UNITED24 - Make a charitable donation in support of Ukraine!

Homeland Security

[House Hearing, 111 Congress]
[From the U.S. Government Printing Office]






                  THE FISCAL YEAR 2010 BUDGET FOR THE 
                   NATIONAL PROTECTION AND PROGRAMS 
                  DIRECTORATE AND THE TRANSPORTATION 
                        SECURITY ADMINISTRATION

=======================================================================

                                HEARING

                               before the

                SUBCOMMITTEE ON TRANSPORTATION SECURITY
                     AND INFRASTRUCTURE PROTECTION

                                 of the

                     COMMITTEE ON HOMELAND SECURITY
                        HOUSE OF REPRESENTATIVES

                     ONE HUNDRED ELEVENTH CONGRESS

                             FIRST SESSION

                               __________

                             JUNE 10, 2009

                               __________

                           Serial No. 111-23

                               __________

       Printed for the use of the Committee on Homeland Security
                                     


[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]


      Available via the World Wide Web: http://www.gpo.gov/fdsys/

                               __________




                                _____

                  U.S. GOVERNMENT PRINTING OFFICE
51-494 PDF                WASHINGTON : 2011
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing 
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC 
area (202) 512-1800 Fax: (202) 512-2104  Mail: Stop SSOP, Washington, DC 
20402-0001











                     COMMITTEE ON HOMELAND SECURITY

               Bennie G. Thompson, Mississippi, Chairman
Loretta Sanchez, California          Peter T. King, New York
Jane Harman, California              Lamar Smith, Texas
Peter A. DeFazio, Oregon             Mark E. Souder, Indiana
Eleanor Holmes Norton, District of   Daniel E. Lungren, California
    Columbia                         Mike Rogers, Alabama
Zoe Lofgren, California              Michael T. McCaul, Texas
Sheila Jackson Lee, Texas            Charles W. Dent, Pennsylvania
Henry Cuellar, Texas                 Gus M. Bilirakis, Florida
Christopher P. Carney, Pennsylvania  Paul C. Broun, Georgia
Yvette D. Clarke, New York           Candice S. Miller, Michigan
Laura Richardson, California         Pete Olson, Texas
Ann Kirkpatrick, Arizona             Anh ``Joseph'' Cao, Louisiana
Ben Ray Lujan, New Mexico            Steve Austria, Ohio
Bill Pascrell, Jr., New Jersey
Emanuel Cleaver, Missouri
Al Green, Texas
James A. Himes, Connecticut
Mary Jo Kilroy, Ohio
Eric J.J. Massa, New York
Dina Titus, Nevada
Vacancy
                    I. Lanier Avant, Staff Director
                     Rosaline Cohen, Chief Counsel
                     Michael Twinchek, Chief Clerk
                Robert O'Connor, Minority Staff Director
                                 ------                                

 SUBCOMMITTEE ON TRANSPORTATION SECURITY AND INFRASTRUCTURE PROTECTION

                 Sheila Jackson Lee, Texas, Chairwoman
Peter A. DeFazio, Oregon             Charles W. Dent, Pennsylvania
Eleanor Holmes Norton, District of   Daniel E. Lungren, California
    Columbia                         Pete Olson, Texas
Ann Kirkpatrick, Arizona             Candice S. Miller, Michigan
Ben Ray Lujan, New Mexico            Steve Austria, Ohio
Emanuel Cleaver, Missouri            Peter T. King, New York (Ex 
James A. Himes, Connecticut              Officio)
Eric J.J. Massa, New York
Dina Titus, Nevada
Bennie G. Thompson, Mississippi (Ex 
    Officio)
                     Michael Beland, Staff Director
                   Natalie Nixon, Deputy Chief Clerk
              Joseph Vealencis, Minority Subcommittee Lead










                            C O N T E N T S

                              ----------                              
                                                                   Page

                               Statements

The Honorable Sheila Jackson Lee, a Representative in Congress 
  From the State of Texas, and Chairwoman, Subcommittee on 
  Transportation Security and Infrastructure Protection..........     1
The Honorable Charles W. Dent, a Representative in Congress From 
  the State of Pennsylvania, and Ranking Member, Subcommittee on 
  Transportation Security and Infrastructure Protection..........    15

                               Witnesses

Mr. Philip R. Reitinger, Deputy Under Secretary, National 
  Protection and Programs Directorate, Department of Homeland 
  Security:
  Prepared Statement.............................................     2
Ms. Gale D. Rossides, Acting Administrator, Transportation 
  Security Administration, Department of Homeland Security:
  Prepared Statement.............................................     7

                                Appendix

Questions From Chairwoman Sheila Jackson Lee.....................    43

 
                  THE FISCAL YEAR 2010 BUDGET FOR THE 
                   NATIONAL PROTECTION AND PROGRAMS 
       DIRECTORATE AND THE TRANSPORTATION SECURITY ADMINISTRATION

                              ----------                              


                        Wednesday, June 10, 2009

             U.S. House of Representatives,
                    Committee on Homeland Security,
Subcommittee on Transportation Security and Infrastructure 
                                                Protection,
                                                    Washington, DC.
    The subcommittee met, pursuant to call, at 2:15 p.m., in 
Room 311, Cannon House Office Building, Hon. Sheila Jackson Lee 
[Chairwoman of the subcommittee] presiding.
    Present: Representatives Jackson Lee, Lujan, Cleaver, 
Himes, Massa, Dent, and Lungren.
    Ms. Jackson Lee. The subcommittee will come to order.
    Let me indicate that my delay was related to some security 
concerns that are occurring in and around the Capitol.
    Some of you may have heard that there was a shooting at the 
Holocaust Museum. The information I have is that two persons 
may have lost their lives. We don't have all the facts. But, 
hearing no objection, I would like for us to just have a moment 
of silence before we start this hearing.
    Thank you.
    The subcommittee will come to order. The subcommittee is 
meeting today to receive testimony on the fiscal year 2010 
budget for the National Protection and Programs Directorate and 
the Transportation Security Administration. Our witnesses today 
will testify about the budget request of their respective 
components for fiscal year 2010.
    At the onset, I would like to thank the witnesses for 
appearing before us today. Because schedules are hectic and the 
Deputy Under Secretary must leave before 3:00 p.m., I would 
like to proceed as quickly as possible. In addition, I would 
ask the indulgence of the Deputy Under Secretary if we are a 
few minutes beyond, but we recognize his scheduling issue.

  STATEMENTS OF PHILIP R. REITINGER, DEPUTY UNDER SECRETARY, 
  NATIONAL PROTECTION AND PROGRAMS DIRECTORATE, DEPARTMENT OF 
 HOMELAND SECURITY AND GALE D. ROSSIDES, ACTING ADMINISTRATOR, 
TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND 
                            SECURITY

