Transportation Worker Identification Credential (TWIC)-Reader Requirements, 13360-13370 [E9-6852]
Download as PDF
13360
Proposed Rules
Federal Register
Vol. 74, No. 58
Friday, March 27, 2009
This section of the FEDERAL REGISTER
contains notices to the public of the proposed
issuance of rules and regulations. The
purpose of these notices is to give interested
persons an opportunity to participate in the
rule making prior to the adoption of the final
rules.
DEPARTMENT OF HOMELAND
SECURITY
Coast Guard
33 CFR Parts 101, 104, 105, and 106
[Docket No. USCG–2007–28915]
RIN 1625–AB21
Transportation Worker Identification
Credential (TWIC)—Reader
Requirements
Coast Guard, DHS.
Advanced notice of proposed
rulemaking.
AGENCY:
pwalker on PROD1PC71 with PROPOSALS3
ACTION:
SUMMARY: This advanced notice of
proposed rulemaking discusses the
United States Coast Guard’s preliminary
thoughts on potential requirements for
owners and operators of certain vessels
and facilities regulated by the Coast
Guard under 33 CFR chapter I,
subchapter H, for use of electronic
readers designed to work with
Transportation Worker Identification
Credentials (TWIC) as an access control
measure. It discusses additional
potential requirements associated with
TWIC readers, such as recordkeeping
requirements for those owners or
operators required to use an electronic
reader, and amendments to security
plans previously approved by the Coast
Guard to incorporate TWIC
requirements.
This rulemaking action, once final,
would enhance the security of ports and
vessels by ensuring that only persons
who hold valid TWICs are granted
unescorted access to secure areas on
vessels and port facilities. It would also
complete the implementation of the
Maritime Transportation Security Act of
2002 transportation security card
requirement, as well as the requirements
of the Security and Accountability for
Every Port Act of 2006, for regulations
on electronic readers for use with
Transportation Worker Identification
Credentials.
VerDate Nov<24>2008
17:07 Mar 26, 2009
Jkt 217001
DATES: Comments and related material
must reach the Docket Management
Facility on or before May 26, 2009.
ADDRESSES: You may submit comments
identified by Coast Guard docket
number USCG–2007–28915 to the
Docket Management Facility at the U.S.
Department of Transportation. Please
note the new address. See 72 FR 28092,
May 18, 2007. To avoid duplication,
please use only one of the following
methods:
(1) Online: https://
www.regulations.gov.
(2) Mail: Docket Management Facility
(M–30), U.S. Department of
Transportation, West Building Ground
Floor, Room W12–140, 1200 New Jersey
Avenue, SE., Washington, DC 20590–
0001.
(3) Hand delivery: Same as mail
address above, between 9 a.m. and 5
p.m., Monday through Friday, except
Federal holidays. The telephone number
is 202–366–9329.
(4) Fax: 202–493–2251.
(5) For comments containing
confidential information, business
information or sensitive security
information, please mail appropriately
marked comments to LCDR Jonathan
Maiorine, Commandant (CG–544) (RM
5222), U.S. Coast Guard, 2100 2nd
Street, SW., Washington, DC 20593.
FOR FURTHER INFORMATION CONTACT: If
you have questions on this advanced
notice of proposed rulemaking, call
LCDR Jonathan Maiorine, Coast Guard,
telephone 1–877–687–2243.
If you have questions on viewing or
submitting material to the docket, call
Renee V. Wright, Program Manager,
Docket Operations, telephone 202–366–
9826.
SUPPLEMENTARY INFORMATION:
Table of Acronyms
AHP Analytical Hierarchy Process
ANPRM Advanced Notice of Proposed
Rulemaking
ASPs Alternative Security Programs
TWIC Transportation Worker Identification
Credential
CDC Certain Dangerous Cargoes
CI/KR Critical Infrastructure/Key Resource
CRL Certificate Revocation List
DHS Department of Homeland Security
DOT Department of Transportation
EOA Early Operational Assessment
FASC–N Federal Agency Smart
Credential—Number
FOIA Freedom of Information Act
FR Final Rule
FSP Facility Security Plan
PO 00000
Frm 00001
Fmt 4702
Sfmt 4702
HSI Homeland Security Institute
ITEP Integrated Test and Evaluation
Program
ITT Initial Technical Test
MARSEC Maritime Security
MERPAC Merchant Marine Personnel
Advisory Committee
MODU Mobile Offshore Drilling Unit
MSRAM Maritime Security Risk Analysis
Model
MTSA Maritime Transportation Security
Act
NMSAC National Maritime Security
Advisory Committee
NPRM Notice of Proposed Rulemaking
OCS Outer Continental Shelf
OMB Office of Management and Budget
OSVs Offshore Supply Vessels
PACS Personnel Access Control System
PIN Personal Identification Number
PIV Personal Identity Verification
RA Regulatory Analysis
RKB Responder Knowledge Base
SSI Sensitive Security Information
ST&E System Test & Evaluation
TEMP Test and Evaluation Master Plan
TSA Transportation Security
Administration
TSAC Towing Safety Advisory Committee
TSI Transportation Security Incident
TWIC Transportation Worker Identification
Credential
VSP Vessel Security Plan
Table of Contents
I. Public Participation and Request for
Comments
A. Submitting Comments
B. Handling Confidential Information,
Proprietary Information, and Sensitive
Security Information (SSI) Submitted in
Public Comments
C. Viewing Comments and Documents
D. Privacy Act
E. Public Meeting
F. Future Opportunities for Comment
II. Summary of ANPRM
III. Background
A. Statutory History
B. Regulatory History
IV. Discussion of Process
A. Risk-Based Approach to Reader
Requirements
B. Maritime Security Risk Analysis Model
(MSRAM) and the Analytic Hierarchy
Process (AHP)
C. Requirement Options Considered
D. Reader Requirements
E. Facility and Vessel Risk Groups
F. Recurring Unescorted Access
G. Additional Topics and Requirements
V. Advisory Committee Input
VI. Discussion of Pilot Programs
VII. Regulatory Analyses
I. Public Participation and Request for
Comments
We encourage you to participate in
this rulemaking by submitting
E:\FR\FM\27MRP1.SGM
27MRP1
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Proposed Rules
comments and related materials. All
comments received will be posted,
without change, to https://
www.regulations.gov and will include
any personal information you have
provided. We have an agreement with
the Department of Transportation (DOT)
to use the Docket Management Facility.
A. Submitting Comments
If you submit a comment, please
include your name and address, identify
the docket number for this rulemaking
(USCG–2007–28915), indicate the
specific section of this document to
which each comment applies, and give
the reason for each comment. You may
submit your comments and material by
electronic means, mail, fax, or delivery
to the Docket Management Facility at
the address under ADDRESSES; but
please submit your comments and
material by only one means. If you
submit them by mail or delivery, submit
them in an unbound format, no larger
than 81⁄2 by 11 inches, suitable for
copying and electronic filing. If you
submit them by mail and would like to
know that they reached the Facility,
please enclose a stamped, self-addressed
postcard or envelope. We will consider
all comments and material received
during the comment period. We may
change the proposed rule in view of
them.
pwalker on PROD1PC71 with PROPOSALS3
B. Handling Confidential Information,
Proprietary Information and Sensitive
Security Information (SSI) Submitted in
Public Comments
Do not submit comments that include
trade secrets, confidential commercial
or financial information, or sensitive
security information (SSI) 1 to the public
regulatory docket. Please submit such
comments separately from other
comments on the rulemaking.
Comments containing this type of
information should be appropriately
marked as containing such information
and submitted by mail to the Coast
Guard point of contact listed in the FOR
FURTHER INFORMATION CONTACT section.
Upon receipt of such comments, the
Coast Guard will not place the
comments in the public docket and will
handle them in accordance with
applicable safeguards and restrictions
on access. The Coast Guard will hold
them in a separate file to which the
public does not have access, and place
1 ‘‘Sensitive Security Information’’ or ‘‘SSI’’ is
information obtained or developed in the conduct
of security activities, the disclosure of which would
constitute an unwarranted invasion of privacy,
reveal trade secrets or privileged or confidential
information, or be detrimental to the security of
transportation. The protection of SSI is governed by
49 CFR part 1520.
VerDate Nov<24>2008
17:07 Mar 26, 2009
Jkt 217001
a note in the public docket that Coast
Guard has received such materials from
the commenter. If the Coast Guard
receives a request to examine or copy
this information, we will treat it as any
other request under the Freedom of
Information Act (FOIA) (5 U.S.C. 552).
C. Viewing Comments and Documents
To view comments, as well as
documents mentioned in this preamble
as being available in the docket, go to
https://dms.dot.gov at any time, enter the
docket number for this rulemaking
(USCG–2007–28915) in the Search box,
and click ‘‘Go >>.’’ If you do not have
access to the internet, you may view the
docket online by visiting the Docket
Management Facility in Room W12–140
on the ground floor of the Department
of Transportation West Building, 1200
New Jersey Avenue, SE., Washington,
DC 20590, between 9 a.m. and 5 p.m.,
Monday through Friday, except Federal
holidays.
D. Privacy Act
Anyone can search the electronic
form of all comments received into any
of our dockets by the name of the
individual submitting the comment (or
signing the comment, if submitted on
behalf of an association, business, labor
union, etc.). You may review a Privacy
Act, system of records notice regarding
our public dockets in the January 17,
2008 issue of the Federal Register (73
FR 3316).
E. Public Meeting
Because the Coast Guard intends to
hold additional public meetings (see
Paragraph F ‘‘Future Opportunities for
Comment’’), we plan to hold only one
public meeting in the Washington, DC
area at this time. A notice with the
specific date and location of the meeting
will be published in the Federal
Register as soon as this information is
known. In addition, known interested
parties will be contacted via mail, email, or telephone. If you wish to be
contacted regarding the public meeting,
contact LCDR Jonathan Maiorine, listed
under FOR FURTHER INFORMATION
CONTACT.
F. Future Opportunities for Comment
The Coast Guard intends to publish a
Notice of Proposed Rulemaking (NPRM)
after reviewing the comments on this
Advanced Notice of Proposed
Rulemaking (ANPRM), and after
receiving data from the TWIC pilot
programs (discussed in Section IV
‘‘Discussion of Pilot Programs’’). We
intend to have an open comment period
with sufficient time to allow interested
parties to submit comments following
PO 00000
Frm 00002
Fmt 4702
Sfmt 4702
13361
publication of an NPRM. We also intend
to hold several public meetings during
that comment period, at various
locations across the country.
II. Summary of ANPRM
This ANPRM presents preliminary
thoughts of the Department of
Homeland Security, through the U.S.
Coast Guard and the Transportation
Security Administration, on potential
requirements for electronic TWIC
readers for certain vessels and facilities
that are regulated by the Coast Guard
under 33 CFR chapter I, subchapter H,
commonly known as ‘‘MTSA-regulated’’
vessels and facilities. The purpose of
this ANPRM is to open the public
dialogue on implementing TWIC reader
requirements using a risk-based
decision model, as well as to seek input
on other requirements that we are
considering proposing at the same time
as the reader requirements. We are not
proposing any specific changes to the
Code of Federal Regulations at this time.
Specific changes would be proposed in
an NPRM at a future date.
This ANPRM discusses separating
individual MTSA-regulated vessels,
facilities, and Outer Continental Shelf
(OCS) facilities into one of three risk
groups. Each risk group would have its
own associated electronic TWIC reader
requirements.
We are considering that those vessels
and facilities in the lowest risk group
continue to use TWICs primarily as a
visual identity badge only, at all
Maritime Security (MARSEC) Levels,
and subject to electronic verification
during inspections and spot checks, as
currently required in the joint Coast
Guard and TSA final rule on TWIC,
issued on January 25, 2007. 72 FR 3492.
At MARSEC Level 1, those in the
middle risk group would perform an
electronic read of the TWIC to verify its
authenticity and to verify the validity of
the card (i.e., ensure that it has not been
revoked). Owners or operators of these
vessels and facilities would match the
TWIC-holder’s fingerprint to the
biometric template stored within the
TWIC (i.e., perform a biometric match)
at MARSEC Level 1 on dates chosen
randomly within a frequency of at least
once a month. They would perform the
biometric match at each entry at the
higher MARSEC Levels.
Those vessels and facilities falling
into the highest risk group would
perform the biometric match and verify
the authenticity and validity of the card
at each entry at all MARSEC Levels.
These requirements are summarized
in a table, found in Section IV. D.
‘‘Reader Requirements’’ and are subject
to change based on public comment and
E:\FR\FM\27MRP1.SGM
27MRP1
13362
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Proposed Rules
additional data collection from the
TWIC reader testing pilot program
(‘‘pilot program’’), which is currently
underway as required by the Safety and
Accountability for Every Port Act of
2006 (SAFE Port Act), Public Law No.
109–347, 120 Stat. 1884, 1889 (Oct. 13,
2006). For example, we may propose, in
an NPRM, to require reader usage at a
facility or vessel in Risk Group C, or
require more frequent reader usage for
those facilities and vessels in Risk
Group B. We request comments from the
public regarding this process and, in
particular, the Risk Group divisions and
application of MARSEC Levels to reader
requirement frequency.
We are also considering that each risk
group have the option of using recurring
unescorted access for up to 14 TWIC
holders, per vessel or facility, if that
provision is included in their amended
security plan and approved by the Coast
Guard. In order to take advantage of
recurring unescorted access, the owner
or operator of the vessel or facility
would conduct an initial biometric
match of the individual against his/her
TWIC, either at hiring or upon the
effective date of a final rule, whichever
occurs later. This biometric match
would include a verification of the
authenticity and validity of the TWIC.
Once this check is done, the TWIC need
only be used as a visual identity badge,
at a frequency to be approved by the
Coast Guard in the amended security
plan, so long as the validity of the TWIC
is verified periodically, ranging from
monthly to daily, depending upon risk
group and MARSEC Level. We are
specifically seeking comment in this
ANPRM as to whether 14 persons is the
appropriate number of persons eligible
for recurring unescorted access and
whether the public believes this process
is appropriate for facilitating industry
operations while maintaining an
appropriate level of port security.
This ANPRM also discusses
recordkeeping requirements for those
risk groups required to use readers, and
for those owners or operators choosing
to use recurring unescorted access. It
discusses and seeks comment on a
requirement for all owners and
operators to amend their security plans
to incorporate TWIC requirements.
pwalker on PROD1PC71 with PROPOSALS3
III. Background
A. Statutory History
The principal statutory authority for
the TWIC program, the Maritime
Transportation Security Act of 2002
(MTSA), Public Law No. 107–295, 116
Stat. 2064 (Nov. 2, 2002), requires the
issuance of biometric transportation
security cards to Coast Guard
VerDate Nov<24>2008
17:07 Mar 26, 2009
Jkt 217001
credentialed merchant mariners and
other workers requiring unescorted
access to secure areas of vessels and
port facilities. 46 U.S.C. 70105(a)–(f)
(2002). The SAFE Port Act, Public Law
No. 109–347, 120 Stat. 1884 (Oct. 13,
2006) supplemented various MTSA
credentialing requirements. These
additional provisions included
establishing a port implementation
deadline; requiring implementation of a
pilot program to test TWIC readers; and
setting a deadline for promulgation of
final regulations requiring the
deployment of TWIC readers that are
consistent with the findings of the pilot
program. 46 U.S.C. 70105(g)–(m) (2006).
