Critical Infrastructure Partnership Advisory Council, 14930-14933 [06-2892]
Download as PDF
14930
Federal Register / Vol. 71, No. 57 / Friday, March 24, 2006 / Notices
Research; 93.209, Contraception and
Infertility Loan Repayment Program, National
Institutes of Health, HHS)
Dated: March 20, 2006.
Anna Snouffer,
Acting Director, Office of Federal Advisory
Committee Policy.
[FR Doc. 06–2887 Filed 3–23–06; 8:45 am]
BILLING CODE 4140–01–M
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
National Institutes of Health
Center for Scientific Review; Notice of
Closed Meetings
wwhite on PROD1PC61 with NOTICES
Pursuant to section 10(d) of the
Federal Advisory Committee Act, as
amended (5 U.S.C. Appendix 2), notice
is hereby given of the following
meetings.
The meetings will be closed to the
public in accordance with the
provisions set forth in sections
552b(c)(4) and 552b(c)(6), Title 5 U.S.C.,
as amended. The grant applications and
the discussions could disclose
confidential trade secrets or commercial
property such as patentable material,
and personal information concerning
individuals associated with the grant
applications, the disclosure of which
would constitute a clearly unwarranted
invasion of personal privacy.
Name of Committee: Center for Scientific
Review Special Emphasis Panel; Stem Cell
Selection.
Date: March 29, 2006.
Time: 2 p.m. to 3 p.m.
Agenda: To review and evaluate grant
applications.
Place: National Institutes of Health, 6701
Rockledge Drive, Bethesda, MD 20892.
(Telephone Conference Call).
Contact Person: Richard Panniers, PhD,
Scientific Review Administrator, Center for
Scientific Review, National Institutes of
Health, 6701 Rockledge Drive, Room 2212,
MSC 7890, Bethesda, MD 20892. (301) 435–
1741. pannierr@csr.nih.gov.
This notice is being published less than 15
days prior to the meeting due to the timing
limitations imposed by the review and
funding cycle.
Name of Committee: Center for Scientific
Review Special Emphasis Panel; AIDSassociated Malignancies.
Date: April 6, 2006.
Time: 11 a.m. to 1 p.m.
Agenda: To review and evaluate grant
applications.
Place: National Institutes of Health, 6701
Rockledge Drive, Bethesda, MD 20892.
(Telephone Conference Call).
Contact Person: Ranga V. Srinivas, PhD,
Scientific Review Administrator, Center for
Scientific Review, National Institutes of
Health, 6701 Rockledge Drive, Room 5222,
MSC 7852, Bethesda, MD 20892. (301) 435–
1167. srinivar@csr.nih.gov.
VerDate Aug<31>2005
18:26 Mar 23, 2006
Jkt 208001
This notice is being published less than 15
days prior to the meeting due to the timing
limitations imposed by the review and
funding cycle.
Name of Committee: Center for Scientific
Review Special Emphasis Panel; AIDS—
Molecular and Cell Biology.
Date: April 7, 2006.
Time: 11 a.m. to 2 p.m.
Agenda: To review and evaluate grant
applications.
Place: National Institutes of Health, 6701
Rockledge Drive, Bethesda, MD 20892.
(Telephone Conference Call).
Contact Person: Ranga V. Srinivas, PhD,
Scientific Review Administrator, Center for
Scientific Review, National Institutes of
Health, 6701 Rockledge Drive, Room 5222,
MSC 7852, Bethesda, MD 20892. (301) 435–
1167. srinivar@csr.nih.gov.
This notice is being published less than 15
days prior to the meeting due to the timing
limitations imposed by the review and
funding cycle.
Name of Committee: Center for Scientific
Review Special Emphasis Panel; Treatment
Technologies.
Date: April 14, 2006.
Time: 11 a.m. to 12 p.m.
Agenda: To review and evaluate grant
applications.
Place: National Institutes of Health, 6701
Rockledge Drive, Bethesda, MD 20892.
(Telephone Conference Call).
Contact Person: Lee Rosen, PhD, Scientific
Review Administrator, Center for Scientific
Review, National Institutes of Health, 6701
Rockledge Drive, Room 5116, MSC 7854,
Bethesda, MD 20892. (301) 435–1171.
rosenl@csr.nih.gov.
(Catalogue of Federal Domestic Assistance
Program Nos. 93.306, Comparative Medicine;
93.333, Clinical Research, 93.306, 93.333,
93.337, 93.393–93.396, 93.837–93.844,
93.846–93.878, 93.892, 93.893, National
Institutes of Health, HHS)
Dated: March 19, 2006.
Anna Snouffer,
Acting Director, Office of Federal Advisory
Committee Policy.
[FR Doc. 06–2886 Filed 3–23–06; 8:45 am]
BILLING CODE 4140–01–M
DEPARTMENT OF HOMELAND
SECURITY
Office of the Secretary
Critical Infrastructure Partnership
Advisory Council
Preparedness Directorate,
Office of Infrastructure Protection,
Department of Homeland Security.
ACTION: Committee management: notice
of committee establishment.
AGENCY:
SUMMARY: In order to facilitate an
effective defense of our Nation’s critical
infrastructure, the Department of
Homeland Security is creating the
Critical Infrastructure Partnership
PO 00000
Frm 00099
Fmt 4703
Sfmt 4703
Advisory Council. Pursuant to the
Homeland Security Act of 2002, the
Department is taking measures to
facilitate strategic planning and effective
discussion of critical infrastructure
issues and to protect sensitive critical
infrastructure information while also
observing appropriate public disclosure
procedures for the council.
Name of Committee: Critical
Infrastructure Partnership Advisory
Council (CIPAC).
FOR FURTHER INFORMATION CONTACT:
Brett Lambo, Infrastructure Programs
Office, Infrastructure Partnerships
Division, Office of Infrastructure
Protection, Preparedness Directorate,
United States Department of Homeland
Security, Washington, DC 20528,
telephone (703) 235–5311 or via e-mail
at brett.lambo@dhs.gov.
