TSA field screening and inspection operations to perform physical screening at FBO operations at DCA or other gateway airports as required. Cost Components The following major cost components have been identified as required to perform the security threat assessment and requisite flight authorization functions. Each major component’s cost estimates and supporting rationale and/ or sources behind the estimate are discussed in detail below: • Flight authorization automated system development (‘‘Systems Costs’’) • Federal authorization staff costs (‘‘Program Staff Costs’’) • Security threat assessment process costs (‘‘Name Check Costs’’) Systems Costs To support up to 48 flights per day into and out of DCA (and all requisite information management of flight and applicant information), a Commercial Off-the-Shelf (COTS) software application will be required. Currently, TSA performs a similar processing function for other types of flight authorizations that cumulatively average some 400+ flight authorizations per week, or almost 23,000 flight authorizations per year. At present, TSA employs 9 full time employees (FTEs) to perform this labor-intensive process. Rather than requiring significant numbers of additional personnel to handle the workload under this IFR, TSA intends to purchase an existing COTS application to automate much of the current flight authorization function E:\FR\FM\19JYR4.SGM 19JYR4 41592 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations at TSA, including operations into and out of DCA. Such a system is already operational and in use at the FAA. At a high level, the automated functionality and thus efficiency gained from such a system will be the following: • Automation of applicant name, other biographical information, and flight information submission and transmission (rather than via fax and manual key entry of current waiver process). • Automated applicant information submission to TSA’s security threat assessment operations (versus fax/ manual list management). • Automated information exchange, including electronic signature for clearance documents and flight slotting, between TSA and FAA (versus current manual courier of documents daily between the two agencies). • Automated tracking of flight volume/metrics, applicants and other performance metrics reporting capabilities as required. TSA realizes that such a system will vastly improve not only the contemplated process for flight authorizations into and out of DCA, but also the efficiency and thus cost of the existing process for other flight authorizations. TSA notes that Section 520 of the Department of Homeland Security Appropriations Act, 2004, Pub. L. 107–90, 117 Stat. 1137 (Oct. 1, 2003) directs TSA to recover its costs related to providing a credential or performing background checks. As the flight authorization services are inextricably linked to providing the security threat assessments under this program, TSA is including the cost of providing these services in the threat assessment fee. TSA intends to charge aircraft operators operating into and out of DCA in accordance with the IFR only for those system costs equal to the proportion of total expected flight authorizations between the DCA program and all other flight authorization programs. TSA estimates that the acquisition, installation, and maintenance of a similar COTS application would total some $4.1 million over a 5-year system and program lifecycle period. Thus, as the total annual flight authorization volume for general aviation operations at DCA is some 8,760 or 28 percent of the total annual expected volume of some 31,600 flight authorizations only 28 percent of the total 5-year system costs will be recovered in the fees charged under this IFR. The remaining 72 percent of system cost will become the responsibility of the existing flight authorization programs. TSA will also incur several one-time technical ‘‘setup’’ costs, including an estimated $100,000 to develop system interfaces with TSA systems for the security threat assessment, $100,000 application installation and hosting setup charges, and an estimated $100,000 for online fee payment functionality via the Federal Government’s required electronic payment system for web-based payments, www.pay.gov. Program Staff Costs Even with the reduction in manual labor TSA should realize with the automated flight authorization COTS system, TSA still estimates that 4 full time employees (FTEs) will be required to perform those functions that will not be automated. These functions are generally those that still require ‘‘live’’ communication and human judgment. This estimate also assumes that the 24hour security threat assessment response time will necessitate some staffing during all 24 hours per day, 7 days per week. TSA has assumed annual staff cost for salary, benefits, and overhead of $100,000 per employee. Name Check Costs TSA incurs both labor, system, and infrastructure/overhead costs each time it performs a name-based check against the multiple governmental watch lists and other terrorist threat sources. For the small portion of those names that are ‘‘hits’’ (names that match any of the various watch lists), TSA must perform identity verification and occasionally coordinate interagency law enforcement/apprehension activities. Based on TSA’s operational history with other similar populations applying for clearance, and what it estimates the DCA general aviation population to require in terms of identity verification and other vetting operations, a $2 per applicant security threat assessment cost has been derived. This fee is included in the $15 security threat assessment fee described below. TABLE 1.—5-YEAR LIFECYCLE COSTS [Program operating year] Year 1 Total Number of security threat assessments ................. Fixed Costs: Automated Flight Authorization System ................... TSA Interface ............................................................ Payment Interface ..................................................... System Hosting Set-Up Costs .................................. Scheduling Staff ............................................................... Year 2 Year 3 Year 4 Year 5 Total 52,560 52,560 52,560 52,560 52,560 262,800 $713,070 100,000 100,000 100,000 400,000 $106,961 0 0 0 400,000 $106,961 0 0 0 400,000 $106,961 0 0 0 400,000 $106,961 0 0 0 400,000 $1,140,912 100,000 100,000 100,000 2,000,000 Total Fixed Costs .............................................. Variable Costs: Name Checks ........................................................... 1,513,070 506,961 506,961 506,961 506,961 3,440,912 105,120 105,120 105,120 105,120 105,120 525,600 Total Costs ........................................................ 1,518,190 612,081 612,081 612,081 612,081 3,966,512 Fee Summary Based on the costs and populations estimated above, TSA has calculated a fee of $15 per person for the security threat assessments and requisite flight authorization services costs. To calculate the fee, TSA has amortized the VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 fixed costs of the security threat assessments over five years as this is generally accepted business practice for software and other infrastructure depreciation. The equation used to determine the fee is $3,440,912 (fixed costs) + $525,600 (variable costs over 5 PO 00000 years)/262,800 (5-year population of applicants) = $15 per person. Pursuant to the Chief Financial Officers Act of 1990, DHS and TSA are required to review these fees no less than every two years.17 Upon review, if 17 31 Frm 00008 Fmt 4701 Sfmt 4700 E:\FR\FM\19JYR4.SGM U.S.C. 3512. 19JYR4 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations it is found that the fees are either too high (that is, total fees exceed the total cost to provide the services) or too low (that is, total fees do not cover the total costs to provide the services), TSA may propose changes to the fees. In addition, as DHS and TSA identify and implement additional efficiencies across numerous threat assessment and credentialing programs, any resulting cost savings will be incorporated into the fee levels accordingly. In addition to the $15 per person fee, the IFR requires each aircraft operator to pay TSA for the costs TSA expends in carrying out this subpart. These costs include the costs of using screening personnel and equipment at DCA and the gateway airports. These costs are currently estimated at $296 per round trip into and out of DCA. TSA may revise these reimbursement cost figures if TSA determines that its estimated costs are too high or too low, and the reimbursable amounts may be modified periodically to reflect the most current costs of services provided. All fees and reimbursement must be remitted to TSA in a form and manner approved by TSA, and TSA will not issue any refunds, unless a fee or reimbursement was paid in error. TSA will provide specific fee remittance instructions prior to enactment of the IFR. The IFR specifies that if an aircraft operator does not remit to TSA the fees and reimbursement required under the IFR, TSA may decline to process any requests for flight authorizations from the aircraft operator. TSA notes that the aircraft operator or flightcrew member may also be required to pay a fee to any fingerprint collector for the fingerprint collection for crewmembers as well as the fee charged by the FBI for conducting a CHRC. In addition, the aircraft operator is responsible for paying to have a TSA qualified armed security officer onboard the aircraft. armed security officers subject to part 1562. 8. Other Security Procedures The aircraft operator must comply with any additional security procedures required by TSA through order, Security Directive, or other means. TSA notes that the following sections of 49 CFR part 1540 apply to persons involved with this program: § 1540.103, which prohibits certain fraud and intentional falsification; § 1540.105, which forbids certain interference with security measures; § 1540.107, which requires individuals to submit to screening and inspection; and § 1540.109, which prohibits persons from interfering with screening personnel. These sections apply throughout the TSA rules for aviation security (49 CFR chapter XII, subchapter C), and therefore now apply in the context of the requirements of part 1562. In addition, this IFR amends § 1540.111 to apply to passengers on aircraft operated into and out of DCA under the DASSP. That section currently prohibits passengers from carrying weapons, explosives, and incendiaries on certain scheduled and charter flights, and is being expanded to also apply to passengers on aircraft operated into and out of DCA in accordance with the IFR and the DASSP. 7. Protection of Sensitive Security Information 9. Compliance The IFR requires an aircraft operator to permit TSA to conduct any inspections or tests, including copying records, to determine compliance with the IFR and the DASSP. The IFR also requires an aircraft operator, at the request of TSA, to provide evidence of compliance with the IFR and the DASSP, including copies of records. The IFR specifies that noncompliance with the IFR or the DASSP may result in the cancellation of any and all of an aircraft operator’s flight approvals and other enforcement action, as appropriate. The aircraft operator must restrict the distribution, disclosure, and availability of sensitive security information (SSI), as defined in 49 CFR part 1520, to persons with a need to know, and refer all requests for SSI by other persons to TSA. The IFR amends part 1520 to specify that the DASSP is SSI and that aircraft operators who receive the DASSP are covered persons under part 1520. Thus, aircraft operators subject to the IFR will be subject to the SSI protection requirements in part 1520. As explained further below, the IFR also amends part 1520 to cover FBOs and B. Fixed Base Operator Requirements Each fixed base operator (FBO) from which flights into DCA operate under the IFR must adopt and carry out the FBO Security Program. TSA will provide the FBO Security Program to each participating FBO at DCA and the gateway airports. The gateway airports are: (1) Seattle-Tacoma, Washington; (2) Boston Logan, Massachusetts; (3) Houston Hobby, Texas; (4) White Plains, New York; (5) LaGuardia, New York; (6) Chicago Midway, Illinois; (7) Minneapolis-St. Paul, Minnesota; (8) West Palm Beach, Florida; (9) San VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 PO 00000 Frm 00009 Fmt 4701 Sfmt 4700 41593 Francisco, California; (10) Teterboro, New Jersey; (11) Philadelphia, Pennsylvania; and (12) Lexington, Kentucky. TSA may revise or expand this list if necessary or appropriate. TSA identified these airports as last points of departure for DCA based on volume and geographical reasons. Eight of the airports represent those that serviced the largest number of general aviation operations into DCA prior to September 11, 2001. Those airports are predominately centered in the northeast corridor where most DCA bound flights occur. The other airports are commercial service airports located throughout the U.S. that are in close proximity to general aviation airports that served DCA prior to September 11, 2001. The FBO must designate a security coordinator who meets the same requirements as designated aircraft operator security coordinators. The security coordinator will be responsible for implementing the FBO Security Program and other security requirements required by the IFR. The FBO must provide TSA with the security coordinator’s contact information and availability in accordance with the FBO Security Program. The FBO must support the screening of persons and property, and the search of aircraft, in accordance with the requirements of the FBO Security Program. The FBO must restrict the distribution, disclosure, and availability of SSI, as defined in 49 CFR part 1520, to persons with a need to know, and refer all requests for SSI by other persons to TSA. The IFR amends part 1520 to specify that the FBO Security Program is SSI and that FBOs that receive the FBO Security Program are covered persons under part 1520. Thus, FBOs subject to the IFR will be subject to the SSI protection requirements in part 1520. The FBO must permit TSA to conduct any inspections or tests, including copying records, to determine compliance with this part and the FBO Security Program. In addition, at the request of TSA, the FBO must provide evidence of compliance with this part and the FBO Security Program, including copies of records. C. Armed Security Officer Requirements The IFR specifies the following requirements for security officers authorized to be armed onboard an aircraft operating into or out of DCA under a DASSP. Each armed security officer must comply with an Armed E:\FR\FM\19JYR4.SGM 19JYR4 41594 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations Security Officer Program (ASOP) issued by TSA. The armed security officer must be qualified to carry a firearm in accordance with the IFR. To be qualified, an armed security officer must be an active law enforcement officer, a retired law enforcement officer, or another individual who meets the requirements specified in the IFR. A qualified active law enforcement officer is an employee of a governmental agency who: (1) Is authorized by law to engage in or supervise the prevention, detection, investigation, or prosecution of, or the incarceration of any person for, any violation of law; (2) has statutory powers of arrest; (3) is authorized by the agency to carry a firearm; (4) is not the subject of any disciplinary action by the agency; (5) is not under the influence of alcohol or another intoxicating or hallucinatory drug or substance; and (6) is not prohibited by Federal law from receiving a firearm. A qualified retired law enforcement officer is an individual who: (1) retired in good standing from service with a public agency as a law enforcement officer, other than for reasons of mental instability; (2) before such retirement, was authorized by law to engage in or supervise the prevention, detection, investigation, or prosecution of, or the incarceration of any person for, any violation of law, and had statutory powers of arrest; (3) before such retirement, was regularly employed as a law enforcement officer for an aggregate of 15 years or more, or retired from service with such agency, after completing any applicable probationary period of such service, due to a serviceconnected disability, as determined by such agency; (4) has a non-forfeitable right to benefits under the retirement plan of the agency; (5) is not under the influence of alcohol or another intoxicating or hallucinatory drug or substance; and (6) is not prohibited by Federal law from receiving a firearm. These requirements are consistent with the requirements specified for law enforcement officers and retired law enforcement officers under the Law Enforcement Officers Safety Act of 2004 (LEOSA).18 LEOSA allows qualified law enforcement officers and qualified retired law enforcement officers to carry firearms in State and municipal jurisdictions beyond their own, but does not eliminate all restrictions that prohibit carrying firearms in certain areas or places, such as State or local government buildings and parks. Likewise, this law does not supersede or 18 Pub. L. 108–277, July 21, 2004. VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 affect Federal laws and regulations that restrict carriage of firearms in certain places, including 49 U.S.C. 46505 (criminal offense for carrying a weapon on aircraft) and the requirement to comply with all applicable provisions of 49 CFR 1544.219 (Carriage of Accessible Weapons) for a law enforcement officer to carry a firearm aboard a commercial aircraft. TSA notes that not all relevant jurisdictions have implemented the requirements of LEOSA, so some law enforcement officers and retired law enforcement officers may not yet be qualified under LEOSA. However, the requirements in this IFR are consistent with the requirements in LEOSA. Under the IFR, TSA, in coordination with the FAMS, may authorize an individual other than an active or retired law enforcement officer to act as an armed security officer on an aircraft operating into or out of DCA, provided that they comply with the qualifications, threat assessment, training, and other requirements specified in the IFR. TSA, in coordination with the FAMS, is developing qualifications for individuals other than active and retired law enforcement officers, and will place them in the Aviation Security Officer Program. At a minimum, these individuals must not be under the influence of alcohol or another intoxicating or hallucinatory drug or substance and must not be prohibited by Federal law from receiving a firearm. Each armed security officer must undergo a fingerprint-based CHRC that does not disclose that he or she has a criminal offense that would disqualify him or her from possessing a firearm under 18 U.S.C. 922(g). If an armed security officer is informed that the CHRC discloses a disqualifying offense, he or she may seek to correct the record in the same manner as a designated security coordinator or flightcrew member under the IFR. Each armed security officer must submit to TSA his