    Ms. Jackson Lee. Without objection, I would like to request 
that the witnesses' testimony be considered as read so that we 
can move directly to questions. Hearing no objection, it is so 
ordered.
    [The statements of Mr. Reitinger and Ms. Rossides follow:]
               Prepared Statement of Philip R. Reitinger
                             June 10, 2009
    Good morning, Chairwoman Jackson Lee, Ranking Member Dent, and 
Members of the subcommittee. Thank you for the opportunity to appear 
before you to discuss the progress the National Protection and Programs 
Directorate (NPPD) has made and how the President's budget request for 
fiscal year 2010 will position us to support the overall Department 
mission to protect and secure our Nation. I will also take this 
opportunity to highlight some of the Directorate's accomplishments.
      national protection and programs directorate budget overview
    The fiscal year 2010 budget request for NPPD is $1.959 billion and 
includes 2,710 Federal positions. This is an increase of $801 million 
over the fiscal year 2009 appropriated amount of $1.158 billion.
    The primary driver of the budgetary and personnel increase arises 
from the requested transfer of $640 million and 1,225 positions of the 
Federal Protective Service (FPS) to NPPD from U.S. Immigration and 
Customs Enforcement (ICE). The proposed transfer aligns the FPS mission 
of Federal facilities infrastructure protection within the NPPD mission 
of critical infrastructure protection. Further, NPPD chairs the 
operations of the Interagency Security Committee, a group that includes 
the physical security leads for all major Federal agencies and whose 
key responsibility is the establishment of Government-wide security 
policies for Federal facilities. These missions are complementary and 
mutually supportive, and the alignment resulting from the transfer 
improves and advances the mission effectiveness of both FPS and NPPD.
    To ensure a smooth transition pending congressional approval, NPPD, 
ICE, and FPS have formed a joint transition team. The transition team 
is reviewing a recently completed inventory of the financial, 
procurement, and administrative support services that ICE currently 
provides for FPS, along with the annual costs ICE charges for those 
services. Services that can be provided by NPPD or DHS Under Secretary 
for Management (USM) will be transferred from ICE. In those cases in 
which it is determined that ICE should continue as the service provider 
for fiscal year 2010, a Service Level Agreement between FPS and ICE 
will be established to ensure there is no disruption to operations 
during the transition until such time that services can be fully 
transferred to NPPD or USM in fiscal year 2011.
    Filling vacant Federal positions and right-sizing the Federal and 
contractor staff ratio across NPPD is my upmost priority. NPPD has made 
great strides in filling critical positions, but much work remains to 
build out a cadre of Federal staff across the Directorate. NPPD has 
brought on board 300 new employees over the last 12 months, and 
currently has approximately 800 Federal employees on board out of the 
1,064 fiscal year 2009 positions. We are projecting bringing on board 
another 200 by the end of fiscal year 2009. The fiscal year 2010 budget 
request includes 350 additional Federal staff across the entire 
Directorate offset by funding decreases in contractor support funding. 
The fiscal year 2010 request also includes 71 new positions mainly to 
support infrastructure security compliance and cybersecurity. This will 
bring NPPD to a total workforce of 2,710 in fiscal year 2010.
    I would now like to highlight some NPPD accomplishments as well as 
review the fiscal year 2010 requested budgets for the Office of 
Infrastructure Protection, the Office of Risk Management and Analysis, 
US-VISIT, and the Office of Cybersecurity and Communications.
Office of Infrastructure Protection
    The Office of Infrastructure Protection (IP) leads the coordinated 
national effort to reduce risk to our critical infrastructure and key 
resources (CIKR) posed by acts of terrorism; it also enables national 
preparedness, timely response, and rapid recovery in the event of an 
attack, natural disaster, or other emergency. IP has achieved a number 
of key milestones in the past year, such as:
   Assigned preliminary risk tiers for facilities covered by 
        Chemical Facility Anti-Terrorism Standards (CFATS), a 
        comprehensive set of regulations that protect high-risk 
        chemical facilities from attack and prevent theft of chemicals 
        for use as weapons.
   Provided physical security and risk data to 5,000 registered 
        Homeland Security Information Network--Critical Sector (HSIN-
        CS) users responsible for critical infrastructure and key 
        resources security in a coordinated national effort to reduce 
        risk posed by acts of terrorism and natural disasters. This 
        included the development and deployment of targeted baseline 
        critical infrastructure and key resource protection 
        information-sharing capabilities.
   Assisted the Government of Trinidad and Tobago (GOTT),\1\ as 
        well as private sector owners and operators, in identifying 
        vulnerabilities throughout the liquefied natural gas system, 
        providing recommendations for enhanced security and protective 
        measures to mitigate risk. This operation was DHS' first 
        comprehensive, system-based vulnerability assessment of a 
        foreign nation's infrastructure system and has become the model 
        for international CIKR security engagements for both DHS and 
        other departments.
---------------------------------------------------------------------------
    \1\ The United States imports approximately 70 percent of its 
liquefied natural gas from GOTT, and any disruptions to the system 
would have an immediate impact on domestic energy supply and security, 
particularly for the Northeastern United States.
---------------------------------------------------------------------------
   Integrated the State, Local, Tribal and Territorial 
        Government Coordinating Council into the full cycle of national 
        infrastructure protection planning and reporting. The Council 
        is a forum for its representatives to engage with the Federal 
        Government and CIKR owners and operators. The Council 
        integrates Council stakeholders into the national level 
        National Infrastructure Protection Plan (NIPP) framework, its 
        Critical Infrastructure Partnership Advisory Council, and 18 
        Sector/Government Coordinating Councils. This evolution of the 
        CIKR partnership model allows all levels of government to 
        provide input into both the NIPP and Sector-Specific Plans as 
        well as their implementation.
   Established State and local critical infrastructure 
        protection training and technical assistance programs. Not only 
        do these programs support standardized infrastructure and risk 
        information, they also provide training to assist State and 
        local law enforcement, emergency responders, emergency 
        managers, and other homeland security officials in 
        understanding the steps necessary to develop and implement 
        comprehensive CIKR protection programs.
    IP's fiscal year 2010 request is $333.3 million and includes 725 
Federal positions. This request maintains critical capabilities; 
expands enforcement of the chemical security; supports development of 
final ammonium nitrate regulations; funds new nuclear reactor security 
consultations with the Nuclear Regulatory Commission; supports five 
Regional Resiliency Assessment Projects; and enhances coordinated 
national bombing prevention and improvised explosive device security 
efforts.
            Infrastructure Security Compliance: Chemical Security and 
                    Ammonium Nitrate
    The total funding requested for fiscal year 2010 to support the 
regulation of high-risk chemical facilities and establish ammonium 
nitrate regulations is $103.4 million, which includes 268 Federal 
staff.
    The increased funding request supports the hiring, training, 
equipping, and housing of additional inspectors. Funding will also 
support the completion and publication of final ammonium nitrate 
regulations that will help prevent the use of ammonium nitrate in an 
act of terrorism through both required registration and verification 
processes and inspection and audit procedures.
    As mentioned previously, DHS released CFATS and the final CFATS 
Appendix A rule, listing approximately 300 ``Chemicals of Interest'' 
and associated threshold quantities. Pursuant to CFATS, facilities 
possessing threshold amounts of Appendix A chemicals were required to 
complete a Top-Screen assessment within 60 days of the release of 
Appendix A (i.e., by January 22, 2008) or, if the facility acquires an 
Appendix A chemical subsequent to the release of Appendix A, within 60 
days of the facility's acquisition of that chemical. Facilities 
preliminarily designated as high-risk based on the Top-Screen 
submissions were also required to complete Security Vulnerability 
Assessments, and, if that high-risk status is confirmed by the Security 
Vulnerability Assessments, will be required to develop Site Security 
Plans and implement measures meeting DHS-defined risk-based performance 
standards.
    To assist facilities in performing these obligations, the 
Department developed an on-line suite of tools known as the Chemical 
Security Assessment Tool, which includes, among other applications, the 
Top-Screen, Security Vulnerability Assessment, and Site Security Plan 
tools; a Risk-Based Performance Standards Guidance Document that 
facilities may use when developing their Site Security Plans; and a 
Help Desk to answer questions regarding CFATS. Additionally, upon 
request, the Department performs technical consultations and technical 
assistance visits for facilities with questions regarding the 
compliance process. To date, over 36,000 chemical facilities have 
submitted Top-Screens, with over 7,000 facilities preliminarily 
designated high-risk in June 2008 and required to submit Security 
Vulnerability Assessments. Due to changes facilities have made around 
chemicals of interest since the preliminary designations a year ago, 
the number of high-risk facilities as of June 2009 has gone down to 
6,414 facilities.
    The Department recently sent final notification letters to the 
highest risk (Tier 1) facilities, confirming the facilities' high-risk 
status and initiating the 120-day time frame for submitting Site 
Security Plan and implementing the associated security measures. The 
Plans are due back to the Department on September 15, 2009. The current 
projections for each type of facility are as follows: Tier 1--182; Tier 
2--680; Tier 3--1,612; and Tier 4--3,940. Following initial approval of 
the Site Security Plans, the Department expects to begin performing 
inspections in the first quarter of fiscal year 2010, commencing with 
the designated Tier 1 facilities.
            Vulnerability Assessments
    An additional $3 million is requested in fiscal year 2010 to 
support Vulnerability Assessment Projects.
    Section 657 of the Energy Policy Act of 2005 (Public Law 109-58) 
requires DHS to perform security consultations for Nuclear Regulatory 
Commission (NRC) new nuclear reactor license applications prior to the 
NRC issuance of the license. DHS is responsible for conducting site 
security consultations in cooperation with the NRC, local law 
enforcement, and private sector partners to provide a report that 
identifies the potential vulnerabilities and threats associated with 
the proposed reactor locations. The NRC has informed DHS that there are 
10 facilities that have submitted license requests and two pending 
license requests that will require site-security assessments in fiscal 
year 2010.
    Additionally, IP will pilot six Regional Resiliency Assessment 
Projects, each of which will involve a cooperative Government-led, 
interagency assessment of both the specific CIKR and a general regional 
analysis of the surrounding infrastructure. The intent of this program 
is to identify and evaluate infrastructure ``clusters,'' regions, 
systems, and their key interdependencies. The outcome of the findings 
will support the development of coordinated protection efforts to 
enhance resiliency and address security gaps within the surrounding 
first responder communities and geographic region. The program's 
integrated approach will measure and provide metrics for risk 
mitigation to a region.
            Bombing Prevention
    A total of $14.8 million is requested to support bombing prevention 
efforts. The fiscal year 2010 request supports the completion of 16 out 
of the 22 Implementation Plan recommendations included in the National 
Strategy for Combating Terrorist Use of Explosives in the United States 
that are the responsibility of DHS. DHS is working closely with both 
the Department of Justice and the Department of Defense, who are 
leading the completion of the other six Implementation Plan 
recommendations, to carry out this National Strategy. The funding will 