SUPPLEMENTARY INFORMATION:
Background
1. The Department’s Relationship With
Owners of Critical Infrastructure
Approximately 85 percent of this
nation’s critical infrastructure is owned
by the private sector. See, e.g., National
Infrastructure Advisory Council Report,
Sector Partnership Model
Implementation: Final Report and
Recommendations 6 (Oct. 11, 2005)
(‘‘NIAC Report’’). Thus, in drafting the
Homeland Security Act of 2002,
Congress repeatedly stressed that the
new Department of Homeland Security
must have a close and highly effective
relationship with the private sector
owners of this infrastructure. See, e.g.,
6 U.S.C. 121(d)(11) (requiring
consultation with ‘‘private sector
entities to ensure appropriate exchanges
of information’’); 6 U.S.C. 112(c)
(requiring coordination with non-federal
entities); see also Statement of Senator
Joe Lieberman, Nov. 16, 2005 (‘‘That’s
why we created an Infrastructure
Protection division in the Department of
Homeland Security which was the first
of its kind at any federal agency. The
point was that government needed to
work with the private sector to make
sure the systems so crucial to our way
of life were adequately protected, and if
attacked by terrorists or overwhelmed
by natural forces, were able to recover
quickly and restore services.’’).
Congress explicitly instructed the
Department to create an effective
structure for sharing sensitive
information with the private sector on
infrastructure. Congress also explicitly
mandated that the Department ‘‘ensure
the security and confidentiality’’ of
sensitive homeland security
information, and gave the Department
specific new authorities to protect such
E:\FR\FM\24MRN1.SGM
24MRN1
Federal Register / Vol. 71, No. 57 / Friday, March 24, 2006 / Notices
wwhite on PROD1PC61 with NOTICES
information. See 6 U.S.C. 131 et seq.; 6
U.S.C. 451; 6 U.S.C. 482.
Over the past two years, the
Department has consulted with
Congress and with the Department’s
private and public sector partners and
advisory committees to assess the
strength and effectiveness of its
relationships with private sector owners
of critical infrastructure. The
Government Accountability Office and
others have reported that the private
sector continues to resist sharing critical
infrastructure information with the
Department. See, e.g., Govt. Acct. Off.,
Rep. No. GAO–03–1165T, Homeland
Security: Information Sharing
Responsibilities, Challenges, and Key
Management Issues 26 (Sept. 17, 2003)
(‘‘As noted in our February 2003 report,
some in the private sector expressed
concerns about voluntarily sharing
information with the government.’’);
Govt. Acct. Off., Rep. No. GAO–06–150,
Homeland Security: DHS is Taking
Steps to Enhance Security at Chemical
Facilities, but Additional Authority is
Needed 55–56 (Jan. 2006) (‘‘While the
industry wants to cooperate with DHS
on its chemical security efforts,
businesses are concerned that sensitive
information could be released.’’);
Homeland Security Advisory Council
Report, Homeland Security Information
Sharing Between Government and the
Private Sector 1 (August 10, 2005)
(‘‘HSAC Report’’) (stating that effective
cooperation between DHS and the
private sector ‘‘has been hampered by a
variety of legal and procedural
obstacles’’); compare 148 Cong. Rec.
S11002, S11001 (Nov. 14, 2002)
(Senator Lieberman) (‘‘We have to close
vulnerabilities in those [critical
infrastructure] systems before terrorists
strike them. To do so, we have to be
working with the private sector.’’).
A number of advisory councils have
recently re-assessed this problem and
provided recommendations to the
Department. For example, after a
lengthy study in August of 2005, the
Homeland Security Advisory Council
(HSAC) opined:
Fundamentally, the challenge of ensuring the
resilient/reliable operation of critical
infrastructure is unique, as it requires close
communication and coordination between
critical private sector entities and the Federal
agencies charged with regulating them. Those
communications, moreover, must remain
non-public in order for those functions to be
served. As specified in statute, these
communications are to involve intelligence
and law enforcement information, and are to
serve warning, preventative and protective
functions. Disclosing this sort of information
would defeat the purpose of these
communications by giving our nation’s
enemies information they could use to most
VerDate Aug<31>2005
18:26 Mar 23, 2006
Jkt 208001
14931
HSAC Report at 30.
2. Identifying Solutions
The Department’s principal advisory
committees specifically concluded that
concerns regarding the Federal Advisory
Committee Act (FACA) have frustrated
vital communication between DHS and
critical infrastructure sectors. This Act,
when it applies, generally requires
advisory committees to meet in open
session and make publicly available
associated written materials. 5 U.S.C.
App. 2 sec. 10. It also requires a 15-day
notice before any meeting may be
‘‘closed’’ to public attendance, a
requirement which could prevent the
Department from meeting on short
notice to discuss sensitive information
in an appropriate setting. The Act
contains a number of exceptions to its
general disclosure rules, but the
applicability of those exceptions
presents what many view as a
significant litigation risk. See, e.g., NIAC
Report at 14. The Department’s
consultations with the Department of
Justice have reinforced this conclusion.
The HSAC summed up the potential
consequences of public disclosure of the
sensitive information:
understood framework that facilitates the
flow of advice and information concerning
critical infrastructure protection. Not doing
so would inhibit information sharing, risk
publicly disclosing vulnerabilities, and
suppress ad hoc communications during
emergencies.
NIAC Report at 12. The NIAC went on
to opine that exercising the exemption
will have a direct effect: ‘‘Interactions
between the government and private
sector will increase, and the flow of
information will be much more
efficient.’’ Id. at 15. The NIAC found the
exercise of the exemption authority to
be ‘‘essential’’ for ‘‘short- and long-term
success.’’ Id. Without exercising the
exemption authority, according to the
NIAC, DHS will not be able to
accomplish its critical infrastructure
protection and information sharing
goals. Id. at 15–16; cf. Govt. Acct. Off.,
Rep. No. GAO–02–811T, National
Preparedness: Integrating New and
Existing Technology and Information
Sharing into an Effective Homeland
Security Strategy 9 (June 7, 2002) (‘‘[I]n
recent discussions with us, industry
officials said that their chief concern in
sharing information about
vulnerabilities and attacks is disclosure
of proprietary data.’’).
effectively attack a particular infrastructure
and cause cascading consequences across
multiple infrastructures.