or her: (1) Legal name, including first, middle, and last; any applicable suffix, and any other names used; (2) current mailing address, including residential address if different than current mailing address; (3) date and place of birth; (4) citizenship status and date of naturalization if the individual is a naturalized citizen of the United States; and (5) alien registration number, if applicable. Armed security officers also are asked to voluntarily submit social security numbers to facilitate TSA’s security threat assessment. TSA will use that information to conduct a name-based security threat assessment. Each armed security officer PO 00000 Frm 00010 Fmt 4701 Sfmt 4700 must undergo the name-based security threat assessment prior to receiving authorization from TSA and prior to boarding an aircraft operating into or out of DCA under a DASSP. If TSA notifies an aircraft operator that an armed security officer may pose a security threat, the aircraft operator may not use that armed security officer to comply with the requirements of the IFR. Failure to provide the social security number will result in delays in processing the application. Failure to provide the other information may result in the applicant being denied the request to serve as an armed security officer under this program. Each armed security officer also must be authorized by TSA, in coordination with the FAMS, to carry a firearm under 49 U.S.C. 44903(d). That provision allows the Assistant Secretary of Homeland Security for TSA, with the approval of the Attorney General and the Secretary of State, to authorize individuals who carry out air transportation security duties to carry firearms and make arrests without warrant for any offense against the United States committed in the presence of the individual or for a felony under the laws of the United States, if the individual reasonably believes that the individual to be arrested has committed or is committing a felony. Each armed security officer must have basic law enforcement training acceptable to TSA. The armed security officer also must complete a TSAapproved training course, developed in coordination with the FAMS, which will initially be provided by the Federal Government. Initially, this course will consist of such components as are germane to operating in this unique environment. However, TSA may augment this course with additional training in the future. The armed security officer will be required to pay for any costs associated with this training. Each armed security officer must comply with an ASOP issued by TSA. The ASOP will contain instructions on the authorized use of force while onboard an aircraft operating into or out of DCA. Because the ASOP contains SSI, armed security officers must restrict the distribution, disclosure, and availability of the ASOP to persons with a need to know in accordance with 49 CFR part 1520, and refer all other requests for SSI by other persons to TSA. The IFR authorizes an armed security officer approved by TSA to carry a firearm in accordance with the ASOP on an aircraft operating under a DASSP into or out of DCA, and to transport a firearm in accordance with the ASOP at E:\FR\FM\19JYR4.SGM 19JYR4 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations any airport as needed to carry out duties under this subpart, including for travel to and from flights conducted under this subpart. It also authorizes an armed security officer approved by TSA to use force, including deadly force, in accordance with the ASOP. The IFR prohibits an armed security officer onboard an aircraft operating into or out of DCA from consuming alcohol or using an intoxicating or hallucinatory drug or substance during the flight and within 8 hours prior to boarding the aircraft. The IFR requires each armed security officer onboard an aircraft operating into or out of DCA to carry a credential issued by TSA. The armed security officer must present the TSAissued credential for inspection when requested by an authorized representative of TSA, FAA, the FAMS, the National Transportation Safety Board, any Federal, State, or local law enforcement officer, or any authorized aircraft operator representative. The armed security officer also must identify himself or herself to all crewmembers either personally or through another member of the crew before the flight. In addition, TSA and the FAMS may conduct random inspections of armed security officers, to ensure compliance with the ASOP. Finally, the IFR provides that at the discretion of TSA, in coordination with the FAMS, the armed security officer’s authorization under this part and 49 U.S.C. 44903(d) is suspended or withdrawn upon notification by TSA. D. Implementation Schedule TSA is planning to implement this program in two phases, and the program will be operational at the earliest date an aircraft operator is determined by TSA to be in compliance with the security requirements in this IFR. In Phase I, TSA expects to permit the following operations into and out of DCA: • Operators under a partial security program approved by TSA under 49 CFR 1544.101(b), which operate aircraft with a passenger seating configuration of 31 or more but 60 or fewer seats. • Operators under a PCSSP approved by TSA under 49 CFR 1544.101(f), which operate aircraft with a passenger seating configuration of 61 or more seats or a maximum certificated takeoff weight of 45,500 kg (100,309 pounds) or more. • Operators in scheduled or charter service with a TFSSP approved by TSA under 49 CFR 1544.101(d), which operate aircraft with a maximum certificated takeoff weight of greater than 12,500 pounds. • Aircraft operated by corporations. VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 TSA anticipates that approximately one year after implementing Phase I, the agency will evaluate the feasibility of Phase II, which may include the following operations: • Aircraft operated by private persons. • Scheduled and charter operations in aircraft not otherwise required to be under security programs (maximum certificated takeoff weight of 12,500 pounds or less). In this way, the initial implementation will include those operators that tend to have more sophisticated operations and professional, experienced flight departments. These persons are likely to be most able to comply with the stringent security measures set out in this program. As TSA gains experience with this program and makes any adjustments found necessary, the agency will consider expanding the program to additional operators. IV. Paperwork Reduction Act The Paperwork Reduction Act of 1995 (PRA) (44 U.S.C. 3501 et seq.) requires Federal agencies to consider the impact of paperwork and other information collection burdens imposed on the public and, under the provisions of PRA section 3507(d), obtain approval from the Office of Management and Budget (OMB) for each collection of information it conducts, sponsors, or requires through regulations. This rulemaking contains information collection activities subject to the PRA. Accordingly, the following information requirements are being submitted to OMB as an emergency processing request for its review. Title: Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations. Type of Request: Emergency processing request of new collection. Summary: Since September 11, 2001, general aviation aircraft operations have been prohibited at DCA. TSA is issuing this IFR to restore access to DCA for certain aircraft operations while maintaining the security of critical Federal Government and other assets in the Washington, DC Metropolitan Area. The IFR establishes security procedures for aircraft operators and gateway airport operators, and security requirements relating to crewmembers, passengers, and armed security officers onboard aircraft operating to or from DCA. Use of: FBOs at DCA and the 12 gateway airports will be required to provide TSA with the fingerprints and identifying information of individuals designated as security coordinators in PO 00000 Frm 00011 Fmt 4701 Sfmt 4700 41595 accordance with the IFR. Aircraft operators that choose to operate into and out of DCA in accordance with the IFR will be required to provide TSA with fingerprints and identifying information of flightcrew members and individuals designated as security coordinators. TSA will use this information to perform a CHRC and a security threat assessment to determine if these individuals pose a security threat. In addition, such aircraft operators will be required to provide TSA with identifying information for all crewmembers and passengers onboard each aircraft that operates into and out of DCA. TSA will use this information to perform security threat assessments in order to assess if the security coordinators, crewmembers, or passengers may pose a security threat. Aircraft operators also will be required to provide TSA with the flight plan and registration number of any aircraft that operates to or from DCA. TSA will use this information to track and identify approved aircraft. Armed security officers approved in accordance with the IFR will be required to provide TSA with fingerprints and identifying information. TSA will use this information to perform a CHRC and a threat assessment in order to assess whether the armed security officers pose a security threat. Respondents (including number of): The likely respondents to this information collection requirement are general aviation passenger aircraft operators that operate into or out of DCA in accordance with the IFR, fixed base operators at DCA and the gateway airports, and armed security officers who apply for TSA approval in accordance with the IFR. TSA estimates that approximately 25 FBOs (one at DCA and two at each of the 12 gateway airports) will be willing to voluntarily participate in the FBO Security Program. TSA does not have current data on how many operators will be impacted by this rule. However, in the year preceding September 11, 2001, approximately 1,900 operators that would be subject to this rule flew into DCA. In that same time period, there were on average 660 flights per week involving these operators. However, the IFR limits the number of airports from which these operators can depart, and the number of takeoff and landing reservations at DCA is expected to be limited to 48 per day, so the total number of flights into DCA will undoubtedly be lower than the pre-2001 numbers. Accordingly, TSA assumes that the number of aircraft operators that E:\FR\FM\19JYR4.SGM 19JYR4 41596 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations will apply for access to DCA will be significantly less than the number of aircraft operators that operated into and out of DCA prior to September 11, 2001. TSA estimates that approximately 500 aircraft operators will apply for access to DCA and thus be required to respond to the information collection requirements. TSA estimates that approximately 1,500 armed security officers will apply for TSA approval in accordance with the IFR. Accordingly, TSA estimates the total number of respondents to be 2,025 (1,500 armed security officers + 500 aircraft operators + 25 FBOs). Frequency: For security coordinators, armed security officers, and flightcrew members, the respondents will be required to provide the subject information only once for a CHRC. For passengers and crewmembers onboard aircraft operating into or out of DCA, the respondents will be required to provide the subject information for a namebased threat assessment for each flight into or out of DCA. TSA estimates the total number of responses to be 11,785 per year (500 aircraft operator security coordinator responses + 1,000 flightcrew member responses 19 + 25 FBO security coordinator responses + 1,500 armed security officer responses + 8,760 flight authorization responses). Annual Burden Estimate: TSA estimates that it will take approximately 1 ‘‘hours to submit the required information, including fingerprints, for armed security officers, flightcrew members, and security coordinators, and approximately 1 hour to submit the required information for each flight into or out of DCA, for a total burden of 13,298 hours per year. TSA is soliciting comments to— (1) Evaluate whether the information collection requirements are necessary for the proper performance of the functions of the agency, including whether the information will have practical utility; (2) Evaluate the accuracy of the agency’s estimate of the burden; (3) Enhance the quality, utility, and clarity of the information to be collected; and 19 TSA estimates that each aircraft operator will have 2 flightcrew members who will be required to submit fingerprints under the IFR. VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 (4) Minimize the burden of the collection of information on those who are to respond, including through the use of appropriate automated, electronic, mechanical, or other technological collection techniques or other forms of information technology. Individuals and organizations may submit comments on the information collection requirements in this IFR by September 19, 2005, and should direct them via fax to the Office of Information and Regulatory Affairs, Office of Management and Budget, Attention: DHS-TSA Desk Officer, at (202) 395– 5806. Comments to OMB are most useful if received within 30 days of publication of the IFR. As protection provided by the PRA, as amended, an agency may not conduct or sponsor, and a person is not required to respond to, a collection of information unless it displays a currently valid OMB control number. The OMB control number for this information collection will be published in the Federal Register after it has been approved by OMB. V. Economic Analyses Changes to Federal regulations must undergo several economic analyses. First, Executive Order 12866, Regulatory Planning and Review (59 FR 51735, October 4, 1993), directs each Federal agency to propose or adopt a regulation only upon a reasoned determination that the benefits of the intended regulation justify its costs. Second, the Regulatory Flexibility Act of 1980 (5 U.S.C. 601, et seq., as amended by the Small Business Regulatory Enforcement Fairness Act (SBREFA) of 1996) requires agencies to analyze the economic impact of regulatory changes on small entities. Third, OMB directs agencies to assess the effect of regulatory changes on international trade. Fourth, the Unfunded Mandates Reform Act of 1995 (2 U.S.C. 1521–1538) requires agencies to prepare a written assessment of the costs, benefits, and other effects of proposed or final rules that include a Federal mandate likely to result in the expenditure by State, local, or tribal governments, in the aggregate, or by the private sector, of $100 million or more annually (adjusted for inflation). PO 00000 Frm 00012 Fmt 4701 Sfmt 4700 A. Executive Order 12866 Assessment Executive Order 12866, ‘‘Regulatory Planning and Review’’ (58 FR 51735, October 4, 1993) provides for making determinations whether a regulatory action is ‘‘significant’’ and therefore subject to OMB review and to the requirements of the Executive Order. Executive Order 12866 classifies a rule as significant if it meets any one of a number of specified conditions, including economic significance, which is defined as having an annual effect on the economy of $100 million. A regulation is also considered a significant regulatory action if it raises novel legal or policy issues. The Department concludes that while this action is not economically significant, it does raise novel legal and policy issues under Section 3(f)(4) of the Executive Order. Accordingly, this rulemaking has been reviewed by OMB as significant under Executive Order 12866. TSA recognizes that the IFR may impose costs on some affected operators, which will stem from developing and implementing new security procedures for all flights into and out of DCA. However, the overall effect of the IFR, to permit these operators to resume DCA operations, may improve their economic condition. In any event, given the current security threat, TSA believes it is necessary to require these enhanced security measures. Only FBOs at DCA and the gateway airports and general aviation aircraft operators desiring to resume operations to and from DCA will incur expenses. Each individual FBO and aircraft operator will evaluate the costs and benefits to them. FBOs and aircraft operators not realizing a benefit will not participate and will not incur any additional costs. The system-wide costs of this rule are approximately $496 per flight. Average annual costs of $8.7 million will be spread over a maximum of 17,520 flights based on the restriction of a total of 48 arrival/departure reservations at DCA per day. The following tables indicate the projected full and discounted costs, as well as the cost per flight. E:\FR\FM\19JYR4.SGM 19JYR4 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations 41597 DCA GA COSTS [2005 $, millions] Year Equipment Threat assessment checks and infrastructure LEOs Security coordinator: paperwork Crew checks Total cost 1 ....................................... 2 ....................................... 3 ....................................... 4 ....................................... 5 ....................................... 6 ....................................... 7 ....................................... 8 ....................................... 9 ....................................... 10 ..................................... $1.038 0.294 0.294 0.294 0.294 0.294 0.294 0.294 0.294 0.294 $6.721 6.721 6.721 6.721 6.721 6.721 6.721 6.721 6.721 6.721 $1.518 0.612 0.612 0.612 0.612 0.612 0.612 0.612 0.612 0.612 $0.024 0.002 0.002 0.002 0.002 0.002 0.002 0.002 0.002 0.002 $0.9 0.9 0.9 0.9 0.9 0.9 0.9 0.9 0.9 0.9 $10.2 8.5 8.5 8.5 8.5 8.5 8.5 8.5 8.5 8.5 Total .......................... 3.681 67.210 7.027 0.046 8.8 87.0 DC GA TOTAL COSTS [Discounted $, millions] Year Total cost 7% factor 7% discounted $ 3% factor 3% discounted $ 1 ....................................................................... 2 ....................................................................... 3 ....................................................................... 4 ....................................................................... 5 ....................................................................... 6 ....................................................................... 7 ....................................................................... 8 ....................................................................... 9 ....................................................................... 10 ..................................................................... $10.20 8.53 8.53 8.53 8.53 8.53 8.53 8.53 8.53 8.53 1.000 0.935 0.873 0.816 0.763 0.713 0.666 0.623 0.582 0.544 $10.20 7.97 7.45 6.96 6.51 6.08 5.68 5.31 4.96 4.64 1.000 0.971 0.943 0.915 0.888 0.863 0.837 0.813 0.789 0.766 $10.20 8.28 8.04 7.80 7.57 7.36 7.14 6.93 6.73 6.53 Total .......................................................... 86.96 ............................ 65.77 ............................ 76.60 COST/FLIGHT [2005 $] Year Total cost Flights Av cost/flight 1 ........................................................................................................................... 