Air Cargo Security Requirements, 30478-30517 [06-4800]

Download as PDF 30478 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration 49 CFR Parts 1520, 1540, 1542, 1544, 1546, and 1548 [Docket No. TSA–2004–19515; Amendment Nos. 1520–4, 1540–7, 1542–2, 1544–5, 1546– 2, and 1548–2] RIN 1652–AA23 Air Cargo Security Requirements Transportation Security Administration (TSA), DHS. ACTION: Final rule. AGENCY: FOR FURTHER INFORMATION CONTACT section. Make sure to identify the docket number of this rulemaking. The Transportation Security Administration is amending its regulations to enhance and improve the security of air cargo transportation. This final rule requires airport operators, aircraft operators, foreign air carriers, and indirect air carriers to implement security measures in the air cargo supply chain as directed under the Aviation and Transportation Security Act. This final rule also amends the applicability of the requirement for a ‘‘twelve-five’’ security program for aircraft with a maximum certificated takeoff weight of 12,500 pounds or more to those aircraft with a maximum certificated takeoff weight of more than 12,500 pounds to conform to recent legislation. SUMMARY: Effective Date: This final rule is effective October 23, 2006. Compliance Date: By November 22, 2006, Indirect air carriers must comply with the requirements for Indirect air carrier training under § 1548.11. By December 1, 2006, aircraft operators, foreign air carriers, and indirect air carriers must comply with the requirements for— Security threat assessments under §§ 1544.228, 1546.213, 1548.15, and 1548.16; and Indirect air carriers that do not currently hold a security program under part 1548, and that offer cargo to an aircraft operator operating under a full all-cargo program or a comparable foreign air carrier under § 1546.101(e), establishment of, and operation under, a TSA security program in part 1548. FOR FURTHER INFORMATION CONTACT: Tamika McCree, Office of Transportation Sector Network Management (TSA–28), Transportation Security Administration, 601 South 12th Street, Arlington, VA 22202; (571– 227–2632); tamika.mccree@dhs.gov. SUPPLEMENTARY INFORMATION: cchase on PROD1PC60 with RULES2 DATES: VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 Availability of Rulemaking Documents You can get an electronic copy using the Internet by— (1) Searching the Department of Transportation’s electronic Docket Management System (DMS) Web page (https://dms.dot.gov/search); (2) Accessing the Government Printing Office’s Web page at https:// www.gpoaccess.gov/fr/; or (3) Visiting TSA’s Law and Policy Web page at https://www.tsa.gov and accessing the link for ‘‘Law and Policy’’ at the top of the page. In addition, copies are available by writing or calling the individual in the Small Entity Inquiries The Small Business Regulatory Enforcement Fairness Act (SBREFA) of 1996 requires TSA to comply with small entity requests for information and advice about compliance with statutes and regulations within TSA’s jurisdiction. Any small entity that has a question regarding this document may contact the person listed in FOR FURTHER INFORMATION CONTACT. Persons can obtain further information regarding SBREFA on the Small Business Administration’s Web page at https:// www.sba.gov/advo/laws/law_lib.html. Abbreviations and Terms Used in This Preamble AAAE American Association of Airport Executives AAPA Association of Asia Pacific Airlines ACCA Air Courier Conference of America ACISP All-Cargo International Security Procedures ACI–NA Airports Council InternationalNorth America AEA Association of European Airlines AES Automated Export System ALPA Air Line Pilots Association International AOPA Aircraft Owners and Pilots Association ASAC Aviation Security Advisory Committee ATA Air Transport Association ATSA Aviation and Transportation Security Act CAA Cargo Airline Association CBP U.S. Customs and Border Protection CFR Code of Federal Regulations CHRC Criminal History Records Check DHS Department of Homeland Security DSIP Domestic Security Integration Program EA Emergency Amendment FAA Federal Aviation Administration HAZMAT Hazardous Materials IAC Indirect Air Carrier IACSSP Indirect Air Carrier Standard Security Program IATA International Air Transport Association PO 00000 Frm 00002 Fmt 4701 Sfmt 4700 MSP Model Security Program MTOW Maximum certificated take-off weight NACA National Armored Car Association NATA National Air Transport Association NCBFAA National Customs Brokers and Forwarders Association RAA Regional Airline Association RACCA Regional Air Cargo Carriers Association SIDA Security Identification Display Area SD Security Directive SSI Sensitive Security Information STA Security Threat Assessment TSA Transportation Security Administration TFSSP Twelve-Five Standard Security Program UPS United Parcel Service Outline of Final Rule I. Background II. Comment Disposition A. Security Threat Assessments B. Acceptance and Screening of Cargo C. Security Identification Display Area D. Known Shipper Program E. Adoption and Implementation of the Security Programs F. Cost of IAC Training and Materials G. Cost Benefit Analysis H. 100 Percent Inspection of Cargo I. Unknown Shipper Cargo J. Terms Used in This Chapter K. Persons and Property Aboard the Aircraft L. Other Issues and Sections III. Section-by-Section Analysis of Changes IV. Fee Authority for Security Threat Assessment V. Rulemaking Analyses and Notices A. Regulatory Evaluation Summary B. Paperwork Reduction Act C. International Compatibility D. International Trade Impact Assessment E. Unfunded Mandates Reform Act Analyses F. Executive Order 13132, Federalism G. Environmental Analysis H. Energy Impact VI. List of Subjects VII. The Amendment I. Background This final rule implements air cargo security requirements under the Aviation and Transportation Security Act (ATSA), Pub. L. 107–71. ATSA requires TSA to implement the following requirements: • Provide for screening of all property, cargo, carry-on and checked baggage, and other articles, that will be carried aboard a passenger aircraft operated by a domestic or foreign air carrier;1 and • Establish a system to screen, inspect, or otherwise ensure the security of freight that is to be transported in allcargo aircraft as soon as practicable.2 TSA published a notice of proposed rulemaking in the Federal Register on 1 49 2 49 U.S.C. 44901(a). U.S.C. 44901(f). E:\FR\FM\26MYR2.SGM 26MYR2 cchase on PROD1PC60 with RULES2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations November 10, 2004, at 69 FR 65258, to solicit public comment on the proposed air cargo regulations. Please see the NPRM for additional background information on the development of these regulations. The NPRM proposed, among other requirements, to: • Address two critical risks in the air cargo environment: (1) The hostile takeover of an all-cargo aircraft leading to its use as a weapon; and (2) the use of cargo to introduce an explosive device onboard a passenger aircraft. • Create a new mandatory security regime for aircraft operators and foreign air carriers in all-cargo operations using aircraft with a maximum certificated take-off weight more than 45,500 kg. • Create requirements for foreign air carriers in all-cargo operation with an aircraft having a maximum certificated take-off weight more than 12,500 pounds but no more than 45,500 kg, and a separate program for aircraft with a maximum certificated take-off weight more than 45,500 kg. • Require a Security Threat Assessment for individuals with unescorted access to air cargo. • Enhance existing requirements for indirect air carriers (IAC). • Expand Security Identification Display Area requirements at regulated airports to include areas where cargo is loaded and unloaded. The NPRM was based in part on recommendations received from the Department of Transportation Office of Inspector General’s (DOT OIG’s) September 2002 audit of the air cargo security program,3 the General Accounting Office’s (GAO’s) December 2002 report entitled, ‘‘Vulnerabilities and Potential Improvements for the Air Cargo System’’,4 and the Aviation Security Advisory Committee recommendations of October 1, 2003. TSA was also guided by the Air Cargo Strategic Plan, which was completed in November 2003, and approved by the Department of Homeland Security in January 2004. The NPRM proposed a threat-based, risk-managed program for securing the air cargo transportation system. This final rule adopts the regulations proposed in the NPRM with minor revisions to clarify certain provisions from the proposed rule. Specifically, the final rule clarifies both of the populations who are subject to Security Threat Assessments (STAs), and the areas where airports must extend Security Identification Display Area (SIDA) measures for cargo. 3 Report Number SC–2002–113, September 19, 2002. This report is SSI. 4 GAO–03–344, December 20, 2002. VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 During this rulemaking, another critical security enhancement has been implemented, that is, an increase in the inspection of cargo by aircraft operators and foreign air carriers. The NPRM proposed to codify the requirement for the aircraft operators and foreign air carriers to inspect cargo in accordance with their security programs. These operators already were inspecting a portion of their cargo as required by Security Directives issued by TSA in November 2003. Following the publication of the NPRM, the Department of Homeland Security Appropriations Act, 2005 was enacted.5 Section 513 of the Act requires TSA to amend Security Directives and programs to triple the percentage of cargo inspected on passenger aircraft, which TSA did. Details of these security measures are protected by TSA as Sensitive Security Information,6 and therefore are not available for release to the general public. Although the details are not in the rule, the regulatory evaluation for this final rule analyzes the cost incurred by aircraft operators and foreign air carriers to comply with this inspection requirement. The cost of inspection of air cargo on passenger aircraft accounts for about $1.491 billion of the total $2 billion costs of this rule, as discussed further in the Regulatory Evaluation Summary (Section V.A.) of this preamble. This inspection requirement accounts for the largest single cost of this final rule. This inspection requirement is not a new responsibility under this final rule; rather, TSA is taking this opportunity to provide a cost estimate for inspection of air cargo on passenger aircraft, as currently required under existing Security Directives. TSA provided cost estimates for these inspections in the NPRM, and has since revised them to account for the effect of the congressional directive and public comments. These Security Directives were first issued in November 2003. TSA subsequently issued security program amendments to reflect the inspection requirements of the Security Directives and the congressional mandates. These amendments have been implemented since July 2005. This rulemaking marks TSA’s first opportunity to account for costs 5 FY ‘05, Pub. L. 108–334. Security Information’’ or ‘‘SSI’’ is information obtained or developed in the conduct of security activities, the disclosure of which would constitute an unwarranted invasion of privacy, reveal trade secrets or privileged or confidential information, or be detrimental to the security of transportation. The protection of SSI is governed by 49 CFR part 1520. 6 ‘‘Sensitive PO 00000 Frm 00003 Fmt 4701 Sfmt 4700 30479 associated with the issuance of these security measures. The specific requirements for these inspections are SSI and are not appropriate for public disclosure as part of this rulemaking. Accordingly, about 75 percent of the approximately $2 billion overall 10-year cost of the requirements implemented under this rule are associated with requirements that did not originate with this rule. These costs originated with TSA Security Directives issued in November 2003 and security program amendments issued in March 2005. The cost of implementing requirements that originate under this final rule is estimated to be about $167 million over a 10-year period. In conjunction with the publication of this final rule, TSA is issuing to regulated parties for comment proposed amendments to their security programs to implement this final rule as authorized under 49 CFR 1542.105, 1544.105, 1546.105, and 1548.5. II. Comment Disposition TSA received 134 letters commenting on the NPRM. These comments were submitted by a broad cross-section of parties with an interest in air cargo security; including aircraft operators, foreign air carriers, trade associations, airports, state and local governments, and indirect air carriers (IACs).7 These comments are addressed below, organized by major issues. II.A. Security Threat Assessments (STAs) TSA received approximately 140 comments on the proposed requirement for security threat assessments (STAs) for persons with access to air cargo. The STA proposed by TSA would include a search by TSA of domestic and international databases to assess any potential terrorist threats from those individuals with access to air cargo. TSA currently requires a variety of individuals working in aviation to submit to a criminal history records check and an additional name-based background check. Generally, these individuals work on airport grounds and have access to secure areas. However, many other persons who have not been subjected to such background checks have access to air cargo. TSA 7 ‘‘Indirect air carrier’’ or ‘‘IAC’’ means any person or entity within the United States not in possession of an FAA air carrier operating certificate, which undertakes to engage indirectly in air transportation of property, and uses for all, or any part, of such transportation the services of an air carrier. This does not include the U.S. Postal Service (USPS) or its representative while acting on the behalf of the USPS. See 49 CFR 1540.5. This definition reflects an amendment pursuant to this final rulemaking. E:\FR\FM\26MYR2.SGM 26MYR2 30480 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations cchase on PROD1PC60 with RULES2 proposed to require that STAs be conducted on additional categories of persons who have unescorted access to air cargo to verify that these individuals do not pose a security threat. Individuals who undergo security checks required for unescorted access to a security identification display area (SIDA), or who have successfully completed another STA that TSA approves as comparable, would not be required to submit to an STA. Applicability and Definitions Comment: The majority of comments addressing the proposed STA requirement expressed uncertainty about which employees would be required to have an STA, and what TSA considers to be ‘‘unescorted access to cargo’’ for purpose of triggering the STA requirement. In addition, the Regional Airline Association (RAA) states that the proposed language appears much broader than the scope previously recommended by the Aviation Security Advisory Committee (ASAC) because the requirement conceivably could apply to individuals who work outside of the airport environment. RAA believes that only individuals under the direct control of all-cargo airlines working at the airport should be subject to the STA requirement. The National Air Transport Association (NATA) suggests that TSA clarify specifically which persons are covered by the STA requirement—either under this rule or by amendment to a security program—and which persons are excluded from the STA requirement. NATA states that because of industry confusion, a number of aircraft operators are unclear of their status with regard to the threat assessment requirement. The Air Transport Association (ATA) commented that they fully support TSA’s conclusion that it is not necessary to require every employee of an entity regulated by TSA that is in the business of cargo transportation to submit to an STA. However, ATA believes that the proposed language in §§ 1540.201 and 1544.228 is overly broad and subject to various interpretations. ATA states that, as written, the rules could apply to individuals who work outside the airport perimeter in cargo storage facilities or holding areas, truck drivers, and others who move cargo to airports on behalf of shippers. ATA believes that the rule also could apply to individuals who work at non-U.S. locations and employees of entities at the airport who share space or have access to air cargo areas operated by the regulated party, such as employees of fixed base operators who provide fuel VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 and other supplies to regulated parties. ATA states that such broad coverage would be impractical and disruptive to timely air cargo transport, and urges TSA to clarify the language to limit the applicability. In addition, ATA recommends amending this section to apply to direct employees and authorized representatives of aircraft operators with unescorted access to cargo accepted by such aircraft operator. Federal Express (FedEx) recommends that TSA limit the STA requirement, to the extent permitted by applicable law, to employees who have unescorted access to the aircraft or cargo, or employees who they know or have reason to know will have access to cargo that will be tendered to a passenger carrier to be flown on a passenger aircraft. A number of comments asked for clarification as to what other security checks are approved by TSA, and, thus, would not require completion of an STA for that individual. TSA response: TSA agrees that not every employee should be subject to the STA requirement. Instead, TSA requires an STA for employees and agents of aircraft operators, foreign air carriers, and IACs who have unescorted access to cargo at certain times. TSA also requires an STA for certain IAC principals. TSA has revised the provisions of the regulations to clarify the STA requirement. While these revisions comport with the scope of the NPRM, we have restructured the sections to indicate more clearly which personnel are required to meet the STA requirements. The revisions clarify that the STA requirements apply: • Only in the United States. • To aircraft operators with a full program, or a full all-cargo program; foreign air carriers under § 1546.101(a), (b), or (e); and indirect air carriers. • To individuals with unescorted access to cargo who are employees or agents of— 8 • Aircraft operators with a full program and foreign air carriers under § 1546.101(a) or (b) where they accept cargo; • Aircraft operators with a full allcargo program and foreign air carriers under § 1546.101(e) where they consolidate or inspect cargo; • IACs which accept cargo for transportation on aircraft operated by an aircraft operator with a full program, or a foreign air carrier under § 1546.101(a) or (b); or 8 The STA requirements also extend to an officer, director, and person who holds 25 percent or more of total outstanding voting stock of an IAC. However, TSA did not receive requests for clarification to this requirement. PO 00000 Frm 00004 Fmt 4701 Sfmt 4700 • IACs where they consolidate or hold cargo for transportation aboard an aircraft operated by an aircraft operator with a full or full all-cargo program, or a foreign air carrier under § 1546.101(a), (b) or (e). • Unless the employee or agent has a Criminal History Records Check (CHRC) for unescorted authority to a SIDA, or another STA approved by TSA as comparable to an STA under subpart C. It is helpful to note where employees and agents are not required to have an STA. Appropriate background checks for access to airport-restricted areas are obligatory under International Civil Aviation Organization (ICAO) Annex 17 Standards. TSA does not require STAs for unescorted access to cargo at foreign locations. Individuals do not need an STA if a person with the appropriate background check escorts them. Individuals who work near cargo, but do not require unescorted access to cargo, do not need an STA where the regulated entity has adopted access control measures to prevent unescorted access to the cargo. TSA will provide guidance on specific access control measures in their security programs and regulated entities may work with TSA to establish additional measures for TSA approval. Ensuring that individuals are properly escorted, or that cargo is in a locked, inaccessible area, are two of many possible examples of access control measures that may be available to regulated entities. Generally, TSA relies on the access control measures that have been in place through FAA and TSA regulations for many years. Regulated entities should contact their TSA principal security inspectors, or other appropriate TSA point of contact, if they have further questions regarding access control measures. Where employees and agents subject to STA requirements have successfully completed a CHRC for unescorted access authority to a SIDA, they have met their requirement and do not need to get a separate STA under this final rule. TSA already requires airport operators to send to TSA certain personal information for each individual who has undergone a CHRC for a current SIDA or sterile area ID in order to perform an additional background check that is comparable to an STA. TSA is providing instruction to aircraft operators with a full or full-allcargo program to send to TSA the same type of information for cargo screeners who do not have current SIDA or sterile area IDs, and will also perform the additional check on this population. Most of these cargo screeners already E:\FR\FM\26MYR2.SGM 26MYR2 cchase on PROD1PC60 with RULES2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations have SIDA IDs; and, thus, already are checked. Likewise, an employee or agent who has undergone another STA that TSA approves as being comparable does not need a separate STA under this rule. TSA considers the threat assessments it conducts for a person holding a commercial driver’s license with a hazardous materials endorsement as comparable to an STA for purposes of this rule. See 49 CFR part 1572. TSA may determine that other threat assessments are comparable to the STA requirement under this rule and will expressly notify regulated entities with security program amendments from TSA upon making that determination. An employee or agent authorized to engage in the actions described below, who does not meet one of these means of compliance, must obtain an STA as directed in part 1540 of this rulemaking. For cargo accepted by an aircraft operator with a full program and a foreign air carrier under § 1546.101(a) and (b), each employee or agent, whom the operator authorizes to have unescorted access, must have an STA.9 The STA requirement for these employees and agents applies at the point of acceptance, whether from a shipper, another aircraft operator, foreign air carrier, or indirect air carrier. For cargo accepted in the United States by an aircraft operator under a full all-cargo program, or a foreign air carrier under § 1546.101(e), this provision applies to each employee or agent authorized to have unescorted access to cargo from the time the regulated entity consolidates or inspects cargo until it is loaded on an aircraft. TSA has determined that security procedures for these all-cargo operations are best focused, and more efficiently applied, at locations where cargo is consolidated or inspected. Reasons for this determination include the layered security approach and the focus on interdicting stowaways. STA requirements for IAC employees and agents parallel measures from both passenger and all-cargo aircraft operators. Each IAC employee or agent who has unescorted access to cargo for transportation on a passenger aircraft must have an STA. For transportation aboard an all-cargo aircraft, each IAC employee and agent must have an STA, if the IAC authorizes them to have unescorted access to cargo, from the time the cargo reaches an IAC facility where the IAC consolidates or holds the cargo. 9 Employees and agents do not need this STA if they have successfully completed a background check for unescorted access to SIDA, or have another threat assessment that TSA approves in this context. VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 Comment: A few commenters note that there seems to be a conflict between proposed § 1540.201 and proposed § 1544.228; specifically, proposed part 1544 includes a provision of applicability of STAs to operators, but part 1540 does not. The commenters request that TSA clarify the scope of these sections, recognizing that the exclusion of all-cargo operators from § 1540.201 may have been inadvertent. TSA response: TSA’s omission of aircraft operators under a full all-cargo security program in § 1540.201(a)(1) was an oversight. We have provided a technical amendment to that subparagraph, adding ‘‘or (h)’’ to the end of the provision. Operators’ Responsibility Comment: The Air Line Pilots Association International (ALPA) does not support the STA requirement because ALPA favors requiring persons with unescorted access to cargo to submit to a CHRC. ALPA argues that under the proposed rules, TSA could approve for unescorted access to air cargo an individual convicted of any of the 28 defined crimes because his or her name does not appear on governmentmaintained lists of individuals suspected of having a link to terrorism. ALPA states that criminal history, financial status, and many other factors can be indicators of an individual’s character, reliability, maturity, and susceptibility to compromise. TSA response: TSA recognizes that there are a number of background check techniques that potentially could be applied to various persons in the supply chain. In accordance with our risk based, threat managed approach; TSA has determined that requiring persons with unescorted access to cargo to submit to an STA provides a significant enhancement while limiting costs. We note that persons with more sensitive positions, such as cargo screeners, are subject to CHRCs and additional background checks. Comment: Federal Express (FedEx) states, that in many cases, it would be unlawful for operators to conduct background checks on persons not directly employed by them. FedEx recommends requiring an operator to conduct such checks only on its direct employees. FedEx also expresses concern about requirements to have STAs for agents due to possible labor and employment law issues. FedEx also commented that for an IAC to fulfill this requirement, it will have to maintain employee records for all the truckers and warehousemen used by the IAC. Further, IACs will have to ensure that their vendors provide them PO 00000 Frm 00005 Fmt 4701 Sfmt 4700 30481 timely updates of changes in employment and monitor unescorted access to cargo. FedEx believes that for the majority of IACs this would be an impossible task. Another comment supports the proposed section, but asserts that carriers should not be responsible for completing third party STAs. The commenter asserts that each entity should be responsible for completing its own STAs, and TSA should be responsible for funding any new background checks. TSA response: Aircraft operators, foreign air carriers, and IACs are responsible for carrying out all security measures as regulated parties. They do so using employees and agents, as they choose. They authorize unescorted access to cargo by agents and employees. Under these regulations, however, these regulated parties are not responsible for conducting the required background checks; rather they must ensure that the necessary information about their employees and agents is transferred to TSA for TSA to conduct the STA. TSA has carefully examined the scope of the need for an STA. TSA has revised the language of proposed §§ 1544.228, 1546.213, and 1548.15 to pertain to those individuals specifically authorized to have unescorted access to cargo. This final rule provides the aircraft operator, foreign air carrier, and IAC latitude in authorizing unescorted access to cargo in order to limit the number of persons requiring an STA. The requirement for an STA does not extend to employees or agents who are only near air cargo where the aircraft operator, foreign air carrier, or IAC has in place other security measures to control access to the cargo. If a regulated entity uses a third party agent to meet its security program requirements, which regulated entity is responsible for ensuring that the third party has an STA, just as they are responsible for other security duties their agents carry out. TSA is aware of no conflict with other laws with regard to collecting STA information. Comment: National Armored Car Association (NACA) states that requiring additional background checks on employees, who have already been investigated and certified by State agencies charged with licensing security personnel, is redundant and wasteful. NACA suggests that TSA accept certifications based on State investigations which include FBI fingerprint examinations, and issue any necessary TSA credentials based on these background checks. E:\FR\FM\26MYR2.SGM 26MYR2 cchase on PROD1PC60 with RULES2 30482 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations The American Trucking Association states that placing direct responsibility on operators to perform STAs on their agents, contractors, or subcontractors places a substantial financial burden on the operator and driver, and potentially will create a confusing, frustrating, and unworkable system. Other concerns of the American Trucking Association include whether STAs are transferable (i.e., would follow the employee as he or she changes employment), and how often individuals are required to renew their security authorization. The American Trucking Association proposes the use of TSA’s Transportation Worker Identification Credential as an alternative solution to implementing STAs on individuals having unescorted access to air cargo. TSA response: In general, TSA does not anticipate accepting the background check of a private company or a state agency as comparable to a CHRC or STA approved by TSA. The TSA STA checks intelligence databases that are inaccessible to the private sector and not widely used by state agencies. As mentioned under § 1540.201, STA requirements apply to those aircraft operators, foreign air carriers, and IAC employees and agents who are authorized and required to handle air cargo in the performance of their duties. STA requirements do not apply to employees and agents who have only incidental access to air cargo, or employees and agents who are required to submit to another TSA-approved STA, such as TSA HAZMAT driver’s license requirements.10 TSA will consider accepting other TSA-approved STAs, such as the Transportation Worker Identity Credential upon broader implementation of its use. Consistent with TSA policy on transferability of a CHRC conducted for unescorted access authority to a SIDA, an employee or agent who has successfully completed an STA for one employer need not complete it for another employer if the employee or agent has been continuously employed in a position that requires an STA. Additionally, as detailed in the response to the first comment on ‘Notification’ below, there is no requirement to renew an STA as long as the STA-holder qualifies as continuously employed. TSA will provide further guidance to aircraft operators, foreign air carriers, and indirect air carriers upon request. 10 See 70 FR 22268 (Apr. 29, 2005), to be codified at 49 CFR part 383. VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 Notification Comment: Several commenters note the potential lengthy turn-around time for STA notifications under § 1540.205 and recommend that TSA include a time frame in which it will make the notification. Many of these commenters propose that TSA should specify an anticipated response time of 10 working days to provide authorization or initial denial to submitted STAs. One commenter notes that TSA will need to increase staffing to handle the impact of processing the STAs in a timely manner. The American Trucking Association commented that the proposed rule excludes certain employers from receiving STA results on their drivers. Without employer notification, trucking companies are unable to make informed personnel decisions regarding their drivers. The American Trucking Association recommends amending this section to include notification to the individual, operator, and employer. TSA response: TSA agrees that an anticipated response time of 10 working days in providing authorization or initial denial is appropriate and achievable in most cases. While some individual situations may require a longer timeframe for adjudication, TSA should provide the vast majority of approvals well within 10 working days. TSA further notes that once it approves an STA, by issuing a ‘‘Determination of No Security Threat’’, the STA will remain valid for an employee or agent from one job to another in accordance with §§ 1544.228(b)(2), 1546.213(b)(2), and 1548.15(b)(2), and consistent with TSA policy on continuous employment for holders of unescorted access authority to SIDA. However, TSA notes that the regulated party and the agent’s direct employer are not prohibited from communicating about the notification. Appeals Procedures Comment: The Airport Consultants Council proposes new language to clarify the requests for materials under the appeals procedure of § 1540.207(c)(1). TSA response: Rather than adopt new language, TSA revised § 1540.205(c)(4) by adding a cross-reference to § 1540.207. Section 1540.207(c) allows an appeal, including a written request for materials, within 30 days of receipt of the ‘‘Initial Determination of Threat Assessment’’ from TSA. STA Fee Comment: United Parcel Service (UPS) states that they already conduct extensive background checks, including checking all airline employees against PO 00000 Frm 00006 Fmt 4701 Sfmt 4700 Federal governmental watch lists. If the TSA check merely duplicates what the air carrier already is doing, UPS contends there is no need for TSA to conduct the test and for the air carriers to pay the fee under § 1540.209. UPS suggests that if TSA wants additional name checks with the proposed STA, then TSA should add the additional checks to the current listings and let the air carriers run them. This method does not place additional costs on TSA or the air carrier because the programming and personnel already are in place. Additional commenters request clarification on the procedures involved in an STA, because they do not understand the nature of the analysis or the basis of the $39 cost figure in the NPRM. The commenters believe that the proposed cost for the STA is excessive, given the cost of the comparable and more extensive CHRC checks. The Air Courier Conference of America (ACCA) and Purolator Courier oppose the fee, and state that TSA should carefully define the applicable population before it requires any new screening. They recommend that TSA conduct the screening against watch lists and the National Crime Information Center. FedEx states that, the new STA program will, contrary to TSA’s expectations, increase both direct and indirect costs. They state that the direct cost of $39 for each STA is significantly more than the average cost of a CHRC. In addition, FedEx contends that the name-based methodology of an STA will result in indirect costs resulting from operational delays and disruptions due to false positives. FedEx argues that such indirect costs will exceed those that currently result from the CHRC. Like UPS, FedEx believes that air carriers should not have to pay TSA or another party to do something that they are already doing. The International Air Transport Association (IATA), Yellow Roadway, British Airways, Delta, and other commenters oppose the fee proposed in this section and believe that it is the Government’s responsibility to provide protection from terrorists and to absorb any costs related to the STAs. TSA response: Private companies do not have access to all of the intelligence databases that TSA will use to conduct STAs. Further, TSA must make judgments as to the information received from the databases, which it has the expertise to apply. Accordingly, TSA has decided to conduct the STAs. Statutory provisions 11 require that 11 Department of Homeland Security Appropriations Act, 2004, Sec. 520 (Pub. L. 108–90, Oct. 1, 2003, 117 Stat. 1137). E:\FR\FM\26MYR2.SGM 26MYR2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations industry should reimburse the agency for direct costs associated with accomplishing STAs. The STAs will not duplicate checks that the carriers are already accomplishing, as TSA has access to a variety of Government watch lists that are not appropriate for dissemination to the private sector. The $39 fee referenced in the NPRM assumed TSA would need to pay the FBI for access to the FBI’s Automated Case System files. Subsequent to NPRM publication, TSA decided not to include the Automated Case System component in its STA. With increased vetting and credentialing experience, TSA has refined the necessary threat assessment sources to be included. As a result, the revised STA fee is $28. The rule provides for a phased-in implementation for compliance with the STA requirements. Regulated entities may mitigate delay in processing by timely submitting the STA application. Subsequent to the compliance date, any possible delay due to a false positive would occur prior to the applicant’s authorization to have unescorted access to cargo. These new hires would constitute a small portion of the entire population subject to the STA. TSA expects that the percentage of false positives among these new hires will be minimal. Further, TSA analysts will be able to resolve most false positives quickly within the anticipated time frame for returning results. cchase on PROD1PC60 with RULES2 Section 1546.213 STAs for Cargo Personnel in the United States Comment: Japan Airlines wants TSA to clarify whether this section would require foreign air carrier employees to undergo STAs or other checks when accessing off-airport facilities, despite the non-application of SIDA-like requirements to such facilities. Nippon Cargo Airlines asks if the rule will apply only to new employees or if it will affect existing employees. TSA response: Foreign air carrier employees and agents within the United States are subject to the same requirements off-airport as corresponding U.S. aircraft operator employees and agents. If the foreign air carrier authorizes its employee or agent to have unescorted access to cargo at an off-airport facility and this facility is used to consolidate or inspect cargo until it is loaded on the aircraft, or an employee or agent accepts cargo from a known shipper, then the requirements of § 1546.213 apply. The requirements apply to both new and existing employees and agents who have unescorted access authority granted by the foreign air carrier. VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 Section 1548.15 STAs for Individuals With Unescorted Access to Air Cargo TSA received 15 comments on this section. Most commenters have doubts about the responsibilities of IACs regarding this rule. They want to know who will need the STA and whether the requirements are retroactive for current employees. Comment: Atlanta-Hartsfield International Airport (ATL) asks if this requirement includes personnel in the manufacturing and shipping phase of preparing air cargo, and if so, whether an IAC will be responsible for filing an STA application on each loading dock employee and transport driver in the shipping chain. ATL also asks if these requirements are retroactive for current IAC employees or other cargo related businesses, and if so, for how many years into the past and how soon will the applications need to be filed. TSA response: The STA requirements apply to those aircraft operator, foreign air carrier, and IAC employees and agents who are authorized to have unescorted access to air cargo in the performance of their duties. Manufacturing or shipping personnel would only be required to have an STA if they are acting as an agent and have unescorted access to cargo for an aircraft operator, foreign air carrier, or IAC. Current IAC employees and agents are required to complete an STA successfully. TSA is providing 180 days from the date of publication of this rule for aircraft operators, foreign air carriers, and IACs to comply with the STA requirements. Comment: Air Courier Conference of America (ACCA) asks to which employees this section will apply, and why some employees will need to undergo a background check against TSA’s lists while others may undergo a CHRC. They note that most ACCA members already check employee names against the ‘‘no fly’’ and ‘‘selectee’’ watch lists as a standard element of their Security Directives, and as an added safeguard. TSA response: This rule requires STAs within the United States for employees and agents authorized by aircraft operators, foreign air carriers, and indirect air carriers to have unescorted access to cargo. Persons who have CHRCs for unescorted access authority to a SIDA already have undergone TSA name-based checks comparable to the STA and therefore will not have to undergo another one. Comment: ATA supports a reasonable extension of STAs for IACs, but warns of significant potential for system disruptions, unless TSA defines IAC PO 00000 Frm 00007 Fmt 4701 Sfmt 4700 30483 and air carrier responsibilities with regard to STA clearance. ATA asserts that air carriers cannot be responsible for ensuring the clearance of each IAC handler who may have contact with cargo before the delivery to the air carrier. ATA believes that this is not a workable process given the inherent time sensitivities in air cargo transport, the number of IACs providing cargo to air carriers, and the nature of an IAC’s workforce scheduling. TSA response: TSA inspectors verify IAC compliance with STA requirements in the normal course of regulatory compliance inspections. Air carriers are not required to verify the IAC’s compliance as part of the air cargo acceptance process. Comment: National Customs Brokers and Forwarders Association (NCBFAA) questions whether longtime employees, and licensed customs brokers, many of whom are also IACs and certified by U.S. Customs and Border Protection (CBP) under the Customs-Trade Partnership Against Terrorism program (C–TPAT), are subject to STA requirements. NCBFAA believes that these employees have proven their reliability and conscientiousness on security matters and it would be inefficient and unnecessary to subject them to background checks. NCBFAA recommends that TSA either exempt individuals previously approved by the CBP, or work with CBP to harmonize their respective screening processes. NCBFAA also proposes that TSA exempt IAC employees with a certain level of experience. NCBFAA believes it would be redundant to require a second DHS screening for many IAC employees. In addition, the NCBFAA recommends that TSA limit STA screening to a fiveyear period for persons who remain in good standing. TSA response: TSA will not exempt any employee from STA requirements based on length of service. TSA believes that performing background checks on individuals playing critical roles in the air cargo supply chain is a necessary step in ensuring aviation security. TSA currently is working with other DHS components to consider background checks performed by those components to determine if they are comparable to checks performed by TSA. Regulated entities will be able to refer to their security programs as provided by TSA for information on comparable checks. Regulated entities have incentive to determine whether an applicant has already completed a comparable check because the employee would not have to wait for clearance for unescorted access to cargo. Also TSA is providing in security programs that regulated entities E:\FR\FM\26MYR2.SGM 26MYR2 30484 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations must accept the comparable check in lieu of the STA. cchase on PROD1PC60 with RULES2 II.B. Acceptance and Screening of Cargo Comment: The majority of commenters on §§ 1544.205, 1546.205, and 1548.9 regarding inspection and screening of cargo are not sure how to accomplish compliance. TSA response: Specific Sensitive Security Information (SSI) measures will be proposed as amendments to airport, aircraft operator, foreign air carrier, and IAC security programs. The contents of these programs are not appropriate for public disclosure as part of this rulemaking. TSA is providing airport operators, aircraft operators, foreign air carriers, and IACs the opportunity to comment on the proposed amendments to their security programs upon issuance, and before the effective date of this final rule. It is helpful to note that many of these measures already appear in current Security Directives and security program requirements. Comment: UPS, ATA, Regional Airline Association (RAA), and Cargo Airline Association (CAA) state that § 1544.205(a) and (b) are imprecise and redundant, and propose alternative language to consolidate the paragraphs. TSA response: Paragraph (a) of § 1544.205 provides the general requirement and performance standard for carriage of cargo. Paragraph (b) provides the specific requirement for screening and inspecting cargo. Other paragraphs provide other specific requirements. The revision also extends those requirements to all-cargo aircraft operations with a maximum certificated take-off weight (MTOW) of more than 45,500 kg (100,309.3 lbs.). These paragraphs do not provide details of how these requirements must be met, because such details are Sensitive Security Information under 49 CFR part 1520 and are contained in security programs that are available only to persons with a need to know. Comment: Several commenters oppose requiring regulated entities to refuse cargo for transport if the shipper does not consent to screening and inspection of the cargo under §§ 1544.205(d) and 1546.205(b). They state that high cash value cargo, such as jewelry, currency, bullion, and other sensitive cargo, is shipped in sealed containers that cause damage or losses to cargo when opened. They suggest additional consideration and industry input on how to deal with these situations and ask whether the Government will provide indemnification if damage occurs VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 during inspection by the Government or Government contractor personnel. TSA response: Regulated entities must refuse to transport cargo as required under, and consistent with, their security programs. TSA understands that requiring shippers, like drug companies, to consent to inspection of cargo is problematic. TSA agrees that the screening of certain types of cargo present unique challenges, and recognizes the safety and security concerns related to screening such cargo. TSA revised the wording in sections that require consent to screen cargo, and provides specific exceptions and alternative procedures in the proposed security program amendments for shipments whose contents would be damaged or compromised if the aircraft operator inspected the cargo. These procedures largely will be transferred from current Security Directives that address these concerns for later consideration in amendments to applicable security programs. Comment: NACA and NATA ask if the terms ‘‘inspect’’ and ‘‘screen’’ are interchangeable. TSA response: The terms ‘‘inspect’’ and ‘‘screen’’ are not interchangeable. Generally, screening means the systematic evaluation of a person or property to assess whether either poses a threat to security. TSA interprets inspection as a subset of screening. An inspection is a method of conducting such an evaluation, but is not the only method. For instance, the known shipper program is an informationbased method of screening. The known shipper program involves the screening of cargo based upon information known to an aircraft operator, foreign air carrier, or indirect air carrier about the shipper of the cargo. Additionally, a certain percentage of that cargo is inspected for the presence of persons and any unauthorized explosives, incendiaries, and other destructive substances or items. TSA will provide specific guidance to regulated entities in their respective security program amendments. Comment: FedEx wants TSA to clarify that the proposed rule does not require or authorize TSA to impose any additional screening beyond the screening they already are doing under SDs and security program amendments. Several all-cargo air carriers ask if TSA will bear the costs of the screening workforce and equipment required under § 1544.205, and want TSA to clarify who has the responsibility for screening cargo. TSA response: Aircraft operators incur the cost for the screening of cargo transported aboard their aircraft and PO 00000 Frm 00008 Fmt 4701 Sfmt 4700 must comply with the procedures for screening incorporated in their security programs. Specific screening requirements are promulgated in amendments to such programs and regulated parties are provided the opportunity to comment on these amendments, as appropriate. Regarding screening of cargo for transportation aboard passenger aircraft, 49 U.S.C. 44901(a) provided an exception for Federal screening for the known shipper program. The inspection of a portion of known shipper cargo is considered a part of the known shipper program and need not be conducted by Federal employees. This rule does not address the amount or type of cargo screening that is required. TSA will respond to changing conditions as needed. Additionally, TSA is considering whether the current system for selecting cargo for inspection will be changed with the TSA Freight Assessment System (FAS). The FAS might be used to identify cargo posing an elevated risk for the application of security measures in the aircraft operator’s security program. Comment: FedEx, UPS, CAA, and ATA note that § 1544.205(e) appears to prohibit the acceptance of cargo for air transportation from a variety of retail outlets, such as the UPS Store, FedEx, Kinko’s, and other authorized shipping outlets. The commenters note that these outlets are neither the shipper nor an entity specifically mentioned with a comparable security program under § 1544.205(e). However, the commenters believe that the exception under § 1544.205(e) will permit them to continue to accept cargo from these retail outlets as is currently allowed in their security programs. The commenters want TSA to clarify that this is, in fact, TSA’s intention. Further, if this is not the intention of TSA, they recommend excluding carriers operating under all-cargo programs from the application of this section, and propose using the following language for § 1544.205(e): ‘‘Each aircraft operator operating under a full program or an allcargo program may accept cargo for air transportation on a passenger air carrier only from a known shipper, or from an aircraft operator, foreign air carrier, or IAC operating under a security program under this chapter with a comparable cargo security program.’’ TSA response: Aircraft operators under a full all-cargo security program are not prohibited from accepting cargo from retail entities as described in these comments. Under these rules, such retail outlets may operate either under an IACSSP, or as an agent with security responsibilities under the aircraft E:\FR\FM\26MYR2.SGM 26MYR2 cchase on PROD1PC60 with RULES2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations operator’s security program. For a further discussion of the differences between IACs and agents of aircraft operators, please see the Section-bySection Analysis for § 1548.5. Comment: UPS, CAA, ATA, and others commenters express concern about the extraterritorial applicability of § 1544.205(f). CAA states that the rule seems to apply to international air cargo movements and notes that commercial realities and foreign government resistance make the application of this rule unattainable. UPS wants TSA to clarify this section to recognize that foreign law may limit the extent to which carriers may be able to comply with security programs outside the United States. ATA states that foreign countries may impose screening requirements that differ and even conflict with those in the carrier’s security program and recommends that TSA permit air carriers to comply with either the security programs imposed by the foreign country or those contained in the TSA-approved security program. TSA response: TSA recognizes, as indicated by the commenters, that the imposition of regulatory requirements on a U.S. aircraft operator operating from foreign locations may be impacted by the legal requirements applied by the host government at such foreign locations. The requirement for a U.S aircraft operator to screen cargo at foreign locations is no different from any other current or proposed aviation security requirement placed upon a U.S. aircraft operator operating outside the United States. The specific security program mandates for the screening of cargo outside of the United States take into consideration cargo security restrictions, as well as requirements mandated at some foreign locations. Comment: Several smaller air carriers state that they cannot comply with the proposed rule requirement to open packages before loading at unsecured airports. TSA response: This rule codifies requirements for screening that already are in place through SDs and security program amendments. The fact that an aircraft operator operates at an airport without a security program has not been found to inhibit screening. Comment: Several airport operators and air carriers ask how to accomplish screening at rural airports. TSA response: Each aircraft operator and foreign air carrier security program must take into consideration the different locations at which cargo must be screened. Aircraft operators and foreign air carriers must conduct screening at rural airports in accordance VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 30485 with the specific requirements of their security programs. applies where a foreign air carrier lands or takes off in the United States. Acceptance and Screening of Cargo From Locations Outside the United States Acceptance of Cargo by an Indirect Air Carrier Comment: Association of Asia Pacific Airlines (AAPA), British Airways, Association of European Airlines (AEA), and Singapore Airlines state that § 1546.205 lacks provisions regarding the acceptance and recognition of National Aviation Security Program requirements that many foreign airlines use. They recommend standardizing requirements for acceptance and screening of cargo, and implementing threat-based measures for inspection of cargo. TSA response: TSA continues to recognize National Aviation Security Programs of foreign countries in accepted security programs. Comment: Several commenters, including British Airways, IATA, and AEA want TSA to clarify the term comparable security program in § 1546.205(e), and ask what this term includes. In addition, these commenters recommend amending § 1546.205(f) to clarify that it applies only to cargo loaded outside the United States that is destined for the United States and that foreign air carriers may accept cargo destined for the United States from any lawful entity, subject to a compatible National Aviation Security Program as approved by the carrier’s national government. TSA response: A comparable security program includes cargo security measures identical or equivalent to those required of the accepting aircraft operator or foreign air carrier. If the transferring aircraft operator, foreign air carrier, or IAC, has performed these cargo security measures, there is no further need for the accepting aircraft operator or foreign air carrier to repeat those measures. For instance, for transfers to aircraft operators with a full program, TSA will consider such security measures as: Whether the known shipper program was applied, from whom the operator accepted the cargo, the type of cargo screening or inspection that was done, and other relevant security measures. Overall, part 1546 applies to the operation, landing, or taking off within the United States of a foreign air carrier. Only cargo destined to, or transported through, the United States is subject to this final rule when loaded at a foreign airport. Section 1546.205(f) requires that foreign air carriers subject to this part carry out the requirements of their security programs. Section 1546.101 PO 00000 Frm 00009 Fmt 4701 Sfmt 4700 Comment: Most comments to § 1548.9 support this section and recommend that TSA allow IACs to screen cargo provided they demonstrate the capability to do so. The Yellow Road Corporation expresses concerns about the costs and redundancy associated with enforcing cargo security requirements for IACs, and recommends the adoption of varying levels of cargo screening with emphasis on loading cargo on the aircraft. IBM wants clarification on the requirement to obtain the shipper’s consent to search or inspect cargo, and suggests allowing the shipper to give a blanket authorization to the IAC as part of its contract. TSA response: While TSA does not state in which manner the shipper’s consent to search or inspect cargo be obtained, it does require that the consent be explicit and in writing. TSA allows aircraft operators, foreign air carriers, and IACs to manage the collection of consent to search in a manner consistent with individual operational needs. The regulations allow a shipper to provide a blanket authorization, as proposed by IBM. II.C. Security Identification Display Area (SIDA) Comment: American Association of Airport Executives (AAAE) disagrees with TSA’s assessment that airports easily will be able to extend SIDAs to areas where cargo is loaded and unloaded under § 1542.205. AAAE states that the rule does not adequately address the complexities of expanding SIDAs at airports with diverse operational configurations, property ownership, and jurisdictional control. Aircraft Owners and Pilots Association (AOPA) states that while this rule may not impose direct mandates for general aviation areas at airports regulated by TSA under 49 CFR part 1542, AOPA is concerned that the practical implementation of this requirement will result in SIDA requirements in many general aviation areas. In addition, AOPA notes that many airports specifically exclude general aviation areas from the SIDA because of time and distance separation from the air carrier areas. This layered approach to security limits access points and the number of individuals needing the background check and identification requirements for the SIDA, and establishes clear distinctions of security areas. E:\FR\FM\26MYR2.SGM 26MYR2 cchase on PROD1PC60 with RULES2 30486 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations AOPA recommends using the standard of the operational area of the aircraft principle for air cargo operations at part 1542 regulated airports, similar to that proposed for operations at nonpart 1542 TSA regulated airports. AOPA further states that the operational area of the aircraft should include the immediate footprint of the cargo aircraft and handling area, with a procedure to limit unauthorized persons near the aircraft while it is being loaded and unloaded, but not the entire ramp. The Department of Transportation of Alaska states that this final rule will require CHRCs for most people working at an airport, and contends that expansion of the CHRC requirement will not effectively increase security for air cargo. TSA received some comments that relate to the fact that areas designated as SIDAs primarily are subject to airport operator control rather than aircraft operator control. CAA states that expansion of the SIDA is not the best way to secure the area surrounding cargo aircraft. It further asserts that the ASAC Working Groups did not recommend such a SIDA expansion, but rather recommended the imposition of SIDA-like requirements on air carriers operating from these cargo areas. CAA, UPS, DHL, and FedEx comments that the difference is significant from an operational, but not a security, standpoint, noting that it is essential that the all-cargo air carriers retain access control so they can carry out their requirements and internal company procedures. CAA recommends requiring air carriers to amend security programs to include SIDA-like measures at non-SIDA operational areas of U.S. airports where cargo is loaded or unloaded from aircraft. FedEx states that this section extends SIDA requirements to areas where operators sort loaded or unloaded cargo on airport grounds. However, § 1542.205(a)(2) does not contain this important language. FedEx recommends adding the phrase ‘‘on airport grounds’’ after every reference to ‘‘each area’’ in the rule to clarify that facilities such as FedEx stations, world service centers, and non-airport sort locations are not to be included in SIDAs. UPS also proposes extensive revisions to this section. Airports Council International–North America (ACI–NA), ATA, and RAA do not support the extension of SIDA requirements. They state that the language is very broad and could potentially extend SIDA requirements far beyond what is necessary to ensure air cargo security. They recommend amending the SIDA requirements only VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 to airport areas used to load or unload cargo from aircraft. The Miami International Airport, Atlanta-Hartsfield International Airport, ACI–NA, and the Airports Consultants Council agree that the new requirement will enhance the overall level of security, but only if designated in those areas under airport control. They argue that the SIDA should begin at the wall of the cargo facility adjacent to the airside ramp locations. The commenters also oppose requiring airports to extend, or enforce the security of the SIDA into tenant-leased facilities. Eleven small aircraft operators, AOPA, and Regional Air Cargo Carriers Association (RACCA) express concern about extending SIDA to cargo operating areas. The commenters state that the SIDA extension is impractical for aircraft operating under the TFSSP, since operations are conducted on common public areas like the general aviation and FBO ramps, and it would be impossible to extend SIDA requirements to these areas. The Juneau International Airport asks to designate dual use areas that are SIDA only during times that the cargo activity is performed, and asks if SIDA need to be contiguous. The Anchorage International Airport recommends allowing the local FSD to determine which areas, if any, need to be classified as SIDAs. TSA response: TSA has determined that measures to prevent individuals from gaining unauthorized access to the cargo operations area are necessary to prevent tampering with the aircraft or the cargo and to remove a potential access point for stowaways. TSA considered requiring aircraft operators and foreign air carriers in all-cargo operations to implement SIDA-like requirements. However, TSA has determined that airport operators with security programs under 49 CFR 1542.101(a) are able to implement more efficiently the requirements to extend SIDAs. These airports are better positioned with the necessary infrastructure to provide security measures, as they are able to leverage the existing resources that support SIDAs currently in place. Airports also will be able to rely on, or more easily expand, existing identification media and security check capabilities, law enforcement support, and training programs. TSA considered limiting the extension of SIDAs to areas of a ramp where cargo is loaded or unloaded from the aircraft. However, the inside of facilities where cargo is sorted, stored, staged, consolidated, processed, screened or transferred, present PO 00000 Frm 00010 Fmt 4701 Sfmt 4700 numerous, and perhaps more, opportunities for someone to tamper with the cargo just before it is loaded onto an aircraft. TSA also considered extending the SIDA requirement for similar cargo areas off-airport. TSA determined that the complexity and cost of applying these measures off-airport would be too great because they lack existing resources to expand. These off-airport locations would disproportionately incur significant start-up costs. Accordingly, the final rule provides that SIDA security measures must be extended to secured areas and air operations areas that are regularly used to load cargo on, or unload cargo from, an aircraft operator under a full or full all-cargo program as provided in § 1544.101(a) or (h), or under a foreign air carrier program under § 1546.101(a), (b), or (e). Adoption of a security program under these sections applies to operation of an aircraft with an MTOW of more than 45,500 kg (100,309.3 lbs.). The requirements do not extend to areas used by aircraft with an MTOW of more than 12,500 lbs., but not more than 45,500 kg (100,309.3 lbs.). Additionally, the SIDA security measures must be extended on an airport to areas where cargo is present after an aircraft operator, foreign air carrier, or indirect air carrier accepts cargo. In particular, this includes inside buildings such as cargo facilities, loading and unloading vehicle docks, and other areas where an aircraft operator, foreign air carrier, or indirect air carrier stores, stages, consolidates, processes, screens, or transfers cargo. As clarified in § 1542.205(a)(3), the SIDA is not required to include access routes between the perimeter entry point of the airport and the cargo facility, or one of these other locations, for the purpose of transporting cargo to or from an aircraft operator, foreign air carrier, or indirect air carrier. There may be areas within a cargo facility that do not need to be SIDAs. For example, some parts of cargo facilities are not restricted to employees and agents of an aircraft operator, foreign air carrier, or indirect air carrier. These areas may have a counter where one of these operators accepts cargo from shippers, or the shipper’s agents. The area leading up to this counter need not be a SIDA if there is no cargo in these areas that already has been accepted. Additionally, on a limited basis other security measures, such as access control measures or active and continuing surveillance or monitoring, may mitigate the need for SIDA in areas where an operator’s customer or the E:\FR\FM\26MYR2.SGM 26MYR2 cchase on PROD1PC60 with RULES2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations customer’s agent is present to tender cargo. Each airport security program will specify the actual limits of the cargo operations area to be included in a SIDA, subject to review and approval by TSA. Amendments to security programs may address the particular circumstances of an airport’s layout and operations and accommodate other aviation operations to the extent practical. Note that under § 1542.111, an aircraft operator or foreign air carrier may enter into an exclusive area agreement with an airport operator to take responsibility for the SIDA. Additionally, under § 1542.111 TSA encourages airports to grant an aircraft operator’s request to enter into an exclusive area agreement for the inside of a building of any cargo facility on its airport where cargo is present after the aircraft operator accepts the cargo. For example, TSA recognizes that some aircraft operators may have buildings that house their own operations and they have an interest in maintaining their own security systems. In such cases, the aircraft operator may elect to carry out the requirements for the SIDA inside the building rather than the airport operator doing so. Airport operations are able to use existing procedures and resources to cover these new SIDAs and will not need to create different procedures and resources in order to comply with the requirements of this final rule. This approach also ensures that common standards apply on these airports. In contrast, airports that are not required to have security programs under part 1542 are not required to create SIDAs. At these airports, TSA requires aircraft operators under full allcargo security programs to prevent unauthorized access to the operational areas of the aircraft, rather than requiring the airports to create SIDAs and corresponding support structures. TSA determined that requiring these airports to create SIDAs would necessitate that they adopt TSAapproved security programs. TSA declined to extend the scope of these regulatory requirements to entities that currently do not have TSAapproved security programs. TSA determined that requiring aircraft operators to meet the security requirements of § 1544.225 would provide the greatest operational flexibility at airports that do not have TSA-approved security programs. Many commenters appear to have interpreted the proposed requirements to extend the airport SIDA to cargo operations areas in § 1542.205(a)(2) as applying to off-airport facilities or VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 general aviation areas where cargo may be loaded on or unloaded from smaller all-cargo aircraft. TSA is reiterating the intent of the proposal and clarifying the applicability of this section by modifying the proposed language in the final rule. As stated in the NPRM ‘‘[t]he SIDA would only be extended to areas on airport grounds.’’ 12 Part 1542 only applies to airports. TSA’s intent in expanding the SIDA is to deny unauthorized individuals access to the cargo operations areas in order to prevent tampering with the aircraft and cargo and to deny a potential access point for stowaways. TSA believes that expanding the SIDA will minimally affect areas where general aviation aircraft operate. However, TSA acknowledges that each airport is different and some consideration must be given to how SIDA expansion affects general aviation. Each Federal Security Director has authority to work with airport operators to design the SIDA based on local airport characteristics and security requirements. In response to a question by Juneau International Airport, there is no requirement that SIDAs for cargo operations be contiguous with other SIDAs at the airport. For instance, TSA understands that some airports have SIDAs where passenger operations are conducted that are on the opposite side of the airport from areas where cargo operations are conducted. The area between these locations may not need to be a SIDA. Comment: UPS recommends that TSA require airports with electronic fingerprint equipment to accept the aircraft operator’s and IAC’s Submitting Office Number to reduce the costs to the aircraft operator and IAC. UPS states that the Submitting Office Number allows the aircraft operator and indirect air carrier to be billed directly for the CHRC and to identify where the results should be routed. Additionally, UPS states that it is impractical for aircraft operators and indirect air carriers to have electronic fingerprint equipment at all locations for employees that need a CHRC. TSA response: TSA does not prohibit airport operators from electronically submitting requests for a CHRC by an aircraft operator using that aircraft operator’s Submitting Office Number. TSA does not regulate how airports use their equipment in this context. However, IACs are not authorized to conduct CHRCs under this rule. 12 69 PO 00000 FR 65270 (Nov. 10, 2004). Frm 00011 Fmt 4701 Sfmt 4700 30487 II.D. Known Shipper Program Comment: Several IACs and the National Industrial Transportation League request that TSA clarify issues surrounding accessibility of the proposed known shipper database and recommend the establishment of a central database managed by TSA. In addition, the commenters seek clarification from TSA on how, and to what extent, air carriers’ internal systems would be able to interface with the database. TSA response: TSA agrees, and has developed a centralized database of known shippers.13 This database is available to the regulated parties. Participating aircraft operators, foreign air carriers, and IACs verify shippers against the database. If the shipper is known in the system, an IAC may offer the cargo for transport to, and the aircraft operator or foreign air carrier may transport their cargo on, a passenger aircraft. The regulated parties may access the system through a webbased portal or by establishing direct access through their air cargo management system. Comment: A number of commenters believe that the known shipper program should be a TSA-operated function, in order to protect commercially sensitive information. The commenters believe that TSA should establish specific requirements for inclusion in the known shipper list or database, vet shippers for inclusion in the program, populate and maintain the list or database, and make provision for automated verification of shippers against the database. TSA response: TSA agrees that the operation and management of the known shipper database is a TSA function. However, TSA believes that in order to maintain the carrier’s domain awareness and client-vendor relationship, the regulated parties, and not TSA, should perform submissions of known shipper data for inclusion in the database. TSA vets shippers in the database via electronic means. Regulated parties are automatically able to verify shippers against the database through a direct access linkage of their air cargo management system to the known shipper database. Comment: UPS and FedEx oppose requirements under § 1544.239 to submit known shipper information to a mandatory database. They state that use of the database will diminish rather 13 This database is covered under the Privacy Act system of records notice. Transportation Security Threat Assessment System (DHS/TSA 002), which was published in the Federal Register on September 24, 2004, and amended on December 10, 2004. It can be found at 69 FR 57348, 57349 and at 69 FR 71837. E:\FR\FM\26MYR2.SGM 26MYR2 cchase on PROD1PC60 with RULES2 30488 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations than enhance security, and question the ability of the TSA database to process the volume of requests and the number of shippers that will be added to the system. In addition, they argue that their competitors could use the database in a manner that would promote unfair competition, and that the servers supporting the database could become inoperable at inopportune times. FedEx states further that the web-based known shipper database will not necessarily be technologically compatible with existing Information Technology (IT) infrastructure and operational demands. UPS wants TSA to treat all information in the database as SSI, and apply stringent privacy protections. ATA supports the concept of a centralized known shipper database, if the database is secure, transparent to authorized users, accurate, and efficient. ATA states that, at times, the current database is not easily accessible through carrier computer systems and needs a standardized query vehicle, such as a unique identifier for each shipper. ATA states that a mandatory, centralized clearance system raises many questions and challenges for all-cargo carriers not discussed by the ASAC Cargo Working Groups. Therefore, ATA recommends creating a separate task force to examine issues relating to whether all-cargo carriers should participate in the centralized database because of the significant ramifications for the industry. ATA recommends also that TSA fund all carrier costs associated with participation in the known shipper program. TSA response: TSA believes that the known shipper database will be able to handle the volume of queries. Regulated entities will not be required to have each satellite location equipped with a direct connection to TSA. Rather, these locations may work through a single corporate point of contact. TSA understands that some operators have expressed concerns that the database may be used in a manner inconsistent with fair competition. TSA notes that regulated entities with access to the database will not be able to produce the entire list of known shippers in a single query. Rather, regulated entities will only be able to confirm a single known shipper at a time. Additionally, TSA notes that it will soon be far less costly for customers to become known shippers with the transition to TSA-vetting. At present, each regulated entity must invest time and effort in making customers known shippers. In the future, TSA will transition this system to allow regulated parties to request that TSA verify that a shipper may be a known shipper. VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 Accordingly, there will be fewer competitiveness issues. TSA remains sensitive to issues of connectivity and competitiveness, and will continue to work with interested stakeholders as we develop these systems. Currently, the known shipper database employs a verification process to match the information submitted to other publicly available information and for maintaining data integrity. TSA believes that the use of the known shipper database will expedite the process of shipper verification, while providing the Government the necessary tools to vet shippers adequately before the transportation of cargo on a passenger aircraft. Air carriers will be able to maintain their current systems and practices, such as the manner in which they flag known shippers within their own systems. In addition, TSA believes that the aviation industry benefits from the reduced time it will take to convert a shipper from unknown to known. TSA disagrees that a centralized database weakens air cargo security. A Government-owned and -managed database that contains all known shippers affords TSA the opportunity to further vet known shippers, evaluate the threat posed by those who use the air transportation system to move goods before the goods are loaded on passenger aircraft and improve efficiency in vetting known shippers. The database treats information that aircraft operators, foreign air carriers, and IACs submit as SSI. TSA will continue to work with regulated parties who have concerns about system continuity and issues of competitiveness as we further develop these systems. Comment: One commenter proposes merging known shipper and the Automated Export System (AES) databases to avoid redundancy. TSA response: The AES is a joint venture between Federal agencies and the export trade community. It is the central point through which export shipment data, required by multiple agencies, is filed electronically with CBP, using an electronic interchange. TSA and CBP are working on the development of TSA’s Freight Assessment System. TSA is looking at ways to leverage CBP’s systems in order to avoid duplication of effort. TSA will study the feasibility of merging the known shipper database with CBP’s AES as part of this effort. Comment: Several commenters request that TSA clarify the criteria to establish a shipper as a known shipper. Other commenters request that TSA clarify whether the definition will be PO 00000 Frm 00012 Fmt 4701 Sfmt 4700 uniform for all types of freight and that TSA indicate whether it will expand the known shipper program to include small aircraft operators. TSA response: The specific criteria that TSA uses for the known shipper program are SSI. TSA does not disclose specifics of the criteria in public documents. The shipper itself does not have a need to know the criteria. Rather, aircraft operators, foreign air carriers, and IACs contact the shipper to qualify it as a known shipper. Known shipper program requirements only apply to the transportation of cargo on: (1) A passenger aircraft under a full program; (2) a passenger aircraft operated by a foreign air carrier under § 1546.101(a) or (b); or (3) cargo being transferred to a passenger aircraft operation under these sections. The known shipper requirements do not apply to cargo transported exclusively on all-cargo aircraft. Comment: The Air Transport Association of Canada proposes reciprocity between TSA and Canadian known shipper databases to avoid duplication of data. TSA response: TSA and Transport Canada continue to coordinate on this issue. In general, we welcome the opportunity to collaborate with foreign governments in the harmonization of global air-cargo security requirements. Known Shipper Program and Foreign Air Carriers Comment: Several commenters, including Nippon Cargo Airlines, question whether TSA requires foreign air carriers to comply with the known shipper program and ask how TSA implements the program with respect to foreign air carriers. The British Embassy asks TSA to clarify whether foreign air carriers are able to accept only cargo from consigners on a TSA-approved list, and requests that TSA confirm that application of the rule is limited to cargo loaded in the United States. TSA response: Currently, passenger foreign air carriers operating from U.S. airports are subject to the provisions of the Model Security Program (MSP), which requires the adoption of the known shipper program. All cargo loaded on a passenger aircraft at a U.S. airport is subject to this requirement, whether under an aircraft operator or foreign air carrier security program. These requirements are not applicable to cargo loaded outside the United States. Known Shipper Program and IACs Comment: TNT USA, an IAC, contends that the regulation is duplicative of existing anti-terrorism E:\FR\FM\26MYR2.SGM 26MYR2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations cchase on PROD1PC60 with RULES2 regulations and legislation. The commenter also states that the rule is a barrier to free trade. TSA response: TSA disagrees. Rather than acting as a barrier to free trade, this rule enhances the capability of aircraft operators, foreign air carriers, and IACs to more efficiently comply with security program requirements. These regulations are not duplicative as they have a different purpose and address a different security threat than those of other U.S. government agencies, like CBP. As stated in the NPRM, CBP and TSA have distinct security missions in securing air cargo. CBP’s mission is preventing terrorist and terrorist weapons, including weapons of mass destruction, from entering the United States.14 TSA, on the other hand, is responsible for securing both U.S. aircraft and foreign flights destined for the United States from destruction or hijacking and, as a result, is primarily concerned with the illicit loading of explosives, incendiaries, or stowaways on board. Comment: NCBFAA wants TSA to clarify how long it will take to qualify a known shipper and if an IAC can accept cargo from the shipper during the qualification period. NCBFAA states that the known shipper database must be precise in order to avoid delays and confusion over shipper names and asks if known shipper status applies to all office branches of a qualified shipper. Further, NCBFAA asks if the database is the only source of known shipper information, and how TSA notifies IACs of known shipper revocations. Finally, the NCBFAA asks whether air carriers need to consult the database if an IAC already has verified the shipper status and if there is reciprocity for a known shipper under a similar program in another country. TSA response: Regulated entities must separately list each location for a known shipper. TSA anticipates that the vetting process will take less time than the current process specified in the security programs and is mindful of the competitive commercial environment in which the regulated entities operate. TSA will address other specific process questions about the database in the security programs in order to protect sensitive security information. 14 Additionally, customs regulations allow for the movement of cargo ‘‘in bond’’ from the initial port of arrival to an inland CBP location where it will be released (inspections prior to release are also conducted at these inland locations) into the commerce of the United States. Under the in-bond process, the cargo remains in customs control with requirements as to who may transport it, and where it may be stored (bonded warehouses) until is released by CBP. VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 Aircraft operators may accept a certification from the IAC that the cargo has been accepted from a known shipper. There is not presently reciprocity to establish a known shipper in the database based upon a determination under a program in another country. Comment: The Airforwarders Association wants TSA to address the consolidations of IAC operations, where IACs tender shipments to another IAC, in order to achieve efficiency and expedite the shipment of air cargo. They state that the rule does not consider this consolidation as within the known shipper program allowances, even if the shipper is known to the IAC supplying the shipment. TSA response: TSA agrees and is addressing this issue in the IACSSP amendments, which will be available for IACs to comment on soon after the publication of this final rule. II.E. Adoption and Implementation of the Security Programs The following are comments to §§ 1544.101, 1546.101, 1546.103 and 1548.5. Comment: AOPA does not want TSA to apply security requirements under these sections to on-demand cargo operations, and wants TSA to limit the application of such requirements to scheduled operations. In addition, a domestic air carrier states that terrorists would likely not choose unscheduled airlines for a hostile takeover, or for placement of an explosive device, because of the inability to plan for the location of the planes. The air carrier also wants to limit the regulations to scheduled air cargo transportation. TSA response: TSA does not believe that distinguishing charter operations as scheduled or unscheduled in this manner would provide for the appropriate level of security. TSA notes that the flight departures of some unscheduled charters are predictable. Comment: FedEx, Swiss International Air Lines, Air France, and the International Brotherhood of Teamsters recommend adopting one security program for all aircraft operators and foreign air carriers in the industry, without differentiating between weight and type of aircraft or operation. TSA response: TSA requirements do not prohibit an air carrier from adopting a single security plan for all of its categories of aircraft sizes provided that the plan meets or exceeds the security requirements for each aircraft used in those operations. TSA recognizes historical patterns of terrorist attacks and a threat-based, riskmanaged approach to security. PO 00000 Frm 00013 Fmt 4701 Sfmt 4700 30489 Terrorists have demonstrated the destructive potential of large turbinepowered aircraft with large capacity fuel loads and speeds. Accordingly, a security regime that differentiates between aircraft on the basis of weight is appropriate, regardless of whether a particular aircraft carries passengers or cargo. At the same time, TSA is mindful of the historical link between terrorist operations and passenger aircraft. Therefore, measures that prevent cargo and cargo operations from being used to carry unauthorized explosives, incendiaries, and other destructive substances or items against passenger aircraft must be provided, regardless of aircraft weight. This rationale underscores TSA’s security regime and the particular measures that TSA has developed across the spectrum of civil aircraft operations, whether passenger, cargo, or mixed. Requiring the highest level of security for all sizes of aircraft would add a burden for smaller aircraft, which is not warranted by the current threat. Comment: FedEx states that, in the past, TSA field agents and foreign government officials have incorrectly assumed that the full all-cargo security program is limited or somehow inferior to the passenger aircraft’s full program because it did not contain the term ‘‘full program.’’ FedEx states that this misunderstanding has resulted in a loss of confidence in their security program, and in some cases, undue scrutiny and delay. ATA CAA, FedEx, and RAA recommend either eliminating the word ‘‘full’’ from the names of all security programs or rename the cargo program. TSA response: TSA notes that the allcargo program does not require all of the same security measures as the full program that applies to passenger operations. TSA has changed the title to ‘‘full all-cargo program’’ in this final rule for the security program required by § 1544.101(h). Comment: UPS agrees with the creation of this program as long as the Domestic Security Integration Program (DSIP) remains intact and up to date in the final rule. UPS is opposed to adopting any security program other than the DSIP. UPS believes also that bringing the all-cargo industry up to the standard of the DSIP is an effective way to enhance supply chain security. British Airways asks whether TSA will eliminate or maintain the DSIP after the incorporation of the two programs. British Airways argues that if the DSIP remains, along with the full all-cargo security program, it would give rise to two standards. They oppose this outcome and recommend treating all cargo operations equally. E:\FR\FM\26MYR2.SGM 26MYR2 cchase on PROD1PC60 with RULES2 30490 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations TSA response: TSA is conforming the existing cargo aircraft operator security programs and the cargo sections of security programs for passenger aircraft operations to the requirements of this final rule. The mandatory program will supersede the DSIP for all-cargo aircraft operators. This new mandatory program will now be referred to as the full allcargo security program. The DSIP was a program that all-cargo aircraft operators were authorized to adopt voluntarily in order to engage in certain business operations. However, it is important to note that, in addition to adopting a full all-cargo security program, aircraft operators with an MTOW of more than 45,500 kg that transfer cargo to an aircraft operator in passenger service with a full program under §§ 1544.101(a) or 1546.101(a) or (b), must also register with TSA to engage in these transfers. While each full all-cargo program will contain an option to implement the security procedures to transfer cargo to these passenger carrying aircraft, only those aircraft operators that have also registered with TSA to transfer cargo to passenger operations may do so. TSA recognizes that some aircraft operators under a full all-cargo program are not in the business of transferring cargo to passenger operations. These aircraft operators do not need to register with TSA or carry out the special security procedures, as long as they do not transfer cargo to passenger operations. Each existing DSIP holder, and any additional aircraft operators with an MTOW of more than 45,500 kg in all-cargo operations, must carry out the specific security procedures and register with TSA prior to transferring cargo to passenger operations. Aircraft operators in passenger services under a full program or under § 1546.101(a) or (b) will be required to verify that the aircraft operator with a full all-cargo security program is on an approved list maintained by TSA in order to accept cargo from it. Comment: AAPA and Singapore Airlines oppose implementation of extraterritorial measures and instead emphasize collaborative discussions to mitigate the terrorist threat without affecting air cargo operations. TSA response: In this final rule, TSA regulates the civil operations of U.S. aircraft operators, wherever they may operate. The application of the final rule to part 1546 air carriers is generally limited to operations from and within the United States, or to the United States, effective at the last point of departure. In the latter case, compliance with foreign government security requirements that TSA determines are VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 equivalent to U.S. part 1544 requirements generally comply. Comment: Japan Airlines asks whether §§ 1546.101 and 1546.103 apply to cargo flights making only a technical stop in the United States. TSA response: Foreign air carriers operating aircraft in all-cargo operations must apply security measures for technical stops in a similar manner as for passenger operations. These security measures are detailed in TSA-approved security programs, related Security Directives, and emergency amendments. The specific security measures are sensitive security information. Comment: Several commenters, including Singapore Airlines and the British Embassy, want TSA to treat foreign air carriers under part 1546 as equal to domestic aircraft operators under part 1544. In addition, the British Embassy states that many countries’ national security program requirements exceed those proposed by TSA, and wants confirmation that, in such cases, these national security programs will be deemed acceptable to TSA. TSA response: Parts 1544 and 1546 are functionally equivalent. The United States recognizes that part 1546 air carrier operations conducted in accordance with foreign government procedures, and with a similar level of security to U.S. part 1544 operations, generally suffice to meet TSA security requirements. Foreign government procedures may include measures that are at least comparable to what is required of part 1544 operations. Comment: IATA and Japan Airlines recommend allowing foreign air carriers to submit existing security programs for approval instead of submitting a new program under these rules. In addition, Singapore Airlines and Nippon Cargo Airlines ask if TSA will accept the current All-Cargo International Security Procedures (ACISP). TSA response: TSA is adjusting security programs such as the Model Security Program (MSP) and ACISP to achieve the security requirements of the final rule. TSA is issuing these security programs to the regulated parties for review and comment sometime on or after publication of the final rule. Foreign air carriers must still submit all such programs to TSA for review and consideration before final approval. The measures of a part 1546 security program that provide a level of security similar to the U.S. part 1544 operations are generally sufficient for operations departing to the United States, satisfy the requirements of the final rule, and are acceptable to TSA. TSA acts through its international air carrier principal security inspector and works with the PO 00000 Frm 00014 Fmt 4701 Sfmt 4700 regulated party to develop measures capable of producing a similar level of security. Form, Content, and Availability of Security Program Comment: Singapore Airlines supports § 1546.103 and AAPA wants TSA to provide air carriers with the information about cargo shippers and IAC security programs. Japan Airlines asks if foreign air carriers have flexibility and discretion with respect to fashioning security measures for inclusion in security programs, so long as those measures are acceptable to TSA. TSA response: TSA considers all security programs SSI and restricts access to applicable regulated entities. Regulated entities may request amendments to their security program following the procedures established in the regulations applicable to their specific operation. Aircraft operators do not have a need to know the contents of an IACSSP. Comment: NCBFAA recommends creating a frequently asked questions section on the TSA Web site to address issues regarding each new proposed regulation. TSA response: TSA offers regulated entities security program updates, including information similar to frequently asked questions sections, through secure web-boards. Questions about accessing these web-boards should be directed to a regulated entity’s principal TSA contact. II.F. Costs of IAC Training and Materials Comment: Several IACs, British Airways, the Airforwarders Association, and Singapore Airlines support § 1548.11 on training and knowledge for individuals with security-related duties. Other IACs, NACA, RACCA, and Brinks, want TSA to clarify what the required training includes. These commenters ask: • Who is going to pay for the training? • What training will TSA require? • Who will provide the training and training materials? • How often must IACs train the personnel? • What is the timeframe for accomplishing the training? FedEx proposes that TSA offer training and certification directly to any trucker or warehouseman who wishes to volunteer, and use vendor certification as evidence of IAC training. In addition, FedEx states that the contractors should directly pay for training, and TSA should pay for the expense of administering the training. E:\FR\FM\26MYR2.SGM 26MYR2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations TSA response: TSA is developing computer-based instructional materials and a testing tool, including a minimum standard that an employee must meet and protocols for situations where employees fail to meet the threshold. TSA also is developing the curriculum and training materials, and is including specific requirements for training and testing IAC employees in the revision of the IACSSP. The rule requires that training be completed at least annually for each authorized employee or agent. The IAC bears the cost of training each of their employees or agents. Comment: FedEx objects to holding IACs responsible for training and testing employees of contractors, subcontractors, or agents, such as truckers or warehousemen, who may have unescorted access to cargo. They believe the proposal is impractical, costprohibitive, and that it would impose an unfair burden on IACs. FedEx argues that TSA has underestimated the number of individuals who will require training, as well as the cost associated with the training. FedEx states that TSA calculated only the cost associated with training employees of an IAC, but that it did not include the cost associated with an IAC training the employees of any agents, contractors, or subcontractors that may have unescorted access to air cargo. FedEx interprets this requirement to mean that they would have to train all drivers, warehouse, and office staff of any trucker or courier who may pick up cargo designated for shipping via airfreight. They state further that there are several million licensed drivers in the United States, and even if only 25 percent (approximately 500,000) drivers are involved in the delivery of air cargo, according to TSA’s estimate of $100 per individual for the cost of training, the cost to IACs will exceed $50 million. This estimate does not include the cost associated with training new hires, as there is a high turnover employee rate in the trucking industry. TSA response: TSA has clarified the applicability of IAC requirements. The 30491 regulation requirements apply to regulated party employees and agents. If an IAC uses others to perform functions that have security consequences, the IAC must make sure that those persons have proper training. TSA is not requiring air cargo operators with a security program to comply with IAC requirements and believes FedEx has extended its estimate beyond the requirements of this regulation. II.G. Cost Benefit Analysis A separate final regulatory analysis is provided on the docket. A summary of the final regulatory analysis appears in this document under the section ‘‘V. Rulemaking Analyses and Notices, A. Regulatory Evaluation Summary.’’ To assist the readers of this section, TSA is providing a table that shows, at the summary level, the changes from the NPRM to the final rule. The details of these changes are found in the full regulatory evaluation on the docket. Summary of changes: 10 year cost Requirement Remarks NPRM Final rule Delta Costs First Associated With Requirements Under November 2003 SD & March 2005 Security Program Amendments Passenger Flight Cargo Screening (first implemented under SD, currently done under security program amendment). All-Cargo Flight Cargo Screening (currently done under SD). Require All-Cargo operators to screen persons entering aircraft(currently done under SD). All-Cargo Security Coordinators (currenlty done under SD). $493.1M $1,491.1M +$998.0M 166.4M 328.0M +161.6M 33.7M 35.2M +1.5M 0.2M 0.0M ¥0.2M Subtotal .......................................................... 693.4M 1,854.5M Cost driven by congressional mandate to triple cargo inspections and public comment. 1,160.9M Public inputs on costs. Implementation cost change. Double Counted in NPRM. Costs Associated With Requirements Originating Under This Rule $3.7M $4.6M + $1.0M Security Identification Display Area (SIDA) .......... CHRCs for individuals inspecting cargo ............... Implementation of All-Cargo security program for aircraft over 45,000 kg. New aircraft inspection requirements ................... TSA Managed Known Shipper Database ............ Develop/implement IAC and Agent Training ........ 0.9M 0.5M 26.6M 10.9M 5.7M 0.7M +10.0M +5.2M ¥25.9M 36.6M 24.5M 15.1M 38.2M 24.5M 35.6M +1.6M .................... +20.5M IAC Security Program Requirements ................... 36.0M 46.5M +10.5M Subtotal .......................................................... 143.9M 166.7M +22.9M Total ............................................................... cchase on PROD1PC60 with RULES2 Security Threat Assessment ................................. 837.3M 2,011.9M +1,183.8M Comment: ACI–NA and the Atlanta International Airport believe that airports and IACs should not be obligated to obtain equipment and staff to support these regulations. They believe that TSA or DHS should either fund the new security mandates or take VerDate Aug<31>2005 17:34 May 25, 2006 Jkt 208001 responsibility for securing cargo operations. United Airlines believes that the NPRM’s economic analysis fails to consider the impact on U.S. passenger carriers. United Airlines believes the solution is to enact a cargo-screening program based on Federal screening of PO 00000 Frm 00015 Fmt 4701 Sfmt 4700 Population Increase but admin cost greatly reduced. Costs Identified in comments. Increased Population. Removed LEO costs. Implementation cost change. Remained the same. Increase in population requiring training and training development cost. Change in Population. freight as Congress intended. United Airlines believes that TSA should review methods of defraying costs borne by carriers before they pursue screening initiatives that burden carriers. TSA response: Only cargo accepted under the known shipper program may E:\FR\FM\26MYR2.SGM 26MYR2 cchase on PROD1PC60 with RULES2 30492 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations be transported on a passenger aircraft; however, Congress chose not to require Federal Government employees to conduct screening of such cargo. Moreover, Congress did not require that Federal employees must conduct cargo screening for aircraft in all-cargo operations. TSA has required aircraft operators conduct cargo screening since November 2003, and, in part to mitigate the costs cited by the commenter, provides a degree of flexibility for the operators to fulfill these requirements within their operational environment. Comment: RACCA estimates that because of the high turnover rate in the industry, actual STA cost per employee is $150. RACCA believes that air carriers need this money for applications that have a direct bearing on safety, like pilot training and aircraft maintenance. RACCA states that the threat is minimal, but the cost may be crippling for an industry that operates with narrow margins. They state further that these costs are a burden for many small air cargo operators and may precipitate cost-cutting measures that will have a negative impact on overall safety. TSA response: RACCA did not provide sufficient information to determine how they computed actual STA costs per employee. TSA has been able to further refine the STA systems and eliminate some costs, lowering the cost of STA per applicant. As our vetting and credentialing capabilities have grown, we are now able to accomplish these checks more expeditiously and economically. TSA allows certain comparable checks in lieu of an STA. Additionally, there is no requirement to renew an STA as long as the STA-holder qualifies as continuously employed. Lastly, in a post 9/11 world, industry must meet both safety and security requirements. Comment: IATA estimates implementation will be 2 to 4 times higher than the TSA estimate ($3.7 million), or $7.4 to 14.8 million over 10 years. For the expansion of SIDA, IATA estimates that the cost to the industry is 4 times the TSA estimate ($1.4 million), or $5.6 million over 10 years. IATA estimates that the actual cost to implement full all-cargo security programs will be 3 to 4 times the TSA estimate ($26.6 million), or $80 to $106 million over 10 years. Although TSA did not provide any cost estimates for the implementation of the known shipper database, IATA estimates the cost to the industry to be between $1 and $2 million per year. For the enhancements to the IACSSP, IATA estimates that the costs are 25 to 30 percent greater than the TSA estimate ($36 million), or $45.0 to $47.0 million VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 over 10 years. IATA estimates that the training requirements for IACs will be 2 times that TSA estimate ($15.1 million), or $30 million over 10 years. Overall, IATA estimates that the proposed rules will cost the industry 80 percent more than the TSA estimate ($49 million), or $88 million a year. TSA response: Although the STA population numbers did in fact increase in the final regulatory analysis, there was a corresponding decrease in the unit costs of the STA as TSA was able to eliminate some costs. The new number for the STA is $4.6 million for the 10 years. TSA is providing a reduction in the unit cost of the STA check from $55 to $38, which explains TSA’s computed cost of $4.6 million versus IATA’s $7.4 to $14.8 million. TSA accepted recommendations from IATA and others, and the SIDA expansion rounds to $10.9 million over 10 years. TSA’s recalculation for the IACSSP of $46.5 million is near the top of IATA’s $45–47 million. The new IAC training numbers are $35.6 million versus IATA’s $30 million. Contrary to IATA’s comment that TSA did not provide information on Known Shipper costs, TSA documented those costs as TSA costs rather than industry costs in the NPRM evaluation. A discussion of the Known Shipper program costs are on page 46 of the final regulatory evaluation. Comment: ATA and British Airways question the distribution of the funding for the proposed rules. They state that, as currently allocated, the costs fall disproportionately on air carriers, because estimated air carrier allocation ($758 million) constitutes 90 percent of the total estimated security costs ($837 million). They state further that the annual costs to all parties will exceed the $100 million annual threshold and would make the NPRM significant under Executive Order 12866. TSA response: TSA has determined that this rule is significant under Executive Order 12866 guidelines, as discussed in the Regulatory Evaluation Summary of this preamble (Section V.A.). TSA has listened to concerns both about cost and security. The largest portions of costs are directly related to the actual screening conducted by the airlines. TSA believes it has complied with legislative intent that this be a private sector responsibility rather than a governmental function. TSA is unaware of a mechanism for the government to redistribute private sector costs for the required inspections. Comment: Delta estimates that the financial impact to aircraft operators in year one will be $56.2 million, or $493.1 million in 10 years, and states that the PO 00000 Frm 00016 Fmt 4701 Sfmt 4700 proposed unfunded security mandates add significant costs to their business. Delta believes that TSA’s assumptions about aircraft operator’s ability to secure operating and capital funding for screening are not correct. Delta believes further that TSA-based calculations from an early 2002 report are significantly inaccurate, and expresses concern about the continued viability of cargo in the passenger air carrier market. TSA response: TSA computes the ten year impact to the carriers at $1.9 billion versus approximately $760 million in the NPRM evaluation. TSA has accepted numerous inputs from the public comments to revise the cost estimates. The largest portion of these costs, the screening costs, has been in place for sometime, through Security Directives and security program amendments. TSA is codifying these measures at this time. Also, the tripling of cargo screening as required by legislation was the single largest source of change. TSA is not making any assumptions about capital availability to aircraft operators. The fact that the screening requirements have been in place would suggest that the market has already adjusted to a requirement affirmed in legislation. Assumptions about capital expenditures in the full evaluation were based upon the likelihood of future cost savings using automated equipment over manual inspections. The evaluation reiterates that TSA has not mandated the purchase of any screening equipment in this rule. Other than screening equipment, TSA is unaware of what other capital costs Delta might be referencing. Comment: FedEx states that as proposed, the rules will require STAs for over 500,000 drivers that have potential access to cargo. According to this estimate, STA implementation will cost the industry $27.5 million for only truck drivers ($55 per individual). NACA states that the TSA estimate of employees that will require training is below the actual number, and NACA estimates that in their industry alone, 20,000 people will need the proposed training. TSA response: The public comments clearly reflected a broader assumption about requirements than TSA intended. TSA has examined the need for STAs in passenger and cargo operations and has reworded the scope of the new requirements more clearly to state which employees and agents of a carrier do require the STA in accordance with security considerations. TSA has adjusted these costs with these new population estimates to reflect TSA’s expectation of a narrower coverage than reflected in the public comments. E:\FR\FM\26MYR2.SGM 26MYR2 cchase on PROD1PC60 with RULES2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations Comment: NCBFAA states that TSA underestimates the cost of the new measures for air forwarders, many of which are small businesses. NCBFAA questions the basis for TSA’s estimate of 3,800 IAC entities and 26,600 IAC employees. NCBFAA questions the lack of underlying support for this conclusion, and believes more employees will be affected by the proposed rules. To support this, NCBFAA states that most IACs are also surface and ocean forwarders, nonvessel operating common carriers, customs brokers, warehousemen, and motor carrier brokers. Hence, the number of employees directly involved in airfreight operations is only a portion of the total employees that might have access to cargo. Consequently, NCBFAA states that the TSA estimate for total compliance ($51 million) is an understatement of the true cost to the industry. NCBFAA recommends TSA undertake a more comprehensive impact and regulatory flexibility analysis of the IAC industry for more accurate assessment of the IAC population. TSA response: TSA maintains an operational database that reflects approximately 3800 IACs who have identified themselves to TSA. These businesses already interact with TSA security personnel and TSA has identified them as currently providing services to aircraft operators. During preparation of the final rule, the 2002 Economic Census data became available which revealed both more firms and a higher average employee per firm value for the general group of freight forwarders. Public input during the comment period and discussions at TSA revealed that there was a misunderstanding of the STA coverage. Clearer language has been provided and consequentially this evaluation expanded the numbers to use the 2002 Economic Census 15 numbers, which were unavailable at the time of the original evaluation. Please see the separate full regulatory evaluation available on the docket. STAs and the changes are discussed in the section labeled Cost of Compliance: Name Based Background checks and Table 17. Comment: AAAE believes that the proposed rules are an unfunded mandate for airports. They state further that the cost of expanding SIDA involves more than just the physical expansion of the space; airports with more remote cargo operating locations will need to increase the number of law enforcement personnel on the cargo ramp, while diverting law enforcement resources away from the passenger terminal facility. In addition, AAAE states that airports may need to expand significantly their badging offices to accommodate the additional cargo personnel, and states that the MemphisShelby Airport will have to badge 15,000 FedEx personnel. TSA response: TSA reiterates that not every worker requires a background check, SIDA clearance, and a new badge. The SIDA guidelines have been adjusted to allow the airports to work with aircraft operators to minimize the expansion of the SIDA, while still providing the necessary security. For example, the final evaluation clarifies that additional law enforcement officers do not need to be employed. Rather, the requirement is to have the ability to contact existing law enforcement officials. Also in the full regulatory evaluation, section on ‘‘Cost of Compliance: Airport Operators,’’ TSA has shown how it used the public comments to revise the costs and population needing badges. Based upon the information in comments, TSA believes it reasonable to reject the need to increase staffing for this expected one time increase. Memphis is an example of several locations that have national hubs for the Nation’s largest parcel and express shippers. TSA invites the airport and shippers to work with us in order to use the flexibility and alternatives that TSA authorizes. Comment: IATA states that TSA underestimates the number of affected employees, and two IATA members indicate that depending on the definition of unescorted access to cargo, they will have at least 63,000 impacted staff, mainly cargo handlers and drivers. The Airforwarders Association states that TSA’s estimate of the number of IACs is correct, but that the number of affected IAC employees is incorrect, and recommends revaluation. ATA states that depending on the scope of the requirement, the number of individuals subject to either an STA or CHRC could be ten times greater than the 63,000 estimated by TSA. TSA response: TSA has examined the public comments along with new data available in the 2002 Economic Census.16 Census numbers do not support a three-fold expansion of the population while keeping the number of businesses constant. The new Census 15 2002 Economic Census, Support Activities for Transportation: 2002, Transportation and Warehousing Industry Series at https://www. census.gov/econ/census02/guide/INDRPT48.HTM. 16 Support Activities for Transportation: 2002, Transportation and Warehousing Industry Series at https://www.census.gov/econ/census02/guide/ INDRPT48.HTM. VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 PO 00000 Frm 00017 Fmt 4701 Sfmt 4700 30493 number of firms and the average employee per business value increased only slightly. Additionally, given that some of the public comments agree with TSA’s original numbers, TSA believes that there has been confusion on to the extent the STA or CHRC were going to be required. The full regulatory evaluation provides several pages of detail in the section ‘‘Cost of Compliance: Indirect Air Carriers’’ and in the full evaluation tables 13–17. Based on extensive internal discussion of very knowledgeable subject matter experts, TSA believes the new language provides much clearer guidance and the Census number adjustments are an appropriate estimate. II.H. 100 Percent Inspection of Cargo TSA invited comments in the NPRM, but did not propose requirements, for the physical inspection of 100 percent of air cargo. Comment: The majority of comments TSA received on this issue, including comments from Air France, ATA, British Airways, IATA, Singapore Airlines, and several IACs, oppose 100 percent inspection of air cargo. The consensus of these comments is that requiring 100 percent inspection of air cargo would be impractical in an industry dependent on just-in-time deliveries, without advances in targeting methodology, data, and technology. ATA states further that the 100 percent inspection of cargo is not warranted or required under ATSA, nor is it justified under any risk-based analysis that TSA has shared with the industry. A small minority of comments, including comments from ALPA and the International Brotherhood of Teamsters, support 100 percent inspection of air cargo. TSA response: TSA is not requiring 100 percent inspection of air cargo at this time. As mentioned in the proposal at 69 FR 65266, TSA considered requiring 100 percent inspection of air cargo, but determined to continue with a layered approach of security measures and to pursue a risk-based targeting strategy to identify higher risk cargo for additional scrutiny. This conclusion is affirmed by, and derived from, the Government Accountability Office report on Vulnerabilities and Potential Improvements for the Air Cargo System,17 the Department of Transportation’s Office of the Inspector General Audit of the Cargo Security Program,18 and TSA’s Air Cargo 17 GAO–03–344, December 2002. Number SC–2002–113, Sep. 19, 2002. This report is SSI. 18 Report E:\FR\FM\26MYR2.SGM 26MYR2 30494 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations Security Scenario Analysis. These reports have cautioned that, in the absence of an appropriate targeting methodology and data, requiring inspection of 100 percent of air cargo would severely burden the just-in-time delivery that is currently a key competitive feature of many U.S. manufacturing and distribution industries. In addition, 100 percent inspection could have particularly severe negative impacts on aircraft operators, IACs, and their employees and agents. TSA has focused on deploying currently available tools, resources, and infrastructure in a targeted manner to provide effective security in the air cargo environment, and has laid out a path for accelerated research and development of even more effective tools. cchase on PROD1PC60 with RULES2 II.I. Unknown Shipper Cargo TSA invited comments in the NPRM, but did not propose requirements, about allowing unknown shipper cargo on passenger aircraft after proper screening. Comment: ATA, CAA, Delta, RAA, and other commenters request that TSA consider allowing cargo from unknown shippers into passenger aircraft after proper screening. These comments assert that TSA should permit cargo on passenger carriers subject to inspection. TSA response: While TSA appreciates these comments, at this time TSA declines to allow the transport of unknown shipper cargo on passenger aircraft. Currently, no technology or inspection techniques exist with sufficient versatility to handle the vast array of cargo configurations, and commodities to ensure security, while maintaining acceptable throughput, or processing time. TSA continues to collaborate with the industry in an effort to develop technology solutions to improve the effectiveness and efficiency of the cargo screening process. II.J. Terms Used in This Subchapter Comment: British Airways, AEA, IATA, and the International Brotherhood of Teamsters support the definition of ‘‘Indirect air carrier’’ in § 1540.5. British Airways and AEA state that the expanded coverage is consistent with proposals from the European Commission. AAPA and IATA suggest that the definition should include equivalent entities of IACs operating outside of the United States. Purolator suggests that the United States Postal Service and foreign postal services should be included in the definition. TSA response: TSA is working closely with the European Commission to establish the basis of mutual recognition of its regulated agent and/or IACSSP. VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 The U.S. Postal Service is not subject to the provisions of this rule. The security of the U.S. Mail is covered under a Mail Security Program that provides an appropriate level of security for mail transported via aircraft. Comment: The Denver International Airport wants TSA to define the term airport grounds, and three commenters recommend adopting a definition for the terms ‘‘cargo’’ and ‘‘access to air cargo.’’ TSA response: ‘‘Cargo’’ is defined in 49 CFR 1540.5. TSA is revising the language of §§ 1544.228, 1546.213, and 1548.15 to include those individuals specifically authorized by the aircraft operator, foreign air carrier, or IAC to have unescorted access to air cargo. As stated in the preamble to the NPRM at 69 FR 65270, ‘‘The SIDA would only be extended to areas on airport grounds.’’ The requirement to extend SIDA to cargo operations is specific to the area used by an aircraft operator under a full all-cargo program, as provided in § 1544.104(h) and by a foreign air carrier under § 1546.101(e). Therefore, the proposed extension of the SIDA applies only to those areas regularly used to load or unload cargo on larger all-cargo aircraft under a full all-cargo security program. TSA is modifying § 1542.205(a)(2) to reflect this intention by adding the words ‘‘air operations area’’ instead of the words ‘‘airport grounds’’ and by deleting the reference to areas used ‘‘to sort cargo.’’ Comment: Air France and Global Express Association propose that TSA harmonize terms used in cargo operations, like ‘‘known shipper,’’ ‘‘consignor,’’ ‘‘regulated agent,’’ and ‘‘IAC.’’ TSA response: TSA believes that the terms ‘‘known consignor’’ and ‘‘known shipper’’ are similar, in general. However, TSA’s use of the term ‘‘known shipper’’ is specifically dependent on meeting the criteria and required measures in TSA-approved security programs. Similarly, the terms ‘‘regulated agent’’ and ‘‘indirect air carrier’’ are alike, in general. However, TSA’s use of the term ‘‘indirect air carrier’’ only applies to entities within the United States, and subject to the required measures in TSA-approved security programs, while ‘‘regulated agents’’ are located outside of the United States and subject to ICAO standards and a State’s national requirements. II.K. Persons and Property Aboard the Aircraft Comment: CAA, FedEx, NACA, and UPS recommend that TSA revise §§ 1544.202 and 1546.202 to apply only to persons who board the aircraft for PO 00000 Frm 00018 Fmt 4701 Sfmt 4700 transportation. ATA recommends distinguishing individuals and the applicable screening requirements to require 100 percent screening of individuals boarding the aircraft for the purpose of transportation, and random screening of those boarding the aircraft for a limited purpose and amount of time. TSA response: TSA is adding the phrase ‘‘for transportation’’ in §§ 1544.202 and 1546.202. The intent of proposed §§ 1544.202 and 1546.202 is to screen persons who are onboard the aircraft in flight, for weapons, explosives, incendiaries, and other destructive substances or items. Persons who enter the aircraft on the ground for servicing or maintenance are subject to other security measures, which may include some screening for prohibited items, in airport areas where all-cargo aircraft operations are conducted. II.L. Other Issues and Sections Proposed Compliance Schedule Comment: AAAE, the Savannah Airport Commission, the NCBFAA, and others state that the compliance schedules are brief and unrealistic. AAAE recommends providing waivers to airports that cannot comply in 90 days. Only one commenter, an insurance company, states that the 180day schedule to introduce new training requirements is too long. TSA response: TSA believes this final rule allows adequate time for airport operators, aircraft operators, foreign air carriers, and IACs to comply. Further, TSA notes that the complexities involved in compliance, as well as anticipated costs, have been carefully weighed where deadlines are established. Where difficulties are encountered, airport operators, aircraft operators, foreign air carriers, and IACs are encouraged to contact their TSA Principal Security Inspector or local Federal Security Director. TSA attempts to ensure a realistic approach to compliance timeframes, but recognizes that such timeframes are sometimes not met for good cause, and is prepared to extend reasonable consideration on a case-by-case basis, as warranted. Use of Loring Air Force Base Comment: Ten commenters, including the U.S. Senate Committee on Government Affairs, a U.S. Representative from Maine and the Governor of Maine, recommend the use of Loring Air Force Base in Northern Maine as an emergency site to land inbound international cargo aircraft found to pose an imminent threat. E:\FR\FM\26MYR2.SGM 26MYR2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations TSA response: The Intelligence Reform and Terrorism Prevention Act of 2004 requires the Secretary of Homeland Security, in coordination with U.S. Department of Defense and FAA, to submit a report on current procedures to address the threat of allcargo aircraft that are inbound to the United States from outside the United States, and an analysis of the benefits of establishing secure facilities along established aviation routes for the purposes of diverting and securing aircraft that may pose a threat. While this rule does not specifically address this issue, TSA is considering these comments in the development of the report to Congress on the feasibility of establishing these sites as required by sec. 4054 of the Intelligence Reform and Terrorism Prevention Act of 2004. cchase on PROD1PC60 with RULES2 STA for Passengers of All-Cargo Aircraft TSA invited comments in the NPRM, but did not propose requirements, about requiring each person who boards an aircraft for transportation under an allcargo security program to submit to an STA. TSA also invited comments about requiring persons who board an aircraft under an all-cargo security program who require prohibited items during the flight to perform their duties to submit to the assessment. There are five comments on this issue. Comment: Three commenters, British Airways, Air France, and ALPA, support STAs for individuals who board all-cargo aircraft for transportation. ALPA states that TSA must minimize access to the aircraft and the flight deck by permitting only those persons to board who have been properly vetted by a 10-year, fingerprint-based CHRC. They also state that TSA should reconsider the practice of allowing employees who have not been vetted to ride aboard allcargo aircraft as an employment benefit, without requiring them to meet the same security requirements applicable to other employees who work on or around the aircraft. In addition, ALPA notes that many foreign nationals travel as animal attendants aboard all-cargo aircraft, and often sit unsupervised just outside of the cockpit, in possession of items normally prohibited on aircraft. Two commenters, ATA and IATA, oppose this requirement. IATA states that STAs for personnel boarding allcargo aircraft are unnecessary when the Government has already vetted such personnel through the submission of master crew lists and flight manifests. Similarly, ATA recommends permitting air carriers to use current comparable procedures in these locations like submission of crew manifests to TSA. VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 TSA response: TSA appreciates the responses to this particular issue and is further evaluating the impact and benefit of establishing an STA requirement for individuals onboard an all-cargo aircraft. At this time, TSA declines to extend an STA requirement to these individuals. Screening requirements for individuals transported are addressed in applicable security programs, Security Directives, and Emergency Amendments. Individuals transported are currently checked against the TSA ‘‘No Fly’’ list and their persons and accessible property are inspected for prohibited items. Security of Aircraft and Facilities Comment: UPS recommends further clarification of ‘‘operational area of the aircraft’’ in § 1544.225(d) and suggests alternative regulatory text. The Airports Consultants Council asks if this provision transfers the responsibility for airport access control for an Exclusive Use Area and states that, if it does, TSA should clarify. TSA response: TSA declines to amend § 1544.225(d). TSA is providing more clarification to this section through the security program revision. This provision does not transfer the responsibility for airport access control for Exclusive Use Areas. Under §§ 1542.111 and 1544.227, airports and aircraft operators may agree that control over a SIDA at cargo operations can be transferred to an aircraft operator. Fingerprint-Based CHRCs: Unescorted Access Authority, Authority To Perform Screening Functions, and Authority To Perform Checked Baggage or Cargo Functions Comment: Four commenters, including ATA and ALPA, support § 1544.229. Swiss International Airlines notes that fingerprinting may not be necessary for an effective background check, and suggests that TSA harmonize these requirements with existing EU regulations. TSA response: TSA continues to collaborate with its foreign counterparts, where possible, in harmonizing security measures. IAC Security Programs: Approval, Amendment, Annual Renewal, and Withdrawal of Approval Comment: While the majority of commenters support § 1548.7, some believe that the process requires applicants to submit information already held by DHS under CBP’s Customs-Trade Partnership Against Terrorism program. The Airforwarders Association asks if § 1548.7(a)(1)(v) PO 00000 Frm 00019 Fmt 4701 Sfmt 4700 30495 requires only addresses for United States and not foreign locations. In addition, the Airforwarders Association recommends facilitating the requirements of § 1548.7(a)(5) through harmonization of a non-governmental organization accreditation program. ACC opposes the duration of the § 1548.7(a)(4) security program, and proposes instead that TSA grant only one initial approval, subject to continued inspection, to avoid processing of thousands of security programs each year. TSA response: TSA currently is evaluating the synergies that may exist between TSA’s IAC and CBP’s CustomsTrade Partnership Against Terrorism programs, and would consider changes to the IACSSP if appropriate. Part 1548 does not apply to stations or locations outside the United States. TSA believes that the yearly revalidation process assists the IAC in reviewing its security posture and compliance with TSA requirements. Furthermore, TSA believes that a yearly revalidation requirement does not impose an unreasonable burden on the IAC community. IAC Security Coordinators Comment: Singapore Airlines, British Airways, ACC, and others support § 1548.13. ACC, ACI–NA, and the Atlanta International Airport ask if this requirement is similar to aircraft operator security coordinator requirements and ask if aircraft operators must update their security programs to include IAC security information. TSA response: This requirement is based on the model of requirements for aircraft operator security coordinators. TSA does not require aircraft operators, foreign air carriers, or airport operators to maintain records of IAC security coordinators as part of their security programs. Comment: Freight Forwarders International questions the purpose of the security coordinator and what specific information TSA requires from this person. TSA response: The purpose of the security coordinator is to act as the security liaison between the regulated party and TSA. The security coordinator provides a single point of contact for communications involving threat information or security procedures, particularly those that are time-sensitive in nature. TSA is revising the IACSSP to include specific requirements for security coordinators. Comment: NCBFAA believes that the security coordinator requirement is impractical and unworkable for many E:\FR\FM\26MYR2.SGM 26MYR2 30496 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations IACs, and imposes a particularly unnecessary burden upon smaller companies. As an alternative, NCBFAA recommends permitting an IAC to contract with a third party to act as its security coordinator or to rely on a contact person who works with the air carrier. TSA response: TSA believes that IAC personnel must perform the functions of the Security Coordinator. It is crucial that the security coordinator be in a position to identify security problems, raise issues with corporate leadership, and initiate corrective action when needed. The security coordinator and alternates must be appointed at the corporate level, and must serve as the IAC’s primary contact for securityrelated activities and communications with TSA. Furthermore, TSA believes that having a single person responsible better assists the IAC to meet current IAC requirements for oversight of the actions of agents performing security functions on behalf of the IAC. Security Directives and Information Circulars for IACs Comment: Many commenters support § 1548.19, and IBM recommends making a sanitized Information Circular available to the shipping public, in particular if there is need for additional screening or inspections. TSA response: In principle, TSA agrees that there must be wide-ranging public access to security information, particularly as needed for compliance with security requirements and procedures. However, information that, singly or collectively, might indicate intelligence sources, methods or procedures, or aviation security procedures, must be protected. Striking the balance between these principles generally requires that access to particular pieces of security information be considered on a case-by-case basis. III. Section-by-Section Analysis of Changes PART 1520—PROTECTION OF SENSITIVE SECURITY INFORMATION cchase on PROD1PC60 with RULES2 Section 1520.5 Information Sensitive Security TSA provides the conforming amendments to § 1520.5(b) consistent with our proposals to restrict this information from public dissemination. TSA now expressly includes as SSI Security Directives and Information Circulars for IACs. VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 PART 1540—CIVIL AVIATION SECURITY: GENERAL RULES Section 1540.5 Terms Used in This Subchapter TSA is amending the definition of ‘‘Indirect Air Carrier’’ to conform to other changes pursuant to this final rule. With these changes, freight forwarders who offer cargo to operators of larger allcargo aircraft must have a TSAapproved security program. Accordingly, TSA has modified the definition of ‘‘Indirect Air Carrier’’ by removing the word ‘‘passenger’’ from ‘‘uses for all or any part of such transportation the services of a passenger air carrier’’ in order to be consistent with TSA’s goal of extending a security regime to full all-cargo aircraft operations. TSA has also provided a definition for ‘‘unescorted access to cargo.’’ Section 1540.111 Carriage of Weapons, Explosives, and Incendiaries by Individuals TSA has expanded the applicability of this section to include persons on allcargo aircraft. TSA amended paragraph (a)(1) by qualifying the applicability of this provision to the entire subchapter (Subchapter C—Civil Aviation Security) rather than to specific sections. This amendment is consistent with the expansion of security functions to persons and property onboard all-cargo aircraft under § 1544.202. Sections 1540.201 Through 1540.209 Subpart C—Security Threat Assessments This subpart sets out the scope and basic requirements of a Security Threat Assessment (STA), including related fees. The STA includes a search by TSA of domestic and international databases to determine the existence of indicators of potential terrorist threats that meet the standards set in subpart C of part 1540. The section also provides for review of a TSA determination that an individual should be denied unescorted access to cargo. Operators are required to ensure that employees and agents whom they authorize to have unescorted access to cargo undergo Security Threat Assessments or other TSA-approved checks under §§ 1544.228, 1546.312, and 1548.15. For a further discussion of the scope for each of these sections, see the section-by-section analysis of § 1544.228 below. Under § 1540.203 operators are required to verify the identity of the employee or agent and submit specified information about that individual to TSA. TSA has provided a modest PO 00000 Frm 00020 Fmt 4701 Sfmt 4700 amendment to the information each individual must submit under § 1540.203. This amendment includes decreases in the information required on previous residential addresses from seven to five years and adds a requirement to list the gender of the individual. TSA has determined that these changes provide sufficient information to conduct a thorough Security Threat Assessment. After assessing this data to determine whether the individual poses or is suspected of posing a threat to national security, to transportation security or of terrorism, under § 1540.205, TSA would notify the regulated party and the individual of its determination. This determination can take three forms: 1. Determination of No Security Threat. This determination indicates that TSA has not found that the individual presents a known or suspected threat to security. Upon receipt of this notification, the operator may authorize the individual unescorted access to air cargo. 2. Initial Determination of Threat Assessment. TSA issues this determination if TSA knows or suspects the individual of posing a security threat. The individual is able to appeal this determination through adjudication. Individuals are not permitted unescorted access to air cargo while the appeal is pending. For each proprietor, general partner, officer, director and owner of the entity as identified in § 1548.16, issuance of an Initial Determination of Threat Assessment may delay TSA approval of authority to operate under an IACSSP. 