support increased assessments of bombing prevention capabilities across 
the country and increased bombing prevention information services for 
Federal, State, local, and private sectors.
Office of Risk Management and Analysis
    The Office of Risk Management and Analysis (RMA) is leading the 
Department's efforts to establish a common risk management framework to 
identify, assess, and manage homeland security risk. RMA seeks to 
enhance overall protection, prevention, preparedness, and mitigation of 
homeland security risks through risk analysis and risk management 
strategies. RMA has:
   Completed the prototype for the Risk Assessment Process for 
        Informed Decision-making (RAPID) to support the Department's 
        overall planning, programming, budgeting, and execution 
        process. When fully developed, RAPID will support strategic 
        policy and budgetary decisions by assessing risk, evaluating 
        risk reduction effects of DHS programs, and evaluating 
        alternative resource allocation strategies. In 2009, within the 
        RAPID framework, detailed assessments in the chemical and 
        biological threat spectrum are being used to inform the 
        Department's Integrated Planning Guidance by: (1) Providing an 
        analysis of DHS chemical/biological security programs; (2) 
        evaluating the degree to which DHS chemical/biological programs 
        are contributing to risk reduction; (3) identifying gaps; and 
        (4) recommending strategies for better allocating resources to 
        manage risk.
   Completed the interim DHS Integrated Risk Management 
        Framework. This framework provides a foundation for 
        institutionalizing integrated risk management in the Department 
        by outlining an overall vision--as well as objectives, 
        principles, and a process--for integrated risk management 
        within DHS. It also identifies how the Department will achieve 
        integrated risk management by developing and maturing policy, 
        governance, processes, training, and accountability methods. 
        Members of the Department's Risk Steering Committee developed 
        the framework, which is supported by all DHS components, 
        directorates, and offices.
   Managed and led the administration and operation of a 
        Department Risk Steering Committee, to serve as the 
        Department's risk management governance structure. The Risk 
        Steering Committee is a three-tiered construct. Tier I consists 
        of all heads of DHS components; Tier II consists of sub-
        directorate/component principals (e.g., assistant secretaries, 
        senior officials, deputy directors); and Tier III consists of 
        senior policy and analysis staff. The Risk Steering Committee 
        and its working groups meet frequently to review and produce 
        risk products for use by the entire Department.
   Produced the first set of analytical guidelines for risk 
        practitioners across the Department. The Risk Management 
        Analytical Guidelines provide a body of knowledge for DHS and 
        its components to improve their risk management capabilities by 
        promoting sound risk management processes and techniques. These 
        primers capture and promulgate promising practices and lessons 
        learned to promote convergence of DHS risk management 
        activities and support education and training. Among the 
        initial titles are Developing Risk Assessment Methodologies, 
        Developing Scenarios, Assessing Vulnerabilities for Risk 
        Assessments, and Analyzing Consequences.
   Published the DHS Risk Lexicon, which defines 73 key risk-
        related terms and provides a common vocabulary for the 
        foundation of an integrated risk management capability within 
        the Department.
    The fiscal year 2010 budget request for RMA is $9.9 million and 
includes 25 Federal staff. Major programs planned in fiscal year 2010 
for RMA expand on recent accomplishments and include:
   Leading a study group under the auspices of the Quadrennial 
        Homeland Security Review that will define, frame, and establish 
        a process for conducting a homeland security national risk 
        assessment for the purpose of determining comparative all-
        hazards risk to the homeland and identifying opportunities to 
        manage that risk. Following the completion of the study, RMA 
        will implement the recommendations and begin conducting the 
        first homeland security national risk assessment.
   RAPID II, to be completed by February 2010, will be the 
        first evaluation of the risk reduction effectiveness of DHS 
        programs against a broader spectrum of homeland security risk; 
        it will be used to help inform the Department's fiscal year 
        2012-2016 resource allocation process.
   Continue development of a Risk Knowledge Center. The Center 
        will serve as the central point for risk data collection and 
        dissemination, as well as provide training to enable the 
        building of a risk core competency across DHS and the broader 
        homeland security enterprise. The Center will also provide 
        technical assistance to help personnel within DHS (and 
        eventually outside DHS) develop and/or apply risk assessment 
        and management concepts, methods, tools, and resulting data. 
        Further, it will support the application of advanced risk 
        concepts developed by a broad range of sources--DHS' Science 
        and Technology Directorate, academia, professional societies, 
        and RMA staff--to current and future needs.
United States Visitor and Immigrant Status Indicator Technology Program
    The United States Visitor and Immigrant Status Indicator Technology 
(US-VISIT) Program assists the Department in facilitating legal travel 
and protecting our Nation from dangerous people attempting to enter the 
country. Recent US-VISIT accomplishments include:
   Deploying 10-print scanner technology to all major ports of 
        entry. This provides the capability to capture 10 fingerprints 
        from 97 percent of travelers. Utilizing 10-print capture 
        improves accuracy in matching fingerprints, increases the 
        identification of high-risk individuals, and reduces 
        interaction with low-risk travelers. Full deployment to 292 
        air, sea, and land ports of entry will be completed by the end 
        of this fiscal year.
   Assisted State and local law enforcement participation in 
        Secure Communities. Secure Communities is an ICE initiative 
        that provides assistance in the identification of immigration 
        violators that have been arrested by State and local law 
        enforcement. Authorized Federal, State, and local government 
        user agencies are provided with access to biometric data to 
        identify and mitigate security risks.
   Supporting the U.S. Coast Guard in the use of mobile 
        biometric services (biometrics at sea) off the coasts of Puerto 
        Rico and Florida. This aids in identifying and prosecuting 
        hundreds of illegal migrants at sea, including some wanted for 
        human smuggling and murder.
   Enhancing the integrity of the immigration system through 
        continued development of alien exit reporting. US-VISIT began 
        biometric air exit pilots on May 28, 2009. Through July 2, 
        2009, U.S. Customs and Border Protection and Transportation 
        Security Administration will conduct tests in the boarding area 
        of the Detroit Metropolitan Wayne County Airport and the 
        security checkpoint of the Hartsfield-Jackson Atlanta 
        International Airport collecting biometric information from 
        non-U.S. citizens.
    The fiscal year 2010 budget request for US-VISIT is $356.2 million 
and includes 212 Federal staff positions. The request includes funding 
to support the growing identity management and screening services 
workloads resulting from the increase to 10-print identifications and 
verifications. The request also includes increased system operations 
and maintenance for the Automated Biometric Identification System (due 
to continued growth of existing programs and servicing new customer 
program needs), technology refresh for fingerprint matching hardware, 
and data center mirroring and migration.
Office of Cybersecurity and Communications
    The Office of Cybersecurity and Communications (CS&C) comprises the 
National Cyber Security Division, the National Communications System, 
and the Office of Emergency Communications. Recent CS&C accomplishments 
include:
   The National Cyber Security Division (NCSD) assessed over 
        4,000 current external internet connections in the .gov domain 
        and identified approximately 80 of those as consolidated 
        internet access points.
   NCSD began deployment of the National Cybersecurity 
        Protection System (NCPS) to enable data collection for the 
        detection of potential malicious cyber activities on Federal 
        networks and consequent coordination and analysis by US-CERT 
        (United States Computer Emergency Readiness Team).
   During Hurricane Ike, the National Communications System 
        (NCS) helped leaders in the Houston and Galveston areas 
        communicate by prioritizing emergency calls over congested 
        phone lines and facilitating the restoration of critical 
        telecommunications services. The Government Emergency 
        Telecommunications Service completed over 93 percent of the 
        2,200 priority calls placed across five States.
   DHS developed the National Emergency Communications Plan and 
        approved 56 State-wide Communications Interoperability Plans.
    The CS&C fiscal year 2010 budget request is $584.9 million and 
includes 419 positions.
   The fiscal year 2010 request for the NCSD is $400.7 million.
     This request includes an increase of $75 million from 
            fiscal year 2009 for the implementation of the 
            Comprehensive National Cybersecurity Initiative to support 
            the ability to develop and deploy cyber technologies to 
            counter on-going, real-world national cyber security 
            threats and apply effective analysis and risk mitigation 
            strategies to detect and deter threats. NCSD will support 
            the on-going reduction and consolidation efforts of 
            external Federal access points, enabling more effective 
            monitoring and alerting on suspicious activities occurring 
            across the Federal enterprise.
     The NCSD request also includes an additional $15 million 
            to enhance outreach and coordination across all levels of 
            government and the private sector. The fiscal year 2010 
            budget request allows for additional support to the private 
            sector by funding 50 site assessment visits to CIKR 
            facilities, increasing the ability to identify 
            vulnerabilities in Industrial Control Systems across the 18 
            CIKR sectors. The fiscal year 2010 request also enhances 
            the capability for DHS to sponsor and support cyber 
            exercises with State, local, regional, and private sector 
            partners, as well as with our international partners. NCSD 
            also plans to conduct Cross Sector Cyber Assessments to 
            support enhanced cybersecurity for all 18 CIKR sectors. 
            This project will analyze cross sector perspectives and 
            activities on common vulnerabilities, protective measures, 
            interdependencies, risk assessment methodologies, and 
            mitigation strategies.
   The fiscal year 2010 request for the NCS is $140.2 million; 
        this will fund 10 new Regional Communications Coordinator 
        positions and development of a Continuity Communications 
        Architecture to ensure, under all conditions, Federal executive 
        branch cross-department and agency communications.
   The fiscal year 2010 request for the OEC is $44 million and 
        includes additional funding to support approximately 100 site 
        visits that will validate progress against the NECP goals, 
        provide additional support to lower-achieving urban areas, and 
        fund State-wide Communication Interoperability Plan workshops.
Office of the Under Secretary
    The fiscal year 2010 budget request includes $34.7 million and 104 
Federal positions for Directorate Administration and the Office of the 
Under Secretary. Priorities for fiscal year 2010 include integrating 
the Federal Protective Service into NPPD, consolidating NPPD financial 
data and reporting, coordinating with DHS to continue to streamline the 
hiring and security clearance processes for new staff, and conducting 
strategic assessments for use in developing future capability needs to 
combat new and emerging threats against infrastructure, cyber networks, 
and biometric technologies.
                                closing
    I appreciate the opportunity to discuss NPPD accomplishments and 
plans for fiscal year 2010 and look forward to answering any questions 
you may have.
                                 ______
                                 