2 ........................................................................................................................... 3 ........................................................................................................................... 4 ........................................................................................................................... 5 ........................................................................................................................... 6 ........................................................................................................................... 7 ........................................................................................................................... 8 ........................................................................................................................... 9 ........................................................................................................................... 10 ......................................................................................................................... $10.20 8.53 8.53 8.53 8.53 8.53 8.53 8.53 8.53 8.53 17,520 17,520 17,520 17,520 17,520 17,520 17,520 17,520 17,520 17,520 $582.23 486.81 486.81 486.81 486.81 486.81 486.81 486.81 486.81 486.81 Total .............................................................................................................. 86.96 175,200 496.35 Assumptions about unit costs are as follows: 1. Equipment Item Unit cost Quantity Annual cost ETD 20 Unit Purchase ...................................................................................................... Recurring: Maintenance: ETD .................................................................................................... Misc. (Gloves, Batteries, etc.) .................................................................................. $41,500.00 25 $1,037,500.00 11,550.00 ............................ 25 ............................ 288,750.00 5,000.00 Total: Recurring Maintenance ........................................................................... ............................ ............................ 293,750.00 20 Explosives VerDate jul<14>2003 Trace Detection. 19:28 Jul 18, 2005 Jkt 205001 PO 00000 Frm 00013 Fmt 4701 Sfmt 4700 E:\FR\FM\19JYR4.SGM 19JYR4 41598 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations 2. Armed Security Officers Armed security officer hourly costs are computed at the wage rate for Bureau of Labor Statistics (BLS) figures for Police and detectives, public service Sheriffs, bailiffs, and other law enforcement officers, all United States, of $21.11 grossed up for employer paid taxes to $24.55 per hour. The historical data does not reveal how many flights into and out of DCA were round trips, so $122.38 average fare was allowed for a return trip. Wage costs were computed at an average 8 hour day, per diem calculated at the average Federal rate of $31. The per-trip costs then average $350 × 17,520 flights = $6.1 million per year. Training for the armed security officers is assumed at an average of 16 hours/year for 1,500 armed security officers for an additional $589,000 per year. 3. Threat Assessment Checks and Infrastructure NAME CHECK POPULATION AND COST Round-trip flights = (24 flights/day × 365 days) Number of checks = (4 passengers + 2 crew per flight) Name based check unit cost Total annual name based check cost 8,760 52,560 $2 $105,120 The number of round-trip flights into and out of DCA is equal to the number of slots per day (4 slots × 12 hours = 48) times the number of days in a year (365) divided by two, which equals 8,760 round trip flights per year. Assuming that each flight has, on average, four passengers and two crew, there will be 52,560 name based threat assessments per year. The cost for running each check is $2 which places the annual cost at $105,120. NAME BASED THREAT ASSESSMENT COST [2005 $, thousands] Automated flight authorization system Threat assessment system interface Payment processing and application setup System hosting setup costs Scheduling staff 1 ..................... 2 ..................... 3 ..................... 4 ..................... 5 ..................... 6 ..................... 7 ..................... 8 ..................... 9 ..................... 10 ................... $713 107 107 107 107 107 107 107 107 107 $100 0 0 0 0 0 0 0 0 0 $100 0 0 0 0 0 0 0 0 0 $100 0 0 0 0 0 0 0 0 0 $400 400 400 400 400 400 400 400 400 400 $105 105 105 105 105 105 105 105 105 105 $1,518 612 612 612 612 612 612 612 612 612 Total ........ 1,676 100 100 100 4,000 1,051 7,027 Year The Automated Flight Authorization System is estimated to cost $713,000 in initial development, which will be incurred in the first year. Every year thereafter, TSA estimates the system will cost $106,961 for annual IT overhead and maintenance. The Threat Assessment Systems Interface, Payment Processing and Application Setup, and System Hosting Setup costs are only incurred in the first year. These reflect various costs of making the system operational. TSA estimates that it will require 4 FTEs to operate the system. The fully loaded cost of one Federal employee is estimated at $100,000 per year; therefore the staffing costs will be $400,000 per year. The ten year total for the name based threat assessments is estimated to be $7.027 million. Loaded hourly rate Passenger and Crew Manifest and Security Program work ........................... Initial Program and Inspection ......................................................................... 4. Flightcrew Member CHRCs Although some flightcrew members will have had fingerprint-based CHRCs under other security programs, TSA assumed 500 flightcrew members would need CHRCs in the first year with a 10% per year replacement rate. At $48 per CHRC this is $24,000 for the first year and $2,500 each additional year. Hours $50.26 50.26 Quantity (1) 8 17,520 13 Total $880,555.20 5,227.04 1 hour/flight. 6. Benefits The primary benefit of this IFR is that it provides access to DCA by general aviation aircraft operations that currently are prohibited. TSA believes that allowing general aviation aircraft operations to resume at DCA will relieve VerDate jul<14>2003 Total 5. Security Coordinators and Paperwork Item 1 Average Name based checks 17:35 Jul 18, 2005 Jkt 205001 some of the economic hardship these operators have suffered due to the current restrictions. TSA believes that the IFR affords these benefits without decreasing the security of the vital government assets in the Washington, DC metropolitan PO 00000 Frm 00014 Fmt 4701 Sfmt 4700 area. The security provisions contained in this IFR are an integral part of the effort to identify and defeat the threat posed by members of foreign terrorist groups to vital U.S. assets and security. The IFR requires general aviation aircraft operators to adopt and carry out E:\FR\FM\19JYR4.SGM 19JYR4 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations security measures that are comparable to the security measures required of regularly scheduled, commercial aircraft. TSA believes that the IFR will mitigate the risk that an airborne strike initiated from DCA, located moments away from vital national assets, will occur. TSA recognizes that such an impact may not cause substantial damage to property or a large structure. However, it could potentially result in an undetermined number of fatalities and injuries, as well as reduced tourism. The resulting tragedy would adversely impact the regional economies. For these reasons, TSA has concluded that the benefits associated with the IFR justify its costs. B. Regulatory Flexibility Act Assessment TSA has not assessed whether this rule will have a significant economic impact on a substantial number of small entities, as defined in the Regulatory Flexibility Act. Under Executive Order 13272 and the Regulatory Flexibility Act, when an agency publishes a rulemaking without prior notice and opportunity for comment, the Regulatory Flexibility Act requirements do not apply. TSA is adopting this IFR without prior notice and opportunity for public comment. Therefore, no Regulatory Flexibility Act analysis is provided. C. International Trade Impact Assessment The Trade Agreement Act of 1979 prohibits Federal agencies from engaging in any standards or related activities that create unnecessary obstacles to the foreign commerce of the United States. Legitimate domestic objectives, such as security, are not considered unnecessary obstacles. The statute also requires consideration of international standards and, where appropriate, that they be the basis for U.S. standards. In addition, consistent with the Administration’s belief in the general superiority and desirability of free trade, it is the policy of TSA to remove or diminish, to the extent feasible, barriers to international trade, including both barriers affecting the export of American goods and services to foreign countries and barriers affecting the import of foreign goods and services into the United States. In accordance with the above statute and policy, TSA has assessed the potential effect of this IFR and has determined that it will impose the same costs on domestic and international entities, and thus will have a neutral trade impact. VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 D. Unfunded Mandates Assessment The Unfunded Mandates Reform Act of 1995 (the Act), enacted as Pub. L. 104–4 on March 22, 1995, is intended to curb the practice of imposing unfunded Federal mandates on State, local, and tribal governments. Title II of the Act requires each Federal agency to prepare a written statement that assesses the effect of any Federal mandate found in a rulemaking action that may result in an expenditure of $100 million or more (adjusted annually for inflation) in any one year by State, local, and tribal governments, in the aggregate, or by the private sector. Such a mandate is identified as a ‘‘significant regulatory action.’’ This IFR is not a significant regulatory action pursuant to the Act. In addition, the Act does not apply to a regulatory action in which no notice of proposed rulemaking is published, as is the case in this proceeding. Accordingly, it is not necessary to prepare a statement under the Act. VI. Executive Order 13132, Federalism Executive Order 13132 requires TSA to develop an accountable process to ensure ‘‘meaningful and timely input by State and local officials in the development of regulatory policies that have federalism implications.’’ ‘‘Policies that have federalism implications’’ are defined in the Executive Order to include regulations that have ‘‘substantial direct effects on the States, on the relationship between the national government and the States, or on the distribution of power and responsibilities among the various levels of government.’’ Under the Executive Order, TSA may construe a Federal statute to preempt State law only where, among other things, the exercise of State authority conflicts with the exercise of Federal authority under the Federal statute. TSA has analyzed this IFR under the principles and criteria of Executive Order 13132, Federalism. TSA has determined that this action will not have a substantial direct effect on the States, the relationship between the national government and the States, or the distribution of power and responsibilities among the various levels of government. Thus, TSA has determined that the IFR will not have sufficient Federalism implications to warrant the preparation of a Federal Assessment. VII. Environmental Analysis PO 00000 Frm 00015 Fmt 4701 Sfmt 4700 that this action will not have a significant effect on the human environment. VIII. Energy Impact Analysis TSA has assessed the energy impact of this IFR in accordance with the Energy Policy and Conservation Act (EPCA), Public Law 94–163, as amended (42 U.S.C. 6362). TSA has tentatively determined that this IFR will not be a major regulatory action under the provisions of the EPCA. List of Subjects in 49 CFR Parts 1520, 1540, and 1562 Air traffic control, Aircraft, Airmen, Airports, Aviation safety, Screening, Security, Sensitive security information, Weapons. The Amendments For the reasons stated in the preamble, the Transportation Security Administration amends parts 1520, 1540, and 1562 of Title 49, Code of Federal Regulations, as follows: I PART 1520—PROTECTION OF SENSITIVE SECURITY INFORMATION 1. The authority citation for part 1520 continues to read as follows: I Authority: 46 U.S.C. 70102–70106, 70117; 49 U.S.C. 114, 40113, 44901–44907, 44913– 44914, 44916–44918, 44935–44936, 44942, 46105. 2. In § 1520.3, revise the definition of ‘‘Security program’’ to read as follows: I § 1520.3 Terms used in this part. * * * * * Security program means a program or plan and any amendments, developed for the security of the following, including any comments, instructions, or implementing guidance: (1) An airport, aircraft, or aviation cargo operation; (2) A fixed base operator; (3) A maritime facility, vessel, or port area; or (4) A transportation-related automated system or network for information processing, control, and communications. * * * * * I 3. In § 1520.5, revise paragraph (b)(1)(i) and add paragraph (b)(8)(iv) to read as follows: § 1520.5 Sensitive security information. * TSA has reviewed this action for purposes of the National Environmental Review Policy Act of 1969 (NEPA) (42 U.S.C. 4321–4347) and has determined 41599 * * * * (b) * * * (1) * * * (i) Any aircraft operator, airport operator, or fixed base operator security E:\FR\FM\19JYR4.SGM 19JYR4 41600 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations program, or security contingency plan under this chapter; * * * * * (8) * * * (iv) Any armed security officer procedures issued by TSA under 49 CFR part 1562. * * * * * I 4. In § 1520.7, revise paragraph (a) to read as follows: § 1520.7 Covered persons. (a) Each airport operator, aircraft operator, and fixed base operator subject to the requirements of subchapter C of this chapter, and each armed security officer under subpart B of part 1562. * * * * * PART 1540—CIVIL AVIATION SECURITY: GENERAL RULES 5. The authority citation for part 1540 continues to read as follows: I Authority: 49 U.S.C. 114, 5103, 40113, 44901–44907, 44913–44914, 44916–44918, 44935–44936, 44942, 46105. Subpart B—Responsibilities of Passengers and Other Individuals and Persons 6. In § 1540.111, revise paragraphs (a)(3), (b)(2), and (c) to read as follows: I § 1540.111 Carriage of weapons, explosives, and incendiaries by individuals. (a) * * * (3) When the individual is attempting to board or onboard an aircraft for which screening is conducted under §§ 1544.201, 1546.201, or 1562.23 of this chapter. (b) * * * (2) An individual authorized to carry a weapon in accordance with §§ 1544.219, 1544.221, 1544.223, 1546.211, or subpart B of part 1562 of this chapter. * * * * * (c) In checked baggage. A passenger may not transport or offer for transport in checked baggage or in baggage carried in an inaccessible cargo hold under § 1562.23 of this chapter: (1) Any loaded firearm(s). (2) Any unloaded firearm(s) unless— (i) The passenger declares to the aircraft operator, either orally or in writing, before checking the baggage, that the passenger has a firearm in his or her bag and that it is unloaded; (ii) The firearm is unloaded; (iii) The firearm is carried in a hardsided container; and (iv) The container in which it is carried is locked, and only the passenger retains the key or combination. VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 (3) Any unauthorized explosive or incendiary. * * * * * I 7. Revise the title of part 1562 to read as follows: PART 1562—OPERATIONS IN THE WASHINGTON, DC, METROPOLITAN AREA 8. The authority citation for part 1562 is revised to read as follows: I Authority: 49 U.S.C. 114, 40114, Sec. 823, Pub. L. 108–176, 117 Stat. 2595. 9. Add a new subpart B to read as follows: I Subpart B—Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations Sec. 1562.21 Scope, general requirements, and definitions. 1562.23 Aircraft operator and passenger requirements. 1562.25 Fixed base operator requirements. 1562.27 Costs. 1562.29 Armed security officer requirements. Subpart B—Ronald Reagan Washington National Airport: Enhanced Security Procedures for Certain Operations § 1562.21 Scope, general requirements, and definitions. (a) Scope. This subpart applies to aircraft operations into or out of Ronald Reagan Washington National Airport (DCA), fixed base operators located at DCA or gateway airports; individuals designated as a security coordinator by aircraft operators or fixed base operators; and crewmembers, passengers, and armed security officers on aircraft operations subject to this subpart. (b) General requirements. Each person operating an aircraft into or out of DCA must comply with this subpart, except: (1) Military, law enforcement, and medivac aircraft operations; (2) Federal and State government aircraft operations operating under an airspace waiver approved by TSA and the Federal Aviation Administration; (3) All-cargo aircraft operations; and (4) Passenger aircraft operations conducted under: (i) A full security program approved by TSA in accordance with 49 CFR 1544.101(a); or (ii) A foreign air carrier security program approved by TSA in accordance with 49 CFR 1546.101(a) or (b). (c) Other security programs. Each aircraft operator required to comply with this subpart for an aircraft PO 00000 Frm 00016 Fmt 4701 Sfmt 4700 operation into or out of DCA must also comply with any other TSA-approved security program that covers that operation. If any requirements of the DASSP conflict with the requirements of another TSA-approved security program, the aircraft operation must be conducted in accordance with the requirements of the DASSP. (d) Definitions. For purposes of this subpart, the following definitions apply: Armed Security Officer Program means the security program approved by TSA, in coordination with the Federal Air Marshal Service, for security officers authorized to carry a firearm under § 1562.29 of this part. Crewmember means a person assigned to perform duty in an aircraft during flight time. This does not include an armed security officer. DCA means Ronald Reagan Washington National Airport. DASSP means the aircraft operator security program (DCA Access Standard Security Program) approved by TSA under this part for aircraft operations into and out of DCA. FBO means a fixed base operator that has been approved by TSA under this part to serve as a last point of departure for flights into or out of DCA. FBO Security Program means the security program approved by TSA under this part for FBOs to serve flights into or out of DCA. Flightcrew member means a pilot, flight engineer, or flight navigator assigned to duty in an aircraft during flight time. Gateway airport means an airport that has been approved by TSA under this part as a last point of departure for flights into DCA under this part. Passenger means any person on an aircraft other than a flightcrew member. A ‘‘passenger’’ includes an armed security officer authorized to carry a