3. Final Determination of Threat Assessment. If the individual was determined to present a threat after an initial determination was issued and the individual has an opportunity to appeal that determination, this determination informs the operator and the individual that he or she is barred from having unescorted access to air cargo. For each proprietor, general partner, officer, director, and each owner of the entity as identified in § 1548.16, issuance of a Final Determination of Threat Assessment may prevent TSA approval of authority to operate under an IACSSP. On a case-by-case basis, TSA may withhold authorization of an IACSSP until the IAC, or an applicant to be an IAC, demonstrates to TSA that a proprietor, partner, officer, director, or owner under § 1548.16 who received a Final Determination of Threat Assessment is unable to influence business practices of the IAC. Section 1540.207 sets out the appeals procedures to provide appropriate due process to individuals determined to E:\FR\FM\26MYR2.SGM 26MYR2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations pose a security threat under this subsection, including a written request for materials, within 30 days of receipt of the Initial Determination of Threat Assessment from TSA. TSA has included a cross reference to § 1540.207 in § 1540.205(c)(4). Throughout the STA adjudication process, TSA may consult with other Federal law enforcement or intelligence agencies in assessing whether an individual poses a security threat under this subsection. Section 1540.209 establishes the fee requirements necessary to recover associated costs for Security Threat Assessments. TSA has modified the sum of the fee from the NPRM to reflect the most recent calculations, as described in the regulatory evaluation. The operator must not permit employees or agents to handle cargo, until TSA notifies the operator and the individuals of a Determination of No Security Threat. In cases where TSA issues a Determination of Threat Assessment, TSA may notify Government agencies for law enforcement or security purposes, or in the interests of national security. TSA recognizes that the requirement for security threat assessments under this final rule may cause affected businesses to alter their hiring practices. However, TSA believes that the security benefits of this requirement will be considerable and that TSA will be able to conduct the initial assessments in an expeditious fashion, providing timely notice to the regulated party. cchase on PROD1PC60 with RULES2 PART 1542—AIRPORT SECURITY Section 1542.1 Applicability of This Part Part 1542 currently applies to certain airports that serve certain passenger aircraft operations identified in parts 1544 and 1546. These airports are required to have security programs. Some airports are not required to have security programs even though the aircraft operators served by the airport hold security programs under parts 1544 or 1546. These aircraft operators include operations of a twelve-five program under § 1544.101(d) and of a full allcargo program under § 1544.101(h). The new § 1542.1(d) expands the applicability of part 1542 to include each airport that does not have a part 1542 security program that serves an aircraft operator with a security program under part 1544, or a foreign air carrier under part 1546. This addition makes clear that TSA may enter an airport to inspect aircraft operators and foreign air carriers even if they are using an airport that is not otherwise required to operate under a TSA-approved security VerDate Aug<31>2005 17:34 May 25, 2006 Jkt 208001 program. It is critical that TSA have access to those aircraft operations to conduct its inspection functions under § 1542.5(e) to determine whether they are in compliance with applicable security requirements. Section 1542.5 Inspection Authority TSA added § 1542.5(e) to clarify that TSA may enter and be present at an airport that is not otherwise required to have a TSA-approved security program under part 1542 in order to inspect a TSA-regulated aircraft operator or foreign air carrier. Section 1542.101 General Requirements TSA deletes ‘‘under this part’’ from the sentence ‘‘No person may operate an airport subject to this part unless it adopts and carries out a security program’’ in § 1542.101(a), and adds ‘‘subject to § 1542.103’’ to further clarify that airports under § 1542.1(d) are not required to meet other requirements of this part. TSA revises § 1542.101(b) by deleting ‘‘The airport’’ and adding ‘‘Each airport subject to ‘‘§ 1542.103’’, and § 1542.101(c) by adding ‘‘subject to § 1542.103’’ after ‘‘Each airport operator’’ for the same reason. Section 1542.205 Security of the Security Identification Display Area (SIDA) TSA has clarified the applicability of this section in this final rule by modifying the language that was proposed in the NPRM for § 1542.205(a)(2) to now include the phrase ‘‘the air operations area’’ in the section, and has deleted the reference to areas used ‘‘to sort cargo,’’ and added new paragraphs (a)(3) and (a)(4). Airports are required to create new, or expand existing, SIDAs to encompass areas on airport grounds where cargo is regularly loaded on, or unloaded from, an aircraft operated under a full program or a full all-cargo program, or foreign air carriers under a security program as provided in § 1546.101(a), (b), or (e). Additionally, TSA clarified the scope of this requirement by adding that the SIDA must be extended on an airport to areas where an aircraft operator, foreign air carrier, or indirect air carrier accepts cargo. Acceptance in this context means taking physical control of the cargo from persons such as a shipper, aircraft operator, foreign air carrier, indirect air carrier, or their respective employees or agents. In particular, this includes inside buildings such as cargo facilities, loading and unloading vehicle docks, and other areas where an aircraft operator, foreign air carrier, or indirect PO 00000 Frm 00021 Fmt 4701 Sfmt 4700 30497 air carrier sorts, stores, stages, consolidates, processes, screens, or transfers cargo. TSA also revised § 1542.205(b)(2), which stated that an individual must undergo an employment history verification under § 1542.209 before gaining unescorted access to a SIDA. This section requires individuals to complete a fingerprint-based criminal history records check pursuant to § 1542.209, rather than an employment history verification, and is consistent with § 1542.209. Finally, TSA adds § 1542.205(c) to clarify that an airport operator that is not required to have a complete program under § 1542.103(a), is not required to establish a SIDA under § 1542.205. PART 1544—AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Section 1544.3 Inspection Authority This section currently refers to TSA inspection authority in secure areas, AOAs, and SIDAs. TSA amended this section under this final rule also to reflect authority to inspect other areas operated by an aircraft operator where it carries out security measures. These areas may include areas off of the airport, or operated by its agent in furtherance of the aircraft operator’s security responsibilities. The amended § 1544.3(c) clarifies that TSA may enter and be present where an aircraft operator carries out security measures without access media or identification media issued or approved by an airport operator or aircraft operator, in order to inspect or test compliance, or perform other such duties as TSA may direct. Section 1544.101 Adoption and Implementation Under this final rule, all-cargo aircraft operations conducted in aircraft with a maximum certificated take-off weight of more than 45,500 kg (100,309.3 lbs.) must meet security requirements for a full all-cargo program under § 1544.101(h) and (i). TSA refers to these security measures as the ‘‘full allcargo security program.’’ Operations under a full all-cargo security program are no longer authorized to operate under the current twelve-five program, as provided in § 1544.101(d)(1), or under a voluntary domestic security integration program (DSIP). TSA revised § 1544.101(e)(1), which lists the elements of the twelve-five program in all-cargo operations, to include: § 1544.202 (Persons and property onboard the all-cargo aircraft) and § 1544.205(a), (b), (d), and (f) (Acceptance and screening of cargo: E:\FR\FM\26MYR2.SGM 26MYR2 30498 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations Preventing or deterring the carriage of any explosive or incendiary, Screening and inspection of cargo, Refusal to transport, and Acceptance and screening of cargo outside the United States). This section also amends the requirements for aircraft under a twelvefive program from a maximum certificated takeoff weight ‘‘of 12,500 pounds or more’’ to ‘‘more than 12,500 pounds’’ as authorized under the Century of Aviation Reauthorization Act.19 Section 1544.202 Persons and Property Onboard the All-Cargo Aircraft Section 1544.202 requires aircraft operators to apply security measures to persons who board their aircraft for transportation, and to the property of those persons. The words ‘‘who are carried aboard the aircraft’’ are added in place of ‘‘board the aircraft’’ to provide clarification of the scope of covered persons. This technical correction is consistent with the language of FAA requirements regarding carriage of persons under 14 CFR 121.583. Section 1544.202 provides the means to prevent persons, who may pose a security threat from boarding, and to prevent or deter the carriage of unauthorized explosives, incendiaries, and other destructive substances or items. This section also provides for TSA to incorporate into security programs screening for unauthorized persons, or substances or items that could be used to pose a threat to transportation security. These requirements apply to both the twelvefive program in all-cargo operations and the new full all-cargo security program. cchase on PROD1PC60 with RULES2 Section 1544.205 Acceptance and Screening of Cargo TSA requires aircraft operators operating under a full, full all-cargo, or twelve-five program to prevent or deter the carriage of, and screen and inspect cargo for, any unauthorized persons, and any unauthorized explosives, incendiaries, and other destructive substances or items. This amendment is necessary to prevent and deter the introduction of stowaway hijackers, explosive devices, or other threats into air cargo. Section 1544.205(c) requires aircraft operators to prevent unauthorized access by persons other than an aircraft operator employee or agent, and adds that persons authorized by the airport operator or host government also may have access. For example, individuals 19 Vision 100—Century of Aviation Reauthorization Act, Sec. 606 (Pub. L. 108–176, 117 Stat. 2490, 2568, Dec. 12, 2003). VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 such as customs inspectors and airport law enforcement officers must have access to such areas. TSA revised paragraph (c)(1) by adding ‘‘any unauthorized person, and any unauthorized explosive, incendiary, or other destructive substance or item’’ in place of ‘‘unauthorized explosive or incendiary’’ to be consistent with the requirement throughout this rulemaking and the identified critical risks. TSA also strengthened the cargo acceptance requirements applicable to aircraft operators operating under a full program or a full all-cargo program. Pursuant to § 1544.205(e), an aircraft operator may accept cargo for air transportation only from entities that have comparable security programs. TSA will provide more information on comparable programs within the standard security programs. These requirements parallel those currently applied to operations conducted under a full passenger security program, in which the aircraft operator may only accept cargo from another aircraft operator or foreign air carrier with a comparable security program. TSA also requires each aircraft operator to carry out the requirements of its security program, for cargo to be loaded on its aircraft outside the United States under § 1544.205(f). TSA recognizes that not all the requirements of part 1544 can be carried out in other countries. Accordingly, we work with the host governments, under international agreements, to ensure that the security measures in place provide the appropriate level of security. Section 1544.217 Law Enforcement Personnel TSA is providing clarifying amendments to paragraphs (a) and (b), to add missing cross-references. Currently, operations under twelve-five programs and under private charter programs must comply with § 1544.217, regarding arranging for law enforcement support at airports where they operate. See § 1544.101(b), (c), (d), and (e). Requirements for law enforcement personnel are already a part of the security programs for the twelve-five and private charter programs. However, § 1544.217 does not currently refer to those operators. This clarification adds these cross references, as well as adding a cross reference to the new full allcargo program under § 1544.101(h) and (i). Section 1544.225 Security of Aircraft and Facilities New § 1544.225 is amended to add paragraph (d), which requires operators of aircraft operating under a full PO 00000 Frm 00022 Fmt 4701 Sfmt 4700 program or a full all-cargo security program to prevent unauthorized access to the operational area of the aircraft while loading or unloading cargo. This requirement applies to operations conducted both within and outside a SIDA. TSA recognizes that current paragraph (b) requires all aircraft operators operating under security programs to prevent unauthorized access to each aircraft. The revisions to this section broaden this requirement for aircraft operated under a full or a full all-cargo security program, clarifying that the aircraft operator must prevent unauthorized access to the operational area around the aircraft during cargo loading and unloading operations. Section 1544.228 Security Threat Assessments for Cargo Personnel in the United States In this final rule, TSA has provided revisions to each section about a regulated entity’s responsibilities for STAs. While these revisions comport with the scope of the NPRM, we have restructured the sections significantly, in order to be responsive to comments and provide greater clarity on the scope of personnel who are required to meet the STA requirements. The revisions clarify that the requirements apply to employees and agents of aircraft operators operating under a full program pursuant to § 1544.101(a) or a full allcargo program pursuant to § 1544.101(h), who are authorized to perform certain security duties without an escort. Likewise, these requirements apply to employees and agents of foreign air carriers under §§ 1546.101(a), (b), or (e), and IACs.20 Please refer back to the previous TSA responses regarding security threat assessments under section II. Comment Disposition, for more information on this topic. This section is also satisfied by completion of a CHRC for unescorted access to SIDA, or by another STA approved by TSA. For instance, if the employee or agent has an STA for the issuance of a hazardous materials endorsement on a commercial driver’s license, in accordance with § 1572.5, TSA would approve that as acceptable for compliance with § 1544.228. 20 The STA requirements also extend to an officer, director, and person who holds 25 percent or more of total outstanding voting stock of an IAC. However, TSA did not receive requests for clarification to this requirement. E:\FR\FM\26MYR2.SGM 26MYR2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations Section 1544.229 Fingerprint-Based Criminal History Records Checks (CHRC): Unescorted Access Authority, Authority To Perform Screening Functions, and Authority To Perform Checked Baggage or Cargo Functions In the case of passenger aircraft operated under a full program, TSA already requires cargo screeners and their immediate supervisors in the United States to meet the CHRC requirements under § 1544.229(a)(3)(i). This amendments requires that individuals and their immediate supervisors in the United States who screen cargo to be transported on an allcargo aircraft with a full all-cargo program under § 1544.101(h) submit to a CHRC under § 1544.229. As stated earlier, TSA already requires airport operators to send to TSA certain personal information for each individual who has undergone a CHRC for a current SIDA or sterile area ID in order to perform an additional background check that is comparable to an STA. TSA is providing instruction to aircraft operators with a full or full-allcargo security program to send to TSA the same type of information for cargo screeners who do not have current SIDA or sterile area IDs, and will also perform the additional check on this population. Most of these cargo screeners already have SIDA IDs and, thus, already are checked. cchase on PROD1PC60 with RULES2 Section 1544.239 Program Known Shipper Section 1544.239 codifies the known shipper program in the Federal regulations. The ‘‘known shipper’’ concept, which differentiates cargo being shipped by recognized entities from that originating with unknown parties, has been a fundamental element of air cargo security since 1976. The program has also been recognized as a global standard by the International Air Transport Association (IATA) and was recognized by the U.S. Congress as a form of screening in the ATSA.21 Passenger aircraft operators operating under a full program are required to have a known shipper program, including measures to ensure the shippers’ validity and integrity, to inspect or further screen cargo, and to provide shipper data to TSA. Aircraft operators must meet these requirements in accordance with the standards detailed in their security program. The known shipper program applies to passenger operations under full programs, and to those operations that elect to have a comparable security 21 49 U.S.C. 44901(a). VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 30499 program that allows interlining cargo to operations under a full program. this section’s requirements to encompass cargo operations. PART 1546—FOREIGN AIR CARRIER SECURITY Section 1546.202 Persons and Property Onboard the Aircraft This section parallels the requirements of those for aircraft operations in the United States. The words ‘‘are carried aboard the aircraft’’ are added in this final rule in place of ‘‘board the aircraft,’’ which was used in the NPRM, to provide clarification of the scope of covered persons. This technical correction is consistent with the language of FAA regulations at 14 CFR 121.583. The rationale for this addition is described in the Section-bySection Analysis for § 1544.202. Section 1546.3 Authority TSA Inspection TSA is adding paragraph (c) relating to TSA authority to enter and be present in certain areas in order to inspect or test compliance or perform other duties. This amendment is parallel to the provisions in § 1544.3(c). This amendment reflects TSA’s authority in the specified areas. Section 1546.101 Implementation Adoption and Cargo operations of foreign air carriers that land or takeoff in the United States are required to conform to essentially the same requirements as those applicable to comparable operations by U.S. aircraft operators. This section broadens the provisions of § 1546.101 to require each foreign air carrier, landing or taking off in the United States, to adopt and carry out an appropriate security program for each covered allcargo operation. This section establishes the requirements of an appropriate security program for a covered foreign air carrier conducting all-cargo operations in aircraft having a maximum certificated take-off weight greater than 45,500 kg (100,309.3 pounds) (analogous to a U.S. full allcargo security program under part 1544), and in aircraft having a maximum certificated take-off weight greater than 12,500 pounds but not more than 45,500 kg (100,309.3 pounds) (analogous to a U.S. twelve-five program in all-cargo operations under part 1544). The requirement that a foreign air carrier with operations in aircraft that have a maximum certificated take-off weight greater than 12,500 pounds but not more than 45,500 kg under § 1546.101(f) will supersede the current All-Cargo International Security Procedures requirements under § 1550.7. See 69 FR 3939, Jan. 27, 2004. Section 1546.103 Form, Content, and Availability of Security Program In this section, TSA makes an administrative change to paragraph (a), removing the word ‘‘passenger’’ and changing ‘‘U.S. air carriers’’ to ‘‘U.S. aircraft operators’’ to acknowledge that certain all-cargo operations by a foreign air carrier now must be under a security program. In paragraph (b), TSA adds references to paragraphs (e) and (f) to the introductory text. This change broadens PO 00000 Frm 00023 Fmt 4701 Sfmt 4700 Section 1546.205 Acceptance and Screening of Cargo This section clarifies aviation security regulations with respect to the duty of foreign air carriers for the security of air cargo loaded in, or destined for, the United States. TSA amends paragraph (a) and (b), and adds new paragraphs (c), (d), (e), and (f) to § 1546.205. These paragraphs are parallel to those for U.S. aircraft operators in § 1544.205. Paragraph (d), ‘‘Screening and inspection of cargo in the United States,’’ provides that each foreign air carrier must ensure that, as required in its security program, cargo is screened and inspected for any unauthorized persons, and any unauthorized explosives, incendiaries, and other destructive substances or items as provided in the foreign air carrier’s security program, in accordance with §§ 1546.207 and 1546.215, if applicable, before loading it on its aircraft in the United States. Paragraph (e), ‘‘Acceptance of cargo in the United States,’’ provides that each foreign air carrier may accept cargo in the United States only from the shipper, or from an aircraft operator, foreign air carrier, or IAC operating under a security program under this chapter, with a comparable cargo security program as provided in its security program. Paragraph (f) provides that, for cargo to be loaded on its aircraft outside the United States, each foreign air carrier must carry out the requirements of its security program. Section 1546.213 Security Threat Assessment for Cargo Personnel in the United States In response to comments, TSA has revised this section from the NPRM to provide greater clarity to the scope of personnel who are required to meet the STA requirements. The rationale for the changes in this section are the same as E:\FR\FM\26MYR2.SGM 26MYR2 30500 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations stated in the Section-by-Section Analysis for § 1544.228. Section 1546.215 Known Shipper Program TSA is codifying the Known Shipper program for foreign air carriers, parallel to the known shipper program applicable to domestic air carriers in § 1544.239. The rationale for adding this section is the same as stated in the Section-by-Section Analysis for § 1544.239. Section 1546.301 Bomb or Air Piracy Threats TSA has revised the opening paragraph of this section by deleting the text ‘‘in passenger operations’’ and the off-setting commas around this text. This amend provides that foreign air carriers in passenger and all-cargo operations are required to meet parallel security measures as aircraft operators in the same operations. PART 1548—INDIRECT AIR CARRIER SECURITY cchase on PROD1PC60 with RULES2 Section 1548.3 TSA Inspection Authority TSA added § 1548.3(c) to clarify that TSA may enter and be present where an IAC carries out security measures in order to inspect or test compliance, or perform other such duties as TSA may direct. Section 1548.5 Adoption and Implementation of the Security Program TSA has revised paragraphs (a), (b), and (c) of § 1548.5 regarding the adoption and implementation of the IACSSP. Paragraph (a) specifies that no IAC may offer cargo to an aircraft operator operating under a full program or a full all-cargo program specified in part 1544, or to a foreign air carrier conducting a passenger operation under § 1546.101(a) and (b), or an all-cargo program under § 1546.101(e), unless that IAC has and carries out an approved security program under part 1548. Where this part referred to ‘‘employees, agents, contractors, and subcontractors’’ in the NPRM, it now reads ‘‘employees and agents.’’ This change is not substantive, as contractors and subcontractors are agents with regard to security responsibilities. This change should provide a simplified understanding of persons with security responsibilities. Paragraph (b) broadens the scope of security measures that may be required in an individual IAC’s security program. Consistent with amendments made throughout this final rule, TSA is codifying existing requirements to VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 prevent and deter unauthorized persons from using cargo to access passenger aircrafts. IACs currently having cargo screening responsibilities under current § 1548.5(b)(1) and their approved security programs must ‘‘[p]rovide for the safety of persons and property traveling in air transportation against acts of criminal violence and air piracy and the introduction of any unauthorized explosive or incendiary into cargo aboard a passenger aircraft.’’ The IAC now must ‘‘provide for the security of persons and property traveling in air transportation against acts of criminal violence and air piracy and against the introduction of any unauthorized person, and any unauthorized explosive, incendiary, and other destructive substance or item as provided in the indirect air carrier’s security program.’’ This section also broadens the scope of IACs’ duties to include cargo to be carried on an aircraft operated under a full all-cargo security program, rather than solely in passenger operations. This change parallels the cargo security requirements in §§ 1544.205 and 1546.205. Under paragraph (b)(1)(i), this requirement applies from the time the IAC accepts the cargo, to the time it transfers the cargo to an entity that is not an employee or agent of the IAC. This provision clarifies the existing IACSSP requirement that the IAC is responsible for carrying out security measures under this part when its employee or agent fulfills its function. Paragraph (b)(1)(ii) makes clear that security program requirements apply while the cargo is stored, en route, or otherwise being handled by an employee or agent of the IAC. Paragraph (b)(1)(iii) makes clear that security program requirements apply regardless of whether or not the IAC ever has physical possession of the cargo. For example, TSA notes that some IACs conduct their services only through telephone conversations or communications over the computer and use agents to transport the cargo physically. In these circumstances, the person with physical possession on behalf of the IAC is the IAC’s agent. When the agent has possession, the IAC remains responsible for ensuring that its security program requirements are met. Paragraph (b) also requires the IAC to ensure that its employees and agents carry out the requirements of the IACSSP. Thus, TSA’s change to paragraph (c) ensures that the content of each IACSSP reflects the scope of security measures established under § 1548.5(b), references known shipper program requirements that are codified PO 00000 Frm 00024 Fmt 4701 Sfmt 4700 in § 1548.17, and establishes a new requirement that each IACSSP include documentation of the procedures and curriculum used to accomplish the training, under § 1548.11, of persons who accept, store, transport or deliver cargo on behalf of the IAC. Section 1548.7 Approval, Amendment, Annual Renewal, and Withdrawal of Approval of the Security Program Paragraph (a) reflects that TSA has developed the IACSSP, rather than having each IAC develop its own security program. Thus, consistent with current practices, rather than submitting a security program for TSA approval, an applicant requests approval to operate under the IACSSP. This paragraph explains how an applicant must seek approval to operate under the IACSSP, including a record-keeping requirement, and a list of information that the applicant must submit to TSA for consideration. Paragraph (a) also outlines the process for approving an applicant’s operation under a security program, that approvals are effective for one year, and that the approved IAC must notify TSA of changes to the initial application. TSA uses the information submitted by IAC applicants to verify their legitimacy through a check of publicly-available records, and cross checks that information against data on terrorist databases. Paragraph (b) presents the processes an IAC must follow annually to seek renewed TSA approval to operate under the IACSSP. Annual renewal is a continuation, and codification, of the current practice under the IACSSP. IACs must submit the renewal request to TSA at least 30 calendar days prior to expiration of the IACSSP, as well as other standards for the submission. Paragraphs (c), (d), and (e) primarily parallel changes made previously to similar requirements for airport operator security programs and aircraft operator security programs in §§ 1542.105 and 1544.105. This section adds a new paragraph (c)(6), allowing a group of IACs to submit a proposed amendment together. Paragraph (d) is the same as the current paragraph (c). Paragraph (d) is separated into three subparagraphs for easier reading. Paragraph (d)(1) substitutes ‘‘aviation security’’ for ‘‘safety in air transportation or in air commerce’’ to clarify the breadth of TSA’s EA authority. Paragraph (d)(2) reorganizes existing EA standards to emphasize immediate effectiveness and that TSA will provide a brief statement regarding the rationale for the EA. Finally, paragraph (d)(3) provides the IAC with 15 days to file a petition for reconsideration but provides that the E:\FR\FM\26MYR2.SGM 26MYR2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations filing of the petition does not stay the effective date of the amendment. Paragraph (e) revises the existing Emergency Amendments (EA) standards of the existing paragraph (d). TSA codifies procedures for TSA to withdraw an IAC’s approval to operate under the IACSSP with the addition of paragraph (f). The standard for withdrawal is a TSA determination that the operation is contrary to security and the public interest. Paragraph (f) provides procedures for notice, response, and petition for reconsideration. The affected IAC would be able to request a stay of the withdrawal. TSA also codifies emergency withdrawal procedures. This codification creates procedural guidelines to implement withdrawal of a security program and affords due process to the IAC. The emergency procedures allow the IAC to submit a petition for reconsideration, but the filing of a petition will not stay the effective date of withdrawal. Paragraph (g) adds provisions for the proper service of documents in the withdrawal proceedings. Procedures for time extensions are found at paragraph (h). cchase on PROD1PC60 with RULES2 Section 1548.9 Acceptance of Cargo Paragraph 1548.9(a) broadens the scope of the IAC’s duty to prevent or deter the carriage of any unauthorized persons and any unauthorized destructive substances or items on board an aircraft to the existing requirements that focus on preventing and deterring explosives and incendiaries. This provision requires IACs to carry out these procedures whenever offering cargo for air transportation on all-cargo aircraft under a full all-cargo program, as well as on passenger aircraft under a full program. This paragraph adds a requirement that the IAC request the shipper’s consent to search or inspect the cargo. Under the former paragraph 1548.9(b), this duty extended only to cargo that was intended for shipment aboard a passenger aircraft. By removing the word ‘‘passenger,’’ this paragraph extends to cargo for shipment aboard certain all-cargo aircraft operations regulated by TSA. Paragraph 1548.9(b) deletes the requirement that the IAC must search or inspect cargo. Such inspections are to be done by the aircraft operator or foreign air carrier only. Section 1548.11 Training and Knowledge for Individuals with Security-Related Duties Certain employees and agents of IACs are subject to security-related training. These enhanced requirements for VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 training cover individuals who perform security-related duties to ensure the appropriate security standards are met. Paragraph 1548.11(a) specifies that an IAC must not use any individual to perform any security-related duties to meet the requirements of its security program unless the individual has received training as specified in its security program. This requirement covers employees and agents performing security-related duties for the IAC. Under § 1548.11(b), additional training requirements are specified for individuals who accept, handle, transport, or deliver cargo for or on behalf of the IAC. This training must include, at a minimum, requirements contained in the applicable provisions of part 1548, applicable Security Directives and Information Circulars, the approved airport security program applicable to their location, and the aircraft operator’s or IAC’s security program to the extent that such individuals need to know in order to perform their duties. Paragraph 1548.11(c) requires annual recurrent training of covered individuals in these elements of knowledge. Pursuant to § 1548.7(a), initial training of the identified individuals performing duties for the IAC must be completed before an IAC may begin operations under its approved security program. TSA is providing a training curriculum to the IAC in this regard. Section 1548.13 Security Coordinators TSA requires each IAC to designate and use an Indirect Air Carrier Security Coordinator (IACSC). The IAC is required to appoint the IACSC at the corporate level, and the IACSC is the IAC’s primary contact for securityrelated activities and communications with TSA, as set forth in the IACSSP. Either the IACSC or an alternate IACSC must be available on a 24-hour basis. This addition parallels existing security coordinator positions required of airport operators in § 1542.3 and aircraft operators in § 1544.215. Section 1548.15 Security Threat Assessments for Individuals Having Unescorted Access to Cargo TSA has provided revisions to this section consistent with the scope of the NPRM. This section is significantly restructured in order to be responsive to comments and provide greater clarity to the scope of personnel who are required to meet the STA requirements. The rationale for the changes in this section are the same as stated in the Section-bySection Analysis for § 1544.228. PO 00000 Frm 00025 Fmt 4701 Sfmt 4700 30501 Section 1548.16 Security Threat Assessments for Each Proprietor, General Partner, Officer, Director, and Specified Owner of the Entity TSA has added this section to provide reference within part 1548 to the STA requirement at § 1540.209(a). TSA has provided further clarification to the scope of persons covered under this section such as to cover partnerships and proprietors. In large part, TSA has adopted the meaning of ‘‘owner,’’ ‘‘same family,’’ and ‘‘voting securities and other voting interests’’ as are found at 31 CFR 103.175, for regulation of foreign banks. Section 1548.17 Program Known Shipper Section 1548.17 codifies the Known Shipper program in regulation. This addition is essentially the same as that for aircraft operators under proposed § 1544.239. Section 1548.19 Security Directives and Information Circulars This section provides a procedure for TSA to issue emergency security measures to IACs through Security Directives (SD). This section authorizes TSA to issue Security Directives and Information Circulars to regulated IACs, and mandates compliance by the IAC with each Security Directive that it receives. Section 1548.19 also requires the IAC to acknowledge in writing receipt of the SD within the time prescribed in the SD, and to specify the method by which the measures in the SD have been implemented (or will be implemented, if the SD is not yet effective) within the time prescribed in the SD. In the event that the IAC is unable to implement the measures in a SD, § 1548.19 authorizes the IAC to submit proposed alternative measures and the basis for the alternative measures to TSA for approval. The IAC must submit the proposed alternative measures within the time prescribed in the SD and, if they are approved by TSA, the IAC must implement them. Section 1548.19 also provides that each IAC that receives a SD may comment on the SD by submitting data, views, or arguments in writing to TSA, and that TSA may amend the SD based on comments received. Section 1548.19 also provides that submission of a comment does not delay the effective date of the SD. Section 1548.19 also provides that each IAC that receives a Security Directive or Information Circular and each person who receives information from a Security Directive or Information Circular must restrict the availability of E:\FR\FM\26MYR2.SGM 26MYR2 30502 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations the Security Directive or Information Circular, and information contained in either document, to those persons with a need-to-know. The IAC must refuse to release the Security Directive or Information Circular, and information contained in either document, to persons other than those with a need-toknow without the prior written consent of TSA. cchase on PROD1PC60 with RULES2 IV. Fee Authority for Security Threat Assessment On October 1, 2003, legislation was enacted requiring TSA to collect reasonable fees to cover the costs of providing credentialing and background investigations in the transportation field.22 Fees collected under this legislation (Section 520) may be used to pay for the costs of conducting or obtaining a criminal history records check (CHRC); reviewing available law enforcement databases, commercial databases, and records of other governmental and international agencies; reviewing and adjudicating requests for waivers and appeals of TSA decisions; and any other costs related to performing a background records check or providing a credential. Section 520 mandates that any fee collected shall be available for expenditure only to pay for the costs incurred in providing services in connection with performing a background check or providing a credential. The fee shall remain available until expended. TSA is establishing this fee in accordance with the criteria set forth in 31 U.S.C. 9701 (General User Fee Statute), which requires fees to be fair and based on (1) costs to the government, (2) the value of the service or thing to the recipient, (3) public policy or interest served, and (4) other relevant facts. Summary of Security Threat Assessment Requirement TSA currently requires a variety of individuals working in aviation to submit to criminal history records checks to reduce the likelihood that a terrorist would gain employment that would give them access to the aircraft. Generally, these individuals work on airport grounds and have unescorted access to secure areas. In the cargo environment, many other persons have access to cargo before someone who has had such a check handles it. TSA recognizes that the number of individuals with unescorted access to cargo is very large and that extending 22 Department of Homeland Security Appropriations Act, 2004, Sec. 520 (Pub. L. 108–90, Oct. 1, 2003, 117 Stat. 1137). VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 fingerprint-based records checks to all of these people would likely be a very time-consuming and costly process that would cause a major disruption to the domestic and international transportation of goods. TSA focused the STA program on a review of terrorist databases to determine whether individuals seeking unescorted access to cargo present a terrorist threat. Flexibility will be achieved by ensuring that each of the following individuals are required to have either an STA or a background check for unescorted SIDA access authority. The covered individuals include: (1) Each proprietor, general partner, officer, director, and owner identified under § 1548.16 of an IAC, or applicant to be an IAC. (2) Each employee and agent authorized to have unescorted access to cargo where: • Aircraft operators with a full program and foreign air carriers under § 1546.101(a) or (b) accept cargo; • Aircraft operators with a full allcargo program and foreign air carriers under § 1546.101(e) consolidate or inspect cargo; • IACs accept cargo for transportation on aircraft operated by an aircraft operator with a full program or a foreign air carrier under § 1546.101(a) or (b); or • IACs consolidate or hold cargo for transportation aboard an aircraft operated by an aircraft operator with a full or full all-cargo program, or a foreign air carrier under § 1546.101(a), (b), or (e). Security Threat Assessment Population The above-referenced personnel who are authorized to have unescorted access to cargo on behalf of an IAC, an aircraft operator, or a foreign air carrier would be required to undergo a namebased STA. TSA approximates a ‘‘de minimis’’ number of persons who own 25 percent or more of these IACs that are not also officers or directors of the entity. Accordingly, TSA has not accounted for these individuals separately. However, those personnel with unescorted SIDA access already have undergone a criminal history records check. TSA would accept the criminal history records check in lieu of the proposed STA for these personnel. The Indirect Air Carrier Population TSA estimates that there are approximately 5,000 companies that are defined as IACs under this rule. TSA further estimates that there are, on average, approximately 13 employees per IAC, of whom an average of 10 would typically require regular unescorted access to air cargo and thus PO 00000 Frm 00026 Fmt 4701 Sfmt 4700 would need an STA under this rule. Therefore, the total IAC population requiring an STA is estimated to be 50,000 (5,000 x 10). Further discussion of TSA’s IAC population estimates can be found in the full Regulatory Evaluation. Cargo Personnel Not Subject to Other TSA Security Threat Assessments TSA estimates that there are approximately 65 aircraft operators and foreign air carriers operating all-cargo flights that have employees who are subject to the proposed STA. As discussed in the Regulatory Evaluation aircraft operators and foreign air carriers have some employees who are required to submit to the fingerprint-based SIDA check, while others will only be required to submit to an STA. Because most of the aircraft operator employees are already covered by the SIDA background check requirements, TSA believes that only a limited number of employees would be required to submit to an STA. TSA estimates that there are, on average, approximately 25 employees for each aircraft operator and foreign air carrier operating all-cargo flights who would be required to submit to an STA. Therefore this total population is estimated to be 1,625 (65 x 25). Further discussion of TSA’s estimates for affected all-cargo employees can be found in the full Regulatory Evaluation. Total Initial Population Given the estimated IAC population of 50,000 and 1,625 additional employees of relevant aircraft operators and foreign air carriers operating allcargo flights, the total population subject to an STA is 51,625. This is the initial population TSA estimates will be required to submit to an STA during the first year of the program. Recurring Population TSA estimates approximately 15 percent of the initial total population will be required to submit to an STA each year after the initial assessment. Further discussion of TSA’s recurring population estimate can be found in the full Regulatory Evaluation. This percentage represents annual new employers or employees with a new requirement for the STA. Therefore, the recurring population that would be required to submit to an STA annually is estimated to be 7,744 (15 percent x 51,625). Five Year Population Given the first year estimated population of 51,625 and subsequent annual recurring population of 7,744, TSA estimates the total population E:\FR\FM\26MYR2.SGM 26MYR2 30503 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations receiving an STA over the first 5 years to be 82,601 (51,625 + (4 x 7,744)). TSA employs a five-year population period for calculating the STA fee to distribute the costs of delivering these services to the entire population more equitably, as required under this rule. Program Costs This section summarizes TSA’s estimated costs for establishing the program, processes, and resources necessary to establish and perform the STA on the population as required under this rule. Leveraging Existing Resources Where possible, TSA will leverage processes, infrastructure and personnel that are currently utilized for other federal government air cargo regulatory initiatives and threat assessment services. These efforts will minimize the need for new government expenditures and keep fee levels to a minimum. For example, TSA is expanding its existing IAC database management system, currently used to manage regulatory relationships with IACs that ship cargo on passenger aircraft, to be able to collect and process the required applicant information from air cargo employees and agents that require an STA. Moreover, TSA is leveraging other existing applicant vetting processes and infrastructure, which TSA threat assessment programs benefit from collectively, so as not to create overlapping resource requirements. Start-Up Costs The startup costs are not incorporated in fee calculations. TSA has made this determination because these expenses are largely the result of extending information systems already built for other regulatory activities within the air cargo/IAC industry. As such, TSA is not including these startup costs in the fee. Five-Year Recurring Costs The entire population covered under this rule must submit to an STA within 180 days of rule publication, and thereafter only a small fraction (15 percent) of applications are expected annually. TSA must ensure that the fixed costs of the program are not borne solely by the smaller pool of new applicants in Year 1. Therefore, TSA averages the estimated total five-year recurring program costs and divides this value by the estimated five-year STA population to generate its per applicant fee. TSA estimates the five-year recurring costs to be $2,322,702. These costs include $1,837,500 for all required program personnel, $320,000 for all information management and hardware/ software costs, and $165,202 for all vetting process costs. See Figure 1 below for additional details. FIGURE 1.—TSA SECURITY THREAT ASSESSMENT PROGRAM COSTS ESTIMATES Category and sub-category Description Hardware/Software: IAC MS Database System Modifications ...... Screening Gateway Interface Development .. System Security Hosting. Testing, Set-up and Hardware/Software Total ........................ Support Functions: Additional Program Personnel ....................... Finance/Accounting Personnel ...................... cchase on PROD1PC60 with RULES2 Support Functions Total ......................... Security Threat Assessment: Threat Assessment Analysis ......................... VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 Year 1 Years 2–5 Five-year recurring costs Modification of existing IAC/air cargo database to accommodate new Security Threat Assessment (STA) information management requirements. Annual recurring system expense estimated to be 10 percent of start-up modification costs. Modification of existing interface to conform to program needs. Annual recurring system expense estimated to be 10 percent of start-up modification costs. Costs related to system set-up required for application hosting. $0 $70,000 $280,000 0 10,000 40,000 0 0 0 ............................................................................... 