Communications [between critical private
sector entities and the Federal Government]
must remain non-public * * * Disclosing
this sort of information would defeat the
purpose of those communications by giving
our nation’s enemies information they could
use to most effectively attack a particular
infrastructure and cause cascading
consequences across multiple infrastructures.
HSAC Report at 30. Because of these
concerns, the HSAC recommended that
DHS consider using its authority under
section 871 of the Homeland Security
Act of 2002, 6 U.S.C. 451, to exempt
critical infrastructure advisory
committees from the FACA
requirements. Section 871 provides the
Secretary of Homeland Security with
the authority to establish advisory
committees and exempt them from the
FACA. 6 U.S.C. 451(a). This authority
allows the Department to enhance the
incentives for providing the Department
with information and recommendations
that would not otherwise be provided.
The National Infrastructure Advisory
Council (NIAC) also considered this
authority and drew a conclusion similar
to the HSAC:
Effective critical infrastructure protection
requires the ability to have real time,
continuous communications and open
dialogue among the public and private
partners in the model. The granting of the
871 exemption will establish a known and
PO 00000
Frm 00100
Fmt 4703
Sfmt 4703
3. Exercise of 871 Authority in a Manner
Intended To Respect Principles of FACA
Despite many past requests, the
Department has not previously
exercised the authority Congress
provided in Section 871. This
reluctance has been due in part to a
respect to the principles of opengovernment. Given mounting evidence
that the use of this authority could
improve the Department’s ability to
protect critical infrastructure and
perform strategic planning, the
Department is now invoking that
authority but, as explained below, in a
manner intended to preserve the
principles of open government
embraced by FACA. Out of concern for
those principles, the Department has
chosen to institute procedures calling
for as much public disclosure as is
consistent with homeland security
goals.
The decisions announced in this
Notice are consistent with longstanding
efforts to increase our capacity to
protect our critical infrastructure and
key resources. Since September 11,
2001, numerous authoritative bodies—
the Congress, advisory councils, and the
9/11 Commission among them—have
stressed the importance of information
sharing between the federal government
and the private sector. See, e.g.,
National Commission on Terrorist
Attacks upon the United States, The
E:\FR\FM\24MRN1.SGM
24MRN1
14932
Federal Register / Vol. 71, No. 57 / Friday, March 24, 2006 / Notices
wwhite on PROD1PC61 with NOTICES
9/11 Commission Report: Final Report
of the National Commission on Terrorist
Attacks upon the United States 398
(authorized ed. 2004) (‘‘Homeland
security and national preparedness
* * * often begins with the private
sector.’’); 148 Cong. Rec. S11405,
S11414 (Nov. 19, 2002) (statement of
Senator Lieberman stressing the
importance of ‘‘engaging the private
sector’’ in anti-terrorism efforts).
Protecting critical infrastructure and
key resources (CI/KR) requires a
comprehensive, effective, and
collaborative partnership between all
stakeholders. Collaboration among
stakeholders must involve many
activities: planning; coordination;
security program implementation;
operational activities related to critical
infrastructure protection security
measures, including incident response,
recovery, and reconstitution from events
both man-made and naturally occurring;
and the sharing of information about
threats, vulnerabilities, protective
measures, best practices, and lessons
learned.
An effective partnership must be
predicated on the ability to have
ongoing, immediate, and multidirectional communication and
coordination between the CI/KR owners
and operators and government,
including under highly exigent
circumstances. During the course of
these activities, policy advice and
recommendations may emerge and be
provided to the Department of
Homeland Security and Sector-Specific
Agencies (SSAs). Consequently, the
depth and breadth of the mission have
unique requirements for comprehensive
interactions. The CI/KR sectors are so
vital to the nation’s economy, public
safety and confidence that it merits use
of all necessary authorities to support
their protection.
4. Establishment of the Critical
Infrastructure Partnership Advisory
Council
In furtherance of DHS’ mission to
safeguard CI/KR sectors, the Secretary
has determined that the public interest
requires the establishment of the CIPAC.
The CIPAC will support implementation
of the National Infrastructure Protection
Plan (NIPP) and will help to effectuate
the sector partnership model set forth in
the NIPP. Specifically, the CIPAC will
facilitate interaction among government
representatives at the Federal, State,
local, and tribal levels and
representatives from the community of
CI/KR owners and operators in each
critical sector to engage in, among other
things, planning; coordination; security
program implementation; operational
VerDate Aug<31>2005
18:26 Mar 23, 2006
Jkt 208001
activities related to critical
infrastructure protection security
measures, including incident response,
recovery, and reconstitution from events
both man-made and naturally occurring;
and the sharing of information about
threats, vulnerabilities, protective
measures, best practices, and lessons
learned.
These activities require regular,
ongoing, and multi-directional
communication and coordination
between CI/KR owners and operators
and government, and to have the ability
to do so under highly exigent
circumstances. During the course of
these activities, policy advice and
recommendations may emerge and be
provided to the Department of
Homeland Security, the SSA for each
sector identified in HSPD–7, and the
other Federal departments and agencies
supporting the critical infrastructure
protection mission under the NIPP.
These departments and agencies have
responsibility for establishing and
implementing Federal policy and
managing Federal programs. The CIPAC
has no authority to establish Federal
policy or otherwise undertake
inherently governmental functions.