firearm in accordance with the rule. § 1562.23 Aircraft operator and passenger requirements. (a) General. To operate into or out of DCA, an aircraft operator must: (1) Designate a security coordinator responsible for implementing the DASSP and other security requirements required under this section, and provide TSA with the security coordinator’s contact information and availability in accordance with the DASSP. (2) Adopt and carry out the DASSP. (3) Ensure that each crewmember of an aircraft operating into or out of DCA meets the requirements of paragraph (c) of this section. (4) Apply for and receive a reservation from the Federal Aviation Administration and authorization from E:\FR\FM\19JYR4.SGM 19JYR4 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations TSA for each flight into and out of DCA in accordance with paragraph (d) of this section. (5) Comply with the operating requirements in paragraph (e) of this section for each flight into and out of DCA. (6) Pay any costs and fees required under this part. (7) Restrict the distribution, disclosure, and availability of sensitive security information (SSI), as defined in part 1520 of this chapter, to persons with a need to know, and refer all requests for SSI by other persons to TSA. (8) Comply with any additional security procedures required by TSA through order, Security Directive, or other means. (b) Security coordinator. Each security coordinator designated by an aircraft operator under paragraph (a) of this section: (1) Must undergo a fingerprint-based criminal history records check that does not disclose that he or she has a disqualifying criminal offense as described in § 1544.229(d) of this chapter. This standard is met if the security coordinator is in compliance with the fingerprint-based criminal history records check requirements of §§ 1542.209, 1544.229, or 1544.230 of this chapter with his or her current employer. (2) Must submit to TSA his or her: (i) Legal name, including first, middle, and last; any applicable suffix, and any other names used. (ii) Current mailing address, including residential address if different than current mailing address. (iii) Date and place of birth. (iv) Social security number, (submission is voluntary, although recommended). (v) Citizenship status and date of naturalization if the individual is a naturalized citizen of the United States. (vi) Alien registration number, if applicable. (3) Must successfully complete a TSA security threat assessment. (4) May, if informed that a disqualifying offense has been disclosed, correct the record in accordance with the procedures set forth in paragraphs (h) and (i) of § 1544.229 of this chapter regarding notification and correction of records. (c) Flightcrew member requirements. Each flightcrew member of an aircraft, as defined in 49 CFR 1540.5, operating into or out of DCA: (1) Must undergo a fingerprint-based criminal history records check that does not disclose that he or she has a disqualifying criminal offense as VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 described in § 1544.229(d) of this chapter. This standard is met if the flightcrew member is in compliance with the fingerprint-based criminal history records check requirements of §§ 1542.209, 1544.229, or 1544.230 of this chapter with his or her current employer. (2) Must not have a record on file with the Federal Aviation Administration of a violation of— (i) A prohibited area designated under 14 CFR part 73; (ii) A flight restriction established under 14 CFR 91.141; (iii) Special security instructions issued under 14 CFR 99.7; (iv) A restricted area designated under 14 CFR part 73; (v) Emergency air traffic rules issued under 14 CFR 91.139; (vi) A temporary flight restriction designated under 14 CFR 91.137, 91.138, or 91.145; or (vii) An area designated under 14 CFR 91.143. (3) May, if informed that a disqualifying offense has been disclosed, correct the record in accordance with the procedures set forth in paragraphs (h) and (i) of § 1544.229 of this chapter regarding notification and correction of records. (d) Flight authorization requirements. To receive authorization to operate an aircraft into or out of DCA, an aircraft operator must follow the procedures in this paragraph. (1) The aircraft operator must apply to the Federal Aviation Administration for a tentative reservation, in a form and manner approved by the Federal Aviation Administration. (2) The aircraft operator must submit to TSA, in a form and manner approved by TSA, the following information at least 24 hours prior to aircraft departure: (i) For each passenger and crewmember on the aircraft: (A) Legal name, including first, middle, and last; any applicable suffix, and any other names used. (B) Current mailing address, including residential address if different than current mailing address. (C) Date and place of birth. (D) Social security number, (submission is voluntary, although recommended). (E) Citizenship status and date of naturalization if the individual is a naturalized citizen of the United States. (F) Alien registration number, if applicable. (ii) The registration number of the aircraft. (iii) The flight plan. (iv) Any other information required by TSA. PO 00000 Frm 00017 Fmt 4701 Sfmt 4700 41601 (3) TSA will conduct a name-based security threat assessment for each passenger and crewmember. If TSA notifies the aircraft operator that a passenger or crewmember may pose a security threat, the aircraft operator must ensure that the passenger or crewmember does not board the aircraft before the aircraft departs out of DCA or out of a gateway airport to DCA. (4) If TSA approves the flight, TSA will transmit such approval to the Federal Aviation Administration for assignment of a final reservation to operate into or out of DCA. Once the Federal Aviation Administration assigns the final reservation, TSA will notify the aircraft operator. (5) TSA may, at its discretion, cancel any or all flight approvals at any time without prior notice to the aircraft operator. (6) TSA may, at its discretion, permit a flight into or out of DCA to deviate from the requirements of this subpart, if TSA finds that such action would not be detrimental to transportation security or the safe operation of the aircraft. (7) TSA may, at its discretion, require any flight into or out of DCA under this subpart to comply with additional security measures. (e) Operating requirements. Each aircraft operator must: (1) Ensure that each flight into DCA departs from a gateway airport and makes no intermediate stops before arrival at DCA. (2) Ensure that each passenger and crewmember on an aircraft operating into or out of DCA has been screened in accordance with the DASSP prior to boarding the aircraft. (3) Ensure that all accessible property and property in inaccessible cargo holds on an aircraft operating into or out of DCA has been screened in accordance with the DASSP prior to boarding the aircraft. (4) Ensure that each aircraft operating into or out of DCA has been searched in accordance with the DASSP. (5) Ensure that each passenger and crewmember on an aircraft operating into or out of DCA provides TSA with a valid government-issued picture identification in accordance with the DASSP. (6) If the aircraft operating into or out of DCA is equipped with a cockpit door, ensure that the door is closed and locked at all times during the operation of the aircraft to or from DCA, unless Federal Aviation Administration regulations require the door to remain open. (7) Ensure that each aircraft operating into or out of DCA has onboard at least one armed security officer who meets E:\FR\FM\19JYR4.SGM 19JYR4 41602 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations the requirements of § 1562.29 of this chapter. This requirement does not apply if— (i) There is a Federal Air Marshal onboard; or (ii) The aircraft is being flown without passengers into DCA to pick up passengers, or out of DCA after deplaning all passengers. (8) Ensure that an aircraft operating into or out of DCA has any Federal Air Marshal onboard, at no cost to the Federal Government, if TSA or the Federal Air Marshal Service so requires. (9) Notify the National Capital Region Coordination Center prior to departure of the aircraft from DCA or a gateway airport. (10) Ensure that each aircraft operating into or out of DCA operates under instrument flight rules. (11) Ensure that each passenger complies with any security measures mandated by TSA. (12) Ensure that no prohibited items are onboard the aircraft. (f) Compliance. (1) Each aircraft operator must: (i) Permit TSA to conduct any inspections or tests, including copying records, to determine compliance with this part and the DASSP. (ii) At the request of TSA, provide evidence of compliance with this part and the DASSP, including copies of records. (2) Noncompliance with this part or the DASSP may result in the cancellation of an aircraft operator’s flight approvals and other remedial or enforcement action, as appropriate. (g) Passenger requirements. Each passenger, including each armed security officer, who boards or attempts to board an aircraft under this section must: (1) Provide information to the aircraft operator as provided in this section. (2) Provide to TSA upon request a valid government-issued photo identification. (3) Comply with security measures as conveyed by the aircraft operator. (4) Comply with all applicable regulations in this chapter, including § 1540.107 regarding submission to screening and inspection, § 1540.109 regarding prohibition against interference with screening personnel, and § 1540.111 regarding carriage of weapons, explosives, and incendiaries by individuals. § 1562.25 Fixed base operator requirements. (a) Security program. Each FBO must adopt and carry out an FBO Security Program. (b) Screening and other duties. Each FBO must— VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 (1) Designate a security coordinator who meets the requirements in § 1562.23(b) of this part and is responsible for implementing the FBO Security Program and other security requirements required under this section, and provide TSA with the security coordinator’s contact information and availability in accordance with the FBO Security Program. (2) Support the screening of persons and property in accordance with the requirements of this subpart and the FBO Security Program. (3) Support the search of aircraft in accordance with the requirements of this subpart and the FBO Security Program. (4) Restrict the distribution, disclosure, and availability of sensitive security information (SSI), as defined in part 1520 of this chapter, to persons with a need to know, and refer all requests for SSI by other persons to TSA. (5) Perform any other duties required under the FBO Security Program. (c) Compliance. (1) Each FBO must: (i) Permit TSA to conduct any inspections or tests, including copying records, to determine compliance with this part and the FBO Security Program. (ii) At the request of TSA, provide evidence of compliance with this part and the FBO Security Program, including copies of records. (2) Noncompliance with this part or the FBO Security Program may result in the cancellation of an aircraft operator’s flight approvals and other remedial or enforcement action, as appropriate. § 1562.27 Costs. (a) Each aircraft operator must pay a threat assessment fee of $15 for each passenger and crewmember whose information the aircraft operator submits to TSA in accordance with § 1562.23(d) of this part. (b) Each aircraft operator must pay to TSA the costs associated with carrying out this subpart, as provided in its DASSP. (c) All fees and reimbursement must be remitted to TSA in a form and manner approved by TSA. (d) TSA will not issue any refunds, unless any fees or reimbursement funds were paid in error. (e) If an aircraft operator does not remit to TSA the fees and reimbursement funds required under this section, TSA may decline to process any requests for authorization from the aircraft operator. PO 00000 Frm 00018 Fmt 4701 Sfmt 4700 § 1562.29 Armed security officer requirements. (a) General. Unless otherwise authorized by TSA, each armed security officer must meet the following requirements: (1) Be qualified to carry a firearm in accordance with paragraph (b) of this section. (2) Successfully complete a TSA security threat assessment as described in paragraph (c) of this section. (3) Meet such other requirements as TSA, in coordination with the Federal Air Marshal Service, may establish in the Armed Security Officer Security Program. (4) Be authorized by TSA, in coordination with the Federal Air Marshal Service, under 49 U.S.C. 44903(d). (b) Qualifications. To be qualified to carry a firearm under this subpart, an individual must meet the requirements in paragraph (1), (2), or (3) of this section, unless otherwise authorized by TSA, in coordination with the Federal Air Marshal Service. (1) Active law enforcement officers. An active law enforcement officer must be an employee of a governmental agency who— (i) Is authorized by law to engage in or supervise the prevention, detection, investigation, or prosecution of, or the incarceration of any person for, any violation of law; (ii) Has statutory powers of arrest; (iii) Is authorized by the agency to carry a firearm; (iv) Is not the subject of any disciplinary action by the agency; (v) Is not under the influence of alcohol or another intoxicating or hallucinatory drug or substance; and (vi) Is not prohibited by Federal law from receiving a firearm. (2) Retired law enforcement officers. A retired law enforcement officer must be an individual who— (i) Retired in good standing from service with a public agency as a law enforcement officer, other than for reasons of mental instability; (ii) Before such retirement, was authorized by law to engage in or supervise the prevention, detection, investigation, or prosecution of, or the incarceration of any person for, any violation of law, and had statutory powers of arrest; (iii) Before such retirement, was regularly employed as a law enforcement officer for an aggregate of 15 years or more, or retired from service with such agency, after completing any applicable probationary period of such service, due to a service-connected disability, as determined by such agency; E:\FR\FM\19JYR4.SGM 19JYR4 Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules and Regulations (iv) Has a non-forfeitable right to benefits under the retirement plan of the agency; (v) Is not under the influence of alcohol or another intoxicating or hallucinatory drug or substance; and (vi) Is not prohibited by Federal law from receiving a firearm. (3) Other individuals. Any other individual must— (i) Meet qualifications established by TSA, in coordination with the Federal Air Marshal Service, in the Armed Security Officer Program; (ii) Not be under the influence of alcohol or another intoxicating or hallucinatory drug or substance; and (iii) Not be prohibited by Federal law from receiving a firearm. (c) Threat assessments. To be authorized under this section, each armed security officer: (1) Must undergo a fingerprint-based criminal history records check that does not disclose that he or she has a criminal offense that would disqualify him or her from possessing a firearm under 18 U.S.C. 922(g). (2) May, if informed that a disqualifying offense has been disclosed, correct the record in accordance with the procedures set forth in paragraphs (h) and (i) of § 1544.229 of this chapter regarding notification and correction of records. (3) Must submit to TSA his or her: (i) Legal name, including first, middle, and last; any applicable suffix, and any other names used. (ii) Current mailing address, including residential address if different than current mailing address. (iii) Date and place of birth. (iv) Social security number, (submission is voluntary, although recommended). (v) Citizenship status and date of naturalization if the individual is a naturalized citizen of the United States. VerDate jul<14>2003 17:35 Jul 18, 2005 Jkt 205001 (vi) Alien registration number, if applicable. (4) Must undergo a threat assessment by TSA prior to receiving authorization under this section and prior to boarding an aircraft operating into or out of DCA as provided in § 1562.23(d)(1) of this part. (d) Training. Each armed security officer onboard an aircraft operating into or out of DCA must: (1) Have basic law enforcement training acceptable to TSA; and (2) Successfully complete a TSAapproved training course, developed in coordination with the Federal Air Marshal Service, at the expense of the armed security officer. (e) Armed security officer program. (1) Each armed security officer onboard an aircraft operating into or out of DCA must— (i) Comply with the Armed Security Officer Program. (ii) Restrict the distribution, disclosure, and availability of sensitive security information (SSI), as defined in part 1520 of this chapter, to persons with a need to know, and refer all requests for SSI by other persons to TSA. (2) TSA and the Federal Air Marshal Service may conduct random inspections of armed security officers to ensure compliance with the Armed Security Officer Program. (f) Authority to carry firearm. An armed security officer approved under this section is authorized— (1) To carry a firearm in accordance with the Armed Security Officer Program on an aircraft operating under a DASSP into or out of DCA; and (2) To transport a firearm in accordance with the Armed Security Officer Program at any airport as needed to carry out duties under this subpart, PO 00000 Frm 00019 Fmt 4701 Sfmt 4700 41603 including for travel to and from flights conducted under this subpart. (g) Use of force. Each armed security officer authorized to carry a firearm under this section may use force, including deadly force, in accordance with the Armed Security Officer Program. (h) Use of alcohol or intoxicating or hallucinatory drugs or substances. An armed security officer onboard an aircraft operating into or out of DCA may not consume alcohol or use an intoxicating or hallucinatory drug or substance during the flight and within 8 hours before boarding the aircraft. (i) Credential. (1) TSA credential. An armed security officer under this section must carry a credential issued by TSA. (2) Inspection of credential. An armed security officer must present the TSAissued credential for inspection when requested by an authorized representative of TSA, the Federal Aviation Administration, the Federal Air Marshal Service, the National Transportation Safety Board, any Federal, State, or local law enforcement officer, or any authorized aircraft operator representative. (3) Preflight identification to crewmembers. When carrying a firearm, an armed security officer must identify himself or herself to all crewmembers either personally or through another member of the crew before the flight. (j) Suspension or withdrawal of authorization. At the discretion of TSA, authorization under this subpart and 49 U.S.C. 44903(d) is suspended or withdrawn upon notification by TSA. Issued in Arlington, Virginia, on July 15, 2005. Tom Blank, Acting Deputy Administrator. [FR Doc. 05–14269 Filed 7–15–05; 3:06 pm] BILLING CODE 4910–62–P E:\FR\FM\19JYR4.SGM 19JYR4