                 Prepared Statement of Gale D. Rossides
                             June 10, 2009
    Good afternoon Chairwoman Jackson Lee, Ranking Member Dent, and 
distinguished Members of the subcommittee. Thank you for the 
opportunity to appear today to provide an update on the President's 
fiscal year 2010 budget request for the Transportation Security 
Administration (TSA).
    I would like to begin by thanking the subcommittee for its support 
of TSA's on-going efforts to improve transportation security. Your 
support positioned us well for a successful Presidential transition. I 
also want to thank the subcommittee for supporting the resources 
provided to TSA in the American Recovery and Reinvestment Act of 2009 
(ARRA). These resources are enhancing our Nation's explosives detection 
capabilities in airports throughout the country by significantly 
accelerating the deployment of more effective and efficient 
technologies.
                    ensuring an effective transition
    The Department of Homeland Security (DHS) has worked hard to ensure 
that TSA, as well as other DHS components, was poised to maintain our 
high level of security during the critical Presidential transition 
period. Continuity is essential for an agency that conducts security 
operations 24 hours a day, 7 days a week, and 365 days a year. TSA 
personnel participated in important transition efforts, including joint 
exercises with our DHS colleagues and other Federal agencies to ensure 
we could effectively prevent and respond to a potential terrorist 
attack during this period. Designating the Deputy Administrator at TSA 
as a career position also helps ensure continuity, and I am honored to 
serve in this position and as the agency's Acting Administrator.
                     building on our joint success
    I have experienced first-hand the growth and maturation of TSA from 
its creation following the tragic events of September 11, 2001 (9/11) 
to the current high-performing global organization protecting Americans 
and our transportation systems.
    Under the oversight of this committee, TSA has grown from a small 
cadre of employees to a dedicated workforce of over 50,000 protecting 
every domestic commercial airport, strengthening our Nation's surface 
transportation modes, and working with our transportation security 
partners both domestically and around the world. We began with the 
challenge of hiring, training, and placing the first Federal screeners, 
known as Transportation Security Officers (TSOs), in airports where 
they intercepted prohibited items such as guns, knives, and razor 
blades. Now, TSA employs a highly-trained, professional, multi-skilled 
TSO workforce that conducts physical and behavioral screening to 
counter constantly changing threats and operates state-of-the-art 
screening equipment throughout airports and across multiple modes of 
transportation.
                           constant vigilance
    Continuing TSA's success is as important today as it has ever been. 
For example, the threat level for commercial aviation remains high and 
terrorists continue to pose a threat to aviation. But the threats we 
face are broader than just aviation and terrorism. TSA is focused on 
the wide variety of threats, including natural disasters and health 
pandemics, that face all of our transportation hubs and infrastructure. 
We must remain vigilant and never lose focus of our mission.
                       implementing arra funding
    Before I address the fiscal year 2010 budget, I want to update you 
on our plans for deploying the $1 billion in funding provided by 
Congress to TSA in ARRA. Using a risk-based approach, TSA is purchasing 
and installing explosives detection systems (EDS) and equipment that 
will greatly accelerate the deployment of new technologies in airports 
across the country. These ARRA funds will not only improve security, 
but also will create jobs and strengthen our economy.
    Approximately $700 million of ARRA funding will be allocated to the 
Electronic Baggage Screening Program, which includes the procurement 
and installation of airport baggage handling systems. TSA approved 
funding for 15 airports in ten States, including several small and 
medium-sized airports, for optimal baggage screening solution projects. 
Additionally, we recently announced the award of $47 million for the 
purchase of 123 reduced-size EDS to be deployed at airports throughout 
the Nation.
    Approximately $300 million of ARRA funding is going to the 
Passenger Screening Program (PSP) to improve explosives detection 
capabilities in passenger screening. For the PSP, TSA plans to use ARRA 
funding for the purchase of Advanced Technology X-rays (AT X-ray), of 
which we announced an award of nearly $3 million for 44 AT X-rays, and 
additional Whole Body Imagers (WBI), Universal Conveyor systems, 
Bottled Liquid Scanners (BLS), and Next Gen Explosives Trace Detectors. 
The ARRA funding enables us to accelerate our projected schedules 
toward full system operating capacity, greatly enhancing checkpoint 
security for the traveling public.
    Finally, TSA is providing subject matter expertise and assistance 
to the Federal Emergency Management Agency (FEMA) for the award of the 
$150 million appropriated in ARRA for public transportation and 
railroad security assistance grants.
               fiscal year 2010 budget request highlights
    The fiscal year 2010 budget will strengthen current efforts to 
secure all modes of transportation and allow critical investments in 
key programs. Specifically, the fiscal year 2010 budget provides TSA 
$7.8 billion, which reflects a total gross increase of $800 million for 
transportation security initiatives.
    The fiscal year 2010 budget includes funding to support various 
activities and requirements, including;
   $856.6 million for the procurement and installation of EDS 
        at airports;
   $128.7 million for checkpoint and checked baggage screening 
        systems at airports;
   $108.1 million for air cargo security;
   $80 million for Visible Intermodal Prevention and Response 
        (VIPR) teams, which includes an additional $50 million for new 
        VIPR teams dedicated solely to surface transportation security.
    The fiscal year 2010 budget also includes the annualization of $30 
million received in fiscal year 2008 and $20 million received in fiscal 
year 2009 for such activities as Security Regulations, Strategies, 
Reports and Studies, Vulnerability and Threat Assessments; Name-Based 
Checks Infrastructure, Inter-modal Security Training and Exercise 
Program; Information Sharing and Analysis Center for transportation 
security; General Aviation; and additional Surface Transportation 
Security Inspectors (STSI).
    I would like to highlight a few programs from the fiscal year 2010 
budget.
    Visible Intermodal Prevention and Response Teams.--The $50 million 
for 15 additional VIPR teams increases our random and surge force 
protection capability at transit hubs and other surface transportation 
venues. VIPR teams are capable of protecting any mode of transportation 
through risk-based targeted or unpredictable deployment of TSA assets 
in coordination with State, local, and Federal officials. VIPR teams 
consist of any combination of TSOs, Transportation Security Inspectors 
(TSIs), Federal Air Marshals (FAMs), Behavior Detection Officers 
(BDOs), Explosives Security Specialists, Bomb Appraisal Officers 
(BAOs), as well as local, State, and Federal security and law 
enforcement partners.
    Bomb Appraisal Officers.--The fiscal year 2010 budget also adds 109 
BAO positions by the end of fiscal year 2010 to strengthen security at 
domestic airports. BAOs are highly skilled individuals who have 
undergone specialized training in the identification and disposal of 
explosives. BAOs provide continual interaction and formal training to 
TSOs to increase their ability to recognize potential improvised 
explosive devices (IEDs) and IED components. BAOs also assist in 
clearing suspicious articles presented at checkpoints, often avoiding 
the need to call bomb squads, which can result in lengthy airport 
delays.
    Infrastructure for Identity Vetting and Credentialing.--The fiscal 
year 2010 budget provides an additional $64 million to modernize the 
information technology infrastructure used to vet the identity of 
travelers and transportation workers. The funding will enable TSA to 
strengthen and enhance the existing infrastructure used to conduct 
vetting operations in several of our key security programs, such as 
Secure Flight, background checks for airport workers, the 
Transportation Worker Identification Credential (TWIC), Hazardous 
Materials Commercial Driver's License Endorsement, and alien flight 
students. The infrastructure funding will also allow TSA to vet new 
populations as directed by Congress in the Implementing Recommendations 
of the 9/11 Commission Act of 2007 (9/11 Act).
    EDS Procurement and Installation.--In addition to the funding 
levels enacted for fiscal year 2009 and through ARRA, the fiscal year 
2010 budget requests $565.4 million to further accelerate facility 
modifications, recapitalization efforts, and the deployment of new 
electronic baggage screening technology systems.
    Whisper Communications.--The fiscal year 2010 budget includes $5 
million for additional Land Mobile Radios (LMRs) at TSA screening 
checkpoints. The LMRs enhance communications between TSOs with 
significantly less disruption to the passenger screening process.
    Passenger Security Fee.--To better align the costs of aviation 
security with the beneficiaries, the President has proposed an increase 
to the Aviation Passenger Security Fee beginning in 2012. Since its 
establishment in 2001 as part of the Aviation and Transportation 
Security Act (ATSA), the Passenger Security Fee has been limited to 
$2.50 per passenger enplanement with a maximum fee of $5.00 per one-way 
trip. Congress anticipated that the aviation industry would pay for 
airline security costs through a combination of the Passenger Security 
Fee and an air carrier fee. However, the cost of providing security has 
increased substantially since 2001, leaving Federal taxpayers, rather 
than passengers and air carriers, to shoulder 60 percent of the expense 
of civil aviation security in fiscal year 2008. In the same year, 
Passenger Security Fee collections covered only about 31 percent of the 
discretionary costs for civil aviation security and air carriers 
covered the remaining 9 percent. Beginning in fiscal year 2012, the Fee 
would increase by $1.00 per year through fiscal year 2014. Under the 
proposal, the maximum fee in fiscal year 2014 and thereafter would be 
$5.50 per enplanement and $11.00 per one-way trip. The adjustment in 
2012 will fulfill the original intent of ATSA by more closely 
allocating the cost of aviation security services to the individuals 
who directly benefit while simultaneously reducing the burden on the 
general taxpayer. The administration and TSA ask for your support of 
this proposal and we commit to work closely with Congress to obtain the 
necessary authorization to begin the fee adjustments in fiscal year 
2012.
              implementing our on-going security strategy
    An effective security system must constantly adapt to ever-changing 
threats in the variety of transportation security environments in which 
TSA operates. Our transportation security strategy begins with 
intelligence, a key driver in our risk-based approach to security. Our 
daily operational decisions are influenced by the latest intelligence 
and the risks that emanate from the constantly evolving threats we 
face. As an example of our constant adaptation, we are in the process 
of upgrading security effectiveness at all of our aviation checkpoints, 
including the most significant overhaul in passenger screening since 9/
11.
    People.--The effectiveness of our security screening relies on our 
people--they are TSA's biggest investment and most valuable asset. We 
work hard to take care of our employees and we are making significant 
progress. Our workforce attrition rates continue to decrease. The 
latest fiscal year 2009 voluntary attrition rate of full-time TSOs is 
5.2 percent--an improvement of more than 58 percent since fiscal year 
2006. The number of workplace injuries has fallen over 75 percent from 
fiscal year 2004 to fiscal year 2008 and continues to decrease. For the 
first 7 months of fiscal year 2009 there has been a 16 percent decrease 
in workplace injury claims filed compared to the first 7 months of 
fiscal year 2008.
    Every TSO working at a checkpoint has completed an extensive 16-
hour retraining called ENGAGE!, which provides the latest information 
on intelligence, explosives detection, and human factors affecting 
security. This training is designed to develop a cadre of analytical 
security professionals. Additionally, all supervisory personnel have 
completed a second 16-hour training course called COACH! to help 
reinforce the ENGAGE! training and provide additional guidance to TSOs. 
We have revised our checkpoint Standard Operating Procedures to enable 
officers to use their judgment appropriately in achieving sensible 
security results.
    As part of TSA's improved security measures, we are deploying our 
workforce where we can achieve the best security results, most 
efficiently, and with minimal hassle for travelers. These improvements 
include the Travel Document Checker (TDC) and Screening Passengers by 
Observation Technique (SPOT) programs.
    The TDC program is now operating at all Federalized airports and 
enhances security by disrupting and detecting individuals who attempt 
to board an aircraft with fraudulent documents.
    We have deployed hundreds of BDOs at the Nation's busiest airports 
as part of the SPOT program. The SPOT program uses non-intrusive 
behavior observation and analysis techniques to identify potentially 
high-risk passengers based on their behavior. The program originated 
from other successful behavioral analysis programs that have been 