B. Regulatory History
On May 22, 2006, the Coast Guard
and TSA issued a joint notice of
proposed rulemaking (TWIC 1 NPRM)
entitled ‘‘Transportation Worker
Identification Credential
Implementation in the Maritime Sector;
Hazardous Materials Endorsement for a
Commercial Driver’s License,’’ setting
forth proposed requirements and
processes required by MTSA. 71 FR
29396. The TWIC 1 NPRM proposed
amending Coast Guard regulations on
vessel and facility security, found in 33
CFR chapter I, subchapter H, to require
the use of the TWIC as an access control
measure, as well as amendments to TSA
regulations on security threat
assessment standards. The TWIC 1
NPRM also proposed requiring the use
of TWIC in a biometric access control
system and user fees for TWIC issued
under this rule. The joint final rule
(TWIC 1 FR), issued January 25, 2007,
under the same title, established the
biometric credential requirements,
amended knowledge requirements,
expanded appeal and waiver provisions,
and set the user fee for the TWIC. 72 FR
3492. The TWIC 1 FR did not require
card readers. A full discussion of the
provisions for the TWIC 1 NPRM and
TWIC 1 FR can be found in the
preambles of those documents, at the
Federal Register cites provided in this
paragraph.
After publication of the TWIC 1 FR,
the Coast Guard issued a Notice of
Availability and requested comments on
draft TWIC biometric reader
specifications and draft TWIC
contactless smart card applications,
which were both developed by the
National Maritime Security Advisory
Committee (NMSAC). The Coast Guard
and TSA reviewed the comments
received and issued a Notice on
September 20, 2007, announcing the
working technical specification selected
for use in the TWIC pilot programs and
discussing the comments received in
PO 00000
Frm 00003
Fmt 4702
Sfmt 4702
response to the Notice of Availability.
72 FR 53784.
On July 13, 2007, the Coast Guard
issued a final rule to delay the
compliance date for facility owners and
operators wishing to redefine their
secure areas, to limit application of the
TWIC requirement to those portions of
their facility directly connected to
maritime transportation. 72 FR 38486.
This provision was included in the
TWIC 1 FR, and the delay in the
compliance date was necessary to allow
owners and operators to consider Coast
Guard guidance, issued as Navigation
and Vessel Inspection Circular 03–07 on
July 2, 2007.
On September 28, 2007, the Coast
Guard and TSA issued another joint
Final Rule to amend provisions of the
TWIC 1 FR. 72 FR 55043. This final rule
amended the definition of secure areas
to address facilities in the
Commonwealth of the Northern Mariana
Islands; allowed flexibility for
additional non-resident aliens to apply
for a TWIC; clarified who may obtain a
TWIC at a reduced fee; and amended the
replacement fee originally announced in
TWIC 1 FR.
On May 7, 2008, the Coast Guard and
TSA issued a joint final rule to extend
the compliance date set forth in the
TWIC 1 FR. 73 FR 25562. Under the
new final compliance date, mariners
must obtain a TWIC no later than April
15, 2009. That date also marks the final
date by which owners and operators of
vessels, facilities, and OCS facilities,
who have not otherwise been required
to implement access control procedures
utilizing TWIC on an earlier date, must
implement those procedures. Owners
and operators of vessels, facilities, and
OCS facilities should note, however,
that in accordance with the TWIC 1 FR
the Coast Guard has announced rolling
COTP Zone compliance dates in the
Federal Register.
IV. Discussion of Process
A. Risk-Based Approach to Reader
Requirements
This ANPRM discusses three levels of
requirements, with vessels and facilities
‘‘assigned’’ into a particular level based
on risk. We used the Maritime Security
Risk Analysis Model (discussed in B.
‘‘Maritime Security Risk Analysis Model
(MSRAM) and the Analytic Hierarchy
Process (AHP)’’) and other factors to
rank facilities and vessels as lower
versus higher risk. We are considering
proposing that those facilities and
vessels with the higher risk be required
to fully utilize the security features and
achieve the full risk reduction benefit of
the TWIC, whereas facilities and vessels
E:\FR\FM\27MRP1.SGM
27MRP1
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Proposed Rules
pwalker on PROD1PC71 with PROPOSALS3
at the lower risk level should be
required to implement only some of the
security features. We have presented the
resulting matrix of potential
requirements in this document. We are
seeking comment not only on these
requirements, but also on the risk
groups themselves and the method we
used to reach those groups, which is
discussed in the next section.
B. Maritime Security Risk Analysis
Model (MSRAM) and the Analytic
Hierarchy Process (AHP)
Three factors were applied to develop
a risk-based ranking of all MTSAregulated facilities and vessels by type.
These factors were: The maximum
consequence resulting from a terrorist
attack, the criticality to the nation’s
health, economy and national security,
and the utility of TWIC in reducing risk.
These factors were applied in an AHP
(discussed later in this section) to
develop an overall ranking of vessel and
facility types for which TWIC
requirements are assigned.2
The first factor applied was the
maximum potential consequence
resulting from the total destruction of
the vessel or facility. We developed this
factor by using the Coast Guard’s
MSRAM application.
MSRAM is a terrorism risk analysis
tool used to perform risk assessments on
critical infrastructure and key resources
in the maritime domain given a range of
terrorist attack scenarios. The tool’s
purpose is to capture and rank the
security risk facing different types of
potential terrorist targets (e.g.,
waterfront facilities, vessels, bridges and
other infrastructure) spanning all
Critical Infrastructure/Key Resource (CI/
KR) sectors in our nation’s ports and on
our waterways. An initial step in the
MSRAM process is to calculate the
maximum potential consequence of
total loss of a target, factoring in injury
and loss of life, economic and
environmental impact, symbolic effect,
and national security impact. MSRAM
then assesses risk for a range of
scenarios—each involving a
combination of target and method of
attack—in terms of threat, vulnerability,
and consequence. MSRAM also
considers the response capability of the
owner/operator, local first responders,
and Federal agencies to mitigate the
consequences of an attack. The Coast
Guard in consultation with
representatives from Area Maritime
Security Committees throughout the
2 The ranking from each factor, as well as the
overall rankings, are SSI per 49 CFR 1520.5(b)(5)
and (b)(12). In accordance with 49 CFR 1520.9, SSI
may only be released to covered persons with a
need to know the information.
VerDate Nov<24>2008
17:07 Mar 26, 2009
Jkt 217001
country has compiled this MSRAM risk
information from Coast Guard Sectors
and Captains of the Port into a database
which provides an overall national view
of terrorist risk to maritime assets.
We extracted information specific to
MTSA regulated vessels and facilities
from this database and used it to
address the maximum consequence that
would occur if the facility or vessel was
completely debilitated by a
transportation security incident (TSI)
resulting from a terrorist attack. These
MSRAM consequence scores were
averaged across similar types of MTSA
regulated vessels and facilities to
develop a standard risk score for each
type of vessel and facility.
The second factor scored was the
criticality of vessel or facility type. The
term ‘‘criticality’’ describes the impact
of the total loss of a vessel or facility
beyond the immediate local
consequences and addresses regional or
national impacts to human health, the
economy and national security.
Finally, we scored the utility of TWIC
in reducing vulnerability to terrorist
attack for each vessel and facility type.
We used the AHP to combine these
three factors and developed an overall
risk ranking by vessel and facility type.
AHP is a technique for decision making
which uses a limited number of
variables, each of which has a number
of different attributes. This enables the
combination of subjective and objective
input from a group to produce
consistent results.
Applying this technique, each of the
three factors was weighted based on
their importance to the policy decision
process, and an analysis was conducted
to check the consistency of the
evaluation measures. At the end of this
process, vessel and facility types with
similar scores were combined into ‘‘risk
groups’’ to determine TWIC verification
and validation requirements.
In determining the cut offs between
risk groups, risk rankings were graphed
to identify any natural breaks that
occurred in the data. For vessels, these
breaks generally occurred where there
was a change in the hazardous nature of
the cargo or where the number of
passengers carried aboard a vessel
increased. The breaks were similar for
facilities where these vessels called.
These breaks were used in defining risk
groups A, B, and C. These groups are
spelled out in E. ‘‘Facility and Vessel
Risk Groups.’’
We then turned to the Homeland
Security Institute (HSI) to provide an
independent peer review of our
PO 00000
Frm 00004
Fmt 4702
Sfmt 4702
13363
analysis.3 Specifically, HSI is evaluating
the validity of the risk assessment
methodology and its appropriateness for
the identified TWIC risk issues, the
extent to which the conclusions follow
from the analysis, and the overall
strengths and weaknesses of the risk
analysis. The main objective is to review
how the MSRAM methodology has been
applied to the development of the
proposed TWIC reader requirements;
the MSRAM methodology itself is not a
part of the peer review. HSI’s final
report is expected this fall, and will be
placed on the docket for this
rulemaking, where indicated under
ADDRESSES, as appropriate.
C. Requirement Options Considered
We considered three separate
categories of TWIC verification that
could, potentially, be checked at each
entry: (1) Identity verification, (2) card
authentication, and (3) card validity.
(1) Identity verification ensures that
the individual presenting the TWIC is
the same person to whom the TWIC was
issued. In its most reliable form, this is
done by matching the biometric
template stored in the TWIC to the
TWIC-holder’s live sample biometric
(e.g., a fingerprint). However it can also
be done to a less reliable degree by
visually comparing the photo on the
TWIC to the TWIC-holder or by
requiring the TWIC-holder to place their
card into a contact smart card reader
and then entering his/her 6-digit
Personal Identity Number (PIN),
selected by the TWIC-holder at card
issuance.
In some instances, a biometric match
will not be possible. A small number of
TWICs will be issued that contain either
poor quality fingerprint templates,
mostly due to badly damaged fingers, or
no fingerprint minutiae in the case of
amputations. In these cases, the reader
will display a prompt indicating that
this TWIC holder will require exception
handling. We expect that the facility or
vessel owner or operator will describe
the exception process to be used in
these cases in their security plan. The
exception processes may include visual
inspection of the TWIC including visual
comparison of the photo printed on the
card to the presented; visual comparison
of the digital photo stored on the TWIC
to the presenter by using a portable
3 The Homeland Security Institute (HSI) is a
Studies and Analysis Federally Funded Research
and Development Center established pursuant to
section 312 of the Homeland Security Act of 2002
(6 U.S.C. 192). HSI delivers independent and
objective analyses and advises in core areas
important to its sponsor in support of policy
development, decision-making, analysis of
alternative approaches, and evaluation of new ideas
on issues of significance.
E:\FR\FM\27MRP1.SGM
27MRP1
pwalker on PROD1PC71 with PROPOSALS3
13364
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Proposed Rules
reader with a contact interface and
releasing the photo to the reader screen
by entering the six-digit PIN; or an
alternative process proposed by the
owner or operator and approved by the
Coast Guard.
Biometrics, other than the fingerprint
templates stored in the Integrated
Circuit Chip of the TWIC, may be used
to biometrically verify the identity of
individuals being granted unescorted
access to secure areas of MTSA
regulated facilities and vessels provided
that a ‘‘chain-of-trust’’ is maintained to
link the individual, their TWIC, and the
alternative biometric. The process for
maintaining these links would need to
be described in an FSP or VSP,
approved by the Coast Guard. In
addition to linking the alternate
biometric to the individual and heir
TWIC, the process would need to
include ascertaining the validity of the
individual’s TWIC.
Before obtaining an alternate
biometric the TWIC holder must first be
linked to their credential by matching
the holder’s fingerprint to the
fingerprint template on the TWIC using
a reader capable of reading and
matching the TWIC biometric. During
this process, the validity of the TWIC
would also need to be ascertained. If the
fingerprint template match is successful
and the TWIC is valid the credential
would, in most cases, be registered with
the personnel access control system
(PACS). While the TWIC holder is
present, the alternate biometric would
be captured and linked to the TWIC,
thus establishing a ‘‘chain-of-trust’’
between the individual, their TWIC, and
the alternate biometric. Variations on
the usual process of registering the
TWIC and alternate biometrics in a
PACS, such as storing the alternate
biometric on a separately issued card, or
storing the alternate biometric on a local
reader, may be proposed as part of the
FSP or VSP. However, in all cases the
linkage between the individual, the
TWIC, and the alternate biometric
would need to be proven and approved
by the Coast Guard.
(2) Card authentication ensures that
the card being used is an authentic
TWIC, i.e., not a counterfeit. As
designed, the primary method of card
authentication involves engaging the
TWIC with a reader to perform a
CHALLENGE/RESPONSE protocol
using the Card Authentication
Certificate and the associated card
authentication private key resident on
the TWIC.4 The card can also be
4 The TWIC reader will read the Card
Authentication Certificate from the TWIC card and
then send a challenge to the card requesting the
VerDate Nov<24>2008
17:07 Mar 26, 2009
Jkt 217001
visually inspected for various security
features that are embedded into the
front and back of the card, although this
is a less reliable form of card
authentication.
(3) Card validity involves the
determination that a TWIC is still valid,
i.e., that it has not expired; been
reported as lost, stolen, or damaged; or
been revoked for cause by TSA. A TWIC
that is invalid is placed on the ‘‘hotlist,’’
which is updated daily.5 As designed,
checking for card validity is
accomplished by comparing the
expiration date of the TWIC to the
current date and additionally comparing
the card’s internal Federal Agency
Smart Card—Number (FASC–N),
retrievable from several locations within
the TWIC, to the hotlist FASC–Ns that
TSA makes available to owners and
operators.
An alternative method for checking
card validity is to use a Certificate
Revocation List (CRL). The link to the
CRL is embedded in the Issuer Signing
Certificate present on every card.6 Each
entry of the CRL is comprised of the
certificate number and its date of
revocation. Note there are four
certificates for every TWIC Card (Card
Authentication Certificate, Digital
Signature Certificate, Key Management
Certificate, and Personal Identity
Verification (PIV) Authentication
Certificate). The CRL is updated daily.
Both of these processes (hotlist or CRL
check) require a card/reader interface. A
partial card validity check can be
accomplished by reviewing the
expiration date on the face of the TWIC,
but such a check would not capture
information relating to cardholders who
TSA determines pose a security threat
and/or hold revoked TWICs.
We anticipate that the Hotlist match
(or the CRL match) can be done in one
of two ways: Electronically (either in
real time or by downloading the Hotlist
into the reader or a separate access
control system), or by printing out the
card authentication key be used to sign a random
block of data (created and known to the TWIC
reader). The TWIC reader will use the public key
embedded in the Card Authentication Certificate to
verify the signature of the random data block is
valid. If the signature is valid the TWIC reader will
trust the TWIC card submitted and will proceed to
pulling the Federal Agency Smart Credential—
Number (FASC–N) and other information from the
card for further processing. The Card
Authentication Certificate contains the FASC–N
and a certificate expiration date harmonized to the
TWIC card expiration date. This minimizes the
need for the TWIC reader to pull more information
from the card (unless required for additional
checking).