Exemption from Public Law 92–463:
In recognition of the highly-sensitive,
and often confidential, nature of the
subject matter involved in the activities
of the CIPAC, under the authority of
section 871 of the Homeland Security
Act of 2002 (6 U.S.C. 451), the Secretary
has decided to exempt the CIPAC from
the requirements of Public Law 92–463
(5 U.S.C. App. 1 et seq.). The decision
to exercise the exemption authority in
section 871 will improve the homeland
security partnership between
government and the private sector. This
exemption will support the free flow of
information as those involved in
protecting our critical infrastructure
strive to meet the need for regular,
interactive discussions concerning
threats and vulnerabilities.
DHS recognizes and supports,
however, the important principle of
transparency as a foundation for public
confidence in government. Accordingly,
to the full extent compatible with the
achievement of the critical
infrastructure protection mission, DHS
will, as a matter of policy, operate the
CIPAC in a manner consistent with the
spirit of this principle. DHS will
maintain the CIPAC Executive
Secretariat, which will manage and
coordinate the activities of the CIPAC
and maintain its records. While many
meetings of the CIPAC will be closed to
the public, meetings will be open as
feasibly consistent with security
objectives. Unless exigent circumstances
PO 00000
Frm 00101
Fmt 4703
Sfmt 4703
arise, the CIPAC Executive Secretariat
will provide public notice of when
scheduled meetings of the CIPAC are
expected to be held. Among its other
responsibilities, the CIPAC Executive
Secretariat will also develop and
maintain on an ongoing basis a publiclyaccessible Web site. The CIPAC
Executive Secretariat will also prepare
and, to the extent consistent with
security objectives, publish on the Web
site copies of meeting agendas and
periodic reports on the CIPAC’s
accomplishments. The Executive
Secretariat will also maintain the
membership list for the CIPAC. DHS
will support the administrative needs of
the CIPAC through the CIPAC Executive
Secretariat.
Membership and Structure: The
CIPAC will be representative of the
following CI/KR sectors identified in
HSPD–7:
Food and Agriculture
Banking and Finance
Chemical
Commercial Facilities
Defense Industrial Base
Drinking Water and Waste Water
Dams
Emergency Services
Energy
Information Technology
Nuclear Reactors, Materials, and Waste
Postal and Shipping
Public Health and Healthcare
Telecommunications
Transportation Systems
The specific membership of the
CIPAC will consist of: (a) The CI/KR
owners and operators that are members
of their respective sector’s recognized
Sector Coordinating Council (SCC),
including their representative trade or
equivalent organizations [‘‘SCC CIPAC
Members’’]; and (b) Federal, State, local,
and tribal governmental entities
comprising the members of the
Government Coordinating Council
(GCC) for each sector, including their
representative trade or equivalent
organizations [‘‘GCC CIPAC Members’’].
CI/KR owners and operators are those
entities that own and invest in
infrastructure assets, in the systems and
processes to secure them, and that are
held responsible by the public for their
operations and the response and their
recovery when their infrastructures or
key resources are disrupted.
SCCs are independent, self-governed
bodies organized (or presently being
organized) by the owners and operators
of the nation’s CI/KR within each of the
critical sectors identified in HSPD–7 to
enable them to coordinate among
themselves on sector initiatives on
critical infrastructure protection,
E:\FR\FM\24MRN1.SGM
24MRN1
wwhite on PROD1PC61 with NOTICES
Federal Register / Vol. 71, No. 57 / Friday, March 24, 2006 / Notices
including response and recovery. The
SCCs are broadly representative of the
owners and operators within each CI/KR
sector. While these councils are
independent of government, they
provide the CIPAC the ability to draw as
representational a membership as
possible from each sector and from
across all sectors.
GCCs are interagency coordinating
bodies that enable interagency and
cross-jurisdictional coordination within
each HSPD–7 sector. Each GCC is
comprised of representatives from
across various levels of government (i.e.,
Federal, State, local, and tribal), as
appropriate to the security landscape of
each sector, and includes the Federal
departments and agencies with a
relevant interest in the sector. Each GCC
is co-chaired by a representative from
the designated SSA for the sector and by
DHS’ Assistant Secretary for
Infrastructure Protection.
Appendix A sets forth a list of the
present membership of the CIPAC from
each sector as of this date, including all
of the GCC CIPAC Members and the
designated leadership of each SCC now
in existence. Immediately following
publication of this Notice in the Federal
Register, the CIPAC Executive
Secretariat will work with each SCC’s
leadership, and the SSA for each sector,
to compile a complete list of the CIPAC
SCC Members from each sector. Not
later than April 24, 2006, the
Department will publish a subsequent
Notice identifying these additional
members of the CIPAC. As new SCCs
are formed and existing ones mature,
the membership of the CIPAC will grow
and change to accommodate changes in
the membership of these bodies. DHS
will publish quarterly updates in the
Federal Register to announce changes
in the membership of the CIPAC.
Membership Status: Non-Federal
members of the CIPAC serve as
representatives of their sectors, not as
special government employees. Private
sector members bear the cost of
participating in the CIPAC.
Meetings: The CIPAC may meet as a
whole or in any combination of
subgroups that is most conducive to the
effective conduct of its activities
including, without limitation, in groups
encompassing discrete sectors to
address sector-specific issues and
concerns (e.g., a meeting of the members
of the Food and Agriculture Sector GCC
with their counterpart owners and
operators from the sector’s SCC), or in
a small group with a single designated
representative from each sector to
address interdependencies and other
cross-sectoral issues. As independent
bodies, meetings consisting solely of
VerDate Aug<31>2005
18:26 Mar 23, 2006
Jkt 208001
members of the SCCs, or those
consisting solely of members of the
GCCs, shall not constitute meetings of
the CIPAC. In addition, the CIPAC may
establish informal working groups for
the purpose of fact-finding, issue
development, or other preliminary nondeliberative activities. Such activities in
support of the CIPAC shall also be
within the scope of the exemption noted
above.