employed by law enforcement and security personnel both in the United 
States and around the world. Some of our law enforcement partners at 
the local and Federal level have asked TSA to provide training on this 
successful program.
    TSA believes a highly motivated workforce enhances our Nation's 
security. We implemented a pay-for-performance system to recognize and 
reward individual and organizational performance, and created a career 
progression program for TSOs with new job classifications and 
opportunities to acquire new security skills. Our flexible personnel 
system authorities enable TSA to offer creative pay incentives, such as 
full-time health benefits for part-time TSOs. And most importantly, we 
listen to our employees. Through the National Advisory Council (NAC)--a 
formal group of TSOs Nation-wide elected by their peers who meet in 
person with TSA's senior leadership on a quarterly basis--and the Model 
Workplace program, TSA strives for continuous improvement by addressing 
employee concerns. At TSA, these programs reflect a genuine commitment 
by senior leadership. I have participated in every quarterly meeting of 
the NAC.
    Process.--TSA is continuing to implement innovations in the 
checkpoint process. The current checkpoint during a peak travel period 
can be noisy and congested, which has the potential to conceal the 
actions of someone with hostile intent. The checkpoint pilot strives to 
provide a more convenient layout for passengers with more information 
explaining the screening process to create a better security 
environment with improved technology and enhanced training for our 
TSOs.
    Another simple yet effective program that improves the checkpoint 
process is the Diamond Self-Select program. Our self-select screening 
lanes are designated by signage (modeled after the familiar ski icons) 
that directs passengers to the appropriate lane based on their travel 
needs and knowledge. Green is the queue line for travelers who need 
extra time or special assistance, such as families traveling with 
children, people with disabilities or those who need prescription 
liquid medications or other liquids for medical conditions. The blue 
lane is for casual travelers who are somewhat familiar with the 
security procedures. The black diamond lane is for expert travelers who 
know the TSA security requirements and arrive at the checkpoint ready 
to go through efficiently.
    These dedicated lanes give passengers some measure of control over 
their own experience and also provide a better, less stressful 
environment for us to do our job. The result has been more effective 
and robust security. In cities with self-select lanes, we are seeing 
considerably lower alarm rates in the green lane because there is more 
time to prepare and remove prohibited items.
    Technology.--With the support of this subcommittee, we are 
expediting the upgrading of technology at passenger checkpoints and for 
checked baggage screening. AT X-Ray and WBI technologies greatly 
enhance our ability to detect small IED components made of common 
items, which remain the greatest threat, resulting in fewer bag checks 
and faster throughput, as well as the ability to upgrade the system 
with enhanced algorithms. WBI technologies enable TSA to detect 
prohibited items such as weapons, explosives, and other metallic and 
non-metallic objects concealed under layers of clothing without 
physical contact. TSA will continue to deploy in 2009 Bottled Liquid 
Scanners that are used to ensure sealed containers do not contain 
threat liquids. Additionally, TSA is purchasing and installing reduced-
size explosive detection systems (EDS) to increase security 
effectiveness and improve operational efficiencies through improved 
throughput.
    Deploying new technology is important, and certainly a step this 
subcommittee has encouraged, but we are also taking critical steps to 
reassess both the technology and the search methods used by our TSOs. 
TSA is working with the Science & Technology Directorate and the 
National Laboratories to stay ahead of terrorist tradecraft.
                update on significant on-going programs
    Before I conclude, I also want to update the subcommittee on some 
of our most significant programs.
    9/11 Act Implementation.--I want to thank the subcommittee for its 
on-going support of $20 million in fiscal year 2009 to implement new 
regulations and activities authorized by the 9/11 Act. TSA plans to use 
$3.6 million to upgrade the Automatic Detection and Processing Terminal 
(ADAPT) system that determines threats in the airspace and reduces the 
time and energy spent tracking an unknown anomaly that presents no 
threat. The remainder of the fiscal year 2009 funding for 9/11 Act 
implementation will be used for surface security measures, including 
the hiring of an additional 50 TSIs for surface transportation, 
completing vulnerability and threat assessments for surface modes, 
developing the Inter-Modal Security Training and Exercise Program, and 
developing a transportation security Information Sharing and Analysis 
Center.
    Air Cargo.--The 9/11 Act included two air cargo security 
requirements that mandate the screening of 50 percent of cargo 
transported on passenger aircraft by February 2009 and 100 percent by 
August 2010. I am happy to report that the industry is meeting the 50 
percent screening requirement. We predict that the 100 percent 
screening requirement will be met by August 2010 for domestic cargo 
through our Certified Cargo Screening Program (CCSP). Under this 
program, the responsibility for screening is distributed voluntarily 
throughout the supply chain to improve security while minimizing the 
potential negative impact on the integrity and movement of commerce.
    A key component of achieving these milestones is the requirement, 
developed in coordination with air carriers and other stakeholders, 
that 100 percent of cargo transported on narrow-body (single-aisle) 
aircraft be screened. This requirement went into effect in October 
2008. The passenger security impact of this screening is significant: 
although these aircraft carry only 25 percent of domestic air cargo on 
passenger aircraft, they account for the majority--approximately 95 
percent--of domestic passenger flights. More importantly, these flights 
carry more than 80 percent of all passengers on flights originating in 
the United States. Thus, even at the statutory deadline for screening 
50 percent of air cargo aboard passenger aircraft, we are effectively 
protecting the vast majority of the flying public.
    The requirement in the 9/11 Act to also screen 100 percent of 
inbound air cargo from international departure points continues to 
present significant challenges. Although it is unlikely that industry 
can meet the ambitious timetable set by Congress, we continue to work 
with our international partners and the private sector to address these 
challenges and expect to continue to see significant improvements in 
the level of security for inbound air cargo on passenger aircraft as we 
move forward. We have developed an international air cargo inspection 
program that expands our on-going foreign airport assessment regime to 
include a risk-based prioritization of sites and assets. This 
international regulatory activity work plan for air cargo will enable 
us to better determine areas of focus for inspection and assistance 
with our foreign partners. We look forward to working with this 
subcommittee on this issue as the August 2010 deadline approaches.
    Secure Flight.--Beginning with the fiscal year 2005 DHS 
Appropriations Act, Congress provided TSA with very specific guidance 
in the form of ten conditions to meet to address concerns with the 
implementation of the Secure Flight program and gave the Government 
Accountability Office (GAO) a proactive role in reporting on our 
progress in meeting those conditions. As verified in GAO's report on 
the Secure Flight program published last month, TSA generally achieved 
nine of the ten conditions and conditionally achieved the one remaining 
condition. Your oversight and our partnership with GAO in meeting these 
conditions made Secure Flight a better program and it is now poised to 
effectively fulfill the mandate of comparing passenger information 
against watchlists.
    Specifically, Secure Flight provides a consistent watch list 
matching process across all aircraft operators; provides for earlier 
law enforcement notification and coordination; and better protects 
watch list data thanks to its limited distribution. The Secure Flight 
program utilizes the Cleared List, a product of the DHS Transportation 
Redress Inquiry Program (DHS TRIP), to ensure that individuals who have 
been previously misidentified and have applied for redress are promptly 
cleared and do not experience similar problems in the future.
    The Secure Flight program began implementation with certain 
aircraft operators on selected flights on January 27, 2009. To date, 
four aircraft operators have successfully begun cutover and numerous 
others have begun testing. TSA truly appreciates the cooperation and 
assistance these volunteer aircraft operators provided to the program 
during its initial rollout.
    Secure Flight has also embarked upon an aggressive public outreach 
campaign in partnership with the aircraft operators and the Ad Council 
to educate passengers about how the Secure Flight program makes air 
travel safer and easier for millions of Americans.
    TSA believes that the Secure Flight program will be able to assume 
responsibility for watch list matching of passengers for all domestic 
commercial flights by the end of the first quarter of calendar year 
2010, and all international commercial flights by the end of calendar 
year 2010.
    Transportation Worker Identification Credential (TWIC).--I am also 
pleased to update you on the progress of the TWIC program that we 
jointly administer with the United States Coast Guard (USCG). TSA 
continues to operate over 149 enrollment centers located throughout the 
United States and territories to serve the maritime workers who will 
require a TWIC. As of May 25, 2009, TSA completed enrollment of 
1,208,412 workers and over 84 percent of workers who had enrolled have 
been issued their cards. The USCG completed the phased compliance of 
enforcement of TWIC in Captain of the Port (COTP) Zones Nation-wide by 
April 15, 2009. TSA and USCG closely monitored progress during the 
transition period to ensure smooth compliance at the COTP Zones. To 
further improve security and enhance enforcement efforts in COTP Zones, 
TSA completed initial capability evaluations of TWIC readers and 
approved 17 readers for use in the TWIC pilot program; additional 
readers are expected to undergo testing and be approved for use in the 
pilot. Early Operational Assessment of readers began in Brownsville, 
Texas, in April 2009 when the port completed final installation of 
readers and began operations of TWIC readers at their MTSA-regulated 
facilities. Other pilot participants are expected to follow Brownsville 
later this year.
    Global Outreach.--As TSA continues to adapt to changing threats, we 
recognize the need to expand our zone of security and interdict threats 
before they arrive on our shores. Through collaboration and 
partnerships, TSA promotes the implementation of effective global 
transportation security processes world-wide while ensuring compliance 
with international and TSA standards. Focusing on closing gaps and 
providing enhanced capabilities, TSA seeks to manage risks and work 
with our international partners to harmonize security measures.
    We accomplish this daily on many international fronts, 
multilaterally and bilaterally, through Transportation Security 
Administration Representatives in 23 countries overseas; a cadre of 
inspectors working with stakeholders and officials at airports, air 
carriers and Foreign Repair Stations; technical assistance programs; 
and standard-setting organizations such as the European Commission and 
the International Civil Aviation Organization (ICAO.) We promote best 
practices, capacity building and information-sharing through other 
international organizations such as the Group of Eight, the 
International Working Group on Land Transport Security, the European 
Community, the Asia-Pacific Economic Conference; and numerous ICAO 
regional groupings in Europe, Asia, Latin America, Africa, and the 
Middle East.
    Another example of our global efforts is our Office of Law 
Enforcement/Federal Air Marshal Service (OLE/FAMS) relationship with 
foreign air security partners. OLE/FAMS conducts training for foreign 
air marshals to combat international terrorism. As demonstrated during 
the United Kingdom August 2006 plot to use liquid explosives to take 
down passenger aircraft bound for the United States, TSA worked with 
our international partners to respond immediately.
    The Aviation Security Sustainable International Standards Team 
(ASSIST) initiative is already showing positive results. This program 
works to effectively build sustainable institutions through information 
sharing and best practices. Key focus areas include training needs, 
equipment, current aviation programs, and aviation security 
legislation. St. Lucia is the first nation to partner with TSA in this 
new program, which launched in January. In April, the Republic of 
Liberia became the second ASSIST partner country and just last month 
TSA completed an intensive 2-week training program on aviation 
passenger screening there. In the coming months we look forward to 
continuing this effort in other locations.
                               conclusion
    Madam Chairwoman, thank you and this subcommittee for the resources 
you have provided in the past to achieve significant enhancements in 
our people, processes, and technology. Thank you also for the 
opportunity to discuss the President's fiscal year 2010 budget request 
for TSA and our plans for continuing to improve transportation 
security. I look forward to working together. I would be pleased to 
respond to your questions.