5 The hotlist is online at: https://
twicprogram.tsa.dhs.gov/TWICWebApp/
SDownloadHotlist.do.
6 The CRL is located at https://twic-crl.orc.com/
CRLs/TWICCA1.crl.
PO 00000
Frm 00005
Fmt 4702
Sfmt 4702
Hotlist and manually entering it into a
separate access control system.
The TWIC 1 NPRM discussed the
potential for a process called ‘‘privilege
granting,’’ in which an owner or
operator could contact TSA and register
those persons granted unescorted access
privileges at the vessel or facility.
Owners or operators would provide
TSA with the FASC–Ns for every person
who was being considered for
unescorted access privileges. TSA
would then contact the owner or
operator directly if any of those FASC–
Ns were placed on the Hotlist. This
option requires access to a TWIC reader
in order to discern the FASC–Ns
associated with the individuals given
unescorted access. This capability was
tested during TSA’s TWIC prototype but
is not part of the current TWIC system.
We would like to hear comments on
whether such an option would be
preferred, and if so, whether owners and
operators would be willing to pay a fee
for the option of using privilege granting
(instead of downloading the Hotlist at
regular intervals). If users would be
willing to pay a fee, we also request a
range of what would be appropriate
(e.g., one time fee to use the system,
annual fees, or a combination of both,
plus limits on what fees owners and
operators would be willing to pay).
D. Reader Requirements
When we considered electronic reader
requirements for facilities and vessels,
we began with a baseline approach that
all three categories of TWIC
verification—identity verification, card
authentication, and card validity—in its
most reliable and complete form should
be required of all risk groups.
TWIC provides a universally
recognized, tamper-resistant credential
backed up by a TSA security threat
assessment that, when used as an access
control tool, reduces the risk of a
transportation security incident at
vessels and maritime facilities. TWIC is
a dual interface smart card which was
developed using national and
international standards to ensure
security, interoperability and
performance. The card has physical and
logical security features which, when
used properly, can provide a secure
method of determining, with a high
level of assurance, that the TWIC-holder
is the same individual to whom the
TWIC was issued, and that they do not
present a security threat.
The benefit of using existing industry
recognized standards in developing the
TWIC is the flexibility of use the card
provides. It can be integrated into
existing access control systems by using
the TWIC as a secure means of
E:\FR\FM\27MRP1.SGM
27MRP1
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Proposed Rules
authenticating an individual when first
registering an individual into an
existing access control system.
Alternatively, either the contact or
contactless interface can be used with
existing smart card readers to
authenticate the individual and the
credential when making access control
decisions, by securely accessing and
using the data stored on the TWIC.
A design principle of the TWIC
system is to establish and maintain a
chain of trust. A chain of trust is a
security architecture that ensures that a
uniform level of security and integrity is
applied to the components or agents
where information is stored or passes
through. TWIC accomplishes this by the
use of secure communication between
components of the TWIC system,
identity verification and authentication
13365
issuance requirements, and centralized
personalization.
The following tables briefly
summarize the requirements the Coast
Guard is considering for each risk
group. It indicates what would need to
occur, at each MARSEC Level, to
complete identity verification, card
authentication, and a card validity
check.
TABLE OF POTENTIAL READER REQUIREMENTS
MARSEC Level 1
Risk Group B, HAZ
MAT, Crude Oil, 500–
1,000 passengers.
Risk Group C, Non-HAZ
MAT, <500 passengers
MODU OSV.
MARSEC Level 3
IDENTITY VERIFICATION: Biometric
match of fingerprint to template
stored in TWIC at each entry.
CARD AUTHENTICATION: Electronic
communication to achieve a successful CHALLENGE/RESPONSE
result at each entry.
CARD VALIDITY CHECK: Compare
FASC–N against Hotlist at each
entry; update Hotlist weekly.
IDENTITY VERIFICATION: Random
biometric match of fingerprint to
template stored in TWIC, at least
one day a month; all other times as
visual identity badge.
CARD AUTHENTICATION: Electronic
communication to achieve a successful CHALLENGE/RESPONSE
result at each entry.
CARD VALIDITY CHECK: Compare
FASC–N against Hotlist at each
entry; update Hotlist weekly.
IDENTITY VERIFICATION: Visual
identity badge at each entry.
IDENTITY VERIFICATION: Biometric
match of fingerprint to template
stored in TWIC at each entry.
CARD AUTHENTICATION: Electronic
communication to achieve a successful CHALLENGE/RESPONSE
result at each entry.
CARD VALIDITY CHECK: Compare
FASC–N against Hotlist at each
entry; update Hotlist daily.
IDENTITY VERIFICATION: Biometric
match of fingerprint to template
stored in TWIC at each entry.
IDENTITY VERIFICATION: Biometric
match of fingerprint to template
stored in TWIC at each entry.
CARD AUTHENTICATION: Electronic
communication to achieve a successful CHALLENGE/RESPONSE
result at each entry.
CARD VALIDITY CHECK: Compare
FASC–N against Hotlist at each
entry; update Hotlist daily.
IDENTITY VERIFICATION: Biometric
match of fingerprint to template
stored in TWIC at each entry.
CARD AUTHENTICATION: Electronic
communication to achieve a successful CHALLENGE/RESPONSE
result at each entry.
CARD VALIDITY CHECK: Compare
FASC–N against Hotlist at each
entry; update Hotlist daily.
IDENTITY VERIFICATION: Visual
identity badge at each entry.
CARD AUTHENTICATION: Electronic
communication to achieve a successful CHALLENGE/RESPONSE
result at each entry.
CARD VALIDITY CHECK: Compare
FASC–N against Hotlist at each
entry; update Hotlist daily.
IDENTITY VERIFICATION: Visual
identity badge at each entry.
CARD AUTHENTICATION: Check
security features on card at each
entry and electronic verification
during annual inspections and random spot checks.
CARD VALIDITY CHECK: Check expiration date at each entry; CG
perform spot checks.
Risk Group A, Bulk
CDCs, >1,000 passengers
MARSEC Level 2
CARD AUTHENTICATION: Check
security features on card at each
entry and electronic verification
during annual inspections and random spot checks.
CARD VALIDITY CHECK: Check expiration date each entry; CG perform spot checks.
CARD AUTHENTICATION: Check
security features on card at each
entry and electronic verification
during annual inspections and random spot checks.
CARD VALIDITY CHECK: Check expiration date at each entry; CG
perform spot checks.
pwalker on PROD1PC71 with PROPOSALS3
Risk Group A
To provide the maximum security
benefit, we determined that those assets
presenting the highest risk should be
required to implement the most
protective measures. Thus, we are
considering requiring facilities and
vessels that fall into risk group A to
either match the TWIC-holder’s
biometric (fingerprint) to the template
stored in the card or to match the TWICholder’s biometric to one held in the
owner/operator’s own access control
system. This match will need to occur
VerDate Nov<24>2008
17:22 Mar 26, 2009
Jkt 217001
at each entry. For the latter option, the
owner or operator may choose to apply
a different biometric than the
fingerprint, such as an iris scan or hand
geometry, stored in the local access
control system and matched to the
individual seeking access. Also, for the
latter option, the owner/operator’s
system must be linked to the TWIC in
such a manner that the access control
system forbids access to someone who
does not have a valid TWIC, or to
someone other than to whom the TWIC
has been issued. This means that the
TWIC will need to be read and the
PO 00000
Frm 00006
Fmt 4702
Sfmt 4702
stored biometric identifier matched
against the TWIC-holder’s fingerprint at
least once, when the individual is
entered into the local access control
system.
We are re-considering whether to
require a TWIC-holder to verify his/her
PIN as a part of the identity verification
process. This added element, making
the TWIC-holder provide ‘‘something
he/she knows,’’ would complete threefactor authentication: (1) Something the
person has—a TWIC credential; (2)
E:\FR\FM\27MRP1.SGM
27MRP1
pwalker on PROD1PC71 with PROPOSALS3
13366
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Proposed Rules
Something the person knows—a PIN,
stored securely on * * * the credential;
and (3) Something the person is—
biometric. PIN verification would
require the TWIC to be inserted into a
card reader, as the PIN only operates in
the contact-chip mode. Comments
received on the TWIC 1 NPRM made it
clear that requiring insertion of a TWIC
into an open-slot card reader was not
favored among the maritime
community. This was echoed in the
recommendations made by NMSAC in
its recommendations for specifications
for a contactless TWIC. There were
concerns over whether the readers
would be able to withstand harsh
environmental and operational
conditions and how long they would
last if they were operated continually in
the maritime environment. Industry
partners also voiced concerns over
whether maritime workers would be
able to remember a PIN, especially if a
PIN was only required at higher
MARSEC Levels, and over the
operational delays that may be caused
by requirements for TWIC-holders to
pass through access control points,
insert the card, enter a PIN (which could
take several tries), and then remove the
card. After considering these comments,
the relative risk presented by the vessels
and facilities, and the security already
being provided through the remaining
requirements, we have tentatively
determined that a requirement for use of
the PIN would have a negative impact
on large scale throughput during access
control evolutions. As a result, we have
not included a requirement for regular
use of the PIN at any MARSEC Level for
any risk group in this ANPRM. We
would like public comments on this
decision and whether the Coast Guard
should reconsider using PIN
requirements. We note, however, that
PINs may be required by owners and
operators who wish to implement an
additional level of security or during the
spot checks and annual inspections
conducted by the Coast Guard.
We are also considering a proposal
that vessels and facilities in the highest
risk group (risk group A) authenticate
the card electronically with a card
reader at each entry. Again, for vessels
and facilities opting to integrate TWIC
into existing local access control
systems, this will need to be done before
the individual’s information is added
into the local access control system, and
before unescorted access is first granted
to the individual. For other vessels and
facilities, this function can be done by
TWIC readers at the same time that the
biometric match is being made. Adding
this requirement would add a negligible
VerDate Nov<24>2008
17:07 Mar 26, 2009
Jkt 217001
time to the transaction between the
TWIC-holder and the card reader, as the
readers will be able to perform this
function as the individual is presenting
his or her finger for matching against the
template stored on the TWIC.
Finally, vessels and facilities in risk
group A would verify the validity of the
TWIC at each entry using information
that is no more than seven (7) days old,
when at MARSEC Level 1. This means
that on a weekly basis, the Hotlist or
CRL will need to be downloaded into
the reader(s) used at the vessel or
facility’s access control point(s) or into
the local access control system used by
the vessel or facility. This frequency
will jump to daily (i.e., the Hotlist or
CRL will need to be downloaded daily)
at MARSEC Levels 2 and 3. We request
comments, particularly from vessels and
facility owners and operators in risk
grouping A, as to these processes.
Risk Group B
Vessels and facilities in risk group B
would, under a final rule based on this
model, be required to complete the
identity verification by using the TWIC
as a visual identity badge (‘‘flash pass’’)
at each entry. On a random basis, but at
least one day a month, at MARSEC
Level 1, they would also be required to
match the biometric stored on the card
in order to conduct more complete
identity verification.
Vessels and facilities in risk group B
would need to perform card
authentication by electronically reading
all the cards at MARSEC Level 1 at each
entry, even when the biometric match is
not being implemented. While these
checks require the use of an electronic
reader, they may be done using the
contactless smart card interface, and
would not require that the individual
TWIC-holder present his or her
fingerprint for matching against the
template. The validity of the TWICs
must be checked at each entry, using
TSA’s Hotlist or CRL. At MARSEC Level
1, this would be done using information
that is no more than seven (7) days old.
At MARSEC Levels 2 and 3, the
information would be downloaded
daily. We seek comments on this
process and its application to vessels
and facilities in risk group B.
Risk Group C
Facilities and vessels in the lowest
risk group, risk group C, would not be
required to match the biometric stored
on the card in order to complete the
identity verification at any MARSEC
Level. Instead, they would only be
required to use the TWIC as a visual
identity badge in the manner currently
required by the TWIC 1 FR. This
PO 00000
Frm 00007
Fmt 4702
Sfmt 4702
provides identity verification with a
lower level of reliance than a biometric
match would, however, we have
determined at this time, and subject to
public comment, that in this lower risk
group matching the biometric frequently
is not necessary. Given the type of
commodities and small number of
passengers typical of this risk group, it
is likely these vessels and facilities are
a less attractive target for individuals
who wish to do harm, though still
holding the potential of being involved
in a TSI. As a result, we have
determined that the frequent matching
of a biometric would not be practical. In
addition, identity verification using
TWIC as a visual identity badge would
more closely align with other less
stringent security provisions
implemented at these lower risk vessels
and facilities.
Card authentication for this group
(risk group C), would require only
verification of the various security
features on the front and back of the
card. Under this process, vessels and
facilities in this risk group would
continue to use the TWIC in the manner
required by the TWIC 1 FR. Finally, for
the card validity check, we would
require only that the expiration date be
checked. Thus, vessels and facilities in
risk group C will be able to fulfill their
TWIC obligations without having to buy
or have access to a card reader.
This does not mean that individuals
who hold TWICs and work exclusively
at vessels or facilities falling into risk
group C will never need to present their
TWICs for a biometric match or more
secure card authentication check. The
Coast Guard will continue to check and
verify TWICs, using handheld readers,
during annual inspections and during
unannounced spot checks aboard
vessels and facilities within all three
risk groups. These checks will include
identity verification using the
fingerprint template stored in the TWIC,
card authentication, and card validity
checks using the current TSA Hotlist or
CRL. Additionally, vessels and facilities
may choose to electronically
authenticate the card with a card reader.
TSA would be able, through use of
information collected during enrollment
for the TWIC, to contact employers or
the Coast Guard if an imminent threat,
resulting in an immediate revocation of
a TWIC, is identified during the
perpetual vetting of TWIC holders. At
MARSEC Levels 2 or 3, the Coast Guard
spot checks and the percentage of
TWICs verified at each annual
inspection would increase.
The Coast Guard seeks public
comment of these processes, and
specifically as to the everyday
E:\FR\FM\27MRP1.SGM
27MRP1
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Proposed Rules
operational impacts related to the
process and whether they will maintain
appropriate security levels while
permitting the efficient and effective
continuation of industry operations.
E. Facility and Vessel Risk Groups
The following are suggested risk
groups for vessels that are subject to 33
CFR part 104:
Risk Group A
(1) Vessels that carry Certain
Dangerous Cargoes (CDC) in bulk;
(2) Vessels certificated to carry more
than 1,000 passengers; and
(3) Towing vessels engaged in towing
a barge or barges subject to paragraphs
(1) or (2).
Risk Group B
(1) Vessels that carry hazardous
materials other than CDC in bulk;
(2) Vessels subject to 46 CFR Chapter
I, Subchapter D, that carry any
flammable or combustible liquid cargoes
or residues 7;
(3) Vessels certificated to carry 500 to
1,000 passengers; and
(4) Towing vessels engaged in towing
a barge or barges subject to paragraphs
(1), (2), or (3).