The CIPAC will meet at least quarterly
to address matters within the scope of
this Charter. The CIPAC Executive
Secretariat will prepare summary
minutes of CIPAC meetings; maintain
calendars and agendas; coordinate
preparation and review of
communications with government
entities; extend invitations to
government officials and other expert
consultants, as needed, to attend
meetings; and other administrative
functions as may be required.
Duration of Committee: Two years,
subject to extension pursuant to section
871(b) of the Homeland Security Act of
2002 (6 U.S.C. 451(b)).
Responsible DHS Official: Nancy J.
Wong, Director, Infrastructure Programs
Office, Infrastructure Partnerships
Division, United States Department of
Homeland Security, Washington, DC
20528, telephone (703) 235–5349.
Dated: March 20, 2006.
Michael Chertoff,
Secretary.
Appendix A—Membership of the
Critical Infrastructure Partnership
Advisory Council
Leadership of Existing SCCs:
Association of American Railroads
Cellular Telecommunications & Internet
Association
Computer Sciences Corporation
Constellation Generation Group
Depository Trust and Clearing Corp.
Duke Energy
DuPont
Exelon Corporation
FedEx Corporation
Greenville Water System
Independent Electricity System Operator,
Ontario, Canada
International Association of Fire Chiefs
International Dairy Foods Association
Madden & Patton, LLC
National Cattleman’s Beef Association
National Food Processors Association
New Jersey Transit
New York City Department of Environmental
Protection
NiSource Pipelines
Northwestern Hospital
Pacific Gas and Electric Co.
The Real Estate Roundtable
Telecommunications Industry Association
U.S. Telecom Association
United States Postal Service
Valero Energy Corporation
PO 00000
Frm 00102
Fmt 4703
Sfmt 4703
14933
VeriSign
Xcel Energy
Federal, State, local, tribal and quasigovernmental entities, or their designated
representative trade or equivalent
associations, identified as members of
existing GCCs:
American Red Cross
Association of Food and Drug Officials
North American Securities Administration
Association
Association of State and Interstate Water
Pollution Control Administrators
Association of State and Territorial Health
Officials
Association of State Drinking Water
Administrators
Commodity Futures Trading Commission
Conference of State Bank Supervisors
Farm Credit Administration
Federal Communications Commission
Federal Deposit Insurance Corporation
Federal Energy Regulatory Commission
Federal Housing Finance Board
Federal Reserve Bank of New York
Federal Reserve Board
Interagency Security Committee
Intertribal Agriculture Council
National Association of County and City
Health Officials
National Association of Departments of
Agriculture
National Association of State Chief
Information Officers
National Association of State Credit Union
Supervisors
National Credit Union Administration
Nuclear Regulatory Commission
Securities Investor Protection Corporation
Tennessee Valley Authority
United States Army Corps of Engineers
United States Department of Agriculture
United States Department of Commerce
United States Department of Defense
United States Department of Education
United States Department of Energy
United States Department of Health and
Human Services
United States Department of Homeland
Security
United States Department of Housing and
Urban Development
United States Department of Interior
United States Department of Justice
United States Department of Labor
United States Department of Transportation
United States Department of the Treasury
United States Environmental Protection
Agency
United States National Archives and Records
Administration
United States Securities and Exchange
Commission
[FR Doc. 06–2892 Filed 3–23–06; 8:45 am]
BILLING CODE 4410–10–P
E:\FR\FM\24MRN1.SGM
24MRN1
Agencies
[Federal Register Volume 71, Number 57 (Friday, March 24, 2006)]
[Notices]
[Pages 14930-14933]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 06-2892]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF HOMELAND SECURITY
Office of the Secretary
Critical Infrastructure Partnership Advisory Council
AGENCY: Preparedness Directorate, Office of Infrastructure Protection,
Department of Homeland Security.
ACTION: Committee management: notice of committee establishment.
-----------------------------------------------------------------------
SUMMARY: In order to facilitate an effective defense of our Nation's
critical infrastructure, the Department of Homeland Security is
creating the Critical Infrastructure Partnership Advisory Council.
Pursuant to the Homeland Security Act of 2002, the Department is taking
measures to facilitate strategic planning and effective discussion of
critical infrastructure issues and to protect sensitive critical
infrastructure information while also observing appropriate public
disclosure procedures for the council.
Name of Committee: Critical Infrastructure Partnership Advisory
Council (CIPAC).
FOR FURTHER INFORMATION CONTACT: Brett Lambo, Infrastructure Programs
Office, Infrastructure Partnerships Division, Office of Infrastructure
Protection, Preparedness Directorate, United States Department of
Homeland Security, Washington, DC 20528, telephone (703) 235-5311 or
via e-mail at brett.lambo@dhs.gov.
SUPPLEMENTARY INFORMATION:
Background
1. The Department's Relationship With Owners of Critical Infrastructure
Approximately 85 percent of this nation's critical infrastructure
is owned by the private sector. See, e.g., National Infrastructure
Advisory Council Report, Sector Partnership Model Implementation: Final
Report and Recommendations 6 (Oct. 11, 2005) (``NIAC Report''). Thus,
in drafting the Homeland Security Act of 2002, Congress repeatedly
stressed that the new Department of Homeland Security must have a close
and highly effective relationship with the private sector owners of
this infrastructure. See, e.g., 6 U.S.C. 121(d)(11) (requiring
consultation with ``private sector entities to ensure appropriate
exchanges of information''); 6 U.S.C. 112(c) (requiring coordination
with non-federal entities); see also Statement of Senator Joe
Lieberman, Nov. 16, 2005 (``That's why we created an Infrastructure
Protection division in the Department of Homeland Security which was
the first of its kind at any federal agency. The point was that
government needed to work with the private sector to make sure the
systems so crucial to our way of life were adequately protected, and if
attacked by terrorists or overwhelmed by natural forces, were able to
recover quickly and restore services.'').