0 80,000 320,000 Two additional federal employee full-time equivalents (FTEs) will be required to perform functions associated with the STA. Total cost to TSA is estimated at $105,000 per FTE (fully loaded, including administrative overhead costs). One half of an FTE (.5) will be required to perform accounting and reconciliation functions and provide financial reports to program personnel. Total cost to TSA is estimated at $105,000 per FTE (fully loaded, including administrative overhead costs). 210,000 210,000 1,050,000 52,500 52,500 262,500 ............................................................................... 262,500 262,500 1,312,500 A security threat analysis is the process of querying applicant names against various terrorism-related government sources. This cost is derived by multiplying the total estimated program population by the TSA’s estimated cost of $2 per applicant. Assumes 15 percent annual employee turnover. 103,250 15,488 165,202 PO 00000 Frm 00027 Fmt 4701 Sfmt 4700 E:\FR\FM\26MYR2.SGM 26MYR2 30504 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations FIGURE 1.—TSA SECURITY THREAT ASSESSMENT PROGRAM COSTS ESTIMATES—Continued Category and sub-category Description Year 1 Years 2–5 Five-year recurring costs Threat Assessment Process Personnel ........ One additional FTE at $105,000 annually will be necessary to provide support for background check component. Will also perform support functions. Total cost to TSA is estimated at$105,000 per FTE. 105,000 105,000 525,000 Security Threat Assessment Total ......... ............................................................................... 208,250 120,488 690,202 Total Costs ............................................. ............................................................................... 470,750 462,988 2,322,702 Cost Adjustments Pursuant to the Chief Financial Officers Act of 1990, DHS/TSA will review this fee at least every two years.23 Upon review, if it is found that the fee is either too high (i.e., total fees exceed the total cost to provide the services) or too low (i.e., total fees do not cover the total costs to provide the services), TSA may propose changes to the fees. In addition, as DHS and TSA identify and implement additional efficiencies across numerous threat assessment and credentialing programs, resulting cost savings will be incorporated into the fee levels accordingly. Fee Calculation TSA is charging a fee to cover the recurring costs of the program. TSA estimates that total recurring program costs for the first 5 years (not including start-up costs) will be approximately $2,322,702 (($470,750 + (462,988 × 4)). These total costs, divided by the estimated five-year total of 82,601 applicants, yields a per applicant fee of $28 ($2,322,702/82,601), rounded down from $28.12. Fee Remittance Process TSA will employ a third party to establish the infrastructure for collecting the required financial data and fees for forwarding to TSA. This process will function in a similar manner to that of other TSA threat assessment programs and may include the services of Pay.gov, https://www.pay.gov/paygov/, the government-wide solution for Internetbased online payment services. V. Rulemaking Analyses and Notices cchase on PROD1PC60 with RULES2 V.A. Regulatory Evaluation Summary Changes to Federal regulations must undergo several economic analyses. First, Executive Order 12866 directs each Federal agency to propose or adopt a regulation only if the agency makes a 23 31 U.S.C. 902. VerDate Aug<31>2005 17:34 May 25, 2006 Jkt 208001 reasoned determination that the benefits of the intended regulation justify its costs. Second, the Regulatory Flexibility Act of 1980 requires agencies to analyze the economic impact of regulatory changes on small entities. Third, the Trade Agreements Act (19 U.S.C. 2531– 2533) prohibits agencies from setting standards that create unnecessary obstacles to the foreign commerce of the United States. In developing U.S. standards, this Trade Act requires agencies to consider international standards and where appropriate, as the basis of U.S. standards. Fourth, the Unfunded Mandates Reform Act of 1995 (Pub. L. 104–4) requires agencies to prepare a written assessment of the costs, benefits and other effects of proposed or final rules that include a Federal mandate likely to result in the expenditure by State, local or tribal governments, in the aggregate, or by the private sector, of $100 million or more annually (adjusted for inflation). In conducting these analyses, TSA has determined this rule— (1) Is a ‘‘significant regulatory action’’ as defined in Executive Order 12866; (2) Will not have a significant impact on a substantial number of small entities; (3) Imposes no significant barriers to international trade; and (4) Does not impose an unfunded mandate on State, local, or tribal governments, but does on the private sector. Because TSA has determined that this rule is a significant regulatory action under Executive Order 12866, this rule has been reviewed and approved by the Office of Management and Budget (OMB). Economic Impacts This summary highlights the costs and benefits of the final rule to amend the transportation security regulations to further enhance and improve the security of air cargo transportation. TSA has determined that this is a major rule within the definition of Executive Order PO 00000 Frm 00028 Fmt 4701 Sfmt 4700 12866, as annual costs or benefits to all parties do pass the $100 million threshold in any year. There are no significant economic impacts for each of the required analyses of small business impact, international trade, or unfunded mandates. Details of the proposed rule and the associated analysis were provided to the public for comment. This final regulatory analysis covers changes to the previous analysis in response both to public comments and changes TSA has made with the final rule. The complete analysis and the associated references are not repeated here. The required OMB Circular A–4 accounting statement is presented in the full regulatory evaluation, which is available in the docket as ‘‘Final Regulatory Evaluation, Regulatory Flexibility Determination, Trade Impact Assessment, and Unfunded Mandate Assessment.’’ Costs The following sections summarize the estimated costs of this rulemaking by general category of who pays. A detailed summary table in the full regulatory evaluation provides an overview of the cost items, section of the regulation that creates the requirement, and a description of cost elements. Both in this summary and the economic evaluation, descriptive language is used to try and relate the consequences of the regulation. Although the regulatory evaluation attempts to mirror the terms and wording of the regulation, no attempt is made to precisely replicate the regulatory language and readers are cautioned that the actual regulatory text, not the text of the evaluation, is binding. Throughout the evaluation rounding in displayed values may result in minor differences in displayed totals. Aircraft Operators will incur additional costs to comply with requirements of this rulemaking over E:\FR\FM\26MYR2.SGM 26MYR2 cchase on PROD1PC60 with RULES2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations the 10-year period of 2005–2014. Cargo aircraft operators are estimated to incur costs totaling approximately $1.9 billion to comply with the requirements to require background checks for individuals who screen cargo for allcargo aircraft, their supervisors, as well as for employees with unescorted access to the cargo. The rulemaking requires all-cargo aircraft operators to screen all persons entering the aircraft. This requirement is estimated to impose costs of approximately $35.2 million over the ten-year period of this analysis. They also are required to take additional measures to secure the aircraft and facilities at an estimated cost of $0.8 million. All-cargo aircraft operators with a maximum certificated take-off weight greater than 45,500 kg (100,309.3 lbs) need to ensure they have coordinated law enforcement notification and response capability to comply with the requirements to extend or create new secure areas to encompass air cargo operations. This requirement is not an expansion of law enforcement staffing. As a result, costs previously attributed to the LEO function have been removed. Finally, the codifying of existing Security Directive requirements and costs for random screening of air cargo on passenger aircraft and all-cargo flights are estimated to cost of $1.491 billion, and $328 million, respectively. Much of this increase is related to increased screening levels as mandated by Congress. Airport Operators that have one or more SIDAs are required to extend or create a new SIDA to encompass air cargo operations. This change applies only to aircraft operations conducted with aircraft having a maximum certificated take-off weight greater than 45,500 kg (100,309.3 lbs) operating a full program or a full all-cargo security program. TSA estimates the cost of this requirement to be $10.9 million over the ten-year period of this analysis. This cost reflects the cost of additional employee badges, additional airports, and the administrative costs of updating the airports’ security plans. Indirect Air Carriers are impacted in several ways by this rulemaking. They are now required to complete security threat assessments for certain individuals. This requirement is estimated to impose costs totaling $4.6 million over ten years. IACs are also required to implement training and develop a testing tool for individuals who perform security related duties to meet the requirements of their security programs. These costs are estimated at $35.2 million over the ten-year period 2005–2014. They include the cost of initial training for the entire IAC labor VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 force and annual recurrent training for the IAC labor force. This rulemaking establishes new requirements for IACs to obtain approval, to amend, and for annual recertification of their security programs. The costs estimated to comply with these requirements are $43.9 million over the period of this analysis. Foreign Air Carriers costs inside the United States are considered domestic costs for the purpose of this analysis and, therefore, are not estimated separately from domestic carrier costs; a separate discussion for these costs is not included. This costing method reflects the way the Department of Transportation reports data on foreign aircraft operations in the U.S. and the way it reports the cost impact of such aircraft operations on the U.S. economy. Security requirements of this rulemaking apply equally to foreign air carriers just as they apply to domestic carriers. For their overseas operations, individual foreign carriers are expected to experience financial impacts at levels similar to those experienced by domestic carriers and are not estimated here. TSA will incur costs as a result of the rule. Development of training for IAC employees will cost the agency approximately $450K. TSA also will incur costs of approximately $24.5 million to administer the Known Shipper program. The cost to TSA for the vetting of IACs is estimated at $2.6 million. TSA will also be modifying its current IAC compliance management system to accommodate the Security Threat Assessments in this rule. The costs of utilizing this system and some STA support costs are captured in the unit costs used to develop the fee costs for the aircraft operators and indirect air carriers. In summary, the cost impacts of this rulemaking are estimated to total approximately $2.0 billion undiscounted (discounted: $1.5 billion at 7 percent, $1.8 billion at 3 percent), over the period 2005–2014. Aircraft operators will incur costs totaling $1.9 billion, airport operators $10.9 million, IACs $83.6 million and TSA anticipates cost expenditures to administer the provisions of the rulemaking at $27.6 million over the ten year analysis period. Details on how estimates were developed, as well as the discounted value comparisons, were presented in the original evaluation. A separate Final Regulatory Evaluation is available on the docket and details the changes from the Initial Regulatory Evaluation. The full evaluation also includes detailed tables showing constant dollars; discounted costs at 7 percent and 3 PO 00000 Frm 00029 Fmt 4701 Sfmt 4700 30505 percent; and a table of changes from the NPRM. Final Regulatory Flexibility Analysis (FRFA) The Regulatory Flexibility Act of 1980 (RFA) establishes ‘‘as a principle of regulatory issuance that agencies shall endeavor, consistent with the objective of the rule and of applicable statutes, to fit regulatory and informational requirements to the scale of the business, organizations, and governmental jurisdictions subject to regulation.’’ To achieve that principle, the RFA requires agencies to solicit and consider flexible regulatory proposals and to explain the rationale for their actions. The RFA covers a wide range of small entities, including small businesses, not-for-profit organizations, and small governmental jurisdictions. Agencies must perform a review to determine whether a proposed or final rule will have a significant economic impact on a substantial number of small entities. If the determination is that it will, the agency must prepare a regulatory flexibility analysis as described in the Act. However, if an agency determines that a proposed or final rule is not expected to have a significant economic impact on a substantial number of small entities, section 605(b) of the 1980 RFA provides that the head of the agency may so certify and a regulatory flexibility analysis is not required. The certification must include a statement providing the factual basis for this determination, and the reasoning should be clear. TSA conducted the required initial review of this rule and indicated that TSA believed it would not have a significant economic impact on a substantial number of small entities. There are two primary sources of change related to the RFA analysis. Although IAC costs in total went up, the population of both workers and businesses both went up. The cost impact per employee and business unit were calculated and summed to get a total business cost per business. TSA examined the smallest businesses’ revenue and compared the cost as a percent of the revenue. This calculation in the Initial Regulatory Flexibility Analysis rounded to 0.0 percent. When recomputed in the Final Regulatory Flexibility Analysis (FRFA) the same computation still rounds to 0.0 percent. Therefore, TSA finds that there is not a significant impact on a substantial number of small businesses. More detail on the FRFA can be found in the separate Final Regulatory Evaluation, available on the docket. E:\FR\FM\26MYR2.SGM 26MYR2 30506 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations cchase on PROD1PC60 with RULES2 V.B. Paperwork Reduction Act TSA did not receive comments that provided substantive information for consideration regarding the Paperwork Reduction Act. Under the Paperwork Reduction Act of 1995 (PRA) (44 U.S.C. 3501, et seq.), a Federal agency must obtain approval from OMB for each collection of information it conducts, sponsors, or requires through regulations. This proposal contains information collection activities subject to the PRA. Accordingly, the following information requirements are being submitted to OMB for its review. Title: Air Cargo Security Requirements. Summary: TSA is amending the transportation security regulations to further enhance and improve the security of air cargo transportation. Specifically, TSA is creating a mandatory security program for allcargo aircraft operations over 45,500 kg (100,309.3 lbs.) and is amending existing security regulations and programs for aircraft operators, foreign air carriers, airport operators, and IACs. TSA is expanding STA requirements to new populations, including certain individuals who have unescorted access to air cargo, each proprietor, general partner, officer, and director, and certain owners of an IAC or applicant to be an IAC. Use of: Security programs that are developed or amended as a result of this final rule will be kept on file and updated so that TSA inspectors may check for regulatory compliance and uniform application of the rules. Evidence of appropriate employee training in security matters will also become a part of this record. STAs conducted as a result of this final rule will be used to determine employment suitability for those who have unescorted access to cargo and each proprietor, general partner, officer, and director, and certain owners of an IAC or applicant to be an IAC. Similarly, employees and agents of aircraft operators must successfully complete a CHRC prior to screening cargo. Respondents (including number of): The respondents to this information requirement are aircraft operators, foreign air carriers, IACs, and their employees who undergo STAs for a total of approximately 51,625 respondents the first year and approximately 7,744 respondents each following year, for an average of 22,371 respondents for each of the three years. Respondents also include carriers and their employees who undergo CHRCs, for a total of approximately 50,000 respondents the first year and approximately 7,651 each VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 following year, for an average of 21,742 respondents for each of the three years. The combined average number of respondents for STAs and CHRCs is approximately 49,395 for each of the three years. The annual number of respondents includes both new entrants and renewals. The number consists of 65 all-cargo operators, 5,000 IACs, and their affected employees. TSA made these estimates after reviewing public comments. Frequency: Upon implementation, security programs related to this final rule, including employee training records, will need to be kept on file and updated as necessary. STAs will be conducted for all existing and subsequent new employees who have unescorted access to cargo where such employees do not already have unescorted SIDA access. CHRCs will be conducted on individuals who are employees of aircraft operators and who have the responsibility to screen cargo. Annual Burden Estimate: The annual burden associated with the security program is estimated to be 43,143 hours. The annual burden associated with the STA is estimated to average 5,593 hours over the three years, while the annual burden associated with the CHRCs is estimated to average 10,871 hours over the three years for a combined average annual total of 59,607 hours. The agency invited comments to— (1) Evaluate whether the proposed information requirement is necessary for the proper performance of the functions of the agency, including whether the information will have practical utility; (2) Evaluate the accuracy of the agency’s estimate of the burden; (3) Enhance the quality, utility, and clarity of the information to be collected; and (4) Minimize the burden of the collection of information on those who are to respond, including through the use of appropriate automated, electronic, mechanical, or other technological collection techniques or other forms of information technology. As protection provided by the Paperwork Reduction Act, as amended, an agency may not conduct or sponsor, and a person is not required to respond to, a collection of information unless it displays a currently valid OMB control number. The OMB control number for this information collection will be published in the Federal Register after OMB approves it. V.C. International Compatibility In keeping with United States obligations under the Convention on International Civil Aviation, it is TSA policy to comply with International PO 00000 Frm 00030 Fmt 4701 Sfmt 4700 Civil Aviation Organization (ICAO) Standards and Recommended Practices to the maximum extent practicable. TSA has determined that these regulations are consistent with ICAO Standards and Recommended Practices. V.D. International Trade Impact Assessment The Trade Agreement Act of 1979 prohibits Federal agencies from establishing any standards or engaging in related activities that create unnecessary obstacles to the foreign commerce of the United States. Legitimate domestic objectives, such as safety, are not considered unnecessary obstacles. The statute also requires consideration of international standards and, where appropriate, that they be the basis for U.S. standards. TSA has assessed the potential effect of this final rule and has determined that carrier operations at overseas locations must provide an equivalent level of security. At most the impact of this rule creates an even competitive cost structure. V.E. Unfunded Mandates Reform Act Analysis The Unfunded Mandates Reform Act of 1995 (the Act) is intended, among other things, to curb the practice of imposing unfunded Federal mandates on State, local, and tribal governments. Title II of the Act requires each Federal agency to prepare a written statement assessing the effects of any Federal mandate in a proposed or final agency rule that may result in an expenditure of $100 million or more (adjusted annually for inflation) in any one year by State, local, and tribal governments, in the aggregate, or by the private sector, such a mandate is deemed to be a ‘‘significant regulatory action.’’ This final rule does not contain such a mandate on State, local, and tribal governments. The overall impact on the economy does exceed the threshold in the aggregate. The full regulatory evaluation documents costs, public comments, alternatives, and TSA accommodation of the public comments. V.F. Executive Order 13132, Federalism TSA has analyzed this final rule under the principles and criteria of Executive Order 13132, Federalism. We determined that this action would not have a substantial direct effect on the States, on the relationship between the national Government and the States, or on the distribution of power and responsibilities among the various levels of government, and therefore would not have federalism implications. E:\FR\FM\26MYR2.SGM 26MYR2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations V.G. Environmental Analysis TSA has reviewed this action for purposes of the National Environmental Policy Act of 1969 (NEPA) (42 U.S.C. 4321–4347) and has determined that this action will not have a significant effect on the human environment. In accordance with FAA Order 1050.1D, appendix 4, paragraph 4(j), this rulemaking action qualifies for a categorical exclusion. The FAA order continues to apply to TSA in accordance with the Homeland Security Act (Pub. L. 107–296), until DHS publishes its NEPA implementing regulations. V.H. Energy Impact The energy impact of this document has been assessed in accordance with the Energy Policy and Conservation Act (EPCA), Pub. L. 94–163, as amended (42 U.S.C. 6362). We have determined that this rulemaking is not a major regulatory action under the provisions of the EPCA. VI. List of Subjects 49 CFR Part 1520 Air transportation, Law enforcement officers, Reporting and recordkeeping requirements, Security measures. 49 CFR Part 1540 Air carriers, Aircraft, Airports, Civil aviation security, Law enforcement officers, Reporting and recordkeeping requirements, Security measures. 49 CFR Part 1544 Air carriers, Aircraft, Aviation safety, Freight forwarders, Incorporation by reference, Reporting and recordkeeping requirements, Security measures. 49 CFR Part 1546 Aircraft, Aviation safety, Foreign air carriers, Incorporation by reference, Reporting and recordkeeping requirements, Security measures. VII. The Amendment cchase on PROD1PC60 with RULES2 § 1520.5 Sensitive security information. * * * * * (b) * * * (2) * * * (i) Issued by TSA under 49 CFR 1542.303, 1544.305, 1548.19, or other authority; * * * * * (3) * * * (i) Information circular issued by TSA under 49 CFR 1542.303, 1544.305, 1548.19, or other authority; and * * * * * (4) * * * (i) Any device used by the Federal Government or any other person pursuant to any aviation or maritime transportation security requirements of Federal law for the detection of any person, and any weapon, explosive, incendiary, or destructive device, item, or substance; and * * * * * 3. The authority citation for part 1540 continues to read as follows: I Authority: 49 U.S.C. 114, 5103, 40113, 44901–44907, 44913–44914, 44916–44918, 44935–44936, 44942, 46105. 4. Amend § 1540.5 by revising the definition of ‘‘indirect air carrier’’ and adding a new definition of ‘‘unescorted access to cargo’’ in alphabetical order to read as follows: I Terms used in this subchapter. * Air transportation, Reporting and recordkeeping requirements, Security measures. For the reasons set forth above, the Transportation Security Administration amends title 49 of the Code of Federal Regulations parts 1520, 1540, 1542, 1544, 1546, and 1548 to read as follows: Jkt 208001 2. Amend § 1520.5 by revising paragraphs (b)(2)(i), (b)(3)(i), and (b)(4)(i) to read as follows: I § 1540.5 49 CFR Part 1548 16:30 May 25, 2006 Authority: 49 U.S.C. 114, 5103, 40119, 44901–44907, 44913–44914, 44916–44918, 44935–44936, 44942, 46105. PART 1540—CIVIL AVIATION SECURITY: GENERAL RULES Air carriers, Aircraft, Airport security, Aviation safety, Security measures. VerDate Aug<31>2005 1. The authority citation for part 1520 continues to read as follows: I SUBCHAPTER C—CIVIL AVIATION SECURITY 49 CFR Part 1542 I PART 1520—PROTECTION OF SENSITIVE SECURITY INFORMATION * * * * Indirect air carrier (IAC) means any person or entity within the United States not in possession of an FAA air carrier operating certificate, that undertakes to engage indirectly in air transportation of property, and uses for all or any part of such transportation the services of an air carrier. This does not include the United States Postal Service (USPS) or its representative while acting on the behalf of the USPS. * * * * * Unescorted access to cargo means the authority granted by an aircraft operator PO 00000 Frm 00031 Fmt 4701 Sfmt 4700 30507 or IAC to individuals to have access to air cargo without an escort. I 5. Amend § 1540.111 by revising paragraph (a)(1) to read as follows: § 1540.111 Carriage of weapons, explosives, and incendiaries by individuals. (a) * * * (1) When performance has begun of the inspection of the individual’s person or accessible property before entering a sterile area, or before boarding an aircraft for which screening is conducted under this subchapter; * * * * * I 6. Add new Subpart C—Security Threat Assessments to read as follows: Subpart C—Security Threat Assessments Sec. 1540.201 Applicability and terms used in this subpart. 1540.203 Operator responsibilities. 1540.205 Notification. 1540.207 Appeal procedures. 1540.209 Security threat assessment fee. Subpart C—Security Threat Assessments § 1540.201 Applicability and terms used in this subpart. (a) This subpart includes the procedures that certain aircraft operators, foreign air carriers, and indirect air carriers must use to have security threat assessments done on certain individuals pursuant to 49 CFR 1544.228, 1546.213, 1548.7, 1548.15, and 1548.16. This subpart applies to— (1) Each aircraft operator operating under a full program or full all-cargo program described in 49 CFR 1544.101(a) or (h); (2) Each foreign air carrier operating under a program described in 49 CFR 1546.101(a), (b), or (e); (3) Each indirect air carrier operating under a security program described in 49 CFR 1548; and (4) Each individual with, or applying for, unescorted access to cargo under one of the programs described in (a)(1) through (a)(3) of this section. (5) Each proprietor, general partner, officer, director, or owner of an indirect air carrier as described in 49 CFR 1548.16. (b) For purposes of this subpart— Individuals means the individuals listed in paragraphs (a)(4) and (a)(5) of this section. Operator means an aircraft operator, foreign air carrier, and indirect air carrier listed in paragraphs (a)(1) through (a)(3) of this section. (c) An individual poses a security threat under this subpart when TSA determines that he or she is known to pose or suspected of posing a threat— E:\FR\FM\26MYR2.SGM 26MYR2 30508 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations (1) To national security; (2) To transportation security; or (3) Of terrorism. (d) For purposes of this subpart: (1) Date of service means— (i) The date of personal delivery in the case of personal service; (ii) The mailing date shown on the certificate of service; (iii) The date shown on the postmark if there is no certificate of service; (iv) Another mailing date shown by other evidence if there is no certificate of service or postmark; or (v) The date in an e-mail showing when it was sent. (2) Day means calendar day. § 1540.203 Operator responsibilities. cchase on PROD1PC60 with RULES2 (a) Each operator subject to this subpart must ensure that each individual described in § 1540.201(a)(4) and (a)(5) completes the Security Threat Assessment described in this section. (b) Each operator must: (1) Authenticate the identity of the individual by— (i) Reviewing two forms of identification, one of which must be a government-issued picture identification; or (ii) Other means approved by TSA. (2) Submit to TSA a Security Threat Assessment application for each individual that is signed by the individual and that includes: (i) Legal name, including first, middle, and last; any applicable suffix; and any other names used previously. (ii) Current mailing address, including residential address if it differs from the current mailing address, and all other residential addresses for the previous five years, and e-mail address, if the individual has an e-mail address. (iii) Date and place of birth. (iv) Social security number, (submission is voluntary, although recommended). (v) Gender. (vi) Country of citizenship, and if naturalized in the United States, date of naturalization and certificate number. (vii) Alien registration number, if applicable. (viii) The following statement reading: Privacy Act Notice: Authority: The authority for collecting this information is 49 U.S.C. 114, 40113, and 49 U.S.C. 5103a. Purpose: This information is needed to verify your identity and to conduct a Security Threat Assessment to evaluate your suitability for completing the functions required by this position. Failure to furnish your SSN may result in delays in processing your application, but will not prevent completion of your Security Threat Assessment. Furnishing the other information is also voluntary; however, failure to provide it may delay or prevent the VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 completion of your Security Threat Assessment, without which you may not be granted authorization to have unescorted access to air cargo subject to TSA security requirements. Routine Uses: Routine uses of this information include disclosure to TSA contractors or other agents who are providing services relating to the Security Threat Assessments; to appropriate governmental agencies for law enforcement or security purposes, or in the interests of national security; and to foreign and international governmental authorities in accordance with law and international agreement. For further information, please consult DHS/TSA 002 Transportation Security Threat Assessment System. The information I have provided on this application is true, complete, and correct to the best of my knowledge and belief and is provided in good faith. I understand that a knowing and willful false statement, or an omission of a material fact, on this application can be punished by fine or imprisonment or both (see section 1001 of Title 18 United States Code), and may be grounds for denial of authorization or in the case of parties regulated under this section, removal of authorization to operate under this chapter, if applicable. (3) Retain the individual’s signed Security Threat Assessment application and any communications with TSA regarding the individual’s application, for 180 days following the end of the individual’s service to the operator. (c) Records under this section may include electronic documents with electronic signature or other means of personal authentication, where accepted by TSA. § 1540.205 Notification. (a) TSA review. In conducting the Security Threat Assessment, TSA reviews— (1) The information required in § 1540.203(b) and transmitted to TSA; and (2) Domestic and international databases relevant to determining whether an individual poses a security threat or that confirm an individual’s identity. (b) Determination of No Security Threat. TSA serves a Determination of No Security Threat on the individual and the operator, if TSA determines that an individual does not pose a security threat. (c) Initial Determination of Threat Assessment. TSA serves an Initial Determination of Threat Assessment on the individual and the operator, if TSA determines that the individual poses a security threat. The Initial Determination of Threat Assessment includes— (1) A statement that TSA has determined that the individual poses a security threat; PO 00000 Frm 00032 Fmt 4701 Sfmt 4700 (2) The basis for the determination; (3) Information about how the individual may appeal the determination; and (4) A statement that if the individual chooses not to appeal TSA’s determination within 30 days of receipt of the Initial Determination of Threat Assessment in accordance with § 1540.207, or does not request an extension of time within 30 days of the Initial Determination of Threat Assessment in order to file an appeal, the Initial Determination of Threat Assessment becomes a Final Determination of Threat Assessment. (d) Final Determination of Threat Assessment. If TSA determines that an individual poses a security threat, TSA serves a Final Determination of Threat Assessment on the operator and the individual who appealed the Initial Determination of Threat Assessment. (e) Withdrawal by TSA. TSA serves a Withdrawal of the Initial Determination of Threat Assessment on the individual and a Determination of No Security Threat on the operator, if the appeal results in a determination that the individual does not pose a security threat. § 1540.207 Appeal procedures. (a) Scope. This section applies to individuals who wish to appeal an Initial Determination of Threat Assessment. (b) Grounds for Appeal. An individual may appeal an Initial Determination of Threat Assessment if the individual is asserting that he or she does not pose a security threat. (c) Appeal. An individual initiates an appeal by submitting a written reply or written request for materials from TSA or by requesting more time in accordance with § 1540.205(c)(4). If the individual fails to initiate an appeal within 30 days of receipt, the Initial Determination of Threat Assessment becomes final, and TSA serves a Final Determination of Threat Assessment on the operator and the individual. (1) Request for materials. An individual receiving an Initial Determination of Threat Assessment may serve upon TSA a written request for copies of the materials upon which the Initial Determination of Threat Assessment was based. (2) TSA response. Within 30 days of receiving the individual’s request for materials, TSA serves copies upon the individual of the releasable materials upon which the Initial Determination of Threat Assessment was based. TSA will exclude any classified information or other protected information described in paragraph (f) of this section. E:\FR\FM\26MYR2.SGM 26MYR2 cchase on PROD1PC60 with RULES2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations (3) Correction of records. If the Initial Determination of Threat Assessment was based on a record that the individual believes is erroneous, he or she may correct the record, as follows: (i) The individual may contact the jurisdiction or entity responsible for the information and attempt to correct or complete information contained in his or her record. (ii) The individual must then provide TSA with the revised record, or a certified true copy of the information from the appropriate entity, before TSA may determine that the individual meets the standards for the Security Threat Assessment. (4) Reply. (i) The individual may serve upon TSA a written reply to the Initial Determination of Threat Assessment within 30 days of service of the Initial Determination of Threat Assessment, or 30 days after the date of service of TSA’s response to the individual’s request for materials under paragraph (c)(1) of this section, if the individual served such a request. (ii) In an individual’s reply, TSA will consider only material that is relevant to verifying identification or determining that the individual does not pose a security threat. (5) Final determination. Within 30 days after TSA receives the individual’s reply, TSA serves a Final Determination of Threat Assessment or a Withdrawal of the Initial Determination of Threat Assessment. (d) Final Determination of Threat Assessment. (1) If TSA determines that the individual poses a security threat, TSA serves a Final Determination of Threat Assessment upon the individual and the operator. The Final Determination of Threat Assessment includes— (2) A statement that TSA has reviewed the Initial Determination of Threat Assessment, the individual’s reply, if any, and any other materials or information available to him or her and has determined that the individual poses a security threat. (e) Withdrawal of Initial Determination of Threat Assessment. If TSA concludes that the individual does not pose a security threat, TSA serves a Withdrawal of the Initial Determination of Threat Assessment on the individual and the operator. (f) Nondisclosure of certain information. In connection with the procedures under this section, TSA does not disclose to the individual or counsel classified information, as defined in sec. 1.1(d) of Executive Order 12968, and reserves the right not to disclose any other information or material not VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 warranting disclosure or protected from disclosure under law. (g) Extension of time. TSA may grant an individual an extension of time of the limits set forth in this section for good cause shown. An individual’s request for an extension of time must be in writing and be received by TSA at least 2 days before the due date to be extended. TSA may grant itself an extension of time for good cause. (h) Judicial review. The Final Determination of Threat Assessment constitutes a final TSA order subject to judicial review in accordance with 49 U.S.C. 46110. § 1540.209 Security threat assessment fee. (a) Imposition of fees. The fee of $28 is required for TSA to conduct a security threat assessment for an individual. (b) Remittance of fees. (1) The fee required under this subpart must be remitted to TSA, in a form and manner acceptable to TSA, each time the individual or an aircraft operator, foreign air carrier, or indirect air carrier submits the information required under § 1540.203 to TSA. (2) Fees remitted to TSA under this subpart must be payable to the ‘‘Transportation Security Administration’’’ in U.S. currency and drawn on a U.S. bank. (3) TSA will not issue any fee refunds, unless a fee was paid in error. PART 1542—AIRPORT SECURITY 7. The authority citation for part 1542 continues to read as follows: I Authority: 49 U.S.C. 114, 5103, 40113, 44901–44905, 44907, 44913–44914, 44916– 44917, 44935–44936, 44942, 46105. 8. Amend § 1542.1 by adding new paragraph (d) to read as follows: I § 1542.1 Applicability of this part. * * * * * (d) Each airport operator that does not have a security program under this part that serves an aircraft operator operating under a security program under part 1544 of this chapter, or a foreign air carrier operating under a security program under part 1546 of this chapter. Such airport operators must comply with § 1542.5(e). I 9. Amend § 1542.5 by adding paragraph (e) to read as follows: § 1542.5 Inspection authority. * * * * * (e) TSA may enter and be present at an airport that does not have a security program under this part, without access media or identification media issued or approved by an airport operator or PO 00000 Frm 00033 Fmt 4701 Sfmt 4700 30509 aircraft operator, to inspect an aircraft operator operating under a security program under part 1544 of this chapter, or a foreign air carrier operating under a security program under part 1546 of this chapter. I 10. Amend § 1542.101 by revising paragraphs (a) introductory text, (b), and (c) introductory text to read as follows: § 1542.101 General requirements. (a) No person may operate an airport subject to § 1542.103 unless it adopts and carries out a security program that— * * * * * (b) Each airport operator subject to § 1542.103 must maintain one current and complete copy of its security program and provide a copy to TSA upon request. (c) Each airport operator subject to § 1542.103 must— * * * * * I 11. Amend § 1542.205 by revising paragraphs (a) and (b)(2), and adding new paragraph (c) to read as follows: § 1542.205 Security of the security identification display area (SIDA). (a) Each airport operator required to have a complete program under § 1542.103(a) must establish at least one SIDA, as follows: (1) Each secured area must be a SIDA. (2) Each part of the air operations area that is regularly used to load cargo on, or unload cargo from, an aircraft that is operated under a full program or a full all-cargo program as provided in § 1544.101(a) or (h) of this chapter, or a foreign air carrier under a security program as provided in § 1546.101(a), (b), or (e), must be a SIDA. (3) Each area on an airport where cargo is present after an aircraft operator operating under a full program or a full all-cargo program under § 1544.101(a) or (h) of this chapter, or a foreign air carrier operating under a security program under § 1546.101(a), (b), or (e) of this chapter, or an indirect air carrier, accepts it must be a SIDA. This includes areas such as: Cargo facilities; loading and unloading vehicle docks; and areas where an aircraft operator, foreign air carrier, or indirect air carrier sorts, stores, stages, consolidates, processes, screens, or transfers cargo. (4) Other areas of the airport may be SIDAs. (b) * * * (2) Subject each individual to a criminal history records check as described in § 1542.209 before authorizing unescorted access to the SIDA. * * * * * E:\FR\FM\26MYR2.SGM 26MYR2 30510 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations (c) An airport operator that is not required to have a complete program under § 1542.103(a) is not required to establish a SIDA under this section. PART 1544—AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS 12. The authority citation for part 1544 continues to read as follows: I Authority: 49 U.S.C. 114, 5103, 40113, 44901–44905, 44907, 44913–44914, 44916– 44918, 44932, 44935–44936, 44942, 46105. 