Risk Group C
(1) Vessels carrying non-hazardous
cargoes that are required to have a
vessel security plan;
(2) Vessels certificated to carry less
than 500 passengers;
(3) Towing vessels engaged in towing
a barge subject to paragraphs (1) or (2);
(4) Mobile Offshore Drilling Units
(MODU); and
(5) Offshore Supply Vessels (OSVs)
subject to 46 CFR chapter I, subchapters
L or I.
The following is suggested risk groups
for facilities that are subject to 33 CFR
part 105:
pwalker on PROD1PC71 with PROPOSALS3
Risk Group A
(1) Facilities that handle CDC in bulk;
(2) Facilities that receive vessels
certificated to carry more than 1,000
passengers; and
(3) Barge fleeting facilities that receive
barges carrying CDC in bulk.
Risk Group B
(1) Facilities that receive vessels that
carry hazardous materials other than
CDC in bulk;
(2) Facilities that receive vessels
subject to 46 CFR Chapter I, Subchapter
D, that carry any flammable or
combustible liquid cargoes or residues;
7 The intent as used here is to capture those tank
vessels that are carrying the high flash point
petroleums, like crude oil, that aren’t hazardous
materials, whether inland, coastal, or seagoing.
VerDate Nov<24>2008
17:07 Mar 26, 2009
Jkt 217001
(3) Facilities that receive vessels
certificated to carry 500 to 1,000
passengers; and
(4) Facilities that receive towing
vessels engaged in towing a barge or
barges carrying hazardous materials
other than CDC in bulk, crude oil, or
certificated to carry 500 to 1,000
passengers.
Risk Group C
(1) MTSA-regulated facilities that
receive vessels carrying non-hazardous
cargoes that are required to have a
vessel security plan;
(2) Facilities that receive towing
vessels engaged in towing a barge
carrying non-hazardous cargoes;
(3) Facilities that receive vessels
certificated to carry less than 500
passengers.
All OCS facilities subject to 33 CFR
part 106 would fall into risk group B.
We considered the possibility that
vessels may move from one risk group
to another, based on the cargo they are
carrying or handling at any given time.
We expect that owners and operators of
vessels that expect to be in this situation
(of moving between risk groups) will
explain, in their amended security
plans, how they will move between the
requirements of the higher and lower
risk groups, with particular attention to
the security measures to be taken when
moving from a lower risk group to a
higher risk group and seek comments
regarding this requirement and the
potential timing and processes for
carrying out these amendments.
We have also considered the
possibility that facilities could be
permitted to move between risk groups
based on vessel interface or cargo
operations. We are specifically
requesting comment and suggestions on
how to apply this flexibility as it
pertains to potential electronic reader
requirements while ensuring an
equivalent level of security and
consistency across multiple COTP
Zones to the maximum extent possible.
F. Recurring Unescorted Access
In the TWIC 1 NPRM, we introduced
the concept of recurring unescorted
access for vessels to allow an individual
to enter on a continual basis, without
repeating the identity verification
requirement at each entry. 71 FR 29410.
This concept allowed flexibility for an
individual to acquire unescorted access
to secure areas on a continual or
ongoing basis, without having to fulfill
the TWIC access control requirement at
every entry. In that NPRM, we noted
that an owner or operator’s decision to
grant recurring unescorted access
should be based on two considerations:
PO 00000
Frm 00008
Fmt 4702
Sfmt 4702
13367
(1) The relationship of the individual to
the vessel, or how well ‘‘known’’ he or
she is; and (2) the individual’s need to
have frequent and unimpeded access to
the vessel. In developing this ANPRM,
we determined that both vessels and
facilities, at each risk group, should
have the option of using recurring
unescorted access for up to 14 persons
per vessel or facility, if that provision is
included in their amended security plan
and approved by the Coast Guard. In
order to take advantage of recurring
unescorted access, the owner or
operator of the vessel or facility would
need to perform a biometric match of
the individual against his or her TWIC
(identity verification), either at hiring or
upon the effective date of a final rule,
whichever occurs later. This biometric
match would need to include a
verification of the FASC–N and the
TWIC Card Authentication Certificate
(card authentication), as well as a
verification of the validity of the TWIC
(card validity check). Once this check is
done, the TWIC could be used as a
visual identity badge at a frequency to
be approved by the Coast Guard in the
amended security plan, so long as the
validity of the TWIC is verified
periodically, using the Hotlist or CRL.
For vessels and facilities in risk groups
A and B, these periodic checks of
validity would need to occur on a
weekly basis at MARSEC Level 1, and
on a daily basis at MARSEC Levels 2
and 3. For those vessels in risk group C,
these checks would need to occur on a
monthly basis at MARSEC Level 1, and
on a weekly basis at MARSEC Levels 2
and 3. In each case, the validity would
need to be checked using information
that is no more than 24 hours old.
As a result, vessels in any risk group
with a crew of 14 or less would not need
to carry a reader on their vessel to
provide access control over his or her
own crew. The owner or operator would
need access to a reader to perform the
initial identity verification and card
authentication, and would likely need
some specialized software on a
computer to complete the card validity
checks, but these checks could be done
at a shore side location, such as at the
company’s office. This would allow
owners and operators of more than one
vessel to use the same reader for an
entire fleet. It also enables the owner or
operator to pursue an agreement with a
facility or other company to borrow or
otherwise have access to their reader to
perform the initial check, create a file
with the FASC–Ns and names of the
employees granted recurring unescorted
access, and then use a software program
E:\FR\FM\27MRP1.SGM
27MRP1
13368
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Proposed Rules
pwalker on PROD1PC71 with PROPOSALS3
to compare this list to the TSA Hotlist
or CRL on the required periodic basis.
We used the recommendation from
the Towing Safety Advisory Committee
(TSAC) which recommended a crew
size cut off of 14 for determining when
to require a reader on board a vessel, as
required by the SAFE Port Act to
develop a cut off for recurring
unescorted access. This was done
because the rationale for allowing
recurring unescorted access—i.e., that
these vessels have a reduced
vulnerability because the individuals
are all ‘‘known’’ to one another—is the
same rationale used by TSAC to justify
their crew size cut off recommendation.
The number was developed by taking
into account the fact that for a small
vessel, such as a towing vessel or
offshore supply vessel, the crew would
typically include up to one Master, one
Chief Engineer, and three four-person
crews who rotate through watch shifts.
This number would also include a large
percentage of deep draft vessels. We
then carried the number over to
facilities, as it is reasonable to assume
that 14 persons could be ‘‘known’’ by a
facility owner or operator as well.
While the recurring unescorted access
provision does not go so far as to set a
specific crew size below which a reader
would not be required on a vessel, we
believe this provision, in conjunction
with the no reader requirement for risk
group C, meets the intent of the SAFE
Port Act. Namely, it provides relief for
owners and operators of small and many
large vessels, where it is unlikely that
someone unknown to the crew could
acquire any type of access to the vessel
without raising suspicion. Additionally,
while the recurring unescorted access
process would call for the use of
electronic card readers to gain access to
certain vessels, we would not require
that they be carried on board any vessel.
If the owner or operator of a vessel can
demonstrate in their vessel security plan
that they will be able to meet the reader
requirements via use of a reader at a
dedicated facility, by using a reader that
stays ashore with the company, or by
agreements established between vessels
and facilities (such those captured in a
Declaration of Security) then the
recurring unescorted access provisions
could be met without requiring
installation or implementation of a
reader on a gangway or at any other
place on the vessel.
G. Additional Topics and Requirements
Reader Approval—TWIC readers,
incorporated into MTSA regulated
vessel and facility PACS, will need to
follow the standard/specification that
will be developed from the results of the
VerDate Nov<24>2008
17:07 Mar 26, 2009
Jkt 217001
TWIC reader pilot program, and
published by the Government. An
independent lab that tests for
compliance to the standard will be used
by reader manufacturers. These test
results will be listed by the Government
on the DHS Responder Knowledge Base
(RKB), which provides an on-line source
of information on products, equipment,
and other information. The RKB Web
site may be viewed at: https://
www.rkb.us.
Reader Calibration and Compliance—
we are considering alternatives for how
we can check for compliance with
regard to the readers themselves. We
would like to ensure, that once readers
are installed, they are maintained in
proper working order. The existing
provisions in 33 CFR 104.235, 104.2260,
105.225, 105.250, 106.230, and 106.255
would require that the readers be
inspected, tested, calibrated, and
maintained in accordance with the
manufacturer’s recommendations, and
that records of those actions be
maintained as well. We seek comment
on whether TWIC readers should also be
the subject to Coast Guard inspections,
or require some type of third party
audit.
Security Plan amendment—we are
considering a requirement for all owners
and operators to amend their security
plans to include TWIC requirements.
We intend, at this time, to require the
amendment within six months of
promulgation of a final rule. However,
we will re-evaluate this deadline as we
get closer to issuing a final rule. We are
also considering the staggering of
deadlines in order to spread out
expiration dates for security plans in the
future. We seek public comment on how
long owners and operators should have
to amend security plans to incorporate
TWIC reader requirements. This
amendment would need to detail how
the owner or operator would implement
the TWIC verification requirements,
including those promulgated in the
TWIC 1 FR (if not already incorporated
into their security plans), and electronic
reader requirements if applicable. For
instance, if the owner or operator will
use recurring unescorted access, the
amendment would need to explain
when and where the initial check of the
TWIC will occur, as well as how the
periodic card validity check will be
accomplished. The amendment would
also need to explain how the owner or
operator would address identity
verification, TWIC authentication, and
the TWIC validity check for individuals
who are not granted recurring
unescorted access (i.e., how they would
check TWICs according to the relevant
requirements if an individual seeks
PO 00000
Frm 00009
Fmt 4702
Sfmt 4702
unescorted access, or how escorting
would be accomplished).
Additional security plan provisions
that we are considering include
requiring the owner or operator to
discuss how they will handle those
persons whose TWIC indicate they have
poor quality or no fingerprints, as well
as those persons that are unable to
match their live fingerprint to the
template stored on their TWIC. We are
also considering adding a requirement
that those owners and operators using a
separate physical access system explain
how they are protecting personal
identity information.
Requests for waivers, alternatives, and
equivalents would need to comply with
existing regulatory requirements found
in 33 CFR 101.120, 101.130, 104.130,
104.135, 105.130, 105.135, 106.125 and
106.130.
We would not amend the section on
Alternative Security Programs (ASPs),
33 CFR 101.120. Rather, we expect that,
should this process be promulgated in a
final rule, the Coast Guard will exercise
its existing authority, found in
§ 101.120(d)(1)(ii), to require those
organizations that have approved ASPs
to amend them to incorporate the TWIC
requirements. We will give each
organization the same amount of time
that owners and operators have to
complete this amendment, but seek
comment on whether a shorter or longer
period would be more appropriate. For
those organizations whose current ASPs
cover vessels or facilities that would fall
into more than one risk group, we
would expect that the amended ASP
address each relevant risk group.
Recordkeeping—The electronic
readers that will be available for owners
and operators to purchase in order to
meet the requirements included in this
proposal should be able to keep track of
the names, FASC–Ns, dates, and times
of those persons passing through the
reader. Having records of those persons
who were granted unescorted access,
may prove beneficial in law
enforcement situations. For this reason,
we are considering requiring that
facility and vessel owners who are
required to utilize readers (those in risk
groups A and B) also keep records of the
persons who have been granted
unescorted access (those whose TWICs
have been read by a card reader) for a
period of two years. We are not
considering requiring that owners and
operators need to know who is on their
vessel or facility at all times and believe
that type of requirement would be
burdensome compared to the security
benefit that it would provide. This
would remove the requirement that
individuals have their TWICs
E:\FR\FM\27MRP1.SGM
27MRP1
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Proposed Rules
pwalker on PROD1PC71 with PROPOSALS3
electronically read when leaving the
facility or vessel.
We are also considering that owners
and operators opting to use recurring
unescorted access keep records of those
persons to whom recurring unescorted
access has been granted. We would not
be prescribing the format for these
records, only that they include the name
of individuals granted recurring
unescorted access and be kept for two
years and made available to the Coast
Guard upon inspection or request.
These records must allow the Coast
Guard to identify the 14 (or fewer)
individuals who are using the recurring
unescorted access privilege at the time
they inspect or request the record.
We are also considering a provision
that all owners and operators maintain
a record to demonstrate that they have
completed the card validity check
(Hotlist or CRL check), if required.
Additional persons required to obtain
TWICs—MTSA contained additional
categories of individuals who must hold
a TWIC that were not explicitly
identified in the TWIC 1 NPRM or TWIC
1 FR. These include all vessel pilots and
all persons engaged on a towing vessel
that pushes, pulls, or hauls alongside a
tank vessel. 46 U.S.C. 70105(b). We
believe that the majority of these
individuals were already captured in
the TWIC 1 FR requirement for all
persons requiring unescorted access to
secure areas; however there may be
some vessel pilots that do not hold
Federal licenses, and there may be some
persons who are not credentialed
mariners who are engaged on a towing
vessel that is not otherwise regulated by
33 CFR part 104. Thus, we are
considering including these populations
in the TWIC requirement when we issue
an NPRM, in order to comply with the
congressional mandate found in 46
U.S.C. 70105(b).
V. Advisory Committee Input
The Coast Guard has a long tradition
of consulting with its advisory
committees before taking regulatory
action. We acknowledge the benefit of
consulting with our advisory
committees, and before issuing this
ANPRM we sent a task statement to the
Merchant Marine Personnel Advisory
Committee (MERPAC), TSAC, and
NMSAC, asking eighteen questions
related to requirements for TWIC
readers. This task statement, as well as
each committee’s formal responses and
recommendations, may be found in the
docket for this ANPRM where listed
under the ADDRESSES section above. As
discussed above, we accepted and
incorporated a number of the advisory
committee recommendations into this
VerDate Nov<24>2008
17:07 Mar 26, 2009
Jkt 217001
ANPRM. We greatly appreciate advisory
committee input into this program and
plan to continue to seek advisory
committee input throughout the
remainder of the TWIC regulatory
process.
VI. Discussion of Pilot Program
In accordance with the SAFE Port
Act, DHS, through the USCG and TSA,
developed a pilot program to ‘‘test the
business processes, technology, and
operational impacts required to deploy
transportation security card readers at
secure areas of the marine
transportation system.’’ 46 U.S.C.
70105(k)(1)(A). The SAFE Port Act
requires the pilot program to be
conducted in a minimum of five
geographically distinct locations. The
selected sites include the ports of Los
Angeles and Long Beach, California; the
ports of New York and New Jersey,
(New York, Elizabeth, and Newark); the
port of Brownsville, Texas; an Inland
Rivers tugboat operator in Vicksburg,
Mississippi; the Staten Island Ferry in
New York, and a small passenger vessel
operator in Annapolis, Maryland. Other
locations are also under consideration,
specifically a cold weather facility in
the Great Lakes region. The goal of the
pilot program site selection is to engage
a wide range of vessel and facility types
in a variety of operational environments
and geographic areas. During the reader
pilot program, TSA strongly advocates,
but does not mandate, that port security
directors consider FIPS 201
authentication readers to accommodate
future FIPS 201 interoperable cards.