Congress explicitly instructed the Department to create an
effective structure for sharing sensitive information with the private
sector on infrastructure. Congress also explicitly mandated that the
Department ``ensure the security and confidentiality'' of sensitive
homeland security information, and gave the Department specific new
authorities to protect such
[[Page 14931]]
information. See 6 U.S.C. 131 et seq.; 6 U.S.C. 451; 6 U.S.C. 482.
Over the past two years, the Department has consulted with Congress
and with the Department's private and public sector partners and
advisory committees to assess the strength and effectiveness of its
relationships with private sector owners of critical infrastructure.
The Government Accountability Office and others have reported that the
private sector continues to resist sharing critical infrastructure
information with the Department. See, e.g., Govt. Acct. Off., Rep. No.
GAO-03-1165T, Homeland Security: Information Sharing Responsibilities,
Challenges, and Key Management Issues 26 (Sept. 17, 2003) (``As noted
in our February 2003 report, some in the private sector expressed
concerns about voluntarily sharing information with the government.'');
Govt. Acct. Off., Rep. No. GAO-06-150, Homeland Security: DHS is Taking
Steps to Enhance Security at Chemical Facilities, but Additional
Authority is Needed 55-56 (Jan. 2006) (``While the industry wants to
cooperate with DHS on its chemical security efforts, businesses are
concerned that sensitive information could be released.''); Homeland
Security Advisory Council Report, Homeland Security Information Sharing
Between Government and the Private Sector 1 (August 10, 2005) (``HSAC
Report'') (stating that effective cooperation between DHS and the
private sector ``has been hampered by a variety of legal and procedural
obstacles''); compare 148 Cong. Rec. S11002, S11001 (Nov. 14, 2002)
(Senator Lieberman) (``We have to close vulnerabilities in those
[critical infrastructure] systems before terrorists strike them. To do
so, we have to be working with the private sector.'').
A number of advisory councils have recently re-assessed this
problem and provided recommendations to the Department. For example,
after a lengthy study in August of 2005, the Homeland Security Advisory
Council (HSAC) opined:
Fundamentally, the challenge of ensuring the resilient/reliable
operation of critical infrastructure is unique, as it requires close
communication and coordination between critical private sector
entities and the Federal agencies charged with regulating them.
Those communications, moreover, must remain non-public in order for
those functions to be served. As specified in statute, these
communications are to involve intelligence and law enforcement
information, and are to serve warning, preventative and protective
functions. Disclosing this sort of information would defeat the
purpose of these communications by giving our nation's enemies
information they could use to most effectively attack a particular
infrastructure and cause cascading consequences across multiple
infrastructures.
HSAC Report at 30.
2. Identifying Solutions
The Department's principal advisory committees specifically
concluded that concerns regarding the Federal Advisory Committee Act
(FACA) have frustrated vital communication between DHS and critical
infrastructure sectors. This Act, when it applies, generally requires
advisory committees to meet in open session and make publicly available
associated written materials. 5 U.S.C. App. 2 sec. 10. It also requires
a 15-day notice before any meeting may be ``closed'' to public
attendance, a requirement which could prevent the Department from
meeting on short notice to discuss sensitive information in an
appropriate setting. The Act contains a number of exceptions to its
general disclosure rules, but the applicability of those exceptions
presents what many view as a significant litigation risk. See, e.g.,
NIAC Report at 14. The Department's consultations with the Department
of Justice have reinforced this conclusion.
The HSAC summed up the potential consequences of public disclosure
of the sensitive information:
Communications [between critical private sector entities and the
Federal Government] must remain non-public * * * Disclosing this
sort of information would defeat the purpose of those communications
by giving our nation's enemies information they could use to most
effectively attack a particular infrastructure and cause cascading
consequences across multiple infrastructures.
HSAC Report at 30. Because of these concerns, the HSAC recommended that
DHS consider using its authority under section 871 of the Homeland
Security Act of 2002, 6 U.S.C. 451, to exempt critical infrastructure
advisory committees from the FACA requirements. Section 871 provides
the Secretary of Homeland Security with the authority to establish
advisory committees and exempt them from the FACA. 6 U.S.C. 451(a).
This authority allows the Department to enhance the incentives for
providing the Department with information and recommendations that
would not otherwise be provided. The National Infrastructure Advisory
Council (NIAC) also considered this authority and drew a conclusion
similar to the HSAC:
Effective critical infrastructure protection requires the ability to
have real time, continuous communications and open dialogue among
the public and private partners in the model. The granting of the
871 exemption will establish a known and understood framework that
facilitates the flow of advice and information concerning critical
infrastructure protection. Not doing so would inhibit information
sharing, risk publicly disclosing vulnerabilities, and suppress ad
hoc communications during emergencies.
NIAC Report at 12. The NIAC went on to opine that exercising the
exemption will have a direct effect: ``Interactions between the
government and private sector will increase, and the flow of
information will be much more efficient.'' Id. at 15. The NIAC found
the exercise of the exemption authority to be ``essential'' for
``short- and long-term success.'' Id. Without exercising the exemption
authority, according to the NIAC, DHS will not be able to accomplish
its critical infrastructure protection and information sharing goals.
Id. at 15-16; cf. Govt. Acct. Off., Rep. No. GAO-02-811T, National
Preparedness: Integrating New and Existing Technology and Information
Sharing into an Effective Homeland Security Strategy 9 (June 7, 2002)
(``[I]n recent discussions with us, industry officials said that their
chief concern in sharing information about vulnerabilities and attacks
is disclosure of proprietary data.'').
3. Exercise of 871 Authority in a Manner Intended To Respect Principles
of FACA
Despite many past requests, the Department has not previously
exercised the authority Congress provided in Section 871. This
reluctance has been due in part to a respect to the principles of open-
government. Given mounting evidence that the use of this authority
could improve the Department's ability to protect critical
infrastructure and perform strategic planning, the Department is now
invoking that authority but, as explained below, in a manner intended
to preserve the principles of open government embraced by FACA. Out of
concern for those principles, the Department has chosen to institute
procedures calling for as much public disclosure as is consistent with
homeland security goals.