13. Amend § 1544.3 by revising paragraph (c) to read as follows: I § 1544.3 TSA inspection authority. * * * * * (c) TSA may enter and be present within secured areas, AOAs, SIDAs, and other areas where security measures required by TSA are carried out, without access media or identification media issued or approved by an airport operator or aircraft operator, in order to inspect or test compliance, or perform other such duties as TSA may direct. * * * * * I 14. Amend § 1544.101 by revising paragraphs (d)(1), (d)(4), and (e)(1), and adding new paragraphs (h) and (i) to read as follows: § 1544.101 Adoption and implementation. cchase on PROD1PC60 with RULES2 * * * * * (d) * * * (1) Is an aircraft with a maximum certificated takeoff weight of more than 12,500 pounds; * * * * * (4) Is not under a full program, partial program, or full all-cargo program under paragraph (a), (b), or (h) of this section. (e) * * * (1) The requirements of §§ 1544.215, 1544.217, 1544.219, 1544.223, 1544.230, 1544.235, 1544.237, 1544.301(a) and (b), 1544.303, and 1544.305; and in addition, for all-cargo operations of §§ 1544.202, 1544.205(a), (b), (d), and (f). * * * * * (h) Full all-cargo program—adoption: Each aircraft operator must carry out the requirements of paragraph (i) of this section for each operation that is— (1) In an aircraft with a maximum certificated takeoff weight of more than 45,500 kg (100,309.3 pounds); and (2) Carrying cargo and authorized persons and no passengers. (i) Full all-cargo program—contents: For each operation described in paragraph (h) of this section, the aircraft operator must carry out the following, and must adopt and carry out a security program that meets the applicable requirements of § 1544.103(c): VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 (1) The requirements of §§ 1544.202, 1544.205, 1544.207, 1544.209, 1544.211, 1544.215, 1544.217, 1544.219, 1544.225, 1544.227, 1544.228, 1544.229, 1544.230, 1544.231, 1544.233, 1544.235, 1544.237, 1544.301, 1544.303, and 1544.305. (2) Other provisions of subpart C of this part that TSA has approved upon request. (3) The remaining requirements of subpart C of this part when TSA notifies the aircraft operator in writing that a security threat exists concerning that operation. I 15. Add a new § 1544.202 to read as follows: § 1544.202 Persons and property onboard an all-cargo aircraft. Each aircraft operator operating under a full all-cargo program, or a twelve-five program in an all-cargo operation, must apply the security measures in its security program for persons who board the aircraft for transportation, and for their property, to prevent or deter the carriage of any unauthorized persons, and any unauthorized weapons, explosives, incendiaries, and other destructive devices, items, or substances. I 16. Revise § 1544.205 to read as follows: § 1544.205 cargo. Acceptance and screening of (a) Preventing or deterring the carriage of any explosive or incendiary. Each aircraft operator operating under a full program, a full all-cargo program, or a twelve-five program in an all-cargo operation, must use the procedures, facilities, and equipment described in its security program to prevent or deter the carriage of any unauthorized persons, and any unauthorized explosives, incendiaries, and other destructive substances or items in cargo onboard an aircraft. (b) Screening and inspection of cargo. Each aircraft operator operating under a full program or a full all-cargo program, or a twelve-five program in an all-cargo operation, must ensure that cargo is screened and inspected for any unauthorized person, and any unauthorized explosive, incendiary, and other destructive substance or item as provided in the aircraft operator’s security program and § 1544.207, and as provided in § 1544.239 for operations under a full program, before loading it on its aircraft. (c) Control. Each aircraft operator operating under a full program or a full all-cargo program must use the procedures in its security program to control cargo that it accepts for transport on an aircraft in a manner that: PO 00000 Frm 00034 Fmt 4701 Sfmt 4700 (1) Prevents the carriage of any unauthorized person, and any unauthorized explosive, incendiary, and other destructive substance or item in cargo onboard an aircraft. (2) Prevents unescorted access by persons other than an authorized aircraft operator employee or agent, or persons authorized by the airport operator or host government. (d) Refusal to transport. Except as otherwise provided in its program, each aircraft operator operating under a full program, a full all-cargo program, or a twelve-five program in an all-cargo operation, must refuse to transport any cargo if the shipper does not consent to a search or inspection of that cargo in accordance with the system prescribed by this part. (e) Acceptance of cargo only from specified persons. Each aircraft operator operating under a full program or a full all-cargo program may accept cargo for air transportation only from the shipper, or from an aircraft operator, foreign air carrier, or indirect air carrier operating under a security program under this chapter with a comparable cargo security program, as provided in its security program. (f) Acceptance and screening of cargo outside the United States. For cargo to be loaded on its aircraft outside the United States, each aircraft operator must carry out the requirements of its security program. I 17. Amend § 1544.217 by revising paragraphs (a)(2) introductory text and (b) introductory text to read as follows: § 1544.217 Law enforcement personnel. (a) * * * (2) For operations under a partial program under § 1544.101(b) and (c), a twelve-five program under § 1544.101(d) and (e), a private charter program under § 1544.101(f), or a full all-cargo program under § 1544.101(h) and (i), each aircraft operator must— * * * * * (b) The following applies to operations at airports required to hold security programs under part 1542 of this chapter. For operations under a partial program under § 1544.101(b) and (c), a twelve-five program under § 1544.101(d) and (e), a private charter program under § 1544.101(f), or a full all-cargo program under § 1544.101(h) and (i), each aircraft operator must— * * * * * I 18. Amend § 1544.225 by adding new paragraph (d) to read as follows: § 1544.225 facilities. Security of aircraft and * * E:\FR\FM\26MYR2.SGM * 26MYR2 * * Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations (d) When operating under a full program or a full all-cargo program, prevent unauthorized access to the operational area of the aircraft while loading or unloading cargo. I 19. Add a new § 1544.228 to read as follows: cchase on PROD1PC60 with RULES2 § 1544.228 Access to cargo: Security threat assessments for cargo personnel in the United States. This section applies in the United States to each aircraft operator operating under a full program under § 1544.101(a), or a full all-cargo program under § 1544.101(h) of this part. (a) This section applies for each employee and agent the aircraft operator authorizes to have unescorted access to cargo from the time— (1) The cargo reaches a location where an aircraft operator with a full all-cargo program consolidates or inspects it pursuant to security program requirements until the cargo enters an airport Security Identification Display Area or is transferred to another TSAregulated aircraft operator, foreign air carrier, or indirect air carrier; or (2) An aircraft operator with a full program accepts the cargo until the cargo: (i) Enters an airport Security Identification Display Area; (ii) Is removed from the destination airport; or (iii) Is transferred to another TSAregulated aircraft operator, foreign air carrier, or indirect air carrier. (b) Before an aircraft operator authorizes, and before an employee or agent gains, unescorted access to cargo as described in paragraph (a) of this section, each employee or agent must successfully complete one of the following: (1) A criminal history records check under §§ 1542.209, 1544.229, or 1544.230 of this chapter, if the employee or agent is otherwise required to undergo that check. (2) A Security Threat Assessment under part 1540 subpart C of this chapter. An employee or agent who has successfully completed this Security Threat Assessment for one employer need not complete it for another employer if the employee or agent has been continuously employed in a position that requires a Security Threat Assessment. (3) Another Security Threat Assessment approved by TSA as comparable to paragraphs (b)(1) or (2) of this section. (c) Each aircraft operator must ensure that each individual who has access to its cargo— VerDate Aug<31>2005 17:34 May 25, 2006 Jkt 208001 (1) Has successfully completed one of the checks in paragraph (b) of this section; (2) Is escorted by an employee or agent who has successfully completed one of the checks in paragraph (b) of this section; or (3) Is authorized to serve as law enforcement personnel at that location. (d) Operators must comply with the requirements of this section not later than November 22, 2006. I 20. Amend § 1544.229 by adding introductory text, and revising paragraph (a)(1)(iii) to read as follows: § 1544.229 Fingerprint-based criminal history records checks (CHRC): Unescorted access authority, authority to perform screening functions, and authority to perform checked baggage or cargo functions. This section applies to each aircraft operator operating under a full program, a private charter program, or a full allcargo program. (a) * * * (1) * * * (iii) Each individual granted authority to perform the following screening functions at locations within the United States (referred to as ‘‘authority to perform screening functions’’): (A) Screening passengers or property that will be carried in a cabin of an aircraft of an aircraft operator required to screen passengers under this part. (B) Serving as an immediate supervisor (checkpoint security supervisor (CSS)), and the next supervisory level (shift or site supervisor), to those individuals described in paragraphs (a)(1)(iii)(A) or (a)(1)(iii)(C) of this section. (C) Screening cargo that will be carried on an aircraft of an aircraft operator with a full all-cargo program. * * * * * I 21. Add a new § 1544.239 to read as follows: § 1544.239 Known shipper program. This section applies to each aircraft operator operating under a full program under § 1544.101(a) of this part and to each aircraft operator with a TSA security program approved for transfer of cargo to an aircraft operator with a full program or a foreign air carrier under paragraphs § 1546.101(a) or (b) of this chapter. (a) For cargo to be loaded on its aircraft in the United States, each aircraft operator must have and carry out a known shipper program in accordance with its security program. The program must— (1) Determine the shipper’s validity and integrity as provided in the security program; PO 00000 Frm 00035 Fmt 4701 Sfmt 4700 30511 (2) Provide that the aircraft operator will separate known shipper cargo from unknown shipper cargo; and (3) Provide for the aircraft operator to ensure that cargo is screened or inspected as set forth in its security program. (b) When required by TSA, each aircraft operator must submit in a form and manner acceptable to TSA— (1) Information identified in its security program regarding a known shipper, or an applicant for that status; and (2) Corrections and updates of this information upon learning of a change to the information specified in paragraph (b)(1) of this section. PART 1546—FOREIGN AIR CARRIER SECURITY 22. The authority citation for part 1546 continues to read as follows: I Authority: 49 U.S.C. 114, 5103, 40113, 44901–44905, 44907, 44914, 44916–44917, 44935–44936, 44942, 46105. 23. Amend § 1546.3 by adding new paragraph (c) to read as follows: I § 1546.3 TSA inspection authority. * * * * * (c) TSA may enter and be present within secured areas, AOAs, SIDAs, and other areas where security measures required by TSA are carried out, without access media or identification media issued or approved by an airport operator or aircraft operator, in order to inspect or test compliance, or perform other such duties as TSA may direct. I 24. Amend § 1546.101 by revising the introductory text and paragraph (a), and by adding new paragraphs (e) and (f) to read as follows: § 1546.101 Adoption and implementation. Each foreign air carrier landing or taking off in the United States must adopt and carry out, for each scheduled and public charter passenger operation or all-cargo operation, a security program that meets the requirements of— (a) Section 1546.103(b) and subparts C, D, and E of this part for each operation with an aircraft having a passenger seating configuration of 61 or more seats; * * * * * (e) Sections 1546.103(b)(2) and (b)(4), 1546.202, 1546.205(a), (b), (c), (d), (e), and (f), 1546.207, 1546.211, 1546.213, and 1546.301 for each all-cargo operation with an aircraft having a maximum certificated take-off weight more than 45,500 kg (100,309.3 lbs.); and E:\FR\FM\26MYR2.SGM 26MYR2 30512 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations (f) Sections 1546.103(b)(2) and (b)(4), 1546.202, 1546.205(a), (b), (d), and (f), 1546.211, and 1546.301 for each allcargo operation with an aircraft having a maximum certificated take-off weight more than 12,500 pounds but not more than 45,500 kg (100,309.3 lbs.). I 25. Amend § 1546.103 by revising paragraph (a)(1) and paragraph (b) introductory text to read as follows: § 1546.103 Form, content, and availability of security program. (a) * * * (1) Acceptable to TSA. A foreign air carrier’s security program is acceptable only if TSA finds that the security program provides a level of protection similar to the level of protection provided by U.S. aircraft operators serving the same airports. Foreign air carriers must employ procedures equivalent to those required of U.S. aircraft operators serving the same airport, if TSA determines that such procedures are necessary to provide a similar level of protection. * * * * * (b) Content of security program. Each security program required by § 1546.101(a), (b), (c), (e), or (f) must be designed to— * * * * * I 26. Add a new § 1546.202 to read as follows: § 1546.202 Persons and property onboard the aircraft. Each foreign air carrier operating under § 1546.101(e) or (f) must apply the security measures in its security program for persons who board the aircraft for transportation, and for their property, to prevent or deter the carriage of any unauthorized persons, and any unauthorized weapons, explosives, incendiaries, and other destructive devices, items, or substances. I 27. Revise § 1546.205 to read as follows: cchase on PROD1PC60 with RULES2 § 1546.205 cargo. Acceptance and screening of (a) Preventing or deterring the carriage of any explosive or incendiary. Each foreign air carrier operating a program under § 1546.101(a), (b), (e), or (f) must use the procedures, facilities, and equipment described in its security program to prevent or deter the carriage of any unauthorized person, and any unauthorized explosive, incendiary, and other destructive substance or item in cargo onboard an aircraft. (b) Refusal to transport. Each foreign air carrier operating a program under § 1546.101(a), (b), (e), or (f) must refuse to transport any cargo, if the shipper does not consent to a search or VerDate Aug<31>2005 17:34 May 25, 2006 Jkt 208001 inspection of that cargo in accordance with the system prescribed by this part. (c) Control. Each foreign air carrier operating a program under § 1546.101(a), (b), or (e) must use the procedures in its security program to control cargo that it accepts for transport on an aircraft in a manner that— (1) Prevents the carriage of any unauthorized person, and any unauthorized explosive, incendiary, and other destructive substance or item onboard the aircraft. (2) Prevents access by unauthorized persons other than an authorized foreign air carrier employee or agent, or persons authorized by the airport operator or host government. (d) Screening and inspection of cargo in the United States. Each foreign air carrier operating a program under § 1546.101(a), (b), (e), or (f) must ensure that, as required in its security program, cargo is screened and inspected for any unauthorized persons, and any unauthorized explosives, incendiaries, and other destructive substances or items as provided in the foreign air carrier’s security program, and § 1546.207, and as provided in § 1546.213 for operations under § 1546.101(a) or (b) before loading it on its aircraft in the United States. (e) Acceptance of cargo in the United States only from specified persons. Each foreign air carrier operating a program under § 1546.101(a), (b), or (e) of this part may accept cargo in the United States only from the shipper, or from an aircraft operator, foreign air carrier, or indirect air carrier operating under a security program under this chapter with a comparable cargo security program as provided in its security program. (f) Acceptance of cargo to be loaded for transport to the United States. Each foreign air carrier subject to this part that accepts cargo to be loaded on its aircraft for transport to the United States must carry out the requirements of its security program. I 28. Add a new § 1546.213 to read as follows: § 1546.213 Access to cargo: Security threat assessments for cargo personnel in the United States. This section applies in the United States to each foreign air carrier operating under § 1546.101(a), (b), or (e). (a) This section applies to each employee or agent in the United States whom the foreign air carrier authorizes to have unescorted access to cargo from the time— (1) The cargo reaches a location where a foreign air carrier operating under § 1546.101(e) consolidates or inspects it PO 00000 Frm 00036 Fmt 4701 Sfmt 4700 pursuant to security program requirements, until the cargo enters an airport Security Identification Display Area or is transferred to another TSAregulated aircraft operator, foreign air carrier, or indirect air carrier, or (2) A foreign air carrier under § 1546.101(a) or (b) accepts the cargo, until the cargo— (i) Enters an airport Security Identification Display Area; (ii) Is removed from the destination airport; or (iii) Is transferred to another TSAregulated aircraft operator, foreign air carrier, or indirect air carrier. (b) Before a foreign air carrier authorizes, and before an employee or agent gains, unescorted access to cargo as described in paragraph (a) of this section, each employee or agent must successfully complete one of the following: (1) A criminal history records check under §§ 1542.209, 1544.229, or 1544.230 of this chapter, if the employee or agent is otherwise required to undergo that check. (2) A Security Threat Assessment under part 1540 subpart C of this chapter. An employee or agent who has successfully completed this Security Threat Assessment for one employer need not complete it for another employer, if the employee or agent has been continuously employed in a position that requires a Security Threat Assessment. (3) Another Security Threat Assessment approved by TSA as comparable to paragraphs (b)(1) or (2) of this section. (c) Each foreign air carrier must ensure that each individual who has access to its cargo— (1) Has successfully completed one of the checks in paragraph (b) of this section; (2) Is escorted by an employee or agent who has successfully completed one of the checks in paragraph (b) of this section; or (3) Is authorized to serve as law enforcement personnel at that location. (d) Operators must comply with the requirements of this section not later than November 22, 2006. I 29. Add a new § 1546.215 to read as follows: § 1546.215 Known shipper program. This section applies to each foreign air carrier operating a program under § 1546.101(a) or (b). (a) For cargo to be loaded on its aircraft in the United States, each foreign air carrier must have and carry out a known shipper program in accordance with its security program. The program must— E:\FR\FM\26MYR2.SGM 26MYR2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations (1) Determine the shipper’s validity and integrity as provided in the foreign air carrier’s security program; (2) Provide that the foreign air carrier will separate known shipper cargo from unknown shipper cargo; and (3) Provide for the foreign air carrier to ensure that cargo is screened or inspected as set forth in its security program. (b) When required by TSA, each foreign air carrier must submit in a form and manner acceptable to TSA— (1) Information identified in its security program regarding an applicant to be a known shipper or a known shipper; and (2) Corrections and updates to the information upon learning of a change to the information specified in paragraph (b)(1) of this section. I 30. Amend § 1546.301 by revising the introductory text to read as follows: § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the following actions are taken: * * * * * PART 1548—INDIRECT AIR CARRIER SECURITY 31. The authority citation for part 1548 continues to read as follows: I Authority: 49 U.S.C. 114, 5103, 40113, 44901–44905, 44913–44914, 44916–44917, 44932, 44935–44936, 46105. 32. Amend § 1548.3 by adding new paragraph (c) to read as follows: I § 1548.3 TSA inspection authority. * * * * * (c) TSA may enter and be present within areas where security measures required by TSA are carried out without access media or identification media issued or approved by the indirect air carrier, an airport operator, or aircraft operator, in order to inspect or test compliance, or perform other such duties as TSA may direct. I 33. Amend § 1548.5 by revising paragraphs (a), (b), and (c) to read as follows: cchase on PROD1PC60 with RULES2 § 1548.5 Adoption and implementation of the security program. (a) Security program required. No indirect air carrier may offer cargo to an aircraft operator operating under a full program or a full all-cargo program specified in part 1544 of this subchapter, or to a foreign air carrier operating under a program under § 1546.101(a), (b), or (e) of this VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 subchapter, unless that indirect air carrier has and carries out an approved security program under this part. Each indirect air carrier that does not currently hold a security program under part 1548, and that offers cargo to an aircraft operator operating under a full all-cargo program or a comparable operation by a foreign air carrier must comply with this section not later than November 22, 2006. (b) General requirements. (1) The security program must provide for the security of the aircraft, as well as that of persons and property traveling in air transportation against acts of criminal violence and air piracy and against the introduction into the aircraft of any unauthorized person, and any unauthorized explosive, incendiary, and other destructive substance or item as provided in the indirect air carrier’s security program. This requirement applies— (i) From the time the indirect air carrier accepts the cargo to the time it transfers the cargo to an entity that is not an employee or agent of the indirect air carrier; (ii) While the cargo is stored, en route, or otherwise being handled by an employee or agent of the indirect air carrier; and (iii) Regardless of whether the indirect air carrier has or ever had physical possession of the cargo. (2) The indirect air carrier must ensure that its employees and agents carry out the requirements of this chapter and the indirect air carrier’s security program. (c) Content. Each security program under this part must— (1) Be designed to prevent or deter the introduction of any unauthorized person, and any unauthorized explosive, incendiary, and other destructive substance or item onto an aircraft. (2) Include the procedures and description of the facilities and equipment used to comply with the requirements of §§ 1548.9 and 1548.17 regarding the acceptance and offering of cargo. (3) Include the procedures and syllabi used to accomplish the training required under § 1548.11 of persons who accept, handle, transport, or deliver cargo on behalf of the indirect air carrier. * * * * * I 34. Revise § 1548.7 to read as follows: § 1548.7 Approval, amendment, annual renewal, and withdrawal of approval of the security program. (a) Original Application—(1) Application. The applicant must apply for a security program in a form and a PO 00000 Frm 00037 Fmt 4701 Sfmt 4700 30513 manner prescribed by TSA not less than 90 calendar days before the applicant intends to begin operations. The application must be in writing and include: (i) The business name; other names, including doing business as; state of incorporation, if applicable; and tax identification number. (ii) The applicant names, addresses, and dates of birth of each proprietor, general partner, officer, director, and owner identified under § 1548.16. (iii) A signed statement from each person listed in paragraph (a)(1)(ii) of this section stating whether he or she has been a proprietor, general partner, officer, director, or owner of an IAC that had its security program withdrawn by TSA. (iv) Copies of government-issued identification of persons listed in paragraph (a)(1)(ii) of this section. (v) Addresses of all business locations in the United States. (vi) A statement declaring whether the business is a ‘‘’small business’’’ pursuant to section 3 of the Small Business Act (15 U.S.C. 632). (vii) A statement acknowledging and ensuring that each employee and agent of the indirect air carrier, who is subject to training under § 1548.11, will have successfully completed the training outlined in its security program before performing security-related duties. (viii) Other information requested by TSA concerning Security Threat Assessments. (ix) A statement acknowledging and ensuring that each employee and agent will successfully complete a Security Threat Assessment under § 1548.15 before authorizing the individual to have unescorted access to cargo. (2) Approval. TSA will approve the security program by providing the indirect air carrier with the Indirect Air Carrier Standard Security Program and any Security Directive upon determining that— (i) The indirect air carrier has met the requirements of this part, its security program, and any applicable Security Directive; (ii) The approval of its security program is not contrary to the interests of security and the public interest; and (iii) The indirect air carrier has not held a security program that was withdrawn within the previous year, unless otherwise authorized by TSA. (3) Commencement of operations. The indirect air carrier may operate under a security program when it meets all requirements, including but not limited to successful completion of training and Security Threat Assessments by relevant personnel. E:\FR\FM\26MYR2.SGM 26MYR2 30514 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations cchase on PROD1PC60 with RULES2 (4) Duration of security program. The security program will remain effective until the end of the calendar month one year after the month it was approved. (5) Requirement to report changes in information. Each indirect air carrier with an approved security program under this part must notify TSA, in a form and manner approved by TSA, of any changes to the information submitted during its initial application. (i) This notification must be submitted to the designated official not later than 30 days after the date the change occurred. (ii) Changes included in the requirement of this paragraph include, but are not limited to, changes in the indirect air carrier’s contact information, owners, business addresses and locations, and form of business entity. (b) Renewal Application. Upon timely submittal of an application for renewal, and unless and until TSA denies the application, the indirect air carrier’s approved security program remains in effect. (1) Unless otherwise authorized by TSA, each indirect air carrier that has a security program under this part must timely submit to TSA, at least 30 calendar days prior to the first day of the anniversary month of initial approval of its security program, an application for renewal of its security program in a form and a manner approved by TSA. (2) The application for renewal must be in writing and include a signed statement that the indirect air carrier has reviewed and ensures the continuing accuracy of the contents of its initial application for a security program, subsequent renewal applications, or other submissions to TSA confirming a change of information and noting the date such applications and submissions were sent to TSA, including the following certification: [Name of indirect air carrier] (hereinafter ‘‘the IAC’’) has adopted and is currently carrying out a security program in accordance with the Transportation Security Regulations as originally approved on [Insert date of TSA initial approval]. In accordance with TSA regulations, the IAC has notified TSA of any new or changed information required for the IAC’s initial security program. If new or changed information is being submitted to TSA as part of this application for reapproval, that information is stated in this filing. The IAC understands that intentional falsification of certification to an air carrier or to TSA may be subject to both civil and criminal penalties under 49 CFR 1540 and 1548 and 18 U.S.C. 1001. Failure to notify TSA of any new or changed information required for initial approval of the IAC’s VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 security program in a timely fashion and in a form acceptable to TSA may result in withdrawal by TSA of approval of the IAC’s security program. (3) TSA will renew approval of the security program if TSA determines that— (i) The indirect air carrier has met the requirements of this chapter, its security program, and any Security Directive; and (ii) The renewal of its security program is not contrary to the interests of security and the public interest. (4) If TSA determines that the indirect air carrier meets the requirements of paragraph (b)(3) of this section, it will renew the indirect air carrier’s security program. The security program will remain effective until the end of the calendar month one year after the month it was renewed. (c) Amendment requested by an indirect air carrier or applicant. An indirect air carrier or applicant may file a request for an amendment to its security program with the TSA designated official at least 45 calendar days before the date it proposes for the amendment to become effective, unless the designated official allows a shorter period. Any indirect air carrier may submit a group proposal for an amendment that is on behalf of it and other indirect air carriers that co-sign the proposal. (1) Within 30 calendar days after receiving a proposed amendment, the designated official, in writing, either approves or denies the request to amend. (2) An amendment to an indirect air carrier security program may be approved, if the designated official determines that safety and the public interest will allow it, and if the proposed amendment provides the level of security required under this part. (3) Within 30 calendar days after receiving a denial of the proposed amendment, the indirect air carrier may petition TSA to reconsider the denial. A petition for reconsideration must be filed with the designated official. (4) Upon receipt of a petition for reconsideration, the designated official either approves the request to amend or transmits the petition, together with any pertinent information, to the TSA for reconsideration. TSA will dispose of the petition within 30 calendar days of receipt by either directing the designated official to approve the amendment or by affirming the denial. (d) Amendment by TSA. TSA may amend a security program in the interest of safety and the public interest, as follows: PO 00000 Frm 00038 Fmt 4701 Sfmt 4700 (1) TSA notifies the indirect air carrier, in writing, of the proposed amendment, fixing a period of not less than 30 calendar days within which the indirect air carrier may submit written information, views, and arguments on the amendment. (2) After considering all relevant material, the designated official notifies the indirect air carrier of any amendment adopted or rescinds the notice of amendment. If the amendment is adopted, it becomes effective not less than 30 calendar days after the indirect air carrier receives the notice of amendment, unless the indirect air carrier disagrees with the proposed amendment and petitions the TSA to reconsider, no later than 15 calendar days before the effective date of the amendment. The indirect air carrier must send the petition for reconsideration to the designated official. A timely petition for reconsideration stays the effective date of the amendment. (3) Upon receipt of a petition for reconsideration, the designated official either amends or withdraws the notice of amendment, or transmits the petition, together with any pertinent information, to TSA for reconsideration. TSA disposes of the petition within 30 calendar days of receipt, either by directing the designated official to withdraw or amend the notice of amendment, or by affirming the notice of amendment. (e) Emergency Amendments. (1) If TSA finds that there is an emergency requiring immediate action, with respect to aviation security that makes procedures in this section contrary to the public interest, the designated official may issue an emergency amendment, without the prior notice and comment procedures described in paragraph (d) of this section. (2) The emergency amendment is effective without stay on the date the indirect air carrier receives notification. TSA will incorporate in the notification a brief statement of the reasons and findings for the emergency amendment to be adopted. (3) The indirect air carrier may file a petition for reconsideration with the TSA no later than 15 calendar days after TSA issued the emergency amendment. The indirect air carrier must send the petition for reconsideration to the designated official; however, the filing does not stay the effective date of the emergency amendment. (f) Withdrawal of approval of a security program. TSA may withdraw the approval of the indirect air carrier’s security program, if TSA determines E:\FR\FM\26MYR2.SGM 26MYR2 cchase on PROD1PC60 with RULES2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations continued operation is contrary to safety and the public interest, as follows: (1) Notice of proposed withdrawal of approval. The designated official will serve a notice of proposed withdrawal of approval, which notifies the indirect air carrier, in writing, of the facts, charges, and applicable law, regulation, or order that form the basis for the determination. (2) Indirect air carrier reply. The indirect air carrier may respond to the notice of proposed withdrawal of approval no later than 15 calendar days after receipt of the withdrawal by providing the designated official, in writing, with any material facts, arguments, applicable law, and regulation. (3) TSA review. The designated official will consider all information available, including any relevant material or information submitted by the indirect air carrier, before either issuing a withdrawal of approval of the indirect air carrier’s security program or rescinding the notice of proposed withdrawal of approval. If TSA issues a withdrawal of approval, it becomes effective upon receipt by the indirect air carrier, or 15 calendar days after service, whichever occurs first. (4) Petition for reconsideration. The indirect air carrier may petition the TSA to reconsider the withdrawal of approval by serving a petition for consideration no later than 15 calendar days after the indirect air carrier receives the withdrawal of approval. The indirect air carrier must serve the petition for reconsideration on the designated official. Submission of a petition for reconsideration will not automatically stay the withdrawal of approval. The indirect air carrier may request the designated official to stay the withdrawal of approval pending consideration of the petition. (5) Assistant Secretary’s review. The designated official transmits the petition together with all pertinent information to the Assistant Secretary for reconsideration. The Assistant Secretary will dispose of the petition within 15 calendar days of receipt by either directing the designated official to rescind the withdrawal of approval or by affirming the withdrawal of approval. The decision of the Assistant Secretary is a final order subject to judicial review in accordance with 49 U.S.C. 46110. (6) Emergency withdrawal. If TSA finds that there is an emergency requiring immediate action, with respect to aviation security that makes procedures in this section contrary to the public interest, the designated official may issue an emergency withdrawal of the indirect air carrier’s VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 security program, without first issuing a notice of proposed withdrawal, effective without stay on the date that the indirect air carrier receives notice of the emergency withdrawal. In such a case, the designated official will send the indirect air carrier a brief statement of the facts, charges, and applicable law, regulation, or order that forms the basis for the emergency withdrawal. The indirect air carrier may submit a petition for reconsideration under the procedures in paragraphs (f)(2) through (f)(5) of this section; however, this petition will not stay the effective date of the emergency withdrawal. (g) Service of documents for withdrawal of approval of security program proceedings. Service may be accomplished by personal delivery, certified mail, or express courier. Documents served on an indirect air carrier will be served at the indirect air carrier’s official place of business as designated in its application for approval or its security program. Documents served on TSA must be served to the address noted in the notice of withdrawal of approval or withdrawal of approval, whichever is applicable. (1) Certificate of service. An individual may attach a certificate of service to a document tendered for filing. A certificate of service must consist of a statement, dated and signed by the person filing the document, that the document was personally delivered, served by certified mail on a specific date, or served by express courier on a specific date. (2) Date of service. The date of service will be— (i) The date of personal delivery; (ii) If served by certified mail, the mailing date shown on the certificate of service, the date shown on the postmark, if there is no certificate of service, or other mailing date shown by other evidence if there is no certificate of service or postmark; or (iii) If served by express courier, the service date shown on the certificate of service, or by other evidence if there is no certificate of service. (h) Extension of time. TSA may grant an extension of time of the limits set forth in this section for good cause shown. An indirect air carrier’s request for an extension of time must be in writing and be received by TSA at least 2 days before the due date to be extended. TSA may grant itself an extension of time for good cause. I 35. Revise § 1548.9 to read as follows: § 1548.9 Acceptance of cargo. (a) Preventing or deterring the carriage of any explosive or incendiary. Each PO 00000 Frm 00039 Fmt 4701 Sfmt 4700 30515 indirect air carrier must use the facilities, equipment, and procedures described in its security program to prevent or deter the carriage onboard an aircraft of any unauthorized person, and any unauthorized explosive, incendiary, and other destructive substance or item, as provided in the indirect air carrier’s security program. (b) Refusal to transport. Each indirect air carrier must refuse to offer for transport on an aircraft any cargo, if the shipper does not consent to a search or inspection of that cargo in accordance with this part, or parts 1544 or 1546 of this chapter. I 36. Add a new § 1548.11 to read as follows: § 1548.11 Training and knowledge for individuals with security-related duties. (a) No indirect air carrier may use an employee or agent to perform any security-related duties to meet the requirements of its security program, unless that individual has received training, as specified in its security program, including his or her personal responsibilities in § 1540.105 of this chapter. (b) Each indirect air carrier must ensure that each of its authorized employees or agents who accept, handle, transport, or deliver cargo have knowledge of the— (1) Applicable provisions of this part; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security program(s) applicable to their location(s); and (4) The aircraft operator’s or indirect air carrier’s security program, to the extent necessary in order to perform their duties. (c) Each indirect air carrier must ensure that each of its authorized employees or agents under paragraph (b) of this section successfully completes recurrent training at least annually on their individual responsibilities in— (1) Section 1540.105 of this chapter; (2) The applicable provisions of this part; (3) Applicable Security Directives and Information Circulars; (4) The approved airport security program(s) applicable to their location(s); and (5) The aircraft operator’s or indirect air carrier’s security program, to the extent that such individuals need to know in order to perform their duties. (d) Operators must comply with the requirements of this section by November 22, 2006. I 37. Add a new § 1548.13 to read as follows: E:\FR\FM\26MYR2.SGM 26MYR2 30516 § 1548.13 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations Security coordinators. Each indirect air carrier must designate and use an Indirect Air Carrier Security Coordinator (IACSC). The IACSC and alternates must be appointed at the corporate level and must serve as the indirect air carrier’s primary contact for security-related activities and communications with TSA, as set forth in the security program. Either the IACSC or an alternate IACSC must be available on a 24-hour basis. I 38. Add a new § 1548.15 to read as follows: cchase on PROD1PC60 with RULES2 § 1548.15 Access to Cargo: Security threat assessments for individuals having unescorted access to cargo. This section applies to each indirect air carrier operating under this part. (a) This section applies to each employee or agent the indirect air carrier authorizes to have unescorted access to cargo from the time— (1) Cargo to be transported on an aircraft operated by an aircraft operator with a full all-cargo program under § 1544.101(h) of this chapter, or by a foreign air carrier under § 1546.101(e) of this chapter, reaches an indirect air carrier facility where the indirect air carrier consolidates or holds the cargo until the indirect air carrier transfers the cargo to an aircraft operator or foreign air carrier, or (2) Cargo to be transported on an aircraft operated by an aircraft operator with a full program or by a foreign air carrier under § 1546.101(a) or (b) of this chapter, is accepted by the indirect air carrier. (b) Before an indirect air carrier authorizes, and before an employee or agent gains, unescorted access to cargo as described in paragraph (a) of this section, each employee or agent must successfully complete one of the following: (1) A criminal history records check under §§ 1542.209, 1544.229, or 1544.230 of this chapter, if the individual is otherwise required to undergo that check. (2) A Security Threat Assessment under part 1540 subpart C of this chapter. An employee or agent who has successfully completed this Security Threat Assessment for one employer need not complete it for another employer if the employee or agent has been continuously employed in a position that requires a Security Threat Assessment. (3) Another Security Threat Assessment approved by TSA as comparable to paragraphs (b)(1) or (b)(2) of this section. VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 (c) Each indirect air carrier must ensure that each individual who has access to its cargo— (1) Has successfully completed one of the checks in paragraph (b) of this section; (2) Is escorted by a person who has successfully completed one of the checks in paragraph (b) of this section; or (3) Is authorized to serve as law enforcement personnel at that location. (d) Operators must comply with the requirements of this section not later than November 22, 2006. I 39. Add a new § 1548.16 to read as follows: § 1548.16 Security threat assessments for each proprietor, general partner, officer, director, and certain owners of the entity. (a) Each indirect air carrier, or applicant to be an indirect air carrier, must ensure that each proprietor, general partner, officer, director, and owner of the entity has successfully completed a Security Threat Assessment under part 1540 subpart C of this chapter. Each indirect air carrier must comply with the requirements of this section not later than November 22, 2006. (b) For purposes of this section, owner means— (1) A person who directly or indirectly owns, controls, or has power to vote 25 percent or more of any class of voting securities or other voting interests of an IAC or applicant to be an IAC; or (2) A person who directly or indirectly controls in any manner the election of a majority of the directors (or individuals exercising similar functions) of an IAC, or applicant to be an IAC. (c) For purposes of this definition of owner— (1) Members of the same family must be considered to be one person. (i) Same family means parents, spouses, children, siblings, uncles, aunts, grandparents, grandchildren, first cousins, stepchildren, stepsiblings, and parents-in-law, and spouses of any of the foregoing. (ii) Each member of the same family, who has an ownership interest in an IAC, or an applicant to be an IAC, must be identified if the family is an owner as a result of aggregating the ownership interests of the members of the family. (iii) In determining the ownership of interests of the same family, any voting interest of any family member must be taken into account. (2) Voting securities or other voting interests means securities or other interests that entitle the holder to vote for or select directors (or individuals exercising similar functions). PO 00000 Frm 00040 Fmt 4701 Sfmt 4700 40. Add a new § 1548.17 to read as follows: I § 1548.17 Known shipper program. This section applies to cargo that an indirect air carrier offers to an aircraft operator operating under a full program under § 1544.101(a) of this chapter, or to a foreign air carrier operating under § 1546.101(a) or (b) of this chapter. (a) For cargo to be loaded on aircraft in the United States, each indirect air carrier must have and carry out a known shipper program in accordance with its security program. The program must— (1) Determine the shipper’s validity and integrity as provided in its security program; (2) Provide that the indirect air carrier will separate known shipper cargo from unknown shipper cargo. (b) When required by TSA, each indirect air carrier must submit to TSA, in a form and manner acceptable to TSA— (1) Information identified in its security program regarding an applicant to be a known shipper or a known shipper; and (2) Corrections and updates of this information upon learning of a change to the information specified in paragraph (b)(1) of this section. I 41. Add a new § 1548.19 to read as follows: § 1548.19 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify indirect air carriers of security concerns. (b) When TSA determines that additional security measures are necessary to respond to a threat assessment, or to a specific threat against civil aviation, TSA issues a Security Directive setting forth mandatory measures. (1) Each indirect air carrier that is required to have an approved indirect air carrier security program must comply with each Security Directive that TSA issues to it, within the time prescribed in the Security Directive for compliance. (2) Each indirect air carrier that receives a Security Directive must comply with the following: (i) Within the time prescribed in the Security Directive, acknowledge in writing receipt of the Security Directive to TSA. (ii) Within the time prescribed in the Security Directive, specify the method by which the measures in the Security Directive have been implemented (or will be implemented, if the Security Directive is not yet effective). (3) In the event that the indirect air carrier is unable to implement the E:\FR\FM\26MYR2.SGM 26MYR2 Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules and Regulations cchase on PROD1PC60 with RULES2 measures in the Security Directive, the indirect air carrier must submit proposed alternative measures and the basis for submitting the alternative measures to TSA for approval. (i) The indirect air carrier must submit the proposed alternative measures within the time prescribed in the Security Directive. (ii) The indirect air carrier must implement any alternative measures approved by TSA. (4) Each indirect air carrier that receives a Security Directive may VerDate Aug<31>2005 16:30 May 25, 2006 Jkt 208001 comment on it by submitting data, views, or arguments in writing to TSA. (i) TSA may amend the Security Directive based on comments received. (ii) Submission of a comment does not delay the effective date of the Security Directive. (5) Each indirect air carrier that receives a Security Directive or Information Circular, and each person who receives information from a Security Directive or Information Circular, must: (i) Restrict the availability of the Security Directive or Information Circular, and information contained in PO 00000 Frm 00041 Fmt 4701 Sfmt 4700 30517 either document, to those persons with a need-to-know. (ii) Refuse to release the Security Directive or Information Circular, and information contained in either document, to persons other than those with a need-to-know without the prior written consent of TSA. Issued in Arlington, Virginia, on May 17, 2006. Kip Hawley, Assistant Secretary. [FR Doc. 06–4800 Filed 5–25–06; 8:45 am] BILLING CODE 9110–05–P E:\FR\FM\26MYR2.SGM 26MYR2