The TWIC pilot program will conduct
tests of contactless biometric readers, as
well as the credential authentication
and validation process to evaluate the
previously published reader
specification. 72 FR 53784. TSA and
USCG worked with the maritime and
smart card industries through NMSAC
to specify contactless technology for
TWIC readers that will minimize the
impact to the flow of commerce (e.g.,
slower throughput at gates, potential
lower availability of workers) while still
enabling the use of biometrics to verify
identity and while protecting personal
information in the card from
unauthorized disclosure. The following
should not be considered an allinclusive list; rather, this information is
intended to offer insight regarding the
purpose and goals of the TWIC pilot
program to greater inform your
comments to this ANPRM and provide
information as to the overall progress of
the TWIC program.
TSA has developed a Test and
Evaluation Master Plan (TEMP) to
provide a plan to acquire and evaluate
PO 00000
Frm 00010
Fmt 4702
Sfmt 4702
13369
the test data needed to support the final
reader rule. The TEMP addresses the
impact of requiring the use of the
Contactless Biometric Card Reader to
biometrically verify identity, card
authenticity and validity, and
establishes a plan for an Integrated Test
and Evaluation Program (ITEP) for the
card reader. The ITEP is designed to
provide accurate and timely information
necessary to evaluate the economic
impact of a nationwide deployment of
the card reader(s), and to test the
capability of card reader(s) to support
the enhanced security of the Nation’s
maritime transportation systems
through the development and issuance
of enhanced rules and specifications.
The ITEP is comprised of three
principle activities including:
(1) Initial Technical Test (ITT),
(2) Early Operational Assessment
(EOA), and
(3) System Test and Evaluation
(ST&E).
All testing is designed to build upon
preceding testing and assessments to
ensure all technical and operational
aspects of the card reader are evaluated
while minimizing testing duplication.
The ITT is focused on providing
information to determine if select card
readers meet specification parameters,
including environmental requirements,
to ensure that the card readers will
correctly perform the biometric match
and operate in the maritime operational
environment during ST&E.
The EOA is focused to obtain
essential data to support rulemaking,
assess card reader suitability and
effectiveness, and support refinement of
the card reader specification.
The ST&E is a comprehensive
technical and operational testing of the
card reader system to provide the
information required to finalize reader
regulatory requirements and support
future card reader acquisitions by the
stakeholders.
Reader conformance testing is
predicated upon a test protocol verified
by the National Institute of Standards
and Technology. Conformance testing
will be conducted in accordance with
the test protocol at an independent
laboratory. This includes TWIC
contactless reader interface testing.
Upon successful completion of the
ST&E conformance testing, card readers
and/or portable card readers are
installed and tested at selected
operational sites and vessels. The
operational testing will proceed with
the system operating at the site or
vessel. System testing then continues
until the data to support the decision for
declaration of operational effectiveness
and supportability is acquired.
E:\FR\FM\27MRP1.SGM
27MRP1
13370
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 / Proposed Rules
As required by the SAFE Port Act, the
pilot program’s results should validate
the TWIC and TWIC reader’s impact on
the flow of commerce, the ability for
vessels and facilities to comply with the
regulations, the applicability of the
TWIC reader requirements, and their
ability to improve security, and
economic and environmental impacts.
FOR FURTHER INFORMATION CONTACT:
Stephen L. Sharfman, General Counsel,
202–789–6820 and
stephen.sharfman@prc.gov.
Regulatory
History, 73 FR 50532 (August 26, 2008).
SUPPLEMENTARY INFORMATION:
I. Introduction
SUMMARY: The Commission is proposing
rules on the treatment of non-public
material submitted by the Postal
Service. Issuance of this proposal will
allow interested parties to comment on
the Commission’s approach to
implementing a new statutory
requirement.
The Postal Regulatory Commission
(Commission) proposes to implement 39
U.S.C. 504(g) by adopting regulations
applicable to confidentiality of materials
submitted by the Postal Service to the
Commission. A Notice of Proposed
Rulemaking to Establish a Procedure for
According Appropriate Confidentiality,
issued August 13, 2008 (Order No. 96),
requested public comments and reply
comments. Based on comments received
in this docket (RM2008–1) in response
to the Commission’s initial notice, the
Commission issues this Second Notice
of Proposed Rulemaking to Establish a
Procedure for According Appropriate
Confidentiality.
39 U.S.C. 504(g)(3)(A) recognizes the
need to balance the Postal Service’s, its
business partners’, or its customers’
legitimate expectations to keep
commercially sensitive information
confidential with the public’s
expectation for accountability and
transparency of the business dealings of
a governmental entity competing in
commercial markets. The Postal
Accountability and Enhancement Act
(PAEA), Public Law 109–435, 120 Stat.
3218 (2006), relies on public
transparency, in addition to regulation,
to achieve its goal of Postal Service
accountability. Therefore, as directed by
the provisions of the PAEA and because
the Commission considers it necessary
and appropriate, the Commission
proposes rules that could lead to public
disclosure of materials that the Postal
Service or a third party initially claims
are non-public.
In developing proposed rules, the
Commission takes very seriously its
responsibility to achieve a fair balance
between the commercial interests of the
Postal Service and its partners or
customers and the public interest in
disclosure of information concerning a
public entity that competes in
commercial markets, as well as the need
for discovery and access for any persons
who wish to participate in Commission
proceedings.
DATES: Initial comments due April 27,
2009; reply comments due May 11,
2009.
II. Statutory Standards for According
Confidentiality to Postal Service
Materials
Submit comments
electronically via the Commission’s
Filing Online system at https://
www.prc.gov.
The Postal Regulatory Commission is
an independent establishment of the
executive branch of the Government of
the United States. See 39 U.S.C. 501.
VII. Regulatory Analyses
Before developing an NPRM, we will
consider a number of statutes and
executive orders related to rulemaking,
including Executive Orders 12866 and
13132 (Regulatory Planning and Review
and Federalism, respectively), the
Regulatory Flexibility Act (5 U.S.C.
601–612), the Paperwork Reduction Act
(44 U.S.C. 3501–3520), and the National
Environmental Policy Act of 1969 (42
U.S.C. 4321–4370f). If you have any
information or comments that you feel
would be helpful to us as we complete
these required analyses, please submit it
to the docket during the comment
period for this ANPRM. Draft analyses
will be included as part of an NPRM,
and will be made public for comment
before the issuance of a final rule, as
required by the Administrative
Procedure Act (5 U.S.C. 553).
Dated: January 16, 2009.
Brian M. Salerno,
Rear Admiral, U.S. Coast Guard, Assistant
Commandant for Marine Safety, Security and
Stewardship.
[FR Doc. E9–6852 Filed 3–26–09; 8:45 am]
BILLING CODE 4910–15–P
POSTAL REGULATORY COMMISSION
39 CFR Part 3007
[Docket No. RM2008–1; Order No. 194]
Treatment of Non-Public Materials
Submitted by the Postal Service
Postal Regulatory Commission.
Proposed rule.
AGENCY:
pwalker on PROD1PC71 with PROPOSALS3
ACTION:
ADDRESSES:
VerDate Nov<24>2008
17:22 Mar 26, 2009
Jkt 217001
PO 00000
Frm 00011
Fmt 4702
Sfmt 4702
Therefore, the presumption is that its
records are available for public review.
5 U.S.C. 552. However, 39 U.S.C.
504(g)(1) provides that the Postal
Service may determine ‘‘that any
document or other matter it provides to
the Postal Regulatory Commission’’ is
exempt from public disclosure under 39
U.S.C. 410(c) or 5 U.S.C. 552(b). The
Postal Service must give reasons, in
writing, for its claim. See 39 U.S.C.
504(g)(1).
Unless the Commission has
established rules for determining the
appropriate degree of protection of
materials claimed to be non-public by
the Postal Service, the Commission may
not (1) ‘‘use such information for
purposes other than the purposes for
which it is supplied;’’ or (2) ‘‘permit
anyone who is not an officer or
employee of the Commission to have
access to any such information.’’ See 39
U.S.C. 504(g)(2).
These proposed rules outline the
procedure for the Commission’s
treatment of non-public materials.
Under these proposed rules, when
materials are filed along with an
application for non-public treatment,
the Commission will initially treat those
materials as non-public. However, the
proposed rules allow persons to
challenge non-public status or request
access to the materials. The
Commission, following such a motion or
of its own accord, may balance the
relevant interests to determine if
disclosure or access is warranted.
Under 39 U.S.C. 410(c), the Postal
Service may claim as exempt from
public disclosure the name and address
of postal customers; certain commercial
information, for example, trade secrets,
and other information which would not
be disclosed under good business
practice; certain information related to
the negotiation of collective bargaining
agreements; information prepared for
proceedings before the Commission or
the Federal courts concerning postal
rates, classes and services; reports and
memoranda prepared by outside sources
unless their disclosure would have been
required if the Postal Service had
prepared the reports or memoranda
itself; and investigatory files compiled
for law enforcement purposes, unless
legally available to parties other than
the Postal Service.
Under 5 U.S.C. 552(b), records that
may be withheld from public disclosure
include, but are not limited to, matters
concerning only internal personnel
matters of an agency; matters
specifically exempted from public
disclosure by statute; trade secrets and
privileged or confidential commercial or
financial information; non-public
E:\FR\FM\27MRP1.SGM
27MRP1
Agencies
[Federal Register Volume 74, Number 58 (Friday, March 27, 2009)]
[Proposed Rules]
[Pages 13360-13370]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E9-6852]
========================================================================
Proposed Rules
Federal Register
________________________________________________________________________
This section of the FEDERAL REGISTER contains notices to the public of
the proposed issuance of rules and regulations. The purpose of these
notices is to give interested persons an opportunity to participate in
the rule making prior to the adoption of the final rules.
========================================================================
Federal Register / Vol. 74, No. 58 / Friday, March 27, 2009 /
Proposed Rules
[[Page 13360]]
DEPARTMENT OF HOMELAND SECURITY
Coast Guard
33 CFR Parts 101, 104, 105, and 106
[Docket No. USCG-2007-28915]
RIN 1625-AB21
Transportation Worker Identification Credential (TWIC)--Reader
Requirements
AGENCY: Coast Guard, DHS.
ACTION: Advanced notice of proposed rulemaking.
-----------------------------------------------------------------------
SUMMARY: This advanced notice of proposed rulemaking discusses the
United States Coast Guard's preliminary thoughts on potential
requirements for owners and operators of certain vessels and facilities
regulated by the Coast Guard under 33 CFR chapter I, subchapter H, for
use of electronic readers designed to work with Transportation Worker
Identification Credentials (TWIC) as an access control measure. It
discusses additional potential requirements associated with TWIC
readers, such as recordkeeping requirements for those owners or
operators required to use an electronic reader, and amendments to
security plans previously approved by the Coast Guard to incorporate
TWIC requirements.
This rulemaking action, once final, would enhance the security of
ports and vessels by ensuring that only persons who hold valid TWICs
are granted unescorted access to secure areas on vessels and port
facilities. It would also complete the implementation of the Maritime
Transportation Security Act of 2002 transportation security card
requirement, as well as the requirements of the Security and
Accountability for Every Port Act of 2006, for regulations on
electronic readers for use with Transportation Worker Identification
Credentials.
DATES: Comments and related material must reach the Docket Management
Facility on or before May 26, 2009.
ADDRESSES: You may submit comments identified by Coast Guard docket
number USCG-2007-28915 to the Docket Management Facility at the U.S.
Department of Transportation. Please note the new address. See 72 FR
28092, May 18, 2007. To avoid duplication, please use only one of the
following methods:
(1) Online: https://www.regulations.gov.
(2) Mail: Docket Management Facility (M-30), U.S. Department of
Transportation, West Building Ground Floor, Room W12-140, 1200 New
Jersey Avenue, SE., Washington, DC 20590-0001.
(3) Hand delivery: Same as mail address above, between 9 a.m. and 5
p.m., Monday through Friday, except Federal holidays. The telephone
number is 202-366-9329.
(4) Fax: 202-493-2251.
(5) For comments containing confidential information, business
information or sensitive security information, please mail
appropriately marked comments to LCDR Jonathan Maiorine, Commandant
(CG-544) (RM 5222), U.S. Coast Guard, 2100 2nd Street, SW., Washington,
DC 20593.
FOR FURTHER INFORMATION CONTACT: If you have questions on this advanced
notice of proposed rulemaking, call LCDR Jonathan Maiorine, Coast
Guard, telephone 1-877-687-2243.
If you have questions on viewing or submitting material to the
docket, call Renee V. Wright, Program Manager, Docket Operations,
telephone 202-366-9826.
SUPPLEMENTARY INFORMATION:
Table of Acronyms
AHP Analytical Hierarchy Process
ANPRM Advanced Notice of Proposed Rulemaking
ASPs Alternative Security Programs
TWIC Transportation Worker Identification Credential
CDC Certain Dangerous Cargoes
CI/KR Critical Infrastructure/Key Resource
CRL Certificate Revocation List
DHS Department of Homeland Security
DOT Department of Transportation
EOA Early Operational Assessment
FASC-N Federal Agency Smart Credential--Number
FOIA Freedom of Information Act
FR Final Rule
FSP Facility Security Plan
HSI Homeland Security Institute
ITEP Integrated Test and Evaluation Program
ITT Initial Technical Test
MARSEC Maritime Security
MERPAC Merchant Marine Personnel Advisory Committee
MODU Mobile Offshore Drilling Unit
MSRAM Maritime Security Risk Analysis Model
MTSA Maritime Transportation Security Act
NMSAC National Maritime Security Advisory Committee
NPRM Notice of Proposed Rulemaking
OCS Outer Continental Shelf
OMB Office of Management and Budget
OSVs Offshore Supply Vessels
PACS Personnel Access Control System
PIN Personal Identification Number
PIV Personal Identity Verification
RA Regulatory Analysis
RKB Responder Knowledge Base
SSI Sensitive Security Information
ST&E System Test & Evaluation
TEMP Test and Evaluation Master Plan
TSA Transportation Security Administration
TSAC Towing Safety Advisory Committee
TSI Transportation Security Incident
TWIC Transportation Worker Identification Credential
VSP Vessel Security Plan
Table of Contents
I. Public Participation and Request for Comments
A. Submitting Comments
B. Handling Confidential Information, Proprietary Information,
and Sensitive Security Information (SSI) Submitted in Public
Comments
C. Viewing Comments and Documents
D. Privacy Act
E. Public Meeting
F. Future Opportunities for Comment
II. Summary of ANPRM
III. Background
A. Statutory History
B. Regulatory History
IV. Discussion of Process
A. Risk-Based Approach to Reader Requirements
B. Maritime Security Risk Analysis Model (MSRAM) and the
Analytic Hierarchy Process (AHP)
C. Requirement Options Considered
D. Reader Requirements
E. Facility and Vessel Risk Groups
F. Recurring Unescorted Access
G. Additional Topics and Requirements
V. Advisory Committee Input
VI. Discussion of Pilot Programs
VII. Regulatory Analyses
I. Public Participation and Request for Comments
We encourage you to participate in this rulemaking by submitting
[[Page 13361]]
comments and related materials. All comments received will be posted,
without change, to https://www.regulations.gov and will include any
personal information you have provided. We have an agreement with the
Department of Transportation (DOT) to use the Docket Management
Facility.