Agencies

[Federal Register Volume 70, Number 137 (Tuesday, July 19, 2005)]
[Rules and Regulations]
[Pages 41586-41603]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 05-14269]



[[Page 41585]]

-----------------------------------------------------------------------

Part V





Department of Homeland Security





-----------------------------------------------------------------------



Transportation Security Administration



-----------------------------------------------------------------------



49 CFR Parts 1520, 1540, and 1562



Ronald Reagan Washington National Airport: Enhanced Security Procedures 
for Certain Operations; Interim Final Rule

Federal Register / Vol. 70, No. 137 / Tuesday, July 19, 2005 / Rules 
and Regulations

[[Page 41586]]


-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Transportation Security Administration

49 CFR Parts 1520, 1540, and 1562

[Docket No. TSA-2005-21866; Amendment Nos. 1520-3, 1540-6, 1562-1]
RIN 1652-AA49


Ronald Reagan Washington National Airport: Enhanced Security 
Procedures for Certain Operations

AGENCY: Transportation Security Administration (TSA), Department of 
Homeland Security (DHS).

ACTION: Interim final rule; request for comments.

-----------------------------------------------------------------------

SUMMARY: Since September 11, 2001, general aviation aircraft operations 
have been prohibited at Ronald Reagan Washington National Airport 
(DCA). The Transportation Security Administration (TSA) is issuing this 
interim final rule (IFR) to restore access to DCA for certain aircraft 
operations while maintaining the security of critical Federal 
Government and other assets in the Washington, DC metropolitan area. 
This IFR applies to all passenger aircraft operations into or out of 
DCA, except U.S. air carrier operations operating under a full security 
program required by 49 CFR part 1544 and foreign air carrier operations 
operating under 49 CFR 1546.101(a) or (b). The IFR establishes security 
procedures for aircraft operators and gateway airport operators, and 
security requirements relating to crewmembers, passengers, and armed 
security officers onboard aircraft operating into or out of DCA. 
Although this IFR is effective on August 18, 2005, an aircraft operator 
may not conduct operations into or out of DCA until it is determined by 
TSA to be in compliance with the security requirements set forth in 
this IFR.

DATES: This rule is effective August 18, 2005. Submit comments by 
September 19, 2005.

ADDRESSES: You may submit comments, identified by the TSA docket number 
to this rulemaking, using any one of the following methods:
    Comments Filed Electronically: You may submit comments through the 
docket Web site at https://dms.dot.gov. Please be aware that anyone is 
able to search the electronic form of all comments received into any of 
our dockets by the name of the individual submitting the comment (or 
signing the comment, if submitted on behalf of an association, 
business, labor union, etc.). You may review the applicable Privacy Act 
Statement published in the Federal Register on April 11, 2000 (65 FR 
19477), or you may visit https://dms.dot.gov.
    Comments Submitted by Mail, Fax, or In Person: Address or deliver 
your written, signed comments to the Docket Management System, U.S. 
Department of Transportation, Room Plaza 401, 400 Seventh Street, SW., 
Washington, DC 20590-0001; Fax: 202-493-2251.
    Comments that include trade secrets, confidential commercial or 
financial information, or sensitive security information (SSI) should 
not be submitted to the public regulatory docket. Please submit such 
comments separately from other comments on the rule. Comments 
containing trade secrets, confidential commercial or financial 
information, or SSI should be appropriately marked as containing such 
information and submitted by mail to the individual(s) listed in FOR 
FURTHER INFORMATION CONTACT.
    Reviewing Comments in the Docket: You may review the public docket 
containing comments on this interim final rule in person in the Docket 
Office between 9 a.m. and 5 p.m., Monday through Friday, except Federal 
holidays. The Docket Office is located on the plaza level of the NASSIF 
Building at the Department of Transportation address above. Also, you 
may review public dockets on the Internet at https://dms.dot.gov.
    See SUPPLEMENTARY INFORMATION for format and other information 
about comment submissions.

FOR FURTHER INFORMATION CONTACT: For policy questions, Robert Rottman, 
Office of Aviation Security Policy, Transportation Security 
Administration Headquarters, East Building, Floor 3, 601 12th Street, 
Arlington, VA 22202; telephone: (571) 227-2289; e-mail: 
Robert.Rottman@dhs.gov.
    For questions related to Sensitive Security Information (SSI), 
Keith L. Moore, Director, SSI Program Office, Office of the Chief of 
Staff, Transportation Security Administration Headquarters, East 
Building, Floor 7, 601 12th Street, Arlington, VA 22202; telephone: 
(571) 227-3513; e-mail: Keith.Moore1@dhs.gov.
    For legal questions, Scott Houston, Office of Chief Counsel, 
Transportation Security Administration Headquarters, East Building, 
Floor 12, 601 12th Street, Arlington, VA 22202; telephone: (571) 227-
3653; e-mail: Scott.Houston@dhs.gov.

SUPPLEMENTARY INFORMATION:

Comments Invited

    This IFR is being adopted without prior notice and prior public 
comment. However, to the maximum extent possible, operating components 
within DHS provide an opportunity for public comment on regulations 
issued without prior notice. Accordingly, TSA invites interested 
persons to participate in this rulemaking by submitting written 
comments, data, or views. TSA also invites comments relating to the 
economic, environmental, energy, or federalism impacts that might 
result from this rulemaking. See ADDRESSES above for information on 
where to submit comments.
    Comments that include trade secrets, confidential commercial or 
financial information, or SSI should not be submitted to the public 
regulatory docket. Please submit such comments separately from other 
comments on the rule. Comments containing this type of information 
should be appropriately marked and submitted by mail to the 
individual(s) listed in FOR FURTHER INFORMATION CONTACT section. Upon 
receipt of such comments, TSA will not place the comments in the public 
docket and will handle them in accordance with applicable safeguards 
and restrictions on access. TSA will hold them in a separate file to 
which the public does not have access, and place a note in the public 
docket that TSA has received such materials from the commenter. If TSA 
receives a request to examine or copy this information, TSA will treat 
it as any other request under the Freedom of Information Act (FOIA) (5 
U.S.C. 552) and the Department of Homeland Security's FOIA regulation 
found in 6 CFR part 5.
    With each comment, please include your name and address, identify 
the docket number at the beginning of your comments, and give the 
reason for each comment. The most helpful comments reference a specific 
portion of the rule, explain the reason for any recommended change, and 
include supporting data. You may submit comments and material 
electronically, in person, by mail, or fax as provided under ADDRESSES, 
but please submit your comments and material by only one means. If you 
submit comments by mail or delivery, submit them in two copies, in an 
unbound format, no larger than 8.5 by 11 inches, suitable for copying 
and electronic filing.
    If you want TSA to acknowledge receipt of your comments on this 
rulemaking, include with your comments a self-addressed, stamped 
postcard on which the docket number

[[Page 41587]]

appears. We will stamp the date on the postcard and mail it to you.
    Except for comments containing confidential information and SSI, we 
will file in the public docket all comments we receive, as well as a 
report summarizing each substantive public contact with TSA personnel 
concerning this rulemaking. The docket is available for public 
inspection before and after the comment closing date.
    We will consider all comments we receive on or before the closing 
date for comments. We will consider comments filed late to the extent 
practicable. We may change this rule in light of the comments we 
receive.

Availability of Rulemaking Document

    You may obtain an electronic copy using the Internet by--
    (1) Searching the Department of Transportation's electronic Docket 
Management System (DMS) Web page (https://dms.dot.gov/search);
    (2) Accessing the Government Printing Office's Web page at https://
www.gpoaccess.gov/fr/; or
    (3) Visiting the TSA's Law and Policy Web page at https://
www.tsa.gov/public/index.jsp.
    In addition, copies are available by writing or calling any of the 
individuals in the FOR FURTHER INFORMATION CONTACT section. Make sure 
to identify the docket number of this rulemaking.

Small Entity Inquiries

    The Small Business Regulatory Enforcement Fairness Act (SBREFA) of 
1996 requires TSA to comply with small entity requests for information 
or advice about compliance with statutes and regulations within TSA's 
jurisdiction. Any small entity that has a question regarding this 
document may contact the persons listed in the FOR FURTHER INFORMATION 
CONTACT section for information or advice. You can get further 
information regarding SBREFA on the Small Business Administration's Web 
page at https://www.sba.gov/advo/laws/law_lib.html.

Good Cause for Issuing Rule Without Prior Notice and Comment

    TSA is issuing this IFR without prior notice and opportunity to 
comment pursuant to its authority under section 4(a) of the 
Administrative Procedure Act (APA) (5 U.S.C. 553(b)). This provision 
authorizes the agency to issue a rule without prior notice and 
opportunity to comment when the agency for good cause finds that those 
procedures are ``impracticable, unnecessary, or contrary to the public 
interest.''
    General aviation and charter operations that are not under full 
security programs have been prohibited from arriving at or departing 
from DCA since September 11, 2001. However, regularly scheduled, 
commercial air carrier operations that had been prohibited at DCA after 
September 11, 2001, have been restored through issuance of Notices to 
Airmen (NOTAMs) by the Federal Aviation Administration (FAA). The 
operators that have not been able to resume flights into and out of DCA 
have suffered economic hardship. Because the interim final rule 
establishes a voluntary program that will lift the suspension of 
general aviation operations for a segment of affected parties, thereby 
removing an existing restriction on their activities, TSA believes 
there will be little, if any, objection from these parties to immediate 
implementation of the interim final rule. Moreover, the economic 
hardship of the operators would be unnecessarily extended by a notice 
and comment rulemaking. Therefore, delaying implementation until after 
a notice and public comment period is unnecessary. If some affected 
parties believe that changes in the interim final rule are warranted, 
they will have the opportunity to comment on the rule, while other 
affected parties that are able take advantage of the benefits of the 
rule may do so without further delay. Therefore, in recognition of the 
need to begin to restore general aviation operations in a manner that 
will neither give rise to security risks, nor prolong the economic 
hardship to affected parties, TSA finds good cause to forgo prior 
notice and public comment in issuing the interim final rule.
    As previously noted, TSA requests comment on all aspects of this 
rule and will modify the rule if warranted.