Agencies

[Federal Register Volume 71, Number 102 (Friday, May 26, 2006)]
[Rules and Regulations]
[Pages 30478-30517]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 06-4800]



[[Page 30477]]

-----------------------------------------------------------------------

Part II





Department of Homeland Security





-----------------------------------------------------------------------



Transportation Security Administration



-----------------------------------------------------------------------



49 CFR Parts 1520, 1540, 1542, et al.



Air Cargo Security Requirements; Final Rule

Federal Register / Vol. 71, No. 102 / Friday, May 26, 2006 / Rules 
and Regulations

[[Page 30478]]


-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Transportation Security Administration

49 CFR Parts 1520, 1540, 1542, 1544, 1546, and 1548

[Docket No. TSA-2004-19515; Amendment Nos. 1520-4, 1540-7, 1542-2, 
1544-5, 1546-2, and 1548-2]
RIN 1652-AA23


Air Cargo Security Requirements

AGENCY: Transportation Security Administration (TSA), DHS.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: The Transportation Security Administration is amending its 
regulations to enhance and improve the security of air cargo 
transportation. This final rule requires airport operators, aircraft 
operators, foreign air carriers, and indirect air carriers to implement 
security measures in the air cargo supply chain as directed under the 
Aviation and Transportation Security Act. This final rule also amends 
the applicability of the requirement for a ``twelve-five'' security 
program for aircraft with a maximum certificated takeoff weight of 
12,500 pounds or more to those aircraft with a maximum certificated 
takeoff weight of more than 12,500 pounds to conform to recent 
legislation.

DATES: Effective Date: This final rule is effective October 23, 2006.
    Compliance Date: By November 22, 2006, Indirect air carriers must 
comply with the requirements for Indirect air carrier training under 
Sec.  1548.11.
    By December 1, 2006, aircraft operators, foreign air carriers, and 
indirect air carriers must comply with the requirements for--
    Security threat assessments under Sec. Sec.  1544.228, 1546.213, 
1548.15, and 1548.16; and
    Indirect air carriers that do not currently hold a security program 
under part 1548, and that offer cargo to an aircraft operator operating 
under a full all-cargo program or a comparable foreign air carrier 
under Sec.  1546.101(e), establishment of, and operation under, a TSA 
security program in part 1548.

FOR FURTHER INFORMATION CONTACT: Tamika McCree, Office of 
Transportation Sector Network Management (TSA-28), Transportation 
Security Administration, 601 South 12th Street, Arlington, VA 22202; 
(571-227-2632); tamika.mccree@dhs.gov.

SUPPLEMENTARY INFORMATION:

Availability of Rulemaking Documents

    You can get an electronic copy using the Internet by--
    (1) Searching the Department of Transportation's electronic Docket 
Management System (DMS) Web page (https://dms.dot.gov/search);
    (2) Accessing the Government Printing Office's Web page at https://
www.gpoaccess.gov/fr/; or
    (3) Visiting TSA's Law and Policy Web page at https://www.tsa.gov 
and accessing the link for ``Law and Policy'' at the top of the page.
    In addition, copies are available by writing or calling the 
individual in the FOR FURTHER INFORMATION CONTACT section. Make sure to 
identify the docket number of this rulemaking.

Small Entity Inquiries

    The Small Business Regulatory Enforcement Fairness Act (SBREFA) of 
1996 requires TSA to comply with small entity requests for information 
and advice about compliance with statutes and regulations within TSA's 
jurisdiction. Any small entity that has a question regarding this 
document may contact the person listed in FOR FURTHER INFORMATION 
CONTACT. Persons can obtain further information regarding SBREFA on the 
Small Business Administration's Web page at https://www.sba.gov/advo/
laws/law_lib.html.

Abbreviations and Terms Used in This Preamble

AAAE American Association of Airport Executives
AAPA Association of Asia Pacific Airlines
ACCA Air Courier Conference of America
ACISP All-Cargo International Security Procedures
ACI-NA Airports Council International-North America
AEA Association of European Airlines
AES Automated Export System
ALPA Air Line Pilots Association International
AOPA Aircraft Owners and Pilots Association
ASAC Aviation Security Advisory Committee
ATA Air Transport Association
ATSA Aviation and Transportation Security Act
CAA Cargo Airline Association
CBP U.S. Customs and Border Protection
CFR Code of Federal Regulations
CHRC Criminal History Records Check
DHS Department of Homeland Security
DSIP Domestic Security Integration Program
EA Emergency Amendment
FAA Federal Aviation Administration
HAZMAT Hazardous Materials
IAC Indirect Air Carrier
IACSSP Indirect Air Carrier Standard Security Program
IATA International Air Transport Association
MSP Model Security Program
MTOW Maximum certificated take-off weight
NACA National Armored Car Association
NATA National Air Transport Association
NCBFAA National Customs Brokers and Forwarders Association
RAA Regional Airline Association
RACCA Regional Air Cargo Carriers Association
SIDA Security Identification Display Area
SD Security Directive
SSI Sensitive Security Information
STA Security Threat Assessment
TSA Transportation Security Administration
TFSSP Twelve-Five Standard Security Program
UPS United Parcel Service

Outline of Final Rule

I. Background
II. Comment Disposition
    A. Security Threat Assessments
    B. Acceptance and Screening of Cargo
    C. Security Identification Display Area
    D. Known Shipper Program
    E. Adoption and Implementation of the Security Programs
    F. Cost of IAC Training and Materials
    G. Cost Benefit Analysis
    H. 100 Percent Inspection of Cargo
    I. Unknown Shipper Cargo
    J. Terms Used in This Chapter
    K. Persons and Property Aboard the Aircraft
    L. Other Issues and Sections
III. Section-by-Section Analysis of Changes
IV. Fee Authority for Security Threat Assessment
V. Rulemaking Analyses and Notices
    A. Regulatory Evaluation Summary
    B. Paperwork Reduction Act
    C. International Compatibility
    D. International Trade Impact Assessment
    E. Unfunded Mandates Reform Act Analyses
    F. Executive Order 13132, Federalism
    G. Environmental Analysis
    H. Energy Impact
VI. List of Subjects
VII. The Amendment

I. Background

    This final rule implements air cargo security requirements under 
the Aviation and Transportation Security Act (ATSA), Pub. L. 107-71. 
ATSA requires TSA to implement the following requirements:
     Provide for screening of all property, cargo, carry-on and 
checked baggage, and other articles, that will be carried aboard a 
passenger aircraft operated by a domestic or foreign air carrier;\1\ 
and
---------------------------------------------------------------------------

    \1\ 49 U.S.C. 44901(a).
---------------------------------------------------------------------------

     Establish a system to screen, inspect, or otherwise ensure 
the security of freight that is to be transported in all-cargo aircraft 
as soon as practicable.\2\
---------------------------------------------------------------------------

    \2\ 49 U.S.C. 44901(f).
---------------------------------------------------------------------------

    TSA published a notice of proposed rulemaking in the Federal 
Register on

[[Page 30479]]

November 10, 2004, at 69 FR 65258, to solicit public comment on the 
proposed air cargo regulations. Please see the NPRM for additional 
background information on the development of these regulations. The 
NPRM proposed, among other requirements, to:
     Address two critical risks in the air cargo environment: 
(1) The hostile takeover of an all-cargo aircraft leading to its use as 
a weapon; and (2) the use of cargo to introduce an explosive device 
onboard a passenger aircraft.
     Create a new mandatory security regime for aircraft 
operators and foreign air carriers in all-cargo operations using 
aircraft with a maximum certificated take-off weight more than 45,500 
kg.
     Create requirements for foreign air carriers in all-cargo 
operation with an aircraft having a maximum certificated take-off 
weight more than 12,500 pounds but no more than 45,500 kg, and a 
separate program for aircraft with a maximum certificated take-off 
weight more than 45,500 kg.
     Require a Security Threat Assessment for individuals with 
unescorted access to air cargo.
     Enhance existing requirements for indirect air carriers 
(IAC).
     Expand Security Identification Display Area requirements 
at regulated airports to include areas where cargo is loaded and 
unloaded.
    The NPRM was based in part on recommendations received from the 
Department of Transportation Office of Inspector General's (DOT OIG's) 
September 2002 audit of the air cargo security program,\3\ the General 
Accounting Office's (GAO's) December 2002 report entitled, 
``Vulnerabilities and Potential Improvements for the Air Cargo 
System'',\4\ and the Aviation Security Advisory Committee 
recommendations of October 1, 2003. TSA was also guided by the Air 
Cargo Strategic Plan, which was completed in November 2003, and 
approved by the Department of Homeland Security in January 2004. The 
NPRM proposed a threat-based, risk-managed program for securing the air 
cargo transportation system.
---------------------------------------------------------------------------

    \3\ Report Number SC-2002-113, September 19, 2002. This report 
is SSI.
    \4\ GAO-03-344, December 20, 2002.
---------------------------------------------------------------------------

    This final rule adopts the regulations proposed in the NPRM with 
minor revisions to clarify certain provisions from the proposed rule. 
Specifically, the final rule clarifies both of the populations who are 
subject to Security Threat Assessments (STAs), and the areas where 
airports must extend Security Identification Display Area (SIDA) 
measures for cargo.
    During this rulemaking, another critical security enhancement has 
been implemented, that is, an increase in the inspection of cargo by 
aircraft operators and foreign air carriers. The NPRM proposed to 
codify the requirement for the aircraft operators and foreign air 
carriers to inspect cargo in accordance with their security programs. 
These operators already were inspecting a portion of their cargo as 
required by Security Directives issued by TSA in November 2003.
    Following the publication of the NPRM, the Department of Homeland 
Security Appropriations Act, 2005 was enacted.\5\ Section 513 of the 
Act requires TSA to amend Security Directives and programs to triple 
the percentage of cargo inspected on passenger aircraft, which TSA did. 
Details of these security measures are protected by TSA as Sensitive 
Security Information,\6\ and therefore are not available for release to 
the general public.
---------------------------------------------------------------------------

    \5\ FY `05, Pub. L. 108-334.
    \6\ ``Sensitive Security Information'' or ``SSI'' is information 
obtained or developed in the conduct of security activities, the 
disclosure of which would constitute an unwarranted invasion of 
privacy, reveal trade secrets or privileged or confidential 
information, or be detrimental to the security of transportation. 
The protection of SSI is governed by 49 CFR part 1520.
---------------------------------------------------------------------------

    Although the details are not in the rule, the regulatory evaluation 
for this final rule analyzes the cost incurred by aircraft operators 
and foreign air carriers to comply with this inspection requirement. 
The cost of inspection of air cargo on passenger aircraft accounts for 
about $1.491 billion of the total $2 billion costs of this rule, as 
discussed further in the Regulatory Evaluation Summary (Section V.A.) 
of this preamble. This inspection requirement accounts for the largest 
single cost of this final rule. This inspection requirement is not a 
new responsibility under this final rule; rather, TSA is taking this 
opportunity to provide a cost estimate for inspection of air cargo on 
passenger aircraft, as currently required under existing Security 
Directives. TSA provided cost estimates for these inspections in the 
NPRM, and has since revised them to account for the effect of the 
congressional directive and public comments. These Security Directives 
were first issued in November 2003. TSA subsequently issued security 
program amendments to reflect the inspection requirements of the 
Security Directives and the congressional mandates. These amendments 
have been implemented since July 2005. This rulemaking marks TSA's 
first opportunity to account for costs associated with the issuance of 
these security measures. The specific requirements for these 
inspections are SSI and are not appropriate for public disclosure as 
part of this rulemaking.
    Accordingly, about 75 percent of the approximately $2 billion 
overall 10-year cost of the requirements implemented under this rule 
are associated with requirements that did not originate with this rule. 
These costs originated with TSA Security Directives issued in November 
2003 and security program amendments issued in March 2005. The cost of 
implementing requirements that originate under this final rule is 
estimated to be about $167 million over a 10-year period.
    In conjunction with the publication of this final rule, TSA is 
issuing to regulated parties for comment proposed amendments to their 
security programs to implement this final rule as authorized under 49 
CFR 1542.105, 1544.105, 1546.105, and 1548.5.

II. Comment Disposition

    TSA received 134 letters commenting on the NPRM. These comments 
were submitted by a broad cross-section of parties with an interest in 
air cargo security; including aircraft operators, foreign air carriers, 
trade associations, airports, state and local governments, and indirect 
air carriers (IACs).\7\ These comments are addressed below, organized 
by major issues.
---------------------------------------------------------------------------

    \7\ ``Indirect air carrier'' or ``IAC'' means any person or 
entity within the United States not in possession of an FAA air 
carrier operating certificate, which undertakes to engage indirectly 
in air transportation of property, and uses for all, or any part, of 
such transportation the services of an air carrier. This does not 
include the U.S. Postal Service (USPS) or its representative while 
acting on the behalf of the USPS. See 49 CFR 1540.5. This definition 
reflects an amendment pursuant to this final rulemaking.
---------------------------------------------------------------------------

II.A. Security Threat Assessments (STAs)

    TSA received approximately 140 comments on the proposed requirement 
for security threat assessments (STAs) for persons with access to air 
cargo. The STA proposed by TSA would include a search by TSA of 
domestic and international databases to assess any potential terrorist 
threats from those individuals with access to air cargo. TSA currently 
requires a variety of individuals working in aviation to submit to a 
criminal history records check and an additional name-based background 
check. Generally, these individuals work on airport grounds and have 
access to secure areas. However, many other persons who have not been 
subjected to such background checks have access to air cargo. TSA

[[Page 30480]]

proposed to require that STAs be conducted on additional categories of 
persons who have unescorted access to air cargo to verify that these 
individuals do not pose a security threat. Individuals who undergo 
security checks required for unescorted access to a security 
identification display area (SIDA), or who have successfully completed 
another STA that TSA approves as comparable, would not be required to 
submit to an STA.
Applicability and Definitions
    Comment: The majority of comments addressing the proposed STA 
requirement expressed uncertainty about which employees would be 
required to have an STA, and what TSA considers to be ``unescorted 
access to cargo'' for purpose of triggering the STA requirement. In 
addition, the Regional Airline Association (RAA) states that the 
proposed language appears much broader than the scope previously 
recommended by the Aviation Security Advisory Committee (ASAC) because 
the requirement conceivably could apply to individuals who work outside 
of the airport environment. RAA believes that only individuals under 
the direct control of all-cargo airlines working at the airport should 
be subject to the STA requirement.
    The National Air Transport Association (NATA) suggests that TSA 
clarify specifically which persons are covered by the STA requirement--
either under this rule or by amendment to a security program--and which 
persons are excluded from the STA requirement. NATA states that because 
of industry confusion, a number of aircraft operators are unclear of 
their status with regard to the threat assessment requirement.
    The Air Transport Association (ATA) commented that they fully 
support TSA's conclusion that it is not necessary to require every 
employee of an entity regulated by TSA that is in the business of cargo 
transportation to submit to an STA. However, ATA believes that the 
proposed language in Sec. Sec.  1540.201 and 1544.228 is overly broad 
and subject to various interpretations.
    ATA states that, as written, the rules could apply to individuals 
who work outside the airport perimeter in cargo storage facilities or 
holding areas, truck drivers, and others who move cargo to airports on 
behalf of shippers. ATA believes that the rule also could apply to 
individuals who work at non-U.S. locations and employees of entities at 
the airport who share space or have access to air cargo areas operated 
by the regulated party, such as employees of fixed base operators who 
provide fuel and other supplies to regulated parties. ATA states that 
such broad coverage would be impractical and disruptive to timely air 
cargo transport, and urges TSA to clarify the language to limit the 
applicability.
    In addition, ATA recommends amending this section to apply to 
direct employees and authorized representatives of aircraft operators 
with unescorted access to cargo accepted by such aircraft operator. 
Federal Express (FedEx) recommends that TSA limit the STA requirement, 
to the extent permitted by applicable law, to employees who have 
unescorted access to the aircraft or cargo, or employees who they know 
or have reason to know will have access to cargo that will be tendered 
to a passenger carrier to be flown on a passenger aircraft.
    A number of comments asked for clarification as to what other 
security checks are approved by TSA, and, thus, would not require 
completion of an STA for that individual.
    TSA response: TSA agrees that not every employee should be subject 
to the STA requirement. Instead, TSA requires an STA for employees and 
agents of aircraft operators, foreign air carriers, and IACs who have 
unescorted access to cargo at certain times. TSA also requires an STA 
for certain IAC principals. TSA has revised the provisions of the 
regulations to clarify the STA requirement. While these revisions 
comport with the scope of the NPRM, we have restructured the sections 
to indicate more clearly which personnel are required to meet the STA 
requirements. The revisions clarify that the STA requirements apply:
     Only in the United States.
     To aircraft operators with a full program, or a full all-
cargo program; foreign air carriers under Sec.  1546.101(a), (b), or 
(e); and indirect air carriers.
     To individuals with unescorted access to cargo who are 
employees or agents of-- \8\
---------------------------------------------------------------------------

    \8\ The STA requirements also extend to an officer, director, 
and person who holds 25 percent or more of total outstanding voting 
stock of an IAC. However, TSA did not receive requests for 
clarification to this requirement.
---------------------------------------------------------------------------

     Aircraft operators with a full program and foreign air 
carriers under Sec.  1546.101(a) or (b) where they accept cargo;
     Aircraft operators with a full all-cargo program and 
foreign air carriers under Sec.  1546.101(e) where they consolidate or 
inspect cargo;
     IACs which accept cargo for transportation on aircraft 
operated by an aircraft operator with a full program, or a foreign air 
carrier under Sec.  1546.101(a) or (b); or
     IACs where they consolidate or hold cargo for 
transportation aboard an aircraft operated by an aircraft operator with 
a full or full all-cargo program, or a foreign air carrier under Sec.  
1546.101(a), (b) or (e).
     Unless the employee or agent has a Criminal History 
Records Check (CHRC) for unescorted authority to a SIDA, or another STA 
approved by TSA as comparable to an STA under subpart C.
    It is helpful to note where employees and agents are not required 
to have an STA. Appropriate background checks for access to airport-
restricted areas are obligatory under International Civil Aviation 
Organization (ICAO) Annex 17 Standards. TSA does not require STAs for 
unescorted access to cargo at foreign locations.
    Individuals do not need an STA if a person with the appropriate 
background check escorts them. Individuals who work near cargo, but do 
not require unescorted access to cargo, do not need an STA where the 
regulated entity has adopted access control measures to prevent 
unescorted access to the cargo. TSA will provide guidance on specific 
access control measures in their security programs and regulated 
entities may work with TSA to establish additional measures for TSA 
approval.
    Ensuring that individuals are properly escorted, or that cargo is 
in a locked, inaccessible area, are two of many possible examples of 
access control measures that may be available to regulated entities. 
Generally, TSA relies on the access control measures that have been in 
place through FAA and TSA regulations for many years. Regulated 
entities should contact their TSA principal security inspectors, or 
other appropriate TSA point of contact, if they have further questions 
regarding access control measures.
    Where employees and agents subject to STA requirements have 
successfully completed a CHRC for unescorted access authority to a 
SIDA, they have met their requirement and do not need to get a separate 
STA under this final rule. TSA already requires airport operators to 
send to TSA certain personal information for each individual who has 
undergone a CHRC for a current SIDA or sterile area ID in order to 
perform an additional background check that is comparable to an STA.
    TSA is providing instruction to aircraft operators with a full or 
full-all-cargo program to send to TSA the same type of information for 
cargo screeners who do not have current SIDA or sterile area IDs, and 
will also perform the additional check on this population. Most of 
these cargo screeners already