    Ms. Jackson Lee. Because this hearing will be abbreviated 
due to the scheduling, the subcommittee requests that each 
witness meet with staff soon after this hearing concludes to go 
over additional questions. I would like to indicate that 
Members of the committee will have the opportunity to submit 
their questions, as well. At that point, Ranking Member Dent 
and I may ask that you meet with us, as well.
    Today's hearing is an important part of the subcommittee's 
oversight of the Department of Homeland Security. Specifically, 
it provides us with the opportunity to assess, discuss, and 
analyze the President's budget request for fiscal year 2010.
    I do thank the acting director, member of the 
Transportation Security Administration for the meetings that 
our committee has been able to have with her. So I thank you 
very much.
    As you all know, this subcommittee has jurisdiction over 
TSA and many elements of NPPD.
    With respect to TSA, we have already done a great deal this 
year. The TSA authorization bill was passed out of the House in 
an overwhelmingly bipartisan manner just last week. I again 
thank the Ranking Member, Mr. Dent, for being my original 
cosponsor on this legislation.
    When it comes to infrastructure protection and the other 
elements of NPPD, the committee is moving quickly to extend and 
comprehensively modify the Chemical Facility Anti-Terrorism 
Standards. In addition, the subcommittee will be working on an 
authorization packet for NPPD later this year. Some of our 
Members have asked about paying more attention to general 
aviation. A number of new issues will be coming to our 
attention.
    With respect to TSA, the subcommittee is generally pleased 
with the budget request of almost $7.8 billion. For fiscal year 
2010, TSA has requested an additional budget authority for 
adding bomb appraisal offices, travel document checkers, and 
behavioral detection officers to enhance aviation security.
    In addition to the standard checkpoint and baggage 
screening operations, TSOs will continue to support security 
initiatives, such as screening of passengers by observation 
techniques, visible intermodal prevention and response teams, 
and the Aviation Direct Access Screening Program. TSA has also 
made heightened investments in technology, precisely what we 
need to keep the traveling public safe.
    I am concerned about TSA's fiscal year 2010 budget request 
of $108 million for cargo security operations. This figure does 
not support an increase in FTEs for air cargo and reflects a 12 
percent decrease from the fiscal year 2009 enacted amount. Even 
as TSA faces significant challenges with respect to air cargo 
security, it is imperative that TSA has significant resources 
to face these challenges.
    The President's fiscal year 2010 budget request for surface 
transportation security at TSA totals roughly $128 million, 
which is more than double the fiscal year 2009 enacted 
appropriation. Although I have concerns about how these new 
resources are allocated, this request reflects a real 
investment in securing non-aviation modes of transportation and 
is consistent with the broader priorities of our authorization 
bill.
    Turning to NPPD, there is much to applaud in this budget 
proposal. This directorate has a troubled history, and this 
budget attempts to unify an entity that contains several 
disparate components.
    In fact, let me be very clear: Sometimes it is not 
understood what the infrastructure protection aspect of our 
jurisdiction is. The only thing that I can say to you that 
makes it as real and as viable and important as I believe it 
is, and I believe my Ranking Member believes it is, is to 
recognize the overall responsibility of this committee, 
including infrastructure protection, takes into account aspects 
of cybersecurity, which we know is shared by our other 
subcommittee, but also it deals with the very incident that we 
have just pointed to that happened today. Infrastructure is 
everything in America, and we must be concerned about it.
    The committee welcomes the $87 million increase over fiscal 
year 2009 appropriations for the National Cybersecurity 
Division. This addresses an important function. We are pleased 
that the Deputy Under Secretary, who has a career of success in 
the cyber environment, is willing to serve in order to help 
protect the Nation.
    We still need to better understand how the Department's 
efforts will interface with the rest of the Federal Government, 
especially with the creation of a new cyber coordinator in the 
White House. Because this subcommittee works a great deal with 
the 18 critical infrastructure sectors, we must ensure that the 
Department's cyber efforts are efficiently leveraging these 
important relationships.
    I applaud the Deputy Under Secretary for his testimony that 
filling vacant Federal positions and right-sizing the Federal 
and contractor staff ratio across NPPD is his utmost priority. 
This subcommittee fully supports this effort. But I am 
concerned about the suitability protocols of NPPD. This 
subcommittee stands ready to assist you in your efforts to 
expedite the security clearance process for prospective 
employees.
    The subcommittee is pleased with NPPD's request for $333 
million for infrastructure protection. As you well know, we 
have done a lot of work in this important area, and the 
response to the Mumbai attacks shows that we have a long way to 
go. The increases for chemical site security and the ammonium 
nitrate regulations are also important steps.
    However, the subcommittee is concerned about the cuts to 
partnerships related to the National Infrastructure Protection 
Plan. In this economic climate, it seems that we should be 
bolstering these efforts as the private sector, an important 
security partner, will have fewer resources.
    I remain very concerned with the Office of Risk Management 
and Analysis. Staff has quarterly briefings with RMA, and it 
seems both underfunded and headed in too many different 
directions. As I said last spring, we need a strategic plan 
from RMA that puts it on a path to success. I look forward to 
introducing legislation that will clarify the roles and 
responsibilities of RMA.
    Finally, the President's 2010 budget request proposes to 
move FPS out of Immigration and Customs Enforcement and into 
NPPD. The committee agrees that ICE was not the proper entity 
to house FPS but questions whether moving it to NPPD will 
address the problems encountered under ICE. And we look forward 
to hearing your thoughts about the proposed move today.
    I look forward to our discussion today, and I will work 
with you and am willing to work with you in order to support 
the vital mission of both TSA and NPPD. Once again, I thank the 
witnesses for their participation today.
    Let me also acknowledge the presence of the gentleman from 
California, Mr. Lungren; the gentleman from Connecticut, Mr. 
Himes; and the gentleman from New Mexico, Mr. Lujan; and thanks 
them for their presence here today.
    The Chair now recognizes the gentleman from Pennsylvania, 
Mr. Dent, for an opening statement.
    Mr. Dent. Thanks, Madam Chairwoman.
    Good afternoon. I would like to thank both our witnesses 
for joining us today. I know your time is in short supply, so I 
will respect that.
    We understand that there is an inordinate amount of time 
senior officials of the Department spend answering too many 
different congressional committees because of Congress's 
dysfunctional jurisdiction over the Department of Homeland 
Security. However, since the Committee on Homeland Security is 
the principal authorizing committee in the House, we very much 
appreciate you being with us today. So, that said, in light of 
some of the time constraints, I would like to keep my remarks 
short.
    As you know, the House passed the TSA Authorization Act 
last week. The bill was negotiated on a bipartisan basis. I 
thank the Chairwoman for her leadership on that issue. Also, 
the committee met with many different stakeholder for input. I 
believe it was a good bill, and I was happy to be an original 
cosponsor of the legislation.
    The Republican Members of committee, however, believe that 
it was premature to bring the bill to the floor for 
consideration before a new administrator was named for the TSA. 
As you know, TSA did not provide any formal input into the 
bill, and that is unfortunate.
    One of the casualties of TSA not being able to provide 
input to the TSA Authorization Act was the misguided adoption 
of the amendment that would have severely restricted the use of 
whole-body imaging technology. The adopted amendment will 
prevent TSA from using whole-body imaging technology for 
primary screening purposes at the airport checkpoints.
    As you know, the committee has been very supportive of WBI 
technology because we know that it enhances aviation security. 
We understand that WBI technology can detect many things, such 
as small IEDs, plastics explosives, ceramic knives, and other 
objects traditional metal detection cannot detect.
    This technology was developed with the backing of Congress 
because we know our enemies are looking to use certain 
explosives which are not detectable with metal detectors or 
magnetometers. Restricting the use of WBI technology at the 
airport checkpoint will put us in a vulnerable position, just 
as we were prior to 9/11. We simply can't allow that to happen.
    I should note that I saw the WBI technology for myself last 
week at Reagan National. I think it is a great technology, and 
I am very satisfied with the privacy measures currently in 
place. I know you have taken a great deal of care to ensure 
that. I think there is a lot of inaccurate information out in 
the public domain, and many Members are misinformed on the 
technology.
    As the TSA Authorization Act makes its way through the 
legislative process, it is my sincere hope, and for the sake of 
all Americans who fly, that TSA will weigh in and inform 
Congress on the advantages of WBI technology so we can ensure 
the use of this innovative and very necessary technology at our 
Nation's airport. My colleague, Mr. Lungren, was very eloquent 
on this issue. I wish more Members could have heard his 
comments on that amendment.
    Moving to the National Protection and Programs Directorate, 
I am very glad to see that the administration is making 
cybersecurity a priority. I am encouraged by the increased 
funding request of $75 million over fiscal year 2009 to support 
the implementation of the Comprehensive National Cyber Security 
Initiative.
    Mr. Reitinger, I understand you have an exemplary 
background in cybersecurity, and I look forward to the work you 
will do at the National Protection and Programs Directorate.
    Thanks again for both of you being here today.
    I will yield back the balance of my time.
    Ms. Jackson Lee. Let me thank the gentleman for his 
testimony.
    I welcome our witnesses.
    Our first witness is Philip R. Reitinger, who was appointed 
by Secretary Janet Napolitano to serve as a Deputy Under 
Secretary for NPPD on March 11, 2009. In this role, Reitinger 
leads the Department's integrated efforts to reduce risk across 
physical and cyber infrastructures.
    Prior to joining DHS, Mr.--let me just ask, how do you 
pronounce your name?
    Mr. Reitinger. Yes, ma'am, it is ``Reitinger.''
    Ms. Jackson Lee. It is ``Reitinger.'' I just want to make 
sure. Thank you.
    Prior to joining DHS--I wanted to make sure that we were 
not getting that smile because--you are just a smiling person.
    Mr. Reitinger. Yes, ma'am.
    Ms. Jackson Lee. Thank you very much.
    Mr. Reitinger was the chief trustworthy infrastructure 
strategist at Microsoft Corporation. I would suggest to you 
that you come widely applauded, because in his title of his 
previous position had the term ``trustworthy''. Is that 
correct?
    Mr. Reitinger. Yes, ma'am, it is.
    Ms. Jackson Lee. I couldn't imagine that the Secretary 
could find a better selection. Thank you.
    In that role, he worked with Government agencies and 
private-sector partners to enhance cybersecurity and 
infrastructure protection.
    Our second witness, Ms. Rossides, is acting administrator 
of TSA. As acting administrator, Ms. Rossides oversees a 
workforce of 50,000 and the security operations of 450 
Federalized airports throughout the United States, as well as 
the Federal security regime for highways, railroads, ports, and 
mass transit systems. Ms. Rossides was one of the six original 
Federal executives handpicked in 2002 to build TSA. We are 
certainly appreciative of your leadership on that issue.
    As agreed to at the beginning of today's hearing, the 
witnesses' testimony will be considered as read so that we can 
begin to question our witnesses in the interest of time.
    I will remind each Member that he or she will have 5 
minutes to question the panel.
    I will now recognize the Ranking Member for 5 minutes, Mr. 
Dent.
    Mr. Dent. Thank you, Madam Chairwoman.
    Just by way of commentary, I learned a long time ago--my 
middle name is W-I-E-D-E-R. My mother taught me, as a young 
person from Pennsylvania Dutch country, I-E is ``E,'' E-I is 
``I.'' Mr. ``Reitinger,'' there are a lot of names like that in 
my area.
    But just a couple things, Mr. Reitinger. Is the Department 
aware that the Committee on Homeland Security and the Committee 
on Energy and Commerce are crafting legislation to authorize 
the Department's regulatory authority over chemical facilities?
    Mr. Reitinger. Yes, sir.
    Mr. Dent. Then, the Department did request a 1-year 
extension for the current CFATS regulations. Why did you do 
that knowing that the committees are engaged in legislation?
    Mr. Reitinger. Thank you, sir. Let me first, before 
answering that question, thank the committee for the 
opportunity to testify today and for the kind words that both 
you and the Chairwoman said about me and about NPPD and the 
criticality of our mission.
    To answer your question in particular, sir, the Department 
requested a 1-year extension of CFATS in the budget because we 
believe that 1 year would give us the time to work effectively 
with Congress for a permanent reauthorization of CFATS.
    The Department supports the permanent reauthorization of 
CFATS, and a year seemed to be a reasonable amount of time to 
enable that discussion to take place and an action to be taken 
by Congress.
    Mr. Dent. Do you believe that the current CFATS regulations 