The decisions announced in this Notice are consistent with
longstanding efforts to increase our capacity to protect our critical
infrastructure and key resources. Since September 11, 2001, numerous
authoritative bodies--the Congress, advisory councils, and the 9/11
Commission among them--have stressed the importance of information
sharing between the federal government and the private sector. See,
e.g., National Commission on Terrorist Attacks upon the United States,
The
[[Page 14932]]
9/11 Commission Report: Final Report of the National Commission on
Terrorist Attacks upon the United States 398 (authorized ed. 2004)
(``Homeland security and national preparedness * * * often begins with
the private sector.''); 148 Cong. Rec. S11405, S11414 (Nov. 19, 2002)
(statement of Senator Lieberman stressing the importance of ``engaging
the private sector'' in anti-terrorism efforts).
Protecting critical infrastructure and key resources (CI/KR)
requires a comprehensive, effective, and collaborative partnership
between all stakeholders. Collaboration among stakeholders must involve
many activities: planning; coordination; security program
implementation; operational activities related to critical
infrastructure protection security measures, including incident
response, recovery, and reconstitution from events both man-made and
naturally occurring; and the sharing of information about threats,
vulnerabilities, protective measures, best practices, and lessons
learned.
An effective partnership must be predicated on the ability to have
ongoing, immediate, and multi-directional communication and
coordination between the CI/KR owners and operators and government,
including under highly exigent circumstances. During the course of
these activities, policy advice and recommendations may emerge and be
provided to the Department of Homeland Security and Sector-Specific
Agencies (SSAs). Consequently, the depth and breadth of the mission
have unique requirements for comprehensive interactions. The CI/KR
sectors are so vital to the nation's economy, public safety and
confidence that it merits use of all necessary authorities to support
their protection.
4. Establishment of the Critical Infrastructure Partnership Advisory
Council
In furtherance of DHS' mission to safeguard CI/KR sectors, the
Secretary has determined that the public interest requires the
establishment of the CIPAC. The CIPAC will support implementation of
the National Infrastructure Protection Plan (NIPP) and will help to
effectuate the sector partnership model set forth in the NIPP.
Specifically, the CIPAC will facilitate interaction among government
representatives at the Federal, State, local, and tribal levels and
representatives from the community of CI/KR owners and operators in
each critical sector to engage in, among other things, planning;
coordination; security program implementation; operational activities
related to critical infrastructure protection security measures,
including incident response, recovery, and reconstitution from events
both man-made and naturally occurring; and the sharing of information
about threats, vulnerabilities, protective measures, best practices,
and lessons learned.
These activities require regular, ongoing, and multi-directional
communication and coordination between CI/KR owners and operators and
government, and to have the ability to do so under highly exigent
circumstances. During the course of these activities, policy advice and
recommendations may emerge and be provided to the Department of
Homeland Security, the SSA for each sector identified in HSPD-7, and
the other Federal departments and agencies supporting the critical
infrastructure protection mission under the NIPP. These departments and
agencies have responsibility for establishing and implementing Federal
policy and managing Federal programs. The CIPAC has no authority to
establish Federal policy or otherwise undertake inherently governmental
functions.
Exemption from Public Law 92-463: In recognition of the highly-
sensitive, and often confidential, nature of the subject matter
involved in the activities of the CIPAC, under the authority of section
871 of the Homeland Security Act of 2002 (6 U.S.C. 451), the Secretary
has decided to exempt the CIPAC from the requirements of Public Law 92-
463 (5 U.S.C. App. 1 et seq.). The decision to exercise the exemption
authority in section 871 will improve the homeland security partnership
between government and the private sector. This exemption will support
the free flow of information as those involved in protecting our
critical infrastructure strive to meet the need for regular,
interactive discussions concerning threats and vulnerabilities.
DHS recognizes and supports, however, the important principle of
transparency as a foundation for public confidence in government.
Accordingly, to the full extent compatible with the achievement of the
critical infrastructure protection mission, DHS will, as a matter of
policy, operate the CIPAC in a manner consistent with the spirit of
this principle. DHS will maintain the CIPAC Executive Secretariat,
which will manage and coordinate the activities of the CIPAC and
maintain its records. While many meetings of the CIPAC will be closed
to the public, meetings will be open as feasibly consistent with
security objectives. Unless exigent circumstances arise, the CIPAC
Executive Secretariat will provide public notice of when scheduled
meetings of the CIPAC are expected to be held. Among its other
responsibilities, the CIPAC Executive Secretariat will also develop and
maintain on an ongoing basis a publicly-accessible Web site. The CIPAC
Executive Secretariat will also prepare and, to the extent consistent
with security objectives, publish on the Web site copies of meeting
agendas and periodic reports on the CIPAC's accomplishments. The
Executive Secretariat will also maintain the membership list for the
CIPAC. DHS will support the administrative needs of the CIPAC through
the CIPAC Executive Secretariat.
Membership and Structure: The CIPAC will be representative of the
following CI/KR sectors identified in HSPD-7:
Food and Agriculture
Banking and Finance
Chemical
Commercial Facilities
Defense Industrial Base
Drinking Water and Waste Water
Dams
Emergency Services
Energy
Information Technology
Nuclear Reactors, Materials, and Waste
Postal and Shipping
Public Health and Healthcare
Telecommunications
Transportation Systems
The specific membership of the CIPAC will consist of: (a) The CI/KR
owners and operators that are members of their respective sector's
recognized Sector Coordinating Council (SCC), including their
representative trade or equivalent organizations [``SCC CIPAC
Members'']; and (b) Federal, State, local, and tribal governmental
entities comprising the members of the Government Coordinating Council
(GCC) for each sector, including their representative trade or
equivalent organizations [``GCC CIPAC Members''].