[[Page 30481]]

have SIDA IDs; and, thus, already are checked. Likewise, an employee or 
agent who has undergone another STA that TSA approves as being 
comparable does not need a separate STA under this rule. TSA considers 
the threat assessments it conducts for a person holding a commercial 
driver's license with a hazardous materials endorsement as comparable 
to an STA for purposes of this rule. See 49 CFR part 1572. TSA may 
determine that other threat assessments are comparable to the STA 
requirement under this rule and will expressly notify regulated 
entities with security program amendments from TSA upon making that 
determination. An employee or agent authorized to engage in the actions 
described below, who does not meet one of these means of compliance, 
must obtain an STA as directed in part 1540 of this rulemaking.
    For cargo accepted by an aircraft operator with a full program and 
a foreign air carrier under Sec.  1546.101(a) and (b), each employee or 
agent, whom the operator authorizes to have unescorted access, must 
have an STA.\9\ The STA requirement for these employees and agents 
applies at the point of acceptance, whether from a shipper, another 
aircraft operator, foreign air carrier, or indirect air carrier.
---------------------------------------------------------------------------

    \9\ Employees and agents do not need this STA if they have 
successfully completed a background check for unescorted access to 
SIDA, or have another threat assessment that TSA approves in this 
context.
---------------------------------------------------------------------------

    For cargo accepted in the United States by an aircraft operator 
under a full all-cargo program, or a foreign air carrier under Sec.  
1546.101(e), this provision applies to each employee or agent 
authorized to have unescorted access to cargo from the time the 
regulated entity consolidates or inspects cargo until it is loaded on 
an aircraft. TSA has determined that security procedures for these all-
cargo operations are best focused, and more efficiently applied, at 
locations where cargo is consolidated or inspected. Reasons for this 
determination include the layered security approach and the focus on 
interdicting stowaways.
    STA requirements for IAC employees and agents parallel measures 
from both passenger and all-cargo aircraft operators. Each IAC employee 
or agent who has unescorted access to cargo for transportation on a 
passenger aircraft must have an STA. For transportation aboard an all-
cargo aircraft, each IAC employee and agent must have an STA, if the 
IAC authorizes them to have unescorted access to cargo, from the time 
the cargo reaches an IAC facility where the IAC consolidates or holds 
the cargo.
    Comment: A few commenters note that there seems to be a conflict 
between proposed Sec.  1540.201 and proposed Sec.  1544.228; 
specifically, proposed part 1544 includes a provision of applicability 
of STAs to operators, but part 1540 does not. The commenters request 
that TSA clarify the scope of these sections, recognizing that the 
exclusion of all-cargo operators from Sec.  1540.201 may have been 
inadvertent.
    TSA response: TSA's omission of aircraft operators under a full 
all-cargo security program in Sec.  1540.201(a)(1) was an oversight. We 
have provided a technical amendment to that subparagraph, adding ``or 
(h)'' to the end of the provision.
Operators' Responsibility
    Comment: The Air Line Pilots Association International (ALPA) does 
not support the STA requirement because ALPA favors requiring persons 
with unescorted access to cargo to submit to a CHRC. ALPA argues that 
under the proposed rules, TSA could approve for unescorted access to 
air cargo an individual convicted of any of the 28 defined crimes 
because his or her name does not appear on government-maintained lists 
of individuals suspected of having a link to terrorism. ALPA states 
that criminal history, financial status, and many other factors can be 
indicators of an individual's character, reliability, maturity, and 
susceptibility to compromise.
    TSA response: TSA recognizes that there are a number of background 
check techniques that potentially could be applied to various persons 
in the supply chain. In accordance with our risk based, threat managed 
approach; TSA has determined that requiring persons with unescorted 
access to cargo to submit to an STA provides a significant enhancement 
while limiting costs. We note that persons with more sensitive 
positions, such as cargo screeners, are subject to CHRCs and additional 
background checks.
    Comment: Federal Express (FedEx) states, that in many cases, it 
would be unlawful for operators to conduct background checks on persons 
not directly employed by them. FedEx recommends requiring an operator 
to conduct such checks only on its direct employees. FedEx also 
expresses concern about requirements to have STAs for agents due to 
possible labor and employment law issues.
    FedEx also commented that for an IAC to fulfill this requirement, 
it will have to maintain employee records for all the truckers and 
warehousemen used by the IAC. Further, IACs will have to ensure that 
their vendors provide them timely updates of changes in employment and 
monitor unescorted access to cargo. FedEx believes that for the 
majority of IACs this would be an impossible task.
    Another comment supports the proposed section, but asserts that 
carriers should not be responsible for completing third party STAs. The 
commenter asserts that each entity should be responsible for completing 
its own STAs, and TSA should be responsible for funding any new 
background checks.
    TSA response: Aircraft operators, foreign air carriers, and IACs 
are responsible for carrying out all security measures as regulated 
parties. They do so using employees and agents, as they choose. They 
authorize unescorted access to cargo by agents and employees. Under 
these regulations, however, these regulated parties are not responsible 
for conducting the required background checks; rather they must ensure 
that the necessary information about their employees and agents is 
transferred to TSA for TSA to conduct the STA.
    TSA has carefully examined the scope of the need for an STA. TSA 
has revised the language of proposed Sec. Sec.  1544.228, 1546.213, and 
1548.15 to pertain to those individuals specifically authorized to have 
unescorted access to cargo. This final rule provides the aircraft 
operator, foreign air carrier, and IAC latitude in authorizing 
unescorted access to cargo in order to limit the number of persons 
requiring an STA. The requirement for an STA does not extend to 
employees or agents who are only near air cargo where the aircraft 
operator, foreign air carrier, or IAC has in place other security 
measures to control access to the cargo.
    If a regulated entity uses a third party agent to meet its security 
program requirements, which regulated entity is responsible for 
ensuring that the third party has an STA, just as they are responsible 
for other security duties their agents carry out. TSA is aware of no 
conflict with other laws with regard to collecting STA information.
    Comment: National Armored Car Association (NACA) states that 
requiring additional background checks on employees, who have already 
been investigated and certified by State agencies charged with 
licensing security personnel, is redundant and wasteful. NACA suggests 
that TSA accept certifications based on State investigations which 
include FBI fingerprint examinations, and issue any necessary TSA 
credentials based on these background checks.

[[Page 30482]]

    The American Trucking Association states that placing direct 
responsibility on operators to perform STAs on their agents, 
contractors, or subcontractors places a substantial financial burden on 
the operator and driver, and potentially will create a confusing, 
frustrating, and unworkable system.
    Other concerns of the American Trucking Association include whether 
STAs are transferable (i.e., would follow the employee as he or she 
changes employment), and how often individuals are required to renew 
their security authorization. The American Trucking Association 
proposes the use of TSA's Transportation Worker Identification 
Credential as an alternative solution to implementing STAs on 
individuals having unescorted access to air cargo.
    TSA response: In general, TSA does not anticipate accepting the 
background check of a private company or a state agency as comparable 
to a CHRC or STA approved by TSA. The TSA STA checks intelligence 
databases that are inaccessible to the private sector and not widely 
used by state agencies. As mentioned under Sec.  1540.201, STA 
requirements apply to those aircraft operators, foreign air carriers, 
and IAC employees and agents who are authorized and required to handle 
air cargo in the performance of their duties. STA requirements do not 
apply to employees and agents who have only incidental access to air 
cargo, or employees and agents who are required to submit to another 
TSA-approved STA, such as TSA HAZMAT driver's license requirements.\10\ 
TSA will consider accepting other TSA-approved STAs, such as the 
Transportation Worker Identity Credential upon broader implementation 
of its use.
---------------------------------------------------------------------------

    \10\ See 70 FR 22268 (Apr. 29, 2005), to be codified at 49 CFR 
part 383.
---------------------------------------------------------------------------

    Consistent with TSA policy on transferability of a CHRC conducted 
for unescorted access authority to a SIDA, an employee or agent who has 
successfully completed an STA for one employer need not complete it for 
another employer if the employee or agent has been continuously 
employed in a position that requires an STA. Additionally, as detailed 
in the response to the first comment on `Notification' below, there is 
no requirement to renew an STA as long as the STA-holder qualifies as 
continuously employed. TSA will provide further guidance to aircraft 
operators, foreign air carriers, and indirect air carriers upon 
request.
Notification
    Comment: Several commenters note the potential lengthy turn-around 
time for STA notifications under Sec.  1540.205 and recommend that TSA 
include a time frame in which it will make the notification. Many of 
these commenters propose that TSA should specify an anticipated 
response time of 10 working days to provide authorization or initial 
denial to submitted STAs. One commenter notes that TSA will need to 
increase staffing to handle the impact of processing the STAs in a 
timely manner.
    The American Trucking Association commented that the proposed rule 
excludes certain employers from receiving STA results on their drivers. 
Without employer notification, trucking companies are unable to make 
informed personnel decisions regarding their drivers. The American 
Trucking Association recommends amending this section to include 
notification to the individual, operator, and employer.
    TSA response: TSA agrees that an anticipated response time of 10 
working days in providing authorization or initial denial is 
appropriate and achievable in most cases. While some individual 
situations may require a longer timeframe for adjudication, TSA should 
provide the vast majority of approvals well within 10 working days. TSA 
further notes that once it approves an STA, by issuing a 
``Determination of No Security Threat'', the STA will remain valid for 
an employee or agent from one job to another in accordance with 
Sec. Sec.  1544.228(b)(2), 1546.213(b)(2), and 1548.15(b)(2), and 
consistent with TSA policy on continuous employment for holders of 
unescorted access authority to SIDA. However, TSA notes that the 
regulated party and the agent's direct employer are not prohibited from 
communicating about the notification.
Appeals Procedures
    Comment: The Airport Consultants Council proposes new language to 
clarify the requests for materials under the appeals procedure of Sec.  
1540.207(c)(1).
    TSA response: Rather than adopt new language, TSA revised Sec.  
1540.205(c)(4) by adding a cross-reference to Sec.  1540.207. Section 
1540.207(c) allows an appeal, including a written request for 
materials, within 30 days of receipt of the ``Initial Determination of 
Threat Assessment'' from TSA.
STA Fee
    Comment: United Parcel Service (UPS) states that they already 
conduct extensive background checks, including checking all airline 
employees against Federal governmental watch lists. If the TSA check 
merely duplicates what the air carrier already is doing, UPS contends 
there is no need for TSA to conduct the test and for the air carriers 
to pay the fee under Sec.  1540.209. UPS suggests that if TSA wants 
additional name checks with the proposed STA, then TSA should add the 
additional checks to the current listings and let the air carriers run 
them. This method does not place additional costs on TSA or the air 
carrier because the programming and personnel already are in place.
    Additional commenters request clarification on the procedures 
involved in an STA, because they do not understand the nature of the 
analysis or the basis of the $39 cost figure in the NPRM. The 
commenters believe that the proposed cost for the STA is excessive, 
given the cost of the comparable and more extensive CHRC checks.
    The Air Courier Conference of America (ACCA) and Purolator Courier 
oppose the fee, and state that TSA should carefully define the 
applicable population before it requires any new screening. They 
recommend that TSA conduct the screening against watch lists and the 
National Crime Information Center.
    FedEx states that, the new STA program will, contrary to TSA's 
expectations, increase both direct and indirect costs. They state that 
the direct cost of $39 for each STA is significantly more than the 
average cost of a CHRC. In addition, FedEx contends that the name-based 
methodology of an STA will result in indirect costs resulting from 
operational delays and disruptions due to false positives. FedEx argues 
that such indirect costs will exceed those that currently result from 
the CHRC.
    Like UPS, FedEx believes that air carriers should not have to pay 
TSA or another party to do something that they are already doing. The 
International Air Transport Association (IATA), Yellow Roadway, British 
Airways, Delta, and other commenters oppose the fee proposed in this 
section and believe that it is the Government's responsibility to 
provide protection from terrorists and to absorb any costs related to 
the STAs.
    TSA response: Private companies do not have access to all of the 
intelligence databases that TSA will use to conduct STAs. Further, TSA 
must make judgments as to the information received from the databases, 
which it has the expertise to apply. Accordingly, TSA has decided to 
conduct the STAs. Statutory provisions \11\ require that

[[Page 30483]]

industry should reimburse the agency for direct costs associated with 
accomplishing STAs. The STAs will not duplicate checks that the 
carriers are already accomplishing, as TSA has access to a variety of 
Government watch lists that are not appropriate for dissemination to 
the private sector. The $39 fee referenced in the NPRM assumed TSA 
would need to pay the FBI for access to the FBI's Automated Case System 
files. Subsequent to NPRM publication, TSA decided not to include the 
Automated Case System component in its STA. With increased vetting and 
credentialing experience, TSA has refined the necessary threat 
assessment sources to be included. As a result, the revised STA fee is 
$28.
---------------------------------------------------------------------------

    \11\ Department of Homeland Security Appropriations Act, 2004, 
Sec. 520 (Pub. L. 108-90, Oct. 1, 2003, 117 Stat. 1137).
---------------------------------------------------------------------------

    The rule provides for a phased-in implementation for compliance 
with the STA requirements. Regulated entities may mitigate delay in 
processing by timely submitting the STA application. Subsequent to the 
compliance date, any possible delay due to a false positive would occur 
prior to the applicant's authorization to have unescorted access to 
cargo. These new hires would constitute a small portion of the entire 
population subject to the STA. TSA expects that the percentage of false 
positives among these new hires will be minimal. Further, TSA analysts 
will be able to resolve most false positives quickly within the 
anticipated time frame for returning results.

Section 1546.213 STAs for Cargo Personnel in the United States

    Comment: Japan Airlines wants TSA to clarify whether this section 
would require foreign air carrier employees to undergo STAs or other 
checks when accessing off-airport facilities, despite the non-
application of SIDA-like requirements to such facilities. Nippon Cargo 
Airlines asks if the rule will apply only to new employees or if it 
will affect existing employees.
    TSA response: Foreign air carrier employees and agents within the 
United States are subject to the same requirements off-airport as 
corresponding U.S. aircraft operator employees and agents.
    If the foreign air carrier authorizes its employee or agent to have 
unescorted access to cargo at an off-airport facility and this facility 
is used to consolidate or inspect cargo until it is loaded on the 
aircraft, or an employee or agent accepts cargo from a known shipper, 
then the requirements of Sec.  1546.213 apply. The requirements apply 
to both new and existing employees and agents who have unescorted 
access authority granted by the foreign air carrier.

Section 1548.15 STAs for Individuals With Unescorted Access to Air 
Cargo

    TSA received 15 comments on this section. Most commenters have 
doubts about the responsibilities of IACs regarding this rule. They 
want to know who will need the STA and whether the requirements are 
retroactive for current employees.
    Comment: Atlanta-Hartsfield International Airport (ATL) asks if 
this requirement includes personnel in the manufacturing and shipping 
phase of preparing air cargo, and if so, whether an IAC will be 
responsible for filing an STA application on each loading dock employee 
and transport driver in the shipping chain. ATL also asks if these 
requirements are retroactive for current IAC employees or other cargo 
related businesses, and if so, for how many years into the past and how 
soon will the applications need to be filed.
    TSA response: The STA requirements apply to those aircraft 
operator, foreign air carrier, and IAC employees and agents who are 
authorized to have unescorted access to air cargo in the performance of 
their duties. Manufacturing or shipping personnel would only be 
required to have an STA if they are acting as an agent and have 
unescorted access to cargo for an aircraft operator, foreign air 
carrier, or IAC.
    Current IAC employees and agents are required to complete an STA 
successfully. TSA is providing 180 days from the date of publication of 
this rule for aircraft operators, foreign air carriers, and IACs to 
comply with the STA requirements.
    Comment: Air Courier Conference of America (ACCA) asks to which 
employees this section will apply, and why some employees will need to 
undergo a background check against TSA's lists while others may undergo 
a CHRC. They note that most ACCA members already check employee names 
against the ``no fly'' and ``selectee'' watch lists as a standard 
element of their Security Directives, and as an added safeguard.
    TSA response: This rule requires STAs within the United States for 
employees and agents authorized by aircraft operators, foreign air 
carriers, and indirect air carriers to have unescorted access to cargo. 
Persons who have CHRCs for unescorted access authority to a SIDA 
already have undergone TSA name-based checks comparable to the STA and 
therefore will not have to undergo another one.
    Comment: ATA supports a reasonable extension of STAs for IACs, but 
warns of significant potential for system disruptions, unless TSA 
defines IAC and air carrier responsibilities with regard to STA 
clearance. ATA asserts that air carriers cannot be responsible for 
ensuring the clearance of each IAC handler who may have contact with 
cargo before the delivery to the air carrier. ATA believes that this is 
not a workable process given the inherent time sensitivities in air 
cargo transport, the number of IACs providing cargo to air carriers, 
and the nature of an IAC's workforce scheduling.
    TSA response: TSA inspectors verify IAC compliance with STA 
requirements in the normal course of regulatory compliance inspections. 
Air carriers are not required to verify the IAC's compliance as part of 
the air cargo acceptance process.
    Comment: National Customs Brokers and Forwarders Association 
(NCBFAA) questions whether longtime employees, and licensed customs 
brokers, many of whom are also IACs and certified by U.S. Customs and 
Border Protection (CBP) under the Customs-Trade Partnership Against 
Terrorism program (C-TPAT), are subject to STA requirements. NCBFAA 
believes that these employees have proven their reliability and 
conscientiousness on security matters and it would be inefficient and 
unnecessary to subject them to background checks. NCBFAA recommends 
that TSA either exempt individuals previously approved by the CBP, or 
work with CBP to harmonize their respective screening processes. NCBFAA 
also proposes that TSA exempt IAC employees with a certain level of 
experience. NCBFAA believes it would be redundant to require a second 
DHS screening for many IAC employees. In addition, the NCBFAA 
recommends that TSA limit STA screening to a five-year period for 
persons who remain in good standing.
    TSA response: TSA will not exempt any employee from STA 
requirements based on length of service. TSA believes that performing 
background checks on individuals playing critical roles in the air 
cargo supply chain is a necessary step in ensuring aviation security. 
TSA currently is working with other DHS components to consider 
background checks performed by those components to determine if they 
are comparable to checks performed by TSA. Regulated entities will be 
able to refer to their security programs as provided by TSA for 
information on comparable checks. Regulated entities have incentive to 
determine whether an applicant has already completed a comparable check 
because the employee would not have to wait for clearance for 
unescorted access to cargo. Also TSA is providing in security programs 
that regulated entities

[[Page 30484]]

must accept the comparable check in lieu of the STA.

II.B. Acceptance and Screening of Cargo

    Comment: The majority of commenters on Sec. Sec.  1544.205, 
1546.205, and 1548.9 regarding inspection and screening of cargo are 
not sure how to accomplish compliance.
    TSA response: Specific Sensitive Security Information (SSI) 
measures will be proposed as amendments to airport, aircraft operator, 
foreign air carrier, and IAC security programs. The contents of these 
programs are not appropriate for public disclosure as part of this 
rulemaking. TSA is providing airport operators, aircraft operators, 
foreign air carriers, and IACs the opportunity to comment on the 
proposed amendments to their security programs upon issuance, and 
before the effective date of this final rule. It is helpful to note 
that many of these measures already appear in current Security 
Directives and security program requirements.
    Comment: UPS, ATA, Regional Airline Association (RAA), and Cargo 
Airline Association (CAA) state that Sec.  1544.205(a) and (b) are 
imprecise and redundant, and propose alternative language to 
consolidate the paragraphs.
    TSA response: Paragraph (a) of Sec.  1544.205 provides the general 
requirement and performance standard for carriage of cargo. Paragraph 
(b) provides the specific requirement for screening and inspecting 
cargo. Other paragraphs provide other specific requirements. The 
revision also extends those requirements to all-cargo aircraft 
operations with a maximum certificated take-off weight (MTOW) of more 
than 45,500 kg (100,309.3 lbs.). These paragraphs do not provide 
details of how these requirements must be met, because such details are 
Sensitive Security Information under 49 CFR part 1520 and are contained 
in security programs that are available only to persons with a need to 
know.
    Comment: Several commenters oppose requiring regulated entities to 
refuse cargo for transport if the shipper does not consent to screening 
and inspection of the cargo under Sec. Sec.  1544.205(d) and 
1546.205(b). They state that high cash value cargo, such as jewelry, 
currency, bullion, and other sensitive cargo, is shipped in sealed 
containers that cause damage or losses to cargo when opened. They 
suggest additional consideration and industry input on how to deal with 
these situations and ask whether the Government will provide 
indemnification if damage occurs during inspection by the Government or 
Government contractor personnel.
    TSA response: Regulated entities must refuse to transport cargo as 
required under, and consistent with, their security programs. TSA 
understands that requiring shippers, like drug companies, to consent to 
inspection of cargo is problematic. TSA agrees that the screening of 
certain types of cargo present unique challenges, and recognizes the 
safety and security concerns related to screening such cargo. TSA 
revised the wording in sections that require consent to screen cargo, 
and provides specific exceptions and alternative procedures in the 
proposed security program amendments for shipments whose contents would 
be damaged or compromised if the aircraft operator inspected the cargo. 
These procedures largely will be transferred from current Security 
Directives that address these concerns for later consideration in 
amendments to applicable security programs.
    Comment: NACA and NATA ask if the terms ``inspect'' and ``screen'' 
are interchangeable.
    TSA response: The terms ``inspect'' and ``screen'' are not 
interchangeable. Generally, screening means the systematic evaluation 
of a person or property to assess whether either poses a threat to 
security. TSA interprets inspection as a subset of screening. An 
inspection is a method of conducting such an evaluation, but is not the 
only method. For instance, the known shipper program is an information-
based method of screening. The known shipper program involves the 
screening of cargo based upon information known to an aircraft 
operator, foreign air carrier, or indirect air carrier about the 
shipper of the cargo. Additionally, a certain percentage of that cargo 
is inspected for the presence of persons and any unauthorized 
explosives, incendiaries, and other destructive substances or items.
    TSA will provide specific guidance to regulated entities in their 
respective security program amendments.
    Comment: FedEx wants TSA to clarify that the proposed rule does not 
require or authorize TSA to impose any additional screening beyond the 
screening they already are doing under SDs and security program 
amendments. Several all-cargo air carriers ask if TSA will bear the 
costs of the screening workforce and equipment required under Sec.  
1544.205, and want TSA to clarify who has the responsibility for 
screening cargo.
    TSA response: Aircraft operators incur the cost for the screening 
of cargo transported aboard their aircraft and must comply with the 
procedures for screening incorporated in their security programs. 
Specific screening requirements are promulgated in amendments to such 
programs and regulated parties are provided the opportunity to comment 
on these amendments, as appropriate.
    Regarding screening of cargo for transportation aboard passenger 
aircraft, 49 U.S.C. 44901(a) provided an exception for Federal 
screening for the known shipper program. The inspection of a portion of 
known shipper cargo is considered a part of the known shipper program 
and need not be conducted by Federal employees. This rule does not 
address the amount or type of cargo screening that is required. TSA 
will respond to changing conditions as needed. Additionally, TSA is 
considering whether the current system for selecting cargo for 
inspection will be changed with the TSA Freight Assessment System 
(FAS). The FAS might be used to identify cargo posing an elevated risk 
for the application of security measures in the aircraft operator's 
security program.
    Comment: FedEx, UPS, CAA, and ATA note that Sec.  1544.205(e) 
appears to prohibit the acceptance of cargo for air transportation from 
a variety of retail outlets, such as the UPS Store, FedEx, Kinko's, and 
other authorized shipping outlets. The commenters note that these 
outlets are neither the shipper nor an entity specifically mentioned 
with a comparable security program under Sec.  1544.205(e). However, 
the commenters believe that the exception under Sec.  1544.205(e) will 
permit them to continue to accept cargo from these retail outlets as is 
currently allowed in their security programs. The commenters want TSA 
to clarify that this is, in fact, TSA's intention. Further, if this is 
not the intention of TSA, they recommend excluding carriers operating 
under all-cargo programs from the application of this section, and 
propose using the following language for Sec.  1544.205(e): ``Each 
aircraft operator operating under a full program or an all-cargo 
program may accept cargo for air transportation on a passenger air 
carrier only from a known shipper, or from an aircraft operator, 
foreign air carrier, or IAC operating under a security program under 
this chapter with a comparable cargo security program.''
    TSA response: Aircraft operators under a full all-cargo security 
program are not prohibited from accepting cargo from retail entities as 
described in these comments. Under these rules, such retail outlets may 
operate either under an IACSSP, or as an agent with security 
responsibilities under the aircraft

[[Page 30485]]

operator's security program. For a further discussion of the 
differences between IACs and agents of aircraft operators, please see 
the Section-by-Section Analysis for Sec.  1548.5.
    Comment: UPS, CAA, ATA, and others commenters express concern about 
the extraterritorial applicability of Sec.  1544.205(f). CAA states 
that the rule seems to apply to international air cargo movements and 
notes that commercial realities and foreign government resistance make 
the application of this rule unattainable. UPS wants TSA to clarify 
this section to recognize that foreign law may limit the extent to 
which carriers may be able to comply with security programs outside the 
United States. ATA states that foreign countries may impose screening 
requirements that differ and even conflict with those in the carrier's 
security program and recommends that TSA permit air carriers to comply 
with either the security programs imposed by the foreign country or 
those contained in the TSA-approved security program.
    TSA response: TSA recognizes, as indicated by the commenters, that 
the imposition of regulatory requirements on a U.S. aircraft operator 
operating from foreign locations may be impacted by the legal 
requirements applied by the host government at such foreign locations. 
The requirement for a U.S aircraft operator to screen cargo at foreign 
locations is no different from any other current or proposed aviation 
security requirement placed upon a U.S. aircraft operator operating 
outside the United States. The specific security program mandates for 
the screening of cargo outside of the United States take into 
consideration cargo security restrictions, as well as requirements 
mandated at some foreign locations.
    Comment: Several smaller air carriers state that they cannot comply 
with the proposed rule requirement to open packages before loading at 
unsecured airports.
    TSA response: This rule codifies requirements for screening that 
already are in place through SDs and security program amendments. The 
fact that an aircraft operator operates at an airport without a 
security program has not been found to inhibit screening.
    Comment: Several airport operators and air carriers ask how to 
accomplish screening at rural airports.
    TSA response: Each aircraft operator and foreign air carrier 
security program must take into consideration the different locations 
at which cargo must be screened. Aircraft operators and foreign air 
carriers must conduct screening at rural airports in accordance with 
the specific requirements of their security programs.
Acceptance and Screening of Cargo From Locations Outside the United 
States
    Comment: Association of Asia Pacific Airlines (AAPA), British 
Airways, Association of European Airlines (AEA), and Singapore Airlines 
state that Sec.  1546.205 lacks provisions regarding the acceptance and 
recognition of National Aviation Security Program requirements that 
many foreign airlines use. They recommend standardizing requirements 
for acceptance and screening of cargo, and implementing threat-based 
measures for inspection of cargo.
    TSA response: TSA continues to recognize National Aviation Security 
Programs of foreign countries in accepted security programs.
    Comment: Several commenters, including British Airways, IATA, and 
AEA want TSA to clarify the term comparable security program in Sec.  
1546.205(e), and ask what this term includes. In addition, these 
commenters recommend amending Sec.  1546.205(f) to clarify that it 
applies only to cargo loaded outside the United States that is destined 
for the United States and that foreign air carriers may accept cargo 
destined for the United States from any lawful entity, subject to a 
compatible National Aviation Security Program as approved by the 
carrier's national government.
    TSA response: A comparable security program includes cargo security 
measures identical or equivalent to those required of the accepting 
aircraft operator or foreign air carrier. If the transferring aircraft 
operator, foreign air carrier, or IAC, has performed these cargo 
security measures, there is no further need for the accepting aircraft 
operator or foreign air carrier to repeat those measures. For instance, 
for transfers to aircraft operators with a full program, TSA will 
consider such security measures as: Whether the known shipper program 
was applied, from whom the operator accepted the cargo, the type of 
cargo screening or inspection that was done, and other relevant 
security measures.
    Overall, part 1546 applies to the operation, landing, or taking off 
within the United States of a foreign air carrier. Only cargo destined 
to, or transported through, the United States is subject to this final 
rule when loaded at a foreign airport. Section 1546.205(f) requires 
that foreign air carriers subject to this part carry out the 
requirements of their security programs. Section 1546.101 applies where 
a foreign air carrier lands or takes off in the United States.
Acceptance of Cargo by an Indirect Air Carrier
    Comment: Most comments to Sec.  1548.9 support this section and 
recommend that TSA allow IACs to screen cargo provided they demonstrate 
the capability to do so. The Yellow Road Corporation expresses concerns 
about the costs and redundancy associated with enforcing cargo security 
requirements for IACs, and recommends the adoption of varying levels of 
cargo screening with emphasis on loading cargo on the aircraft. IBM 
wants clarification on the requirement to obtain the shipper's consent 
to search or inspect cargo, and suggests allowing the shipper to give a 
blanket authorization to the IAC as part of its contract.
    TSA response: While TSA does not state in which manner the 
shipper's consent to search or inspect cargo be obtained, it does 
require that the consent be explicit and in writing. TSA allows 
aircraft operators, foreign air carriers, and IACs to manage the 
collection of consent to search in a manner consistent with individual 
operational needs. The regulations allow a shipper to provide a blanket 
authorization, as proposed by IBM.

II.C. Security Identification Display Area (SIDA)

    Comment: American Association of Airport Executives (AAAE) 
disagrees with TSA's assessment that airports easily will be able to 
extend SIDAs to areas where cargo is loaded and unloaded under Sec.  
1542.205. AAAE states that the rule does not adequately address the 
complexities of expanding SIDAs at airports with diverse operational 
configurations, property ownership, and jurisdictional control.
    Aircraft Owners and Pilots Association (AOPA) states that while 
this rule may not impose direct mandates for general aviation areas at 
airports regulated by TSA under 49 CFR part 1542, AOPA is concerned 
that the practical implementation of this requirement will result in 
SIDA requirements in many general aviation areas. In addition, AOPA 
notes that many airports specifically exclude general aviation areas 
from the SIDA because of time and distance separation from the air 
carrier areas. This layered approach to security limits access points 
and the number of individuals needing the background check and 
identification requirements for the SIDA, and establishes clear 
distinctions of security areas.

[[Page 30486]]

    AOPA recommends using the standard of the operational area of the 
aircraft principle for air cargo operations at part 1542 regulated 
airports, similar to that proposed for operations at non-part 1542 TSA 
regulated airports. AOPA further states that the operational area of 
the aircraft should include the immediate footprint of the cargo 
aircraft and handling area, with a procedure to limit unauthorized 
persons near the aircraft while it is being loaded and unloaded, but 
not the entire ramp.
    The Department of Transportation of Alaska states that this final 
rule will require CHRCs for most people working at an airport, and 
contends that expansion of the CHRC requirement will not effectively 
increase security for air cargo.
    TSA received some comments that relate to the fact that areas 
designated as SIDAs primarily are subject to airport operator control 
rather than aircraft operator control.
    CAA states that expansion of the SIDA is not the best way to secure 
the area surrounding cargo aircraft. It further asserts that the ASAC 
Working Groups did not recommend such a SIDA expansion, but rather 
recommended the imposition of SIDA-like requirements on air carriers 
operating from these cargo areas. CAA, UPS, DHL, and FedEx comments 
that the difference is significant from an operational, but not a 
security, standpoint, noting that it is essential that the all-cargo 
air carriers retain access control so they can carry out their 
requirements and internal company procedures. CAA recommends requiring 
air carriers to amend security programs to include SIDA-like measures 
at non-SIDA operational areas of U.S. airports where cargo is loaded or 
unloaded from aircraft.
    FedEx states that this section extends SIDA requirements to areas 
where operators sort loaded or unloaded cargo on airport grounds. 
However, Sec.  1542.205(a)(2) does not contain this important language. 
FedEx recommends adding the phrase ``on airport grounds'' after every 
reference to ``each area'' in the rule to clarify that facilities such 
as FedEx stations, world service centers, and non-airport sort 
locations are not to be included in SIDAs. UPS also proposes extensive 
revisions to this section.
    Airports Council International-North America (ACI-NA), ATA, and RAA 
do not support the extension of SIDA requirements. They state that the 
language is very broad and could potentially extend SIDA requirements 
far beyond what is necessary to ensure air cargo security. They 
recommend amending the SIDA requirements only to airport areas used to 
load or unload cargo from aircraft.
    The Miami International Airport, Atlanta-Hartsfield International 
Airport, ACI-NA, and the Airports Consultants Council agree that the 
new requirement will enhance the overall level of security, but only if 
designated in those areas under airport control. They argue that the 
SIDA should begin at the wall of the cargo facility adjacent to the 
airside ramp locations. The commenters also oppose requiring airports 
to extend, or enforce the security of the SIDA into tenant-leased 
facilities.
    Eleven small aircraft operators, AOPA, and Regional Air Cargo 
Carriers Association (RACCA) express concern about extending SIDA to 
cargo operating areas. The commenters state that the SIDA extension is 
impractical for aircraft operating under the TFSSP, since operations 
are conducted on common public areas like the gene
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.