are sufficient?
    Mr. Reitinger. I believe the current CFATS regulations give 
us a good basis for going forward, sir.
    As the Ranking Member knows, we are currently in the 
process of implementing the regulations, in tiering assets, and 
in executing the site security plans that are called for under 
the regulation. That activity will give us a lot of additional 
experience about the effectiveness of the regime, if there are 
holes in it.
    So, while I am comfortable with the regime as it is, I 
believe we will have additional opportunities to learn about 
opportunities for improvement going forward. I look forward to 
working with the committee and staff on the most effective 
design for that program.
    Mr. Dent. I have introduced legislation to extend the 
current CFATS regulations by 3 years. So thank you for that 
comment.
    One of the issues Congress is grappling with is whether or 
not to require facilities to re-engineer their plants to use 
different and perhaps less dangerous chemicals in their 
manufacturing processes. Alternatively, plants could shift from 
on-site storage model to a just-in-time delivery model. A 
popular catchy phrase for this is called ``inherently safer 
technologies,'' or IST.
    If IST reviews were mandatory, how many Government 
employees who are professional IST experts capable of analyzing 
each of these facility processes does the Department have on 
staff? Any idea?
    Mr. Reitinger. Well, sir, in terms of specific IST experts, 
I am not aware that we have any. We, of course, are in the 
process of hiring and training chemical experts, chemical 
inspectors, who would develop certainly expertise that would be 
applicable to that sort of activity, if not completely aligned 
with it.
    One of the things I would say is that there is nothing 
about the current statutory regime, however, that forbids the 
use of what amounts to IST technologies, choosing to use 
different chemicals, choosing to use different technologies, in 
order to tier down or comply with the existing regime.
    So the current regime allows use of those, it just doesn't 
mandate their analysis or use.
    Mr. Dent. Does the Department's fiscal year 2010 budget 
request include any investment in IST expertise?
    Mr. Reitinger. Not specifically, sir. It does, however, 
include authorizations to hire up to 139 CFATS inspectors, with 
an additional 20 ammonium nitrate inspectors who could be 
cross-trained, or with the upcoming addition of 40 chemical 
inspectors who could be cross-trained to do CFATS inspections.
    Mr. Dent. Ms. Rossides, as you know, during the last week's 
authorization, TSA's authorization bill, the House adopted the 
amendment offered by Mr. Chaffetz and Ms. Shea-Porter, which 
would prohibit the use of whole-body imaging in primary 
screening positions. Of course, I opposed this amendment very 
strongly, as did Mr. Lungren.
    As you know, I went to Reagan National last week and saw 
this technology first-hand. I was, as I mentioned, really very 
impressed by it. I saw an individual walk through a checkpoint 
with two weapons, and, without giving any detail, let's just 
say I was unnerved by the magnetometer's inability to detect 
them. However, the whole-body imaging showed both concealed 
weapons pretty easily.
    Could you explain the Department's current privacy 
safeguards in place that govern the use of this technology? 
What would be the practical implications if the prohibition of 
using whole-body imaging technology for primary screening were 
to become law? You know, what capabilities would be lost?
    Ms. Rossides. Yes, sir.
    First of all, with respect to the privacy issues, TSA took 
really great measures to protect the privacy concerns. We have 
a privacy impact assessment study that was published that 
reflects those measures.
    But, very specifically, first of all, the passengers have a 
choice as to whether or not they go through the WBI or the 
walk-through metal detectors.
    Second, the images that are viewed are viewed in a remote 
location, so that the officer that is viewing the image never 
sees the passenger and the officer that is assisting the 
passenger never sees the image. The face is blurred.
    There is signage in the checkpoint advising the passengers 
of their options and what the image actually looks like. The 
technology itself does not store, it does not print, it does 
not transmit nor save the image. Once the image is deleted, it 
cannot be retrieved.
    These are the measures that we have put in place. In the 
places where we have the technology, we have over a 95 percent 
satisfaction rate with the traveling public.
    In all honesty, sir, based on the intel that I and the 
leadership team at TSA sees every single day, if we do not have 
the ability to deploy this technology and utilize it to the 
best of the abilities for the system, it will represent a 
severe limitation of our detection capability.
    We know that those who intend to do harm today have moved 
way beyond metal items. They are, in fact, looking for things 
that they can conceal. They are looking for things that the 
walk-through metal detector cannot detect, and the whole-body 
imaging technology can.
    Mr. Dent. Well, thank you. I hope somebody in the media is 
writing that down and they publish that tomorrow. It is a very 
good statement. I appreciate that.
    Finally, on the LASP program, as you know, I have some real 
concerns about the proposed rulemaking. I noted that, with some 
comfort, the Department has recently conducted a couple of 
workshops of various stakeholder groups, and will soon hold a 
third, to consider future proposed rulemaking.
    How is this process that you are conducting different than 
the process used to develop the initial rulemaking, which has 
given a lot of us, on a bipartisan basis, some real heartburn?
    Ms. Rossides. Well, sir, the initial rulemaking that we 
sent out, we actually did something that was rather 
unconventional with our regular rulemaking process in that we 
did have five public meetings on the initial rulemaking.
    But after the extensive comments--and I believe we got over 
6,000 comments from the public in general--we have held a 
series of meetings with major trade associations and other 
stakeholders. We held the first meeting in April, the second in 
May, and we have the third meeting scheduled for June 15. What 
we are looking at is those areas of concern by the external 
stakeholders and associations.
    Once we have these meetings, we will look to see where the 
interests of those persons are and the TSA concerns and 
security interests are. Then we will go out with--we will 
reopen the notice of proposed rule making for a second round of 
comments.
    I am hoping, and from the feedback we are getting from the 
associations, that is a positive step in the right direction, 
in terms of coming to agreement on how we close some of the 
security vulnerabilities we are concerned with and meet their 
concerns, as well.
    Mr. Dent. I just think a lot of the Members here would be 
appreciative if the stakeholder input was not summarily 
dismissed.
    Ms. Rossides. It won't be.
    Mr. Dent. Thank you.
    I will yield back.
    Ms. Jackson Lee. Thank you.
    Let me ask Mr. Reitinger again, how close to the 3 o'clock 
hour can you stay?
    Mr. Reitinger. Thank you, Chairwoman. I have a speaking 
engagement at the Chamber of Commerce, where I know one of your 
Members is going later. I was supposed to leave at 2:45, but I 
will push it, as we need to, to respond to the committee.
    Ms. Jackson Lee. Well, let me do this. My questions are 
only going to be to you. I hope, if you give quick answers, I 
might be able to get Mr. Lungren in and Mr. Himes before you 
leave.
    If I could ask Members to only question--we will be able to 
come back around for Ms. Rossides. If that can work for your 
questioning, it would be helpful, since he has an opportunity 
to leave.
    Let me quickly ask the question about the NPPD. There have 
been a lot of discussions about the permanence of NPPD. As we 
all know, it is a disparate collection of entities that, in 
some cases, do not appear to a unifying focus beyond being 
security programs.
    With that said, does this budget set the stage for the 
reorganization of the NPPD before or after the delivery of the 
Quadrennial Homeland Security Review next winter, Mr. 
Reitinger?
    Mr. Reitinger. No, ma'am, it does not. The budget, in fact, 
is designed to help drive unity of NPPD by building an 
effective front office that will enable the organizations to 
move effectively and work together on its joint mission of 
mitigating threats to the homeland.
    Ms. Jackson Lee. Are you saying that you don't intend to 
begin to look at reorganization at this time or before the 
delivery of the Quadrennial Homeland Security Review, or are 
you going to do it after? What is the time frame for 
reorganization? What is the interest in reorganization?
    Mr. Reitinger. Well, ma'am, an ultimate decision about 
reorganization I would leave to the Under Secretary, once 
confirmed by the Senate.
    I believe we have a good basis going forward with NPPD. 
There are no current plans to reorganize NPPD, other than to 
move IGP up as a direct report to the Secretary. We intend to 
move forward effectively. As experience tells us whether the 
organization of NPPD is optimal, we would come back and work 
with the committee to make sure that could be done as 
effectively as possible and with minimal disruption to 
business.
    Ms. Jackson Lee. Well, let me just hope that you will 
convey to your leadership there that we are interested in 
seeing a plan for reorganization or at least some argument that 
it shouldn't be reorganized.
    The subcommittee is concerned with the level of personnel 
NPPD employs. I am happy to learn from your testimony that many 
you brought on 300 new employees over the last 12 months and 
currently have approximately 800 Federal employees on board out 
of 1,064.
    For that reason, I was pleased to learn from your budget 
request that you intend to bring on additional personnel. Could 
you describe NPPD's efforts to employ additional personnel, how 
this will affect current contracts at the Department?
    Mr. Reitinger. Yes, ma'am. As you indicated in your opening 
statement, Madam Chairwoman, my No. 1 priority is bringing the 
right people on board. It is my personal belief that 
organizations succeed or fail based on the people that they 
have. Therefore, that takes the majority--of my time, I spend 
the biggest chunk of it working to make sure that we have 
effective processes in place to bring on the right people as 
rapidly as possible to supplement the excellent staff we 
already have.
    To that end, we have aggressive hiring plans for the 
remainder of the fiscal year, and we will be bringing on 
additional people next year.
    As my testimony also indicates, we are making efforts to, 
as you said, correctly right-size the contractor workforce so 
that we build up our Government personnel capabilities, create 
expertise in Government, and use contractors appropriately for 
the roles for which they are best suited, which includes 
scaling to meet needs and for getting particular expertise that 
is readily not available in the Government workforce.
    That will, I think for the foreseeable future, remain my 
No. 1 priority, because I believe if we can do that 
effectively, everything else will come with it.
    Ms. Jackson Lee. I would like you to make yourself 
available for briefing for Members who may be interested and 
myself--I happen to be interested--on the progress of that 
effort and how you are approaching it, particularly since it 
relates to utilizing or non-utilizing of contractors. So if you 
could make note of that, I would appreciate it.
    Mr. Reitinger. I would be happy to, ma'am.
    Ms. Jackson Lee. On the RMA, you heard my comments earlier. 
They have been meeting with our staff. We know that they have 
an ambitious agenda, ranging from a national risk assessment to 
the informing of budget cycles to a heavy presence working with 
the Quadrennial Homeland Security Review.
    So how, then, is approximately $9 million enough for fiscal 
year 2010 for this particular subset? Staff was told last week 
that 19 of the 26 FTEs are filled; that means that you have 
seven that are not. How quickly can you get to full capacity, 
given the major hiring that you are trying to do within NPPD?
    Mr. Reitinger. Well, ma'am, I believe that the budget 
request is reflective of what we believe we need to start to 
drive success with RMA; and, in particular, to have it lead the 
risk management study group within the Quadrennial Homeland 
Security Review.
    I think, going forward, this and other areas will get 
additional knowledge about the scope of requirements and could 
come back to the committee or find the resources within DHS and 
reallocate personnel, if necessary, to accomplish the mission.
    In terms of hiring, I believe that the number that you 
stated refers to--my recollection is we have 13 Government 
personnel on-board in FTE, with six offers outstanding, and 10 
contractor personnel on-board. That is my current 
understanding. So we will be to be the number you said very 
soon. We are focusing just as much on RMA hiring as we are on 
hiring for other components. So we will bring on the additional 
FTEs as rapidly as possible to make sure that we can 
effectively execute the mission.
    Ms. Jackson Lee. Let me suggest that I appreciate the 
answer that you had to give. This should be an on-going review 
by those of us who are concerned that any cuts in the budget, 
when we are trying to build and ensure that the Department does 
have the staff, is of concern to us.
    It follows that my next question about the $11 million cut 
from IP's national infrastructure protection program efforts, 
we are curious as to the rationale behind those cuts, 
particularly since we know the private sector are not regulated 
for security purposes. Many do not have the financial resources 
in this economic climate.
    So I would appreciate it if you would explain whether other 
departments and agencies which partner with DHS under the NIPP 
will be providing resources to counter and to complement the 
losses of $11 million and to further security efforts under the 
NIPP and fiscal year 2010.
    I think one of our biggest Achilles heels are the private 
sector, although they are aware of the responsibilities of 