A. Submitting Comments
If you submit a comment, please include your name and address,
identify the docket number for this rulemaking (USCG-2007-28915),
indicate the specific section of this document to which each comment
applies, and give the reason for each comment. You may submit your
comments and material by electronic means, mail, fax, or delivery to
the Docket Management Facility at the address under ADDRESSES; but
please submit your comments and material by only one means. If you
submit them by mail or delivery, submit them in an unbound format, no
larger than 8\1/2\ by 11 inches, suitable for copying and electronic
filing. If you submit them by mail and would like to know that they
reached the Facility, please enclose a stamped, self-addressed postcard
or envelope. We will consider all comments and material received during
the comment period. We may change the proposed rule in view of them.
B. Handling Confidential Information, Proprietary Information and
Sensitive Security Information (SSI) Submitted in Public Comments
Do not submit comments that include trade secrets, confidential
commercial or financial information, or sensitive security information
(SSI) \1\ to the public regulatory docket. Please submit such comments
separately from other comments on the rulemaking. Comments containing
this type of information should be appropriately marked as containing
such information and submitted by mail to the Coast Guard point of
contact listed in the FOR FURTHER INFORMATION CONTACT section.
---------------------------------------------------------------------------
\1\ ``Sensitive Security Information'' or ``SSI'' is information
obtained or developed in the conduct of security activities, the
disclosure of which would constitute an unwarranted invasion of
privacy, reveal trade secrets or privileged or confidential
information, or be detrimental to the security of transportation.
The protection of SSI is governed by 49 CFR part 1520.
---------------------------------------------------------------------------
Upon receipt of such comments, the Coast Guard will not place the
comments in the public docket and will handle them in accordance with
applicable safeguards and restrictions on access. The Coast Guard will
hold them in a separate file to which the public does not have access,
and place a note in the public docket that Coast Guard has received
such materials from the commenter. If the Coast Guard receives a
request to examine or copy this information, we will treat it as any
other request under the Freedom of Information Act (FOIA) (5 U.S.C.
552).
C. Viewing Comments and Documents
To view comments, as well as documents mentioned in this preamble
as being available in the docket, go to https://dms.dot.gov at any time,
enter the docket number for this rulemaking (USCG-2007-28915) in the
Search box, and click ``Go >>.'' If you do not have access to the
internet, you may view the docket online by visiting the Docket
Management Facility in Room W12-140 on the ground floor of the
Department of Transportation West Building, 1200 New Jersey Avenue,
SE., Washington, DC 20590, between 9 a.m. and 5 p.m., Monday through
Friday, except Federal holidays.
D. Privacy Act
Anyone can search the electronic form of all comments received into
any of our dockets by the name of the individual submitting the comment
(or signing the comment, if submitted on behalf of an association,
business, labor union, etc.). You may review a Privacy Act, system of
records notice regarding our public dockets in the January 17, 2008
issue of the Federal Register (73 FR 3316).
E. Public Meeting
Because the Coast Guard intends to hold additional public meetings
(see Paragraph F ``Future Opportunities for Comment''), we plan to hold
only one public meeting in the Washington, DC area at this time. A
notice with the specific date and location of the meeting will be
published in the Federal Register as soon as this information is known.
In addition, known interested parties will be contacted via mail, e-
mail, or telephone. If you wish to be contacted regarding the public
meeting, contact LCDR Jonathan Maiorine, listed under FOR FURTHER
INFORMATION CONTACT.
F. Future Opportunities for Comment
The Coast Guard intends to publish a Notice of Proposed Rulemaking
(NPRM) after reviewing the comments on this Advanced Notice of Proposed
Rulemaking (ANPRM), and after receiving data from the TWIC pilot
programs (discussed in Section IV ``Discussion of Pilot Programs''). We
intend to have an open comment period with sufficient time to allow
interested parties to submit comments following publication of an NPRM.
We also intend to hold several public meetings during that comment
period, at various locations across the country.
II. Summary of ANPRM
This ANPRM presents preliminary thoughts of the Department of
Homeland Security, through the U.S. Coast Guard and the Transportation
Security Administration, on potential requirements for electronic TWIC
readers for certain vessels and facilities that are regulated by the
Coast Guard under 33 CFR chapter I, subchapter H, commonly known as
``MTSA-regulated'' vessels and facilities. The purpose of this ANPRM is
to open the public dialogue on implementing TWIC reader requirements
using a risk-based decision model, as well as to seek input on other
requirements that we are considering proposing at the same time as the
reader requirements. We are not proposing any specific changes to the
Code of Federal Regulations at this time. Specific changes would be
proposed in an NPRM at a future date.
This ANPRM discusses separating individual MTSA-regulated vessels,
facilities, and Outer Continental Shelf (OCS) facilities into one of
three risk groups. Each risk group would have its own associated
electronic TWIC reader requirements.
We are considering that those vessels and facilities in the lowest
risk group continue to use TWICs primarily as a visual identity badge
only, at all Maritime Security (MARSEC) Levels, and subject to
electronic verification during inspections and spot checks, as
currently required in the joint Coast Guard and TSA final rule on TWIC,
issued on January 25, 2007. 72 FR 3492.
At MARSEC Level 1, those in the middle risk group would perform an
electronic read of the TWIC to verify its authenticity and to verify
the validity of the card (i.e., ensure that it has not been revoked).
Owners or operators of these vessels and facilities would match the
TWIC-holder's fingerprint to the biometric template stored within the
TWIC (i.e., perform a biometric match) at MARSEC Level 1 on dates
chosen randomly within a frequency of at least once a month. They would
perform the biometric match at each entry at the higher MARSEC Levels.
Those vessels and facilities falling into the highest risk group
would perform the biometric match and verify the authenticity and
validity of the card at each entry at all MARSEC Levels.
These requirements are summarized in a table, found in Section IV.
D. ``Reader Requirements'' and are subject to change based on public
comment and
[[Page 13362]]
additional data collection from the TWIC reader testing pilot program
(``pilot program''), which is currently underway as required by the
Safety and Accountability for Every Port Act of 2006 (SAFE Port Act),
Public Law No. 109-347, 120 Stat. 1884, 1889 (Oct. 13, 2006). For
example, we may propose, in an NPRM, to require reader usage at a
facility or vessel in Risk Group C, or require more frequent reader
usage for those facilities and vessels in Risk Group B. We request
comments from the public regarding this process and, in particular, the
Risk Group divisions and application of MARSEC Levels to reader
requirement frequency.
We are also considering that each risk group have the option of
using recurring unescorted access for up to 14 TWIC holders, per vessel
or facility, if that provision is included in their amended security
plan and approved by the Coast Guard. In order to take advantage of
recurring unescorted access, the owner or operator of the vessel or
facility would conduct an initial biometric match of the individual
against his/her TWIC, either at hiring or upon the effective date of a
final rule, whichever occurs later. This biometric match would include
a verification of the authenticity and validity of the TWIC. Once this
check is done, the TWIC need only be used as a visual identity badge,
at a frequency to be approved by the Coast Guard in the amended
security plan, so long as the validity of the TWIC is verified
periodically, ranging from monthly to daily, depending upon risk group
and MARSEC Level. We are specifically seeking comment in this ANPRM as
to whether 14 persons is the appropriate number of persons eligible for
recurring unescorted access and whether the public believes this
process is appropriate for facilitating industry operations while
maintaining an appropriate level of port security.
This ANPRM also discusses recordkeeping requirements for those risk
groups required to use readers, and for those owners or operators
choosing to use recurring unescorted access. It discusses and seeks
comment on a requirement for all owners and operators to amend their
security plans to incorporate TWIC requirements.
III. Background
A. Statutory History
The principal statutory authority for the TWIC program, the
Maritime Transportation Security Act of 2002 (MTSA), Public Law No.
107-295, 116 Stat. 2064 (Nov. 2, 2002), requires the issuance of
biometric transportation security cards to Coast Guard credentialed
merchant mariners and other workers requiring unescorted access to
secure areas of vessels and port facilities. 46 U.S.C. 70105(a)-(f)
(2002). The SAFE Port Act, Public Law No. 109-347, 120 Stat. 1884 (Oct.
13, 2006) supplemented various MTSA credentialing requirements. These
additional provisions included establishing a port implementation
deadline; requiring implementation of a pilot program to test TWIC
readers; and setting a deadline for promulgation of final regulations
requiring the deployment of TWIC readers that are consistent with the
findings of the pilot program. 46 U.S.C. 70105(g)-(m) (2006).
B. Regulatory History
On May 22, 2006, the Coast Guard and TSA issued a joint notice of
proposed rulemaking (TWIC 1 NPRM) entitled ``Transportation Worker
Identification Credential Implementation in the Maritime Sector;
Hazardous Materials Endorsement for a Commercial Driver's License,''
setting forth proposed requirements and processes required by MTSA. 71
FR 29396. The TWIC 1 NPRM proposed amending Coast Guard regulations on
vessel and facility security, found in 33 CFR chapter I, subchapter H,
to require the use of the TWIC as an access control measure, as well as
amendments to TSA regulations on security threat assessment standards.
The TWIC 1 NPRM also proposed requiring the use of TWIC in a biometric
access control system and user fees for TWIC issued under this rule.
The joint final rule (TWIC 1 FR), issued January 25, 2007, under the
same title, established the biometric credential requirements, amended
knowledge requirements, expanded appeal and waiver provisions, and set
the user fee for the TWIC. 72 FR 3492. The TWIC 1 FR did not require
card readers. A full discussion of the provisions for the TWIC 1 NPRM
and TWIC 1 FR can be found in the preambles of those documents, at the
Federal Register cites provided in this paragraph.
After publication of the TWIC 1 FR, the Coast Guard issued a Notice
of Availability and requested comments on draft TWIC biometric reader
specifications and draft TWIC contactless smart card applications,
which were both developed by the National Maritime Security Advisory
Committee (NMSAC). The Coast Guard and TSA reviewed the comments
received and issued a Notice on September 20, 2007, announcing the
working technical specification selected for use in the TWIC pilot
programs and discussing the comments received in response to the Notice
of Availability. 72 FR 53784.
On July 13, 2007, the Coast Guard issued a final rule to delay the
compliance date for facility owners and operators wishing to redefine
their secure areas, to limit application of the TWIC requirement to
those portions of their facility directly connected to maritime
transportation. 72 FR 38486. This provision was included in the TWIC 1
FR, and the delay in the compliance date was necessary to allow owners
and operators to consider Coast Guard guidance, issued as Navigation
and Vessel Inspection Circular 03-07 on July 2, 2007.
On September 28, 2007, the Coast Guard and TSA issued another joint
Final Rule to amend provisions of the TWIC 1 FR. 72 FR 55043. This
final rule amended the definition of secure areas to address facilities
in the Commonwealth of the Northern Mariana Islands; allowed
flexibility for additional non-resident aliens to apply for a TWIC;
clarified who may obtain a TWIC at a reduced fee; and amended the
replacement fee originally announced in TWIC 1 FR.
On May 7, 2008, the Coast Guard and TSA issued a joint final rule
to extend the compliance date set forth in the TWIC 1 FR. 73 FR 25562.
Under the new final compliance date, mariners must obtain a TWIC no
later than April 15, 2009. That date also marks the final date by which
owners and operators of vessels, facilities, and OCS facilities, who
have not otherwise been required to implement access control procedures
utilizing TWIC on an earlier date, must implement those procedures.
Owners and operators of vessels, facilities, and OCS facilities should
note, however, that in accordance with the TWIC 1 FR the Coast Guard
has announced rolling COTP Zone compliance dates in the Federal
Register.
IV. Discussion of Process
A. Risk-Based Approach to Reader Requirements
This ANPRM discusses three levels of requirements, with vessels and
facilities ``assigned'' into a particular level based on risk. We used
the Maritime Security Risk Analysis Model (discussed in B. ``Maritime
Security Risk Analysis Model (MSRAM) and the Analytic Hierarchy Process
(AHP)'') and other factors to rank facilities and vessels as lower
versus higher risk. We are considering proposing that those facilities
and vessels with the higher risk be required to fully utilize the
security features and achieve the full risk reduction benefit of the
TWIC, whereas facilities and vessels
[[Page 13363]]
at the lower risk level should be required to implement only some of
the security features. We have presented the resulting matrix of
potential requirements in this document. We are seeking comment not
only on these requirements, but also on the risk groups themselves and
the method we used to reach those groups, which is discussed in the
next section.
B. Maritime Security Risk Analysis Model (MSRAM) and the Analytic
Hierarchy Process (AHP)
Three factors were applied to develop a risk-based ranking of all
MTSA-regulated facilities and vessels by type. These factors were: The
maximum consequence resulting from a terrorist attack, the criticality
to the nation's health, economy and national security, and the utility
of TWIC in reducing risk. These factors were applied in an AHP
(discussed later in this section) to develop an overall ranking of
vessel and facility types for which TWIC requirements are assigned.\2\
---------------------------------------------------------------------------
\2\ The ranking from each factor, as well as the overall
rankings, are SSI per 49 CFR 1520.5(b)(5) and (b)(12). In accordance
with 49 CFR 1520.9, SSI may only be released to covered persons with
a need to know the information.
---------------------------------------------------------------------------
The first factor applied was the maximum potential consequence
resulting from the total destruction of the vessel or facility. We
developed this factor by using the Coast Guard's MSRAM application.
MSRAM is a terrorism risk analysis tool used to perform risk
assessments on critical infrastructure and key resources in the
maritime domain given a range of terrorist attack scenarios. The tool's
purpose is to capture and rank the security risk facing different types
of potential terrorist targets (e.g., waterfront facilities, vessels,
bridges and other infrastructure) spanning all Critical Infrastructure/
Key Resource (CI/KR) sectors in our nation's ports and on our
waterways. An initial step in the MSRAM process is to calculate the
maximum potential consequence of total loss of a target, factoring in
injury and loss of life, economic and environmental impact, symbolic
effect, and national security impact. MSRAM then assesses risk for a
range of scenarios--each involving a combination of target and method
of attack--in terms of threat, vulnerability, and consequence. MSRAM
also considers the response capability of the owner/operator, local
first responders, and Federal agencies to mitigate the consequences of
an attack. The Coast Guard in consultation with representatives from
Area Maritime Security Committees throughout the country has compiled
this MSRAM risk information from Coast Guard Sectors and Captains of
the Port into a database which provides an overall national view of
terrorist risk to maritime assets.