CI/KR owners and operators are those entities that own and invest
in infrastructure assets, in the systems and processes to secure them,
and that are held responsible by the public for their operations and
the response and their recovery when their infrastructures or key
resources are disrupted.
SCCs are independent, self-governed bodies organized (or presently
being organized) by the owners and operators of the nation's CI/KR
within each of the critical sectors identified in HSPD-7 to enable them
to coordinate among themselves on sector initiatives on critical
infrastructure protection,
[[Page 14933]]
including response and recovery. The SCCs are broadly representative of
the owners and operators within each CI/KR sector. While these councils
are independent of government, they provide the CIPAC the ability to
draw as representational a membership as possible from each sector and
from across all sectors.
GCCs are interagency coordinating bodies that enable interagency
and cross-jurisdictional coordination within each HSPD-7 sector. Each
GCC is comprised of representatives from across various levels of
government (i.e., Federal, State, local, and tribal), as appropriate to
the security landscape of each sector, and includes the Federal
departments and agencies with a relevant interest in the sector. Each
GCC is co-chaired by a representative from the designated SSA for the
sector and by DHS' Assistant Secretary for Infrastructure Protection.
Appendix A sets forth a list of the present membership of the CIPAC
from each sector as of this date, including all of the GCC CIPAC
Members and the designated leadership of each SCC now in existence.
Immediately following publication of this Notice in the Federal
Register, the CIPAC Executive Secretariat will work with each SCC's
leadership, and the SSA for each sector, to compile a complete list of
the CIPAC SCC Members from each sector. Not later than April 24, 2006,
the Department will publish a subsequent Notice identifying these
additional members of the CIPAC. As new SCCs are formed and existing
ones mature, the membership of the CIPAC will grow and change to
accommodate changes in the membership of these bodies. DHS will publish
quarterly updates in the Federal Register to announce changes in the
membership of the CIPAC.
Membership Status: Non-Federal members of the CIPAC serve as
representatives of their sectors, not as special government employees.
Private sector members bear the cost of participating in the CIPAC.
Meetings: The CIPAC may meet as a whole or in any combination of
subgroups that is most conducive to the effective conduct of its
activities including, without limitation, in groups encompassing
discrete sectors to address sector-specific issues and concerns (e.g.,
a meeting of the members of the Food and Agriculture Sector GCC with
their counterpart owners and operators from the sector's SCC), or in a
small group with a single designated representative from each sector to
address interdependencies and other cross-sectoral issues. As
independent bodies, meetings consisting solely of members of the SCCs,
or those consisting solely of members of the GCCs, shall not constitute
meetings of the CIPAC. In addition, the CIPAC may establish informal
working groups for the purpose of fact-finding, issue development, or
other preliminary non-deliberative activities. Such activities in
support of the CIPAC shall also be within the scope of the exemption
noted above.
The CIPAC will meet at least quarterly to address matters within
the scope of this Charter. The CIPAC Executive Secretariat will prepare
summary minutes of CIPAC meetings; maintain calendars and agendas;
coordinate preparation and review of communications with government
entities; extend invitations to government officials and other expert
consultants, as needed, to attend meetings; and other administrative
functions as may be required.
Duration of Committee: Two years, subject to extension pursuant to
section 871(b) of the Homeland Security Act of 2002 (6 U.S.C. 451(b)).
Responsible DHS Official: Nancy J. Wong, Director, Infrastructure
Programs Office, Infrastructure Partnerships Division, United States
Department of Homeland Security, Washington, DC 20528, telephone (703)
235-5349.
Dated: March 20, 2006.
Michael Chertoff,
Secretary.
Appendix A--Membership of the Critical Infrastructure Partnership
Advisory Council
Leadership of Existing SCCs:
Association of American Railroads
Cellular Telecommunications & Internet Association
Computer Sciences Corporation
Constellation Generation Group
Depository Trust and Clearing Corp.
Duke Energy
DuPont
Exelon Corporation
FedEx Corporation
Greenville Water System
Independent Electricity System Operator, Ontario, Canada
International Association of Fire Chiefs
International Dairy Foods Association
Madden & Patton, LLC
National Cattleman's Beef Association
National Food Processors Association
New Jersey Transit
New York City Department of Environmental Protection
NiSource Pipelines
Northwestern Hospital
Pacific Gas and Electric Co.
The Real Estate Roundtable
Telecommunications Industry Association
U.S. Telecom Association
United States Postal Service
Valero Energy Corporation
VeriSign
Xcel Energy
Federal, State, local, tribal and quasi-governmental entities,
or their designated representative trade or equivalent associations,
identified as members of existing GCCs:
American Red Cross
Association of Food and Drug Officials
North American Securities Administration Association
Association of State and Interstate Water Pollution Control
Administrators
Association of State and Territorial Health Officials
Association of State Drinking Water Administrators
Commodity Futures Trading Commission
Conference of State Bank Supervisors
Farm Credit Administration
Federal Communications Commission
Federal Deposit Insurance Corporation
Federal Energy Regulatory Commission
Federal Housing Finance Board
Federal Reserve Bank of New York
Federal Reserve Board
Interagency Security Committee
Intertribal Agriculture Council
National Association of County and City Health Officials
National Association of Departments of Agriculture
National Association of State Chief Information Officers
National Association of State Credit Union Supervisors
National Credit Union Administration
Nuclear Regulatory Commission
Securities Investor Protection Corporation
Tennessee Valley Authority
United States Army Corps of Engineers
United States Department of Agriculture
United States Department of Commerce
United States Department of Defense
United States Department of Education
United States Department of Energy
United States Department of Health and Human Services
United States Department of Homeland Security
United States Department of Housing and Urban Development
United States Department of Interior
United States Department of Justice
United States Department of Labor
United States Department of Transportation
United States Department of the Treasury
United States Environmental Protection Agency
United States National Archives and Records Administration
United States Securities and Exchange Commission
[FR Doc. 06-2892 Filed 3-23-06; 8:45 am]
BILLING CODE 4410-10-P