Abbreviations of Terms Used In This Document

ADIZ--Air Defense Identification Zone
ASOP--Armed Security Officer Program
ATSA--Aviation and Transportation Security Act
CHRC--Criminal history records check
DASSP--DCA Access Standard Security Program
DCA--Ronald Reagan Washington National Airport
DHS--Department of Homeland Security
FAA--Federal Aviation Administration
FAM--Federal Air Marshal
FAMS--Federal Air Marshal Service
FBI--Federal Bureau of Investigation
FBO--fixed base operator
FRZ--Flight Restricted Zone
LEOSA--Law Enforcement Officers Safety Act
NOTAM--Notice to Airmen
PCSSP--Private Charter Standard Security Program
SSI--Sensitive Security Information
TFR--Temporary Flight Restriction
TFSSP--Twelve-Five Standard Security Program
TSA--Transportation Security Administration

I. Background

A. Operations at DCA

    After the September 11, 2001, terrorist attacks against four U.S. 
commercial aircraft resulting in the tragic loss of human life at the 
World Trade Center, the Pentagon, and in southwest Pennsylvania, the 
FAA immediately prohibited all aircraft operations within the 
territorial airspace of the U.S., with the exception of certain 
military, law enforcement, and emergency related aircraft operations. 
This general prohibition was lifted in part on September 13, 2001. In 
the Washington, DC metropolitan area, however, aircraft operations 
remained prohibited at all civil airports within a 25 nautical mile 
radius of the Washington DC Very High Frequency Omnidirectional Range/
Distance Measuring Equipment (VOR/DME). This action was accomplished 
via the U.S. NOTAM system.\1\
---------------------------------------------------------------------------

    \1\ NOTAMs are used by the FAA to notify pilots of important 
information, including airspace restrictions. The FAA issued several 
NOTAMs regarding the restricted airspace over the Washington, DC, 
metropolitan area. The current NOTAM restricting aircraft operations 
in the Washington, DC, Flight Restricted Zone is NOTAM 3/2126.
---------------------------------------------------------------------------

    Limited commercial air carrier operations were permitted to resume 
at DCA on October 4, 2001, and through a series of emergency air 
traffic rules issued by the FAA under 14 CFR 91.139 and NOTAMs that 
followed, other restrictions were eliminated. Currently operations to 
and from DCA by aircraft operators that hold a certificate under 14 CFR 
part 121 and operate under a full security program approved by TSA in 
accordance with 49 CFR 1544.101(a), or a foreign air carrier security 
program approved by TSA in accordance with 49 CFR 1546.101(a) or (b), 
are permitted under NOTAM 3/2126. Generally these are regularly 
scheduled, commercial, passenger operations. General aviation 
operations and other operations that are not under one of these 
security programs under part 1544 or 1546 are prohibited.
    As a result of this prohibition, many operators and the businesses 
they serve have experienced economic hardship. According to estimates 
prepared by the DCA Fixed Based Operator,\2\

[[Page 41588]]

approximately 660 general aviation and charter flights occurred per 
week prior to September 11, 2001. The majority of these were corporate 
aircraft accommodating business travelers in the Washington, DC, area.
---------------------------------------------------------------------------

    \2\ A Fixed Base Operator is an airport-based commercial 
enterprise that provides support services to aircraft operators, 
such as maintenance, overnight parking, fueling, and deicing.
---------------------------------------------------------------------------

    It is important to resume these operations at DCA to permit these 
operators, their customers, and affected local businesses to recover 
from the adverse economic impacts brought on by the events of September 
11, 2001. However, DCA is located in close proximity to critical 
Federal Government assets, infrastructure, and functions. Any aircraft 
arriving at or departing from DCA will fly very near several 
significant government office buildings and national monuments. It 
would take very little time for such aircraft to inflict serious damage 
to any number of buildings in Washington, DC, and the surrounding area. 
Such an event could occur so quickly that it may not be possible to 
prevent. Therefore it is necessary to balance the economic interests of 
operators against the legitimate governmental security risks that 
exist.
    After discussions with the United States Secret Service, the 
Federal Air Marshal Service (FAMS), the Department of Defense, the 
Homeland Security Council, and other Federal agencies, it has been 
determined that the national security concerns surrounding operations 
at DCA can be addressed effectively by requiring operators to comply 
with the security procedures set forth in this IFR. Applying these 
procedures to operations arriving at and departing from DCA will help 
to protect the critical national assets in the Washington, DC area from 
an airborne terrorist act. TSA has consulted with the associations that 
represent the operators subject to this rule, and they understand the 
need for special procedures at DCA. These operators are prepared to 
undertake special security procedures in order to recommence operations 
at DCA.

B. Statutory Background

    On November 19, 2001, Congress enacted the Aviation and 
Transportation Security Act (ATSA),\3\ which created TSA, and 
transferred civil aviation security functions from the FAA to TSA. TSA 
transferred the bulk of FAA's civil aviation security regulations (in 
Title 14, Code of Federal Regulations) to TSA (in Title 49, Code of 
Federal Regulations) in a separate rulemaking (see docket number TSA-
2002-11602, 67 FR 8340, February 22, 2002).
---------------------------------------------------------------------------

    \3\ Pub. L. 107-71, November 19, 2001, 115 Stat. 597.
---------------------------------------------------------------------------

    On December 12, 2003, Congress enacted the Vision 100-Century of 
Aviation Reauthorization Act.\4\ Section 823 of Vision 100 requires the 
Secretary of Homeland Security to develop a security plan to permit 
general aviation aircraft to resume operations into and out of DCA.
---------------------------------------------------------------------------

    \4\ Pub. L. 108-176, December 12, 2003, 117 Stat. 2490.
---------------------------------------------------------------------------

II. Summary of the Interim Final Rule

    For affected aircraft operators to fly into and out of DCA, they 
must designate a security coordinator and adopt a DCA Access Standard 
Security Program (DASSP). As part of the DASSP, they must ensure that 
all flight crewmembers have undergone a fingerprint-based criminal 
history records check (CHRC). Once aircraft operators have complied 
with those requirements, they will be eligible to apply to the FAA for 
a reservation, and to TSA for authorization, to operate specific 
flights into and out of DCA.
    To receive authorization for a flight, aircraft operators must have 
name-based threat assessments conducted by TSA on their flight 
crewmembers and passengers. They must carry an armed security officer 
who also must have a threat assessment conducted by TSA, as well as 
specialized training and authorization from TSA. The operators must 
have their last point of departure from a Fixed Base Operator (FBO)\5\ 
that holds a security program issued by TSA at an airport designated by 
TSA (referred to in the IFR as a ``gateway airport''). At each gateway 
airport, TSA will inspect the aircraft and will screen the passengers, 
their carry-on property, and property carried in the cargo hold of the 
aircraft, before it departs for DCA. The aircraft operator must also 
comply with all applicable FAA rules, including those rules for 
operating in the Flight Restricted Zone (FRZ).\6\
---------------------------------------------------------------------------

    \5\ An FBO is an airport-based commercial enterprise that 
provides support services to aircraft operators, such as 
maintenance, overnight parking, fueling, and de-icing.
    \6\ The FRZ is an airspace ring centered on the Washington DC 
VOR/DME with a radius of approximately 15 nautical miles. In order 
to enter and operate in FRZ airspace, an operator must comply with 
certain access and security procedures implemented by FAA and TSA.
---------------------------------------------------------------------------

    The aircraft operator must reimburse TSA for any costs associated 
with carrying out this subpart. These costs include $15 for the threat 
assessment TSA will conduct for each passenger and crewmember whose 
information the aircraft operator submits to TSA as part of the flight 
approval process, and $296 per round trip into and out of DCA to cover 
the costs of using TSA screening personnel and equipment at DCA and the 
gateway airports.

III. Discussion of the Interim Final Rule

A. Scope and Definitions

    This IFR creates a new subpart B in part 1562 of Title 49 of the 
Code of Federal Regulations (CFR). Subpart B applies to FBOs located at 
DCA and the gateway airports. It also applies to all aircraft 
operations into or out of DCA that are conducted under subpart B. The 
IFR also applies to passengers, crewmembers, and armed security 
officers onboard aircraft operations operated in accordance with the 
IFR. Finally, the IFR applies to individuals designated as security 
coordinators by aircraft operators in accordance with the IFR.
    Section 1562.21(b) provides that each person operating an aircraft 
into or out of DCA must comply with this subpart, with certain 
exceptions. The exceptions include (1) military, law enforcement, or 
medivac aircraft operating into or out of DCA; (2) Federal and State 
Government aircraft operating under an airspace waiver approved by TSA 
and authorized by FAA; \7\ (3) all-cargo aircraft operations; and (4) 
passenger aircraft operations conducted under a full security program 
approved by TSA in accordance with 49 CFR 1544.101(a) or a foreign air 
carrier security program approved by TSA in accordance with 49 CFR 
1546.101(a) or (b).
---------------------------------------------------------------------------

    \7\ TSA will continue to coordinate with FAA, which authorizes 
waivers into and out of DCA for these and other certain operations, 
including Elected Official Operations, Government Operations, and 
Special Operations, in accordance with established policy.
---------------------------------------------------------------------------

    This IFR does not apply to operations into or out of any airports 
other than DCA and gateway airports. Similarly, this IFR does not alter 
or suspend other regulations that TSA has issued or may issue that 
apply to aircraft operations. Further, this IFR does not affect the 
FAA's rules for operating into DCA, such as its rules relating to the 
allocation of reservations under the High Density Rule (14 CFR part 93, 
subpart K) and the Perimeter Rule (14 CFR 93.253), which prohibits a 
nonstop commercial aircraft operation to DCA from an airport that is 
more than 1,250 miles away from DCA.\8\
---------------------------------------------------------------------------

    \8\ Due to slot control restrictions under the High Density Rule 
and the need to limit traffic volume in the FRZ for security 
purposes, it is expected that unscheduled aircraft operations into 
and out of DCA will be capped at 4 per hour for 12 hours a day, for 
a total of 48 operations daily.
---------------------------------------------------------------------------

    The IFR specifies that any aircraft operation into or out of DCA 
under the IFR must be conducted in accordance

[[Page 41589]]

with the DASSP and any other TSA-approved security program that covers 
that operation. If any requirements of the DASSP conflict with the 
requirements of another TSA-approved security program, such as a 
Twelve-Five Standard Security Program (TFSSP) or Private Charter 
Standard Security Program (PCSSP), the aircraft operation into or out 
of DCA must be conducted in accordance with the requirements of the 
DASSP.
    For purposes of the IFR, the following definitions apply:
    ``Armed Security Officer Program'' is defined as the security 
program approved by TSA, in coordination with the FAMS, for armed 
security officers authorized to carry a firearm in accordance with the 
IFR.
    ``Crewmember'' is defined as a person assigned to perform duty in 
an aircraft during flight time. This includes pilots and flight 
attendants, but does not include armed security officers authorized to 
carry a firearm in accordance with the IFR.
    ``DCA'' is defined as Ronald Reagan Washington National Airport.
    ``DASSP'' (DCA Access Standard Security Program) is defined as the 
aircraft operator security program approved by TSA under part 1562 for 
aircraft operations into and out of DCA.
    ``FBO'' is defined as a fixed base operator that has been approved 
by TSA under part 1562 to serve as a last point of departure for 
flights into or out of DCA. The approved FBOs are located at either DCA 
or one of the gateway airports.
    ``FBO Security Program'' is defined as the security program 
approved by TSA under part 1562 for FBOs to serve flights into or out 
of DCA.
    ``Flightcrew member'' is defined as a pilot, flight engineer, or 
flight navigator assigned to duty in an aircraft during flight time. 
This is the same definition provided under 49 CFR 1540.5.
    ``Gateway airport'' is defined as an airport that has been approved 
by TSA as a last point of departure for flights into DCA. More 
information on the gateway airports is provided below.
    ``Passenger'' is defined as any person other than a flightcrew 
member on an aircraft. A ``passenger'' includes armed security officers 
authorized to carry a firearm in accordance with the rule.

B. Aircraft Operator Requirements

    To operate into or out of DCA under part 1562, an aircraft operator 
must comply with the following requirements.
1. Security Coordinators
    The aircraft operator must designate an individual as a security 
coordinator responsible for implementing the DASSP and other security 
requirements under the IFR. The aircraft operator must provide TSA with 
the security coordinator's contact information and availability in 
accordance with the DASSP.
    The security coordinator must undergo a fingerprint-based criminal 
history records check (CHRC) that does not disclose that he or she has 
a disqualifying criminal offense as described in 49 CFR 1544.229(d).\9\ 
The IFR provides that this requirement is met if a security coordinator 
has already undergone a fingerprint-based CHRC in accordance with 49 
CFR 1542.209, 1544.229, or 1544.230, with his or her current employer. 
The security coordinator also must undergo a security threat assessment 
performed by TSA.
---------------------------------------------------------------------------

    \9\ These are the same disqualifying crimes used for TSA 
screeners, individuals with unescorted access to secured areas of an 
airport, and crewmembers employed by an aircraft operator operating 
under a TFSSP or PCSSP.
---------------------------------------------------------------------------