We extracted information specific to MTSA regulated vessels and
facilities from this database and used it to address the maximum
consequence that would occur if the facility or vessel was completely
debilitated by a transportation security incident (TSI) resulting from
a terrorist attack. These MSRAM consequence scores were averaged across
similar types of MTSA regulated vessels and facilities to develop a
standard risk score for each type of vessel and facility.
The second factor scored was the criticality of vessel or facility
type. The term ``criticality'' describes the impact of the total loss
of a vessel or facility beyond the immediate local consequences and
addresses regional or national impacts to human health, the economy and
national security.
Finally, we scored the utility of TWIC in reducing vulnerability to
terrorist attack for each vessel and facility type.
We used the AHP to combine these three factors and developed an
overall risk ranking by vessel and facility type. AHP is a technique
for decision making which uses a limited number of variables, each of
which has a number of different attributes. This enables the
combination of subjective and objective input from a group to produce
consistent results.
Applying this technique, each of the three factors was weighted
based on their importance to the policy decision process, and an
analysis was conducted to check the consistency of the evaluation
measures. At the end of this process, vessel and facility types with
similar scores were combined into ``risk groups'' to determine TWIC
verification and validation requirements.
In determining the cut offs between risk groups, risk rankings were
graphed to identify any natural breaks that occurred in the data. For
vessels, these breaks generally occurred where there was a change in
the hazardous nature of the cargo or where the number of passengers
carried aboard a vessel increased. The breaks were similar for
facilities where these vessels called. These breaks were used in
defining risk groups A, B, and C. These groups are spelled out in E.
``Facility and Vessel Risk Groups.''
We then turned to the Homeland Security Institute (HSI) to provide
an independent peer review of our analysis.\3\ Specifically, HSI is
evaluating the validity of the risk assessment methodology and its
appropriateness for the identified TWIC risk issues, the extent to
which the conclusions follow from the analysis, and the overall
strengths and weaknesses of the risk analysis. The main objective is to
review how the MSRAM methodology has been applied to the development of
the proposed TWIC reader requirements; the MSRAM methodology itself is
not a part of the peer review. HSI's final report is expected this
fall, and will be placed on the docket for this rulemaking, where
indicated under ADDRESSES, as appropriate.
---------------------------------------------------------------------------
\3\ The Homeland Security Institute (HSI) is a Studies and
Analysis Federally Funded Research and Development Center
established pursuant to section 312 of the Homeland Security Act of
2002 (6 U.S.C. 192). HSI delivers independent and objective analyses
and advises in core areas important to its sponsor in support of
policy development, decision-making, analysis of alternative
approaches, and evaluation of new ideas on issues of significance.
---------------------------------------------------------------------------
C. Requirement Options Considered
We considered three separate categories of TWIC verification that
could, potentially, be checked at each entry: (1) Identity
verification, (2) card authentication, and (3) card validity.
(1) Identity verification ensures that the individual presenting
the TWIC is the same person to whom the TWIC was issued. In its most
reliable form, this is done by matching the biometric template stored
in the TWIC to the TWIC-holder's live sample biometric (e.g., a
fingerprint). However it can also be done to a less reliable degree by
visually comparing the photo on the TWIC to the TWIC-holder or by
requiring the TWIC-holder to place their card into a contact smart card
reader and then entering his/her 6-digit Personal Identity Number
(PIN), selected by the TWIC-holder at card issuance.
In some instances, a biometric match will not be possible. A small
number of TWICs will be issued that contain either poor quality
fingerprint templates, mostly due to badly damaged fingers, or no
fingerprint minutiae in the case of amputations. In these cases, the
reader will display a prompt indicating that this TWIC holder will
require exception handling. We expect that the facility or vessel owner
or operator will describe the exception process to be used in these
cases in their security plan. The exception processes may include
visual inspection of the TWIC including visual comparison of the photo
printed on the card to the presented; visual comparison of the digital
photo stored on the TWIC to the presenter by using a portable
[[Page 13364]]
reader with a contact interface and releasing the photo to the reader
screen by entering the six-digit PIN; or an alternative process
proposed by the owner or operator and approved by the Coast Guard.
Biometrics, other than the fingerprint templates stored in the
Integrated Circuit Chip of the TWIC, may be used to biometrically
verify the identity of individuals being granted unescorted access to
secure areas of MTSA regulated facilities and vessels provided that a
``chain-of-trust'' is maintained to link the individual, their TWIC,
and the alternative biometric. The process for maintaining these links
would need to be described in an FSP or VSP, approved by the Coast
Guard. In addition to linking the alternate biometric to the individual
and heir TWIC, the process would need to include ascertaining the
validity of the individual's TWIC.
Before obtaining an alternate biometric the TWIC holder must first
be linked to their credential by matching the holder's fingerprint to
the fingerprint template on the TWIC using a reader capable of reading
and matching the TWIC biometric. During this process, the validity of
the TWIC would also need to be ascertained. If the fingerprint template
match is successful and the TWIC is valid the credential would, in most
cases, be registered with the personnel access control system (PACS).
While the TWIC holder is present, the alternate biometric would be
captured and linked to the TWIC, thus establishing a ``chain-of-trust''
between the individual, their TWIC, and the alternate biometric.
Variations on the usual process of registering the TWIC and alternate
biometrics in a PACS, such as storing the alternate biometric on a
separately issued card, or storing the alternate biometric on a local
reader, may be proposed as part of the FSP or VSP. However, in all
cases the linkage between the individual, the TWIC, and the alternate
biometric would need to be proven and approved by the Coast Guard.
(2) Card authentication ensures that the card being used is an
authentic TWIC, i.e., not a counterfeit. As designed, the primary
method of card authentication involves engaging the TWIC with a reader
to perform a CHALLENGE/RESPONSE protocol using the Card Authentication
Certificate and the associated card authentication private key resident
on the TWIC.\4\ The card can also be visually inspected for various
security features that are embedded into the front and back of the
card, although this is a less reliable form of card authentication.
---------------------------------------------------------------------------
\4\ The TWIC reader will read the Card Authentication
Certificate from the TWIC card and then send a challenge to the card
requesting the card authentication key be used to sign a random
block of data (created and known to the TWIC reader). The TWIC
reader will use the public key embedded in the Card Authentication
Certificate to verify the signature of the random data block is
valid. If the signature is valid the TWIC reader will trust the TWIC
card submitted and will proceed to pulling the Federal Agency Smart
Credential--Number (FASC-N) and other information from the card for
further processing. The Card Authentication Certificate contains the
FASC-N and a certificate expiration date harmonized to the TWIC card
expiration date. This minimizes the need for the TWIC reader to pull
more information from the card (unless required for additional
checking).
---------------------------------------------------------------------------
(3) Card validity involves the determination that a TWIC is still
valid, i.e., that it has not expired; been reported as lost, stolen, or
damaged; or been revoked for cause by TSA. A TWIC that is invalid is
placed on the ``hotlist,'' which is updated daily.\5\ As designed,
checking for card validity is accomplished by comparing the expiration
date of the TWIC to the current date and additionally comparing the
card's internal Federal Agency Smart Card--Number (FASC-N), retrievable
from several locations within the TWIC, to the hotlist FASC-Ns that TSA
makes available to owners and operators.
---------------------------------------------------------------------------
\5\ The hotlist is online at: https://twicprogram.tsa.dhs.gov/TWICWebApp/SDownloadHotlist.do.
---------------------------------------------------------------------------
An alternative method for checking card validity is to use a
Certificate Revocation List (CRL). The link to the CRL is embedded in
the Issuer Signing Certificate present on every card.\6\ Each entry of
the CRL is comprised of the certificate number and its date of
revocation. Note there are four certificates for every TWIC Card (Card
Authentication Certificate, Digital Signature Certificate, Key
Management Certificate, and Personal Identity Verification (PIV)
Authentication Certificate). The CRL is updated daily. Both of these
processes (hotlist or CRL check) require a card/reader interface. A
partial card validity check can be accomplished by reviewing the
expiration date on the face of the TWIC, but such a check would not
capture information relating to cardholders who TSA determines pose a
security threat and/or hold revoked TWICs.
---------------------------------------------------------------------------
\6\ The CRL is located at https://twic-crl.orc.com/CRLs/TWICCA1.crl.
---------------------------------------------------------------------------
We anticipate that the Hotlist match (or the CRL match) can be done
in one of two ways: Electronically (either in real time or by
downloading the Hotlist into the reader or a separate access control
system), or by printing out the Hotlist and manually entering it into a
separate access control system.
The TWIC 1 NPRM discussed the potential for a process called
``privilege granting,'' in which an owner or operator could contact TSA
and register those persons granted unescorted access privileges at the
vessel or facility. Owners or operators would provide TSA with the
FASC-Ns for every person who was being considered for unescorted access
privileges. TSA would then contact the owner or operator directly if
any of those FASC-Ns were placed on the Hotlist. This option requires
access to a TWIC reader in order to discern the FASC-Ns associated with
the individuals given unescorted access. This capability was tested
during TSA's TWIC prototype but is not part of the current TWIC system.
We would like to hear comments on whether such an option would be
preferred, and if so, whether owners and operators would be willing to
pay a fee for the option of using privilege granting (instead of
downloading the Hotlist at regular intervals). If users would be
willing to pay a fee, we also request a range of what would be
appropriate (e.g., one time fee to use the system, annual fees, or a
combination of both, plus limits on what fees owners and operators
would be willing to pay).
D. Reader Requirements
When we considered electronic reader requirements for facilities
and vessels, we began with a baseline approach that all three
categories of TWIC verification--identity verification, card
authentication, and card validity--in its most reliable and complete
form should be required of all risk groups.
TWIC provides a universally recognized, tamper-resistant credential
backed up by a TSA security threat assessment that, when used as an
access control tool, reduces the risk of a transportation security
incident at vessels and maritime facilities. TWIC is a dual interface
smart card which was developed using national and international
standards to ensure security, interoperability and performance. The
card has physical and logical security features which, when used
properly, can provide a secure method of determining, with a high level
of assurance, that the TWIC-holder is the same individual to whom the
TWIC was issued, and that they do not present a security threat.
The benefit of using existing industry recognized standards in
developing the TWIC is the flexibility of use the card provides. It can
be integrated into existing access control systems by using the TWIC as
a secure means of
[[Page 13365]]
authenticating an individual when first registering an individual into
an existing access control system. Alternatively, either the contact or
contactless interface can be used with existing smart card readers to
authenticate the individual and the credential when making access
control decisions, by securely accessing and using the data stored on
the TWIC.
A design principle of the TWIC system is to establish and maintain
a chain of trust. A chain of trust is a security architecture that
ensures that a uniform level of security and integrity is applied to
the components or agents where information is stored or passes through.
TWIC accomplishes this by the use of secure communication between
components of the TWIC system, identity verification and authentication
issuance requirements, and centralized personalization.
The following tables briefly summarize the requirements the Coast
Guard is considering for each risk group. It indicates what would need
to occur, at each MARSEC Level, to complete identity verification, card
authentication, and a card validity check.
Table of Potential Reader Requirements
----------------------------------------------------------------------------------------------------------------
MARSEC Level 1 MARSEC Level 2 MARSEC Level 3
----------------------------------------------------------------------------------------------------------------
Risk Group A, Bulk CDCs, >1,000 IDENTITY VERIFICATION: IDENTITY VERIFICATION: IDENTITY VERIFICATION:
passengers Biometric match of Biometric match of Biometric match of
fingerprint to fingerprint to fingerprint to
template stored in template stored in template stored in
TWIC at each entry. TWIC at each entry. TWIC at each entry.
CARD AUTHENTICATION: CARD AUTHENTICATION: CARD AUTHENTICATION:
Electronic Electronic Electronic
communication to communication to communication to
achieve a successful achieve a successful achieve a successful
CHALLENGE/RESPONSE CHALLENGE/RESPONSE CHALLENGE/RESPONSE
result at each entry. result at each entry. result at each entry.
CARD VALIDITY CHECK: CARD VALIDITY CHECK: CARD VALIDITY CHECK:
Compare FASC-N against Compare FASC-N against Compare FASC-N against
Hotlist at each entry; Hotlist at each entry; Hotlist at each entry;
update Hotlist weekly. update Hotlist daily. update Hotlist daily.
Risk Group B, HAZ MAT, Crude Oil, 500- IDENTITY VERIFICATION: IDENTITY VERIFICATION: IDENTITY VERIFICATION:
1,000 passengers. Random biometric match Biometric match of Biometric match of
of fingerprint to fingerprint to fingerprint to
template stored in template stored in template stored in
TWIC, at least one day TWIC at each entry. TWIC at each entry.
a month; all other
times as visual
identity badge.
CARD AUTHENTICATION: CARD AUTHENTICATION: CARD AUTHENTICATION:
Electronic Electronic Electronic
communication to communication to communication to
achieve a successful achieve a successful achieve a successful
CHALLENGE/RESPONSE CHALLENGE/RESPONSE CHALLENGE/RESPONSE
result at each entry. result at each entry. result at each entry.
CARD VALIDITY CHECK: CARD VALIDITY CHECK: CARD VALIDITY CHECK:
Compare FASC-N against Compare FASC-N against Compare FASC-N against
Hotlist at each entry; Hotlist at each entry; Hotlist at each entry;
update Hotlist weekly. update Hotlist daily. update Hotlist daily.
Risk Group C, Non-HAZ................ IDENTITY VERIFICATION: IDENTITY VERIFICATION: IDENTITY VERIFICATION:
MAT, <500 passengers MODU OSV........ Visual identity badge Visual identity badge Visual identity badge
at each entry. at each entry. at each entry.
CARD AUTHENTICATION: CARD AUTHENTICATION: CARD AUTHENTICATION:
Check security Check security Check security
features on card at features on card at features on card at
each entry and each entry and each entry and
electronic electronic electronic
verification during verification during verification during
annual inspections and annual inspections and annual inspections and
random spot checks. random spot checks. random spot checks.
CARD VALIDITY CHECK: CARD VALIDITY CHECK: CARD VALIDITY CHECK:
Check expiration date Check expiration date Check expiration date
at each entry; CG each entry; CG perform at each entry; CG
perform spot checks. spot checks. perform spot checks.
----------------------------------------------------------------------------------------------------------------
Risk Group A
To provide the maximum security benefit, we determined that those
assets presenting the highest risk should be required to implement the
most protective measures. Thus, we are considering requiring facilities
and vessels that fall into risk group A to either match the TWIC-
holder's biometric (fingerprint) to the template stored in the card or
to match the TWIC-holder's biometric to one held in the owner/
operator's own access control system. This match will need to occur at
each entry. For the latter option, the owner or operator may choose to
apply a different biometric than the fingerprint, such as an iris scan
or hand geometry, stored in the local access control system and matched
to the individual seeking access. Also, for the latter option, the
owner/operator's system must be linked to the TWIC in such a manner
that the access control system forbids access to someone who does not
have a valid TWIC, or to someone other than to whom the TWIC has been
issued. This means that the TWIC will need to be read and the stored
biometric identifier matched against the TWIC-holder's fingerprint at
least once, when the individual is entered into the local access
control system.
We are re-considering whether to require a TWIC-holder to verify
his/her PIN as a part of the identity verification process. This added
element, making the TWIC-holder provide ``something he/she knows,''
would complete three-factor authentication: (1) Something the person
has--a TWIC credential; (2)
[[Page 13366]]
Something the person knows--a PIN, stored securely on * * * the
credential; and (3) Something the person is--biometric. PIN
verification would require the TWIC to be inserted into a card reader,
as the PIN only operates in the contact-chip mode. Comments received on
the TWIC 1 NPRM made it clear that requiring insertion of a TWIC into
an open-slot card reader was not favored among the maritime community.
This was echoed in the recommendations made by NMSAC in its
recommendations for specifications for a contactless TWIC. There were
concerns over whether the readers would be able to withstand harsh
environmental and operational conditions and how long they would last
if they were operated continually in the maritime environment. Industry
partners also voiced concerns over whether maritime workers would be
able to remember a PIN, especially if a PIN was only required at higher
MARSEC Levels, and over the operational delays that may be caused by
requirements for TWIC-holders to pass through access control points,
insert the card, enter a PIN (which could take several tries), and then
remove the card. After considering these comments, the relative risk
presented by the vessels and facilities, and the security already being
provided through the remaining requirements, we have tentatively
determined that a requirement for use of the PIN would have a negative
impact on large scale throughput during access control evolutions. As a
result, we have not included a requirement for regular use of the PIN
at any MARSEC Level for any risk group in this ANPRM. We would like
public comments on this decision and whether the Coast Guard should
reconsider using PIN requirements. We note, however, that PINs may be
required by owners and operators who wish to implement an additional
level of security or during the spot checks and annual inspections
conducted by the Coast Guard.
We are also considering a proposal that vessels and facilities in
the highest risk group (risk group A) authenticate the card
electronically with a card reader at each entry. Again, for vessels and
facilities opting to integrate TWIC into existing local access control
systems, this will need to be done before the individual's information
is added into the local access control system, and before unescorted
access is first granted to the individual. For other vessels and
facilities, this function can be done by TWIC readers at the same time
that the biometric match is being made. Adding this requirement would
add a negligible time to the transaction between the TWIC-holder and
the card reader, as the readers will be able to perform this function
as the individual is presenting his or her finger for matching against
the template stored on the TWIC.
Finally, vessels and facilities in risk group A would verify the
validity of the TWIC at each entry using information that is no more
than seven (7) days old, when at MARSEC Level 1. This means that on a
weekly basis, the Hotlist or CRL will need to be downloaded into the
reader(s) used at the vessel or facility's access control point(s) or
into the local access control system used by the vessel or facility.
This frequency will jump to daily (i.e., the Hotlist or CRL will need
to be downloaded daily) at MARSEC Levels 2 and 3. We request comments,
particularly from vessels and facility owners and operators in risk
grouping A, as to these processes.
Risk Group B
Vessels and facilities in risk group B would, under a final rule
based on this model, be required to complete the identity verification
by using the TWIC as a visual identity badge (``flash pass'') at each
entry. On a random basis, but at least one day a month, at MARSEC Level
1, they would also be required to match the biometric stored on the
card in order to conduct more complete identity verification.
Vessels and facilities in risk group B would need to perform card
authentication by electronically reading all the cards at MARSEC Level
1 at each entry, even when the biometric match is not being
implemented. While these checks require the use of an electronic
reader, they may be done using the contactless smart card interface,
and would not require that the individual TWIC-holder present his or
her fingerprint for matching against the template. The validity of the
TWICs must be checked at each entry, using TSA's Hotlist or CRL. At
MARSEC Level 1, this would be done using information that is no more
than seven (7) days old. At MARSEC Levels 2 and 3, the information
would be downloaded daily. We seek comments on this process and its
application to vessels and facilities in risk group B.
Risk Group C
Facilities and vessels in the lowest risk group, risk group C,
would not be required to match the biometric stored on the card in
order to complete the identity verification at any MARSEC Level.
Instead, they would only be required to use the TWIC as a visual
identity badge in the manner currently required by the TWIC 1 FR. This
provides identity verification with a lower level of reliance than a
biometric match would, however, we have determined at this time, and
subject to public comment, that in this lower risk group matching the
biometric frequently is not necessary. Given the type of commodities
and small number of passengers typical of this risk group, it is likely
these vessels and facilities are a less attractive target for
individuals who wish to do harm, though still holding the potential of
being involved in a TSI. As a result, we have determined that the
frequent matching of a biometric would not be practical. In addition,
identity verification using TWIC as a visual identity badge would more
closely align with other less stringent security provisions implemented
at these lower risk vessels and facilities.
Card authentication for this group (risk group C), would require
only verification of the various security features on the front and
back of the card. Under this process, vessels and facilities in this
risk group would continue to use the TWIC in the manner required by the
TWIC 1 FR. Finally, for the card validity check, we would require only
that the expiration date be checked. Thus, vessels and facilities in
risk group C will be able to fulfill their TWIC obligations without
having to buy or have access to a card reader.
This does not mean that individuals who hold TWICs and work
exclusively at vessels or facilities falling into risk group C will
never need to present their TWICs for a biometric match or more secure
card authentication check. The Coast Guard will continue to check and
verify TWICs, using handheld readers, during annual inspections and
during unannounced spot checks aboard vessels and facilities within all
three risk groups. These checks will include identity verification
using the fingerprint template stored in the TWIC, card authentication,
and card validity checks using the current TSA Hotlist or CRL.
Additionally, vessels and facilities may choose to electronically
authenticate the card with a card reader.
TSA would be able, through use of information collected during
enrollment for the TWIC, to contact employers or the Coast Guard if an
imminent threat, resulting in an immediate revocation of a TWIC, is
identified during the perpetual vetting of TWIC holders. At MARSEC
Levels 2 or 3, the Coast Guard spot checks and the percentage of TWICs
verified at each annual inspection would increase.
The Coast Guard seeks public comment of these processes, and
specifically as to the everyday
[[Page 13367]]
operational impacts related to the process and whether they will
maintain appropriate security levels while permitting the efficient and
effective continuation of industry operations.
E. Facility and Vessel Risk Groups
The following are suggested risk groups for vessels that are
subject to 33 CFR part 104:
Risk Group A
(1) Vessels that carry Certain Dangerous Cargoes (CDC) in bulk;
(2) Vessels certificated to carry more than 1,000 passengers; and
(3) Towing vessels engaged in towing a barge or barges subject to
paragraphs (1) or (2).
Risk Group B
(1) Vessels that carry hazardous materials other than CDC in bulk;
(2) Vessels subject to 46 CFR Chapter I, Subchapter D, that carry
any flammable or combustible liquid cargoes or residues \7\;
---------------------------------------------------------------------------
\7\ The intent as used here is to capture those tank vessels
that are carrying the high flash point petroleums, like crude oil,
that aren't hazardous materials, whether inland, coastal, or
seagoing.
---------------------------------------------------------------------------
(3) Vessels certificated to carry 500 to 1,000 passengers; and
(4) Towing vessels engaged in towing a barge or barges subject to
paragraphs (1), (2), or (3).
Risk Group C
(1) Vessels carrying non-hazardous cargoes that are required to
have a vessel security plan;
(2) Vessels certificated to carry less than 500 passengers;
(3) Towing vessels engaged in towing a barge subject to paragraphs
(1) or (2);
(4) Mobile Offshore Drilling Units (MODU); and
(5) Offshore Supply Vessels (OSVs) subject to 46 CFR chapter I,
subchapters L or I.
The following is suggested risk groups for facilities that are
subject to 33 CFR part 105:
Risk Group A
(1) Facilities that handle CDC in bulk;
(2) Facilities that receive vessels certificated to carry more than
1,000 passengers; and
(3) Barge fleeting facilities that receive barges carrying CDC in
bulk.
Risk Group B
(1) Facilities that receive vessels that carry hazardous materials
other than CDC in bulk;
(2) Facilities that receive vessels subject to 46 CFR Chapter I,
Subchapter D, that carry any flammable or combustible liquid cargoes or
residues;
(3) Facilities that receive vessels certificated to carry 500 to
1,000 passengers; and
(4) Facilities that receive towing vessels engaged in towing a
barge or barges carrying hazardous materials other than CDC in bulk,
crude oil, or certificated to carry 500 to 1,000 passengers.
Risk Group C
(1) MTSA-regulated facilities that receive vessels carrying non-
hazardous cargoes that are required to have a vessel security plan;
(2) Facilities that receive towing vessels engaged in towing a
barge carrying non-hazardous cargoes;
(3) Facilities that receive vessels certificated to carry less than
500 passengers.
All OCS facilities subject to 33 CFR part 106 would fall into risk
group B.
We considered the possibility that vessels may move from one risk
group to another, based on the cargo they are carrying or handling at
any given time. We expect that owners and operators of vessels that
expect to be in this situation (of moving between risk groups) will
explain, in their amended security plans, how they will move between
the requirements of the higher and lower risk groups, with particular
attention to the security measures to be taken when moving from a lower
risk group to a higher risk group and seek comments regarding this
requirement and the potential timing and processes for carrying out
these amendments.
We have also considered the possibility that facilities could be
permitted to move between risk groups based on vessel interface or
cargo operations. We are specifically requesting comment and
suggestions on how to apply this flexibility as it pertains to
potential electronic reader requirements while ensuring an equivalent
level of security and consistency across multiple COTP Zones to the
maximum extent possible.
F. Recurring Unescorted Access
In the TWIC 1 NPRM, we introduced the concept of recurring
unescorted access for vessels to allow an individual to enter on a
continual basis, without repeating the identity verification
requirement at each entry. 71 FR 29410. This concept allowed
flexibility for an individual to acquire unescorted access to secure
areas on a continual or ongoing basis, without having to fulfill the
TWIC access control requirement at every entry. In that NPRM, we noted
that an owner or operator's decision to grant recurring unescorted
access should be based on two considerations: (1) The relationship of
the individual to the vessel, or how well ``known'' he or she is; and
(2) the individual's need to have frequent and unimpeded access to the
vessel. In developing this ANPRM, we determined that both vessels and
facilities, at each risk group, should have the option of using
recurring unescorted access for up to 14 persons per vessel or
facility, if that provision is included in their amended security plan
and approved by the Coast Guard. In order to take advantage of
recurring unescorted access, the owner or operator of the vessel or
facility would need to perform a biometric match of the individual
against his or her TWIC (identity verification), either at hiring or
upon the effective date of a final rule, whichever occurs later. This
biometric match would need to include a verification of the FASC-N and
the TWIC Card Authentication Certificate (card authentication), as well
as a verification of the validity of the TWIC (card validity check).
Once this check is done, the TWIC could be used as a visual identity
badge at a frequency to be approved by the Coast Guard in the amended
security plan, so long as the validity of the TWIC is verified
periodically, using the Hotlist or CRL. For vessels and facilities in
risk groups A and B, these periodic checks of validity would need to
occur on a weekly basis at MARSEC Level 1, and on a daily basis at
MARSEC Levels 2 and 3. For those vessels in risk group C, these checks
would need to occur on a monthly basis at MARSEC Level 1, and on a
weekly basis at MARSEC Levels 2 and 3. In each case, the validity would
need to be checked using information that is no more than 24 hours old.
As a result, vessels in any risk group with a crew of 14 or less
would not need to carry a reader on their vessel to provide access
control over his or her own crew. The owner or operator would need
access to a reader to perform the initial identity verification and
card authentication, and would likely need some specialized software on
a computer to complete the card validity checks, but these checks could
be done at a shore side location, such as at the company's office. This
would allow owners and operators of more than one vessel to use the
same reader for an entire fleet. It also enables the owner or operator
to pursue an agreement with a facility or other company to borrow or
otherwise have access to their reader to perform the initial check,
create a file with the FASC-Ns and names of the employees granted
recurring unescorted access, and then use a software program
[[Page 13368]]
to compare this list to the TSA Hotlist or CRL on the required periodic
basis.
We used the recommendation from the Towing Safety Advisory
Committee (TSAC) which recommended a crew size cut off of 14 for
determining when to require a reader on board a vessel, as required by
the SAFE Port Act to develop a cut off for recurring unescorted access.
This was done because the rationale for allowing recurring unescorted
access--i.e., that these vessels have a reduced vulnerability because
the individuals are all ``known'' to one another--is the same rationale
used by TSAC to justify their crew size cut off recommendation. The
number was developed by taking into account the fact that for a small
vessel, such as a towing vessel or offshore supply vessel, the crew
would typically include up to one Master, one Chief Engineer, and three
four-person crews who rotate through watch shifts. This number would
also include a large percentage of deep draft vessels. We then carried
the number over to facilities, as it is reasonable to assume that 14
persons could be ``known'' by a facility owner or operator as well.
While the recurring unescorted access provision does not go so far
as to set a specific crew size below which a reader would not be
required on a vessel, we believe this provision, in conjunction with
the no reader requirement for risk group C, meets the intent of the
SAFE Port Act. Namely, it provides relief for owners and operators of
small and many large vessels, where it is unlikely that someone unknown
to the crew could acquire any type of access to the vessel without
raising suspicion. Additionally, while the recurring unescorted access
process would call for the use of electronic card readers to gain
access to certain vessels, we would not require that they be carried on
board any vessel. If the owner or operator of a vessel can demonstrate
in their vessel security plan that they will be able to meet the reader
requirements via use of a reader at a dedicated facility, by using a
reader that stays ashore with the company, or by agreements established
between vessels and facilities (such those captured in a Declaration of
Security) then the recurring unescorted access provisions could be met
without requiring installation or implementation of a reader on a
gangway or at any other place on the vessel.
G. Additional Topics and Requirements
Reader Approval--TWIC readers, incorporated into MTSA regulated
vessel and facility PACS, will need to follow the standard/
specification that will be developed from the results of the TWIC
reader pilot program, and published by the Government. An independent
lab that tests for compliance to the standard will be used by reader
manufacturers. These test results will be listed by the Government on
the DHS Responder Knowledge Base (RKB), which provides an on-line
source of information on products, equipment, and other information.
The RKB Web site may be viewed at: https://www.rkb.us.
Reader Calibration and Compliance--we are considering alternatives
for how we can check for compliance with regard to the readers
themselves. We would like to ensure, that once readers are installed,
they are maintained in proper working order. The existing provisions in
33 CFR 104.235, 104.2260, 105.225, 105.250, 106.230, and 106.255 would
require that the readers be inspected, tested, calibrated, and
maintained in accordance with the manufacturer's recommendations, and
that records of those actions be maintained as well. We seek comment on
whether TWIC readers should also be the subject to Coast Guard
inspections, or require some type of third party audit.
Security Plan amendment--we are considering a requirement for all
owners and operators to amend their security plans to include TWIC
requirements. We intend, at this time, to require the amendment within
six months of promulgation of a final rule. However, we will re-
evaluate this deadline as we get closer to issuing a final rule. We are
also considering the staggering of deadlines in order to sp