    To initiate the CHRC, the security coordinator must submit his or 
her fingerprints and required information to a fingerprint collector 
approved by TSA. The collector will forward the information to TSA, and 
TSA will forward the information to the Federal Bureau of Investigation 
(FBI). The FBI will conduct the CHRC and send the results to TSA, and 
TSA will adjudicate the results to verify that the security coordinator 
does not have a disqualifying criminal offense described in 49 CFR 
1544.229(d). This process is similar to the process used for aircraft 
operators with a Twelve-Five Standard Security Program (TFSSP) or a 
Private Charter Standard Security Program (PCSSP).
    If TSA informs the security coordinator that the CHRC discloses a 
disqualifying offense, he or she may seek to correct the record in 
accordance with the procedures set forth in 49 CFR 1544.229(h) and (i) 
regarding notification and correction of records. These procedures 
require an aircraft operator to notify an applicant when the 
applicant's FBI record discloses information that would disqualify the 
applicant, and provide the applicant with a copy of the FBI record if 
the applicant requests it. The applicant may contact the local 
jurisdiction responsible for the information in the record and the FBI 
to complete or correct the information, provided that the applicant 
notifies the aircraft operator in writing, within 30 days of receiving 
notification that the applicant's FBI record discloses a disqualifying 
criminal offense, of his or her intent to correct the record. TSA notes 
that the procedures set forth in 49 CFR 1544.229(h) and (i) apply to 
the aircraft operator. Since TSA will be adjudicating the CHRC results 
for security coordinators under this IFR, TSA will perform the 
functions required of aircraft operators by 49 CFR 1544.229(h) and (i).
    For purposes of the security threat assessment, the security 
coordinator must submit to TSA: his or her (1) legal name, including 
first, middle, and last; any applicable suffix, and any other names 
used; (2) current mailing address, including residential address if 
different than current mailing address; (3) date and place of birth; 
(4) citizenship status and date of naturalization if the individual is 
a naturalized citizen of the United States; and (5) alien registration 
number, if applicable. The security operator also may voluntarily 
provide his or her social security number. Using that information, TSA 
will conduct a security threat assessment and inform the aircraft 
operator of the results. If TSA determines that the security 
coordinator may pose a security threat, the aircraft operator may not 
designate the individual as a security coordinator. Failure to provide 
the social security number may result in delays in processing the 
application. Failure to provide the other information may result in the 
applicant being denied the request to serve as a security coordinator.
2. DCA Access Standard Security Program (DASSP)
    The aircraft operator must adopt and carry out the DASSP. To 
receive the DASSP, an aircraft operator must contact TSA through TSA's 
Office of Aviation Programs and request the DASSP. TSA will verify that 
the aircraft operator is a valid operator and then provide the aircraft 
operator with a non-disclosure agreement that the aircraft operator 
must sign, as the DASSP contains sensitive security information (SSI) 
that must be protected in accordance with TSA's SSI regulation at 49 
CFR part 1520. TSA then will provide the DASSP to the aircraft 
operator. Once the aircraft operator implements the requirements of the 
DASSP, the aircraft operator must notify TSA. TSA will then inspect the 
aircraft operator to ensure that the program requirements have been 
implemented in accordance with the DASSP. Upon a satisfactory 
inspection, the aircraft operator will be eligible to apply to TSA

[[Page 41590]]

for approval to operate flights into and out of DCA in accordance with 
the requirements in the IFR, explained in further detail below.
3. Flightcrew Members
    The aircraft operator must ensure that each flightcrew member \10\ 
who will be assigned to an aircraft operating into or out of DCA 
complies with the requirements of the IFR. Each flightcrew member must 
undergo a fingerprint-based CHRC, using the same process and list of 
disqualifying criminal offenses used for the designated security 
coordinator. If a flightcrew member is informed that the CHRC discloses 
a disqualifying offense, he or she also may seek to correct the record 
in the same manner as the designated security coordinator. The IFR 
provides that the CHRC requirement is met if a flightcrew member has 
already undergone a fingerprint-based CHRC in accordance with 49 CFR 
1542.209, 1544.229, or 1544.230, with his or her current employer.
---------------------------------------------------------------------------

    \10\ These requirements do not apply to cabin crewmembers.
---------------------------------------------------------------------------

    Each flightcrew member also must undergo a check of their FAA 
record. A flightcrew member may not have a record on file with the FAA 
of a violation of: (1) A prohibited area designated under 14 CFR part 
73; (2) a flight restriction established under 14 CFR 91.141 (flight 
restrictions in the proximity of the President and certain other 
parties); (3) special security instructions issued under 14 CFR 99.7 
(air defense identification zone or defense area); (4) a restricted 
area designated under 14 CFR part 73; (5) emergency air traffic rules 
issued under 14 CFR 91.139 (emergency conditions); (6) a temporary 
flight restriction designated under 14 CFR 91.137 (vicinity of a 
disaster or hazard area), 91.138 (national disaster area in the State 
of Hawaii), or 91.145 (management of aircraft operations in the 
vicinity of aerial demonstrations and major sporting events); or (7) an 
area designated under 14 CFR 91.143 (flight limitations in the 
proximity of space flight operations). These violations also are 
considered disqualifying for pilots who apply for approval to operate 
to and from the Maryland Three Airports, which are located in the 
FRZ.\11\
---------------------------------------------------------------------------

    \11\ See 70 FR 7150, February 10, 2005.
---------------------------------------------------------------------------

4. Flight Approvals
    The aircraft operator must apply for and receive a reservation from 
the FAA and authorization from TSA for each flight into and out of 
DCA.\12\ The aircraft operator first must apply to the FAA for 
assignment of a tentative reservation to operate into and/or out of 
DCA. The FAA will produce a tentative reservation based on air traffic 
scheduling and other relevant factors.
---------------------------------------------------------------------------

    \12\ As noted above, we expect that the total number of takeoff 
and landing reservations at DCA under the IFR will be limited to 48 
per day.
---------------------------------------------------------------------------

    Then the aircraft operator must apply for TSA authorization for the 
flight by submitting to TSA the following information at least 24 hours 
prior to aircraft departure: (1) For each passenger and crewmember 
(both flightcrew and cabin crew) on the aircraft: legal name, including 
first, middle, and last; any applicable suffix, and any other names 
used; current mailing address, including residential address if 
different than current mailing address; date and place of birth;; 
citizenship status and date of naturalization if the individual is a 
naturalized citizen of the United States; and alien registration 
number, if applicable; (2) the registration number of the aircraft; (3) 
the flight plan; and (4) any other information required by TSA.\13\ TSA 
will conduct a name-based security threat assessment for each passenger 
and crewmember. If TSA notifies the aircraft operator that a passenger 
or crewmember may pose a security threat, the aircraft operator must 
ensure that the passenger or crewmember does not board the aircraft. 
TSA's ability to conduct a security threat assessment will be 
facilitated by the use of social security numbers and asks that 
passengers and crew consider voluntarily submitting social security 
numbers to TSA. Failure to provide the social security number may 
result in delays in processing the application. Failure to provide the 
other information may result in the applicant being denied the request 
to be a passenger or crewmember.
---------------------------------------------------------------------------

    \13\ The aircraft operator is required to submit the required 
information for each passenger and crewmember only once per round 
trip flight. If any passengers or crewmembers are added on the 
flight out of DCA, the aircraft operator must submit the required 
information for those individuals at least 24 hours prior to the 
aircraft departing DCA.
---------------------------------------------------------------------------

    If TSA authorizes the flight, TSA will transmit its authorization 
to the FAA for assignment of a final reservation to operate into or out 
of DCA. Once FAA assigns the reservation, TSA will notify the aircraft 
operator.
    The IFR specifies that TSA may, at its discretion, cancel any or 
all flight approvals at any time without prior notice to the aircraft 
operator. For example, if the threat level in the Washington, D.C., 
area or in the vicinity of any of the gateway airports is set at ORANGE 
or RED, TSA is likely to cancel any and all flight approvals into and 
out of DCA. The IFR also specifies that TSA may, at its discretion, 
permit a flight to or from DCA to deviate from the requirements of the 
IFR, if TSA finds that such action would not be detrimental to 
transportation security or the safe operation of the aircraft. TSA will 
consult with the U.S. Secret Service, FAMS, Department of Defense, FAA, 
and other relevant government agencies prior to approving a flight to 
deviate from the requirements of the IFR. Finally, the IFR provides 
that TSA may, at its discretion, require any flight into or out of DCA 
under this subpart to comply with additional security measures. For 
instance, for certain operations, such as those with a large number of 
persons on board, TSA may require additional armed security officers 
onboard the aircraft.
5. Operating Requirements
    For each flight into and out of DCA, an aircraft operator must 
comply with the following operating requirements specified in the IFR. 
The aircraft operator must ensure that each flight into DCA departs 
from a gateway airport and makes no intermediate stops before arrival 
at DCA. More information on the gateway airports is provided below.
    The aircraft operator must ensure that the aircraft has been 
searched in accordance with the DASSP, and that each passenger and 
crewmember and all accessible property and property in inaccessible 
cargo holds on the aircraft has been screened in accordance with the 
DASSP prior to boarding the aircraft. TSA personnel will conduct the 
aircraft searches and screening of passengers, crewmembers, and 
property. The aircraft operator must ensure that each passenger and 
crewmember on the aircraft provides TSA screening personnel with a 
valid government-issued picture identification. If the aircraft is 
equipped with a cockpit door, the aircraft operator must ensure that 
the door is closed and locked at all times during the operation of the 
aircraft to or from DCA, unless FAA regulations require the door to 
remain open.\14\ The aircraft operator must notify the National Capital 
Region Coordination Center prior to departure of the aircraft from a 
gateway airport or DCA.
---------------------------------------------------------------------------

    \14\ TSA notes that FAA regulations require that some cockpit 
doors remain open during takeoff and landing for safety reasons.
---------------------------------------------------------------------------

    The aircraft operator must ensure that each aircraft operating into 
or out of DCA has onboard at least one armed security officer who meets 
the

[[Page 41591]]

requirements specified in the IFR, which are discussed in greater 
detail below. For some flights, such as flights with a large number of 
passengers, TSA may require more than one armed security officer to be 
onboard the aircraft. In addition, if TSA or the FAMS requires that the 
aircraft have one or more Federal Air Marshals (FAMs) on board, the 
aircraft operator must allow the FAM(s) onboard, at no cost to the 
Federal Government.
    The aircraft operator must ensure that the aircraft operates under 
instrument flight rules only. Finally, the aircraft operator must 
ensure that each passenger complies with any security measures mandated 
by TSA, and that no prohibited items are onboard the aircraft. TSA 
intends to use the same list of prohibited items that is currently used 
for regularly-scheduled commercial aircraft operations. In addition, as 
explained in greater detail below, TSA rules for aviation security, 
including the rules prohibiting interference with security measures and 
screening personnel and requiring individuals to submit to screening 
and inspection, will apply to passengers and crewmembers on aircraft 
operated into and out of DCA in accordance with the IFR.
6. Costs
    The aircraft operator must pay any costs and fees required under 
this part. As explained in greater detail below, the aircraft operator 
must pay a $15 threat assessment fee for each passenger and crewmember 
whose information the aircraft operator submits to TSA as part of the 
flight approval process. In addition, the aircraft operator must 
reimburse TSA for additional costs TSA will incur in carrying out the 
requirements of the IFR.
    On October 1, 2003, Congress enacted legislation directing TSA to 
collect reasonable fees to cover the costs of providing credentialing 
and background investigations in the transportation field.\15\ Section 
520 of the Department of Homeland Security Appropriations Act of 2004 
(2004 Appropriations Act) authorizes TSA to collect fees to pay for the 
following costs: Conducting or obtaining a criminal history records 
check (CHRC); reviewing available law enforcement databases, commercial 
databases, and records of other governmental and international 
agencies; reviewing and adjudicating requests for waivers and appeals 
of TSA decisions; and any other costs related to performing the 
background records check or providing the credential. Section 520 of 
the 2004 Appropriations Act mandates that any fee collected be 
available for expenditure only to pay for the costs incurred in 
providing services in connection with performing the background check 
or providing the credential. The fees collected shall remain available 
until expended.
---------------------------------------------------------------------------

    \15\ Department of Homeland Security Appropriations Act, 2004, 
Section 520, Pub. L. 108-90, October 1, 2003, 117 Stat. 1156 (6 
U.S.C. 469) (2004 Appropriations Act).
---------------------------------------------------------------------------

    Under the IFR, each aircraft operator must remit to TSA a fee of 
$15 per person to defray the costs of the security threat assessment 
performed for passengers (including any armed security officers) and 
crewmembers on each flight operated into or out of DCA. The aircraft 
operator is required to pay this fee each time the aircraft operator 
submits the manifest to TSA for the required security threat 
assessments. In addition, each aircraft operator must reimburse TSA for 
the costs TSA incurs in carrying out the requirements of the IFR.

Population

    The number of security threat assessments performed as a result of 
this IFR is drawn from general aviation industry data as well as TSA 
operational assumptions. The total figure is roughly equivalent to the 
product of two separate estimates: Total Round Trips Through DCA is the 
number of available general aviation slots divided by half (4 slots/
hour x 12 hours/day x 365 days/year)/2 departures/round trip = 8,760), 
taking into account that round trips account for two allocated slots. 
This analysis assumes 100 percent capacity utilization of the available 
48 daily slots, a premise based on pre-September 11, 2001, general 
aviation flight throughput of approximately 30,000 annual round trips 
through DCA. The second component is Average Persons Per Flight. Based 
on National Business Aviation Association (NBAA) analysis of pre-
September 11, 2001, general aviation traffic at the airport, TSA has 
estimated that the Average Persons Per Flight is 6 persons (2 
crewmembers and 4 passengers).\16\ The product of these two numbers is 
52,560 (8,760 round trips * 6 persons per flight).
---------------------------------------------------------------------------

    \16\ According to the NBAA, over 90% of pre-September 11, 2001 
general aviation traffic at DCA was corporate. A similar ratio is 
assumed for the current rollout.
---------------------------------------------------------------------------

Operational Assumptions

    To develop its cost estimate, TSA has assumed the following 
procedures for general aviation flight authorizations and security 
threat assessments:
    Step 1: An aircraft operator approved by TSA under the DASSP will 
apply to the FAA for assignment of a tentative reservation to operate 
into and (typically) out of DCA. FAA will produce a tentative 
reservation based on air traffic scheduling availability and other 
relevant factors.
    Step 2: The aircraft operator will apply to TSA for a flight 
approval and submit the names and other required information of all 
crewmembers and passengers.
    Step 3: TSA will conduct name-checks against multiple government 
watch lists and other terrorist threat sources.
    Step 4: Once TSA clears the crewmembers and passengers and approves 
the flight, TSA will transmit its approval to FAA for assignment of a 
final reservation to operate into and/or out of DCA.
    Step 5: Once FAA assigns the final reservation, TSA will notify the 
aircraft operator.
    Step 6: TSA will coordinate the aircraft operator's flight schedule 
with appropriate TSA field screening and inspection operations to 
perform physical screening at FBO operations at DCA or other gateway 
airports as required.

Cost Components

    The following major cost components have been identified as 
required to perform the security threat assessment and requisite flight 
authorization functions. Each major component's cost estimates and 
supporting rationale and/or sources behind the estimate are discussed 
in detail below:
     Flight authorization automated system development 
(``Systems Costs'')
     Federal authorization staff costs (``Program Staff 
Costs'')
     Security threat assessment process costs (``Name Check 
Costs'')

Systems Costs

    To support up to 48 flights per day into and out of DCA (and all 
requisite information management of flight and applicant information), 
a Commercial Off-the-Shelf (COTS) software application will be 
required. Currently, TSA performs a similar processing function for 
other types of flight authorizations that cumulatively average some 
400+ flight authorizations per week, or almost 23,000 flight 
authorizations per year. At present, TSA employs 9 full time employees 
(FTEs) to perform this labor-intensive process.
    Rather than requiring significant numbers of additional personnel 
to handle the workload under this IFR, TSA intends to purchase an 
existing COTS application to automate much of the current flight 
authorization function

[[Page 41592]]

at TSA, including operations into and out of DCA. Such a system is 
already operational and in use at the FAA. At a high level, the 
automated functionality and thus efficiency gained from such a system 
will be the following:
     Automation of applicant name, other biographical 
information, and flight information submission and transmission (rather 
than via fax and manual key entry of current waiver process).
     Automated applicant information submission to TSA's 
security threat assessment operations (versus fax/manual list 
management).
     Automated information exchange, including electronic 
signature for clearance documents and flight slotting, between TSA and 
FAA (versus current manual courier of documents daily between the two 
agencies).
     Automated tracking of flight volume/metrics, applicants 
and other performance metrics reporting capabilities as required.
    TSA realizes that such a system will vastly improve not only the 
contemplated process for flight authorizations into and out of DCA, but 
also the efficiency and thus cost of the existing process for other 
flight authorizations. TSA notes that Section 520 of the Department of 
Homeland Security Appropriations Act, 2004, Pub. L. 107-90, 117 Stat. 
1137 (Oct. 1, 2003) directs TSA to recover its costs related to 
providing a credential or performing background checks. As the flight 
authorization services are inextricably linked to providing the 
security threat assessments under this program, TSA is including the 
cost of providing these services in the threat assessment fee.
    TSA intends to charge aircraft operators operating into and out of 
DCA in accordance with the IFR only for those system costs equal to the 
proportion of total expected flight authorizations between the DCA 
program and all other flight authorization programs. TSA estimates that 
the acquisition, installation, and maintenance of a similar COTS 
application would total some $4.1 million over a 5-year system and 
program lifecycle period. Thus, as the total annual flight 
authorization volume for general aviation operations at DCA is some 
8,760 or 28 percent of the total annual expected volume of some 31,600 
flight authorizations only 28 percent of the total 5-year system costs 
will be recovered in the fees charged under this IFR. The remaining 72 
percent of system cost will become the responsibility of the existing 
flight authorization programs.
    TSA will also incur several one-time technical ``setup'' costs, 
including an estimated $100,000 to develop system interfaces with TSA 
systems for the security threat assessment, $100,000 application 
installation and hosting setup charges, and an estimated $100,000 for 
online fee payment functionality via the Federal Government's required 
electronic payment system for web-based payments, www.pay.gov.

Program Staff Costs

    Even with the reduction in manual labor TSA should realize with the 
automated flight authorization COTS system, TSA still estimates that 4 
full time employees (FTEs) will be required to perform those functions 
that will not be automated. These functions are generally those that 
still require ``live'' communication and human judgment. This estimate 
also assumes that the 24-hour security threat assessment response time 
will necessitate some staffing during all 24 hours per day, 7 days per 
week. TSA has assumed annual staff cost for salary, benefits, and 
overhead of $100,000 per employee.

Name Check Costs

    TSA incurs both labor, system, and infrastructure/overhead costs 
each time it performs a name-based check against the multiple 
governmental watch lists and other terrorist threat sources. For the 
small portion of those names that are ``hits'' (names that match any of 
the various watch lists), TSA must perform identity verification and 
occasionally coordinate interagency law enforcement/apprehension 
activities. Based on TSA's operational history with other similar 
populations applying for clearance, and what it estimates the DCA 
general aviation population to require in terms of identity 
verification and other vetting operations, a $2 per applicant security 
threat assessment cost has been derived. This fee is included in the 
$15 security threat assessment fee described below.

                                        Table 1.--5-Year Lifecycle Costs
                                            [Program operating year]
----------------------------------------------------------------------------------------------------------------
                                       Year 1       Year 2       Year 3       Year 4       Year 5       Total
----------------------------------------------------------------------------------------------------------------
Total Number of security threat          52,560       52,560       52,560       52,560       52,560      262,800
 assessments......................
Fixed Costs:
    Automated Flight Authorization     $713,070     $106,961     $106,961     $106,961     $106,961   $1,140,912
     System.......................
    TSA Interface.................      100,000            0            0            0            0      100,000
    Payment Interface.............      100,000            0            0            0            0      100,000
    System Hosting Set-Up Costs...      100,000            0            0            0            0      100,000
Scheduling Staff..................      400,000      400,000      400,000      400,000      400,000    2,000,000
                                   --------------
        Total Fixed Costs.........    1,513,070      506,961      506,961      506,961      506,961    3,440,912
Variable Costs:
    Name Checks...................      105,120      105,120      105,120      105,120      105,120      525,600
                                   --------------
        Total Costs...............    1,518,190      612,081      612,081      612,081      612,081    3,966,512
----------------------------------------------------------------------------------------------------------------

Fee Summary

    Based on the costs and populations estimated above, TSA has 
calculated a fee of $15 per person for the security threat assessments 
and requisite flight authorization services costs. To calculate the 
fee, TSA has amortized the fixed costs of the security threat 
assessments over five years as this is generally accepted business 
practice for software and other infrastructure depreciation. The 
equation used to determine the fee is $3,440,912 (fixed costs) + 
$525,600 (variable costs over 5 years)/262,800 (5-year population of 
applicants) = $15 per person.
    Pursuant to the Chief Financial Officers Act of 1990, DHS and TSA 
are required to review these fees no less than every two years.\17\ 
Upon review, if

[[Page 41593]]

it is found that the fees are either too high (that is, total fees 
exceed the total cost to provide the services) or too low (that is, 
total fees do not cover the total costs to provide the services), TSA 
may propose changes to the fees. In addition, as DHS and TSA identify 
and implement additional efficiencies across numerous threat assessment 
and credentialing programs, any resulting cost savings will be 
incorporated into the fee levels accordingly.
---------------------------------------------------------------------------

    \17\ 31 U.S.C. 3512.
---------------------------------------------------------------------------

    In addition to the $15 per person fee, the IFR requires each 
aircraft operator to pay TSA for the costs TSA expends in carrying out 
this subpart. These costs include the costs of using screening 
personnel and equipment at DCA and the gateway airports. These costs 
are currently estimated at $296 per round trip into and out of DCA. TSA 
may revise these reimbursement cost figures if TSA determines that its 
estimated costs are too high or too low, and the reimbursable amounts 
may be modified periodically to reflect the most current costs of 
services provided.
    All fees and reimbursement must be remitted to TSA in a form and 
manner approved by TSA, and TSA will not issue any refunds, unless a 
fee or reimbursement was paid in error. TSA will provide specific fee 
remittance instructions prior to enactment of the IFR. The IFR 
specifies that if an aircraft operator does not remit to TSA the fees 
and reimbursement required under the IFR, TSA may decline to process 
any requests for flight authorizations from the aircraft operator.
    TSA notes that the aircraft operator or flightcrew member may also 
be required to pay a fee to any fingerprint collector for the 
fingerprint collection for crewmembers as well as the fee charged by 
the FBI for conducting a CHRC. In addition, the aircraft operator is 
responsible for paying to have a TSA qualified armed security officer 
onboard the aircraft.
7. Protection of Sensitive Security Information
    The aircraft operator must restrict the distribution, disclosure, 
and availability of sensitive security information (SSI), as defined in 
49 CFR part 1520, to persons with a need to know, and refer all 
requests for SSI by other persons to TSA. The IFR amends part 1520 to 
specify that the DASSP is SSI and that aircraft operators who receive 
the DASSP are covered persons under part 1520. Thus, aircraft operators 
subject to the IFR will be subject to the SSI protection requirements 
in part 1520. As explained further below, the IFR also amends part 1520 
to cover FBOs and armed security officers subject to part 1562.
8. Other Security Procedures
    The aircraft operator must comply with any additional security 
procedures required by TSA through order, Security Directive, or other 
means.
    TSA notes that the following sections of 49 CFR part 1540 apply to 
persons involved with this program: Sec.  1540.103, which prohibits 
certain fraud and intentional falsification; Sec.  1540.105, which 
forbids certain interference with security measures; Sec.  1540.107, 
which requires individuals to submit to screening and inspection; and 
Sec.  1540.109, which prohibits persons from interfering with screening 
personnel. These sections apply throughout the TSA rules for aviation 
security (49 CFR chapter XII, subchapter C), and therefore now apply in 
the context of the requirements of part 1562.
    In addition, this IFR amends Sec.  1540.111 to apply to passengers 
on aircraft operated into and out of DCA under the DASSP. That section 
currently prohibits passengers from carrying weapons, explosives, and 
incendiaries on certain scheduled and charter flights, and is being 
expanded to also apply to passengers on aircraft operated into and out 
of DCA in accordance with the IFR and the DASSP.
9. Compliance
    The IFR requires an aircraft operator to permit TSA to conduct any 
inspections or tests, including copying records, to determine 
compliance with the IFR and the DASSP. The IFR also requires an 
aircraft operator, at the request of TSA, to provide evidence of 
compliance with the IFR and the DASSP, including copies of records.
    The IFR specifies that noncompliance with the IFR or the DASSP may 
result in the cancellation of any and all of an aircraft operator's 
flight approvals and other enforcement action, as appropriate.

B. Fixed Base Operator Requirements

    Each fixed base operator (FBO) from which flights into DCA operate 
under the IFR must adopt and carry out the FBO Security Program. TSA 
will provide the FBO Security Program to each participating FBO at DCA 
and the gateway airports. The gateway airports are: (1) Seattle-Tacoma, 
Washington; (2) Boston Logan, Massachusetts; (3) Houston Hobby, Texas; 
(4) White Plains, New York; (5) LaGuardia, New York; (6) Chicago 
Midway, Illinois; (7) Minneapolis-St. Paul, Minnesota; (8) West Palm 
Beach, Florida; (9) San Francisco, California; (10) Teterboro, New 
Jersey; (11) Philadelphia, Pennsylvania; and (12) Lexington, Kentucky. 
TSA may revise or expand this list if necessary or appropriate.
    TSA identified these airports as last points of departure for DCA 
based on volume and geographical reasons. Eight of the airports 
represent those that serviced the largest number of general aviation 
operations into DCA prior to September 11, 2001. Those airports are 
predominately centered in the northeast corridor where most DCA bound 
flights occur. The other airports are commercial service airports 
located throughout the U.S. that are in close proximity to general 
aviation airports that served DCA prior to September 11, 2001.
    The FBO must designate a security coordinator who meets the same 
requirements as designated aircraft operator security coordinators. The 
security coordinator will be responsible for implementing the FBO 
Security Program and other security requirements required by the IFR. 
The FBO must provide TSA with the security coordinator's contact 
information and availability in accordance with the FBO Security 
Program.
    The FBO must support the screening of persons and property, and the 
search of aircraft, in accordance with the requirements of the FBO 
Security Program.
    The FBO must restrict the distribution, disclosure, and 
availability of SSI, as defined in 49 CFR part 1520, to persons with a 
need to know, and refer all requests for SSI by other persons to TSA. 
The IFR amends part 1520 to specify that the FBO Security Program is 
SSI and that FBOs that receive the FBO Security Program are covered 
persons under part 1520. Thus, FBOs subject to the IFR will be subject 
to the SSI protection requirements in part 1520.
    The FBO must permit TSA to conduct any inspections or tests, 
including copying records, to determine compliance with this part and 
the FBO Security Program. In addition, at the request of TSA, the FBO 
must provide evidence of compliance with this part and the FBO Security 
Program, including copies of records.

C. Armed Security Officer Requirements

    The IFR specifies the following requirements for security officers 
authorized to be armed onboard an aircraft operating into or out of DCA 
under a DASSP. Each armed security officer must comply with an Armed

[[Page 41594]]

Security Officer Program (ASOP) issued by TSA.
    The armed security officer must be qualified to carry a firearm in 
accordance with the IFR. To be qualified, an armed security officer 
must be an active law enforcement officer, a retired law enforcement 
officer, or another individual who meets the requirements specified in 
the IFR.
    A qualified active law enforcement officer is an employee of a 
governmental agency who: (1) Is authorized by law to engage in or 
supervise the prevention, detection, investigation, or prosecution of, 
or the incarceration of any person for, any violation of law; (2) has 
statutory powers of arrest; (3) is authorized by the agency to carry a 
firearm; (4) is not the subject of any disciplinary action by the 
agency; (5) is not under the influence of alcohol or another 
intoxicating or hallucinatory drug or substance; and (6) is not 
prohibited by Federal law from receiving a firearm.
    A qualified retired law enforcement officer is an individual who: 
(1) retired in good standing from service with a public agency as a law 
enforcement officer, other than for reasons of mental instability; (2) 
before such retirement, was authorized by law to engage in or supervise 
the prevention, detection, investigation, or prosecution of, or the 
incarceration of any person for, any violation of law, and had 
statutory powers of arrest; (3) before such retirement, was regularly 
employed as a law enforcement officer for an aggregate of 15 years or 
more, or retired from service with such agency, after completing any 
applicable probationary period of such service, due to a service-
connected disability, as determined by such agency; (4) has a non-
forfeitable right to benefits under the retirement plan of the agency; 
(5) is not under the influence of alcohol or another intoxicating or 
hallucinatory drug or substance; and (6) is not prohibited by Federal 
law from receiving a firearm.
    These requirements are consistent with the requirements specified 
for law enforcement officers and retired law enforcement officers under 
the Law Enforcement Officers Safety Act of 2004 (LEOSA).\18\ LEOSA 
allows qualified law enforcement officers and qualified retired law 
enforcement officers to carry firearms in State and municipal 
jurisdictions beyond their own, but does not eliminate all restrictions 
that prohibit carrying firearms in certain areas or places, such as 
State or local government buildings and parks. Likewise, this law does 
not supersede or affect Federal laws and regulations that restrict 
carriage of firearms in certain places, including 49 U.S.C. 46505 
(criminal offense for carrying a weapon on aircraft) and the 
requirement to comply with all applicable provisions of 49 CFR 1544.219 
(Carriage of Accessible Weapons) for a law enforcement officer to carry 
a firearm aboard a commercial aircraft. TSA notes that not all relevant 
jurisdictions have implemented the requirements of LEOSA, so some law 
enforcement officers and retired law enforcement officers may not yet 
be qualified under LEOSA. However, the requirements in this IFR are 
consistent with the requirements in LEOSA.
--
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.