securing their facilities, the question is, do we have it at a 
level that suggests that they are doing everything they can do? 
We are now cutting in this area.
    Mr. Reitinger. Yes, ma'am. Let me answer that in several 
different ways, if I could. I will try to be as brief as 
possible.
    First, it is not our intention to not do anything we were 
going to do with the cut of $11 million. We might simply have 
to push out particular products that we were designed from 
fiscal year 2010 to perhaps fiscal year 2011.
    We are also going to have to rely on a more, as your 
question indicates, a more distributed model for resourcing the 
partnership. That seems, to me, appropriate because it is, in 
fact, a distributed process involving not just the Department 
of Homeland Security but multiple Federal agencies and 
literally thousands upon thousands of private-sector entities. 
We are going to need to rely more on them to help drive the 
NIPP partnership. I will be working personally and avidly to 
make sure other Federal agencies do their part in that process.
    In addition, with regard to the private sector, as your 
question points out, it is a more difficult time for the 
private sector to devote things such as working to partnership 
with the Department of Homeland Security.
    That said, I spent the last 6 years in the private sector, 
and I can personally testify to the fact that large portions of 
the private sector are deeply committed to the security of the 
United States and I believe, with the right partnership, with 
the right opportunities, are willing to go to even greater 
lengths to work with U.S. Government, and DHS in particular, to 
more effectively secure the homeland.
    Ms. Jackson Lee. I thank the gentleman.
    With that, I will end my questioning and yield to Mr. 
Lungren. I will reserve my questions for you, Ms. Rossides. 
Thank you.
    Mr. Lungren.
    Mr. Lungren. Thank you very much, Madam Chairwoman.
    Mr. Reitinger, in the President's budget I think there is 
$19 million for the implementation or enforcement of the 
chemical security regulations. Can you give us an update on 
where we are in terms of the implementation of the chemical 
security regs?
    Mr. Reitinger. Yes, sir. The most recent action--as I am 
sure you know, the original notice of rulemaking was published 
back in 2008, and initial tiering determinations were made. 
This is also reflected in my testimony.
    Most recently, back in May, the tiering of the entities 
regulated under CFATS, the initial letters went out to those 
regulated under tier 1, the highest level. So, those have been 
notified of their need to develop a site security plan. So that 
effort is on-going. Further communications to the lower tiers 
will take place over the remainder of the year.
    Mr. Lungren. The authority to regulate the chemical 
security expires in October of this year because of how we had 
to fashion legislation in the past. How long does the 
Department need to complete and review all the vulnerability 
assessments, the site security plans and site visits to the 
covered facilities?
    Mr. Reitinger. Yes, sir, we believe that will be an on-
going activity and would support reauthorization of CFATS. That 
is the reason that we ask for, in the budget request, the 1-
year reauthorization, so we could discuss with Congress a 
permanent reauthorization of the CFATS regulatory regime.
    Mr. Lungren. I want to stress that, because, you know, 
there is a lot of talk here on the Hill that we didn't do 
enough or we have to change it and so forth. You got the 
industry to buy into it. You had a cooperative effort with the 
industry to come up with regulations that, it appears to me, 
can actually work. I am worried about us starting the whole 
process again, not that we can't improve the process, but 
starting it again and losing all the good work that we had in 
the past.
    Do you share that concern?
    Mr. Reitinger. I certainly would not like to start again 
from scratch. We have made a lot of headway. We have done some 
extensive hiring. We are bringing the right expertise on board 
to be able to execute the regime. Zeroing out that program and 
restarting would be costly and inefficient.
    Mr. Lungren. The budget request has $19 million in there to 
complete the ammonium nitrate regulations that were mandated 
some years ago. Can you give us the status of the regulations, 
when you expect those will be completed?
    Mr. Reitinger. Yes, sir, I can. The advanced notice of 
proposed rulemaking came out last year, and comments were 
received. Based on those comments, which came in through 
December of last year, a task force was established by DHS in 
January of this year.
    That body has been reviewing the comments, contacting 
internal and external stakeholders, and is working on 
developing an actual notice of proposed rulemaking that should 
be released some time in the fall, after review by OMB. The 
ultimate effective date of such a regulation will depend on a 
number of factors after that.
    Mr. Lungren. Sure, I understand that. But I hope that you 
understand that we, in the Congress, are very concerned about 
the ammonium nitrate. It does appear to be a substance that is 
a favored substance used by terrorists. This Congress was 
concerned, with some sense of urgency, that do have 
regulations, so I hope that they will be completed sooner 
rather than later.
    The committee will be considering chemical facilities 
security legislation next week. We have the issue of inherently 
safer technology, or IST. There is some issue--again, this goes 
back to the question about whether we start almost from scratch 
or revamping it again. Can you give us your thoughts on IST and 
its reasonable application to regulations?
    Mr. Reitinger. Of course, sir. I will be brief on this 
subject, because, as you indicate, sir, there is a hearing next 
week specifically on the topic.
    There is nothing in the current regime that prohibits a 
covered entity from implementing the use of inherently safer 
technologies to tier down or to comply with the existing 
regime. So the existing regime has the flexibility to allow 
regulated entities to use those sorts of technologies. It does 
not, however, mandate them.
    I, and NPPD generally, would be happy to work with the 
committee going forward to make sure that any permanent 
reauthorization of CFATS or other statutory amendments most 
effectively allow meeting critical national needs around 
protecting chemical facilities and, at the same time, preserve 
the greatest degree of flexibility around risk-based 
performance so that covered entities can comply most 
effectively with the Federal requirements.
    Mr. Lungren. I thank you. I appreciate that response.
    I will return any time I might have.
    Ms. Jackson Lee. Let me thank you.
    Before I just may be able to yield a minute or 2 to the 
next speaker, looking at the clock, Mr. Reitinger, I just want 
to make mention of the fact that our chemical legislation we 
have been working on for a very long time, so it would not be 
starting from scratch.
    If we got momentum and saw this thing really formulating, 
would you welcome it getting done within the year?
    Mr. Reitinger. I would welcome a reauthorization, a 
permanent reauthorization, as rapidly as possible of the CFATS 
regime, yes, ma'am.
    Ms. Jackson Lee. Thank you.
    Mr. Himes, we have you for a moment.
    Mr. Himes. One minute, one question, Madam Chairwoman.
    Mr. Reitinger, I am interested in the topic of 
cybersecurity, in particular. I have listened to people at DOD 
and elsewhere who are concerned with this issue make statements 
indicating they understand the threat. In all candor, it also 
seems like people are just now beginning to really think how to 
address that threat.
    So my question is, looking at your budget request and also 
aware of the fact that the White House has developed this 
concept of naming a cyber coordinator, can you address how you 
are thinking about this, how you are coordinating this in an 
integrated fashion with DOD and other interested agencies and 
departments, and how you might relate to the White House cyber 
coordinator, and how your budget proposal reflects that 
possible integration?
    Mr. Reitinger. Yes, sir, I can. We have a very strong 
interagency coordination process under the White House through 
interagency policy committees. They meet regularly to make sure 
that all of the agencies are moving forward jointly to address 
the issue.
    In that vein, I would greatly welcome the appointment of a 
cyber coordinator in the White House, because it is my opinion, 
as the President indicated as the outcome of the 60-day review, 
that this is an issue of such national importance that we need 
White House leadership. We need White House leadership to 
continue to bring all of the agencies together as effectively 
as possible.
    I pledge to you and the committee that DHS will be a part 
of that and will work effectively, not only with the White 
House but with all of our agency partners from DOD, through the 
Department of Commerce, the Federal Bureau of Investigation, 
and many others, to make sure we are effectively addressing the 
issues.
    I believe our budget proposal reflects the increasing 
seriousness of the issue. As the Chairwoman noted, we are 
devoting substantial additional dollars to help do our part in 
DHS to help provide for cybersecurity both within the Federal 
Government and in the private sector.
    Mr. Himes. Thank you.
    I yield.
    Ms. Jackson Lee. Thank you.
    Mr. Lujan is next.
    Mr. Massa, did you have a question? Because you would have 
to ask Mr. Lujan to yield.
    Mr. Massa. No, Madam Chairwoman. I will wait until we go 
around our first round.
    Ms. Jackson Lee. All right. Thank you.
    I think he is ending his time. Mr. Lujan, did you have a 
second of any comment?
    Mr. Lujan. Well, Madam Chair, maybe not necessarily 
anything that the Under Secretary would have to respond to. I 
could probably make my point as the Under Secretary is packing 
up, so best to utilize his time. I know he has an important 
speaking engagement.
    But, you know, the issue that we would have to visit about 
our report as well. But I would yield back to the Chairwoman 
and allow him to maybe be excused, and I could make my point as 
he is packing up.
    Ms. Jackson Lee. Well, I am yielding to you, Mr. Lujan. You 
are ready to make your point.
    Mr. Lujan. Okay. With that, Madam Chairwoman, thank you 
very much.
    The one thing, to carry on what Mr. Himes was discussing 
pertaining to cybersecurity, is again that we have an 
invaluable asset in some of our NNSA laboratories, both 
Lawrence Livermore, Los Alamos, and Sandia National 
Laboratories, of which they already process real-world 
experience, technology, Government, and private-sector 
interface to be able to be an immediate asset to these efforts 
and to this program.
    I would hope that, as we look at DHS in conjunction with 
what the President's efforts are in this area, that we look to 
the NNSA laboratories for their expertise and to fully utilize 
their experience with the data sets that have been compiled, as 
well as other security measures that can be taken.
    I yield back, Madam Chair. My other questions I can reserve 
until later on. Thank you.
    Mr. Reitinger. Let me again offer my apologies that I need 
to leave and my thanks to the committee for understanding that 
I had a prior commitment and my commitment to come back and 
meet with you and/or staff at your convenience to address any 
additional questions that you have.
    I would, in response to the last Member's point, say that I 
agree completely that this is a national problem and we need to 
bring all national capabilities to bear to address it. So I 
look forward to working with the committee and all elements of 
the Government to make that happen as effectively as possible.
    Ms. Jackson Lee. We are understanding of that. As you are 
putting your papers together, I don't want to--Mr. Cleaver, did 
you have a point you wanted to get on the record as he is 
packing up?
    Let me suggest to the Members what I said earlier, that any 
additional questions we will provide in writing. Mr. Reitinger, 
you indicated that you would be willing or accepting the fact 
of sitting down with staff after this particular meeting to go 
over any additional points.
    Mr. Reitinger. Yes, ma'am.
    Ms. Jackson Lee. Thank you very much.
    We are somewhat out of order here, but let me find out, Mr. 
Lujan, did you finish?
    Mr. Lujan. Madam Chairwoman, I would yield back so we can 
go to the second round of questions.
    Ms. Jackson Lee. All right. So then I am going to go to Mr. 
Cleaver. The witness that you have before you is the acting 
administrator for TSA.
    Mr. Cleaver. I am concerned about--and I apologize if this 
issue has already surfaced. But the TSA has this mandate by 
2010 to do 100 percent screening. Based on what happened with 
this existing budget, I am wondering if it is still realistic 
to have a 100 percent screening by 2010 if we are going to 
begin to cut back in the current budget?
    Ms. Rossides. You are speaking about the air cargo budget?
    Mr. Cleaver. Yes.
    Ms. Rossides. Yes, sir. First of all, let me explain the 
reduction, which is a reduction of $18 million that was in the 
2009 budget that was for pilots of utilizing technology. Those 
dollars went out to various partners that were testing the 
technology. So, in essence, that was a one-time investment that 
was made in 2009. So, in essence, the budget is a flat budget, 
you know, the same investment in terms of the program dollars 
from 2009 to 2010.
    With respect to the screening and the mandate for the 100 
percent screening for both domestic and international by August 
2010, we are absolutely certain that, on the domestic side, we 
will meet that mandate.
    We do believe that it is going to be a significant 
challenge to meet the international mandate by August 2010. 
Because, in essence, you have 98 countries that are importing 
to the United States via air cargo, and it is going to be a 
challenge to get all of those in compliance by the August 2010 
deadline.
    Honestly, sir, that is not necessarily a function of the 
dollars that TSA has, but it is the limitations we have with 
some of those foreign governments in getting them to comply 
with that mandate.
    Mr. Cleaver. So you do believe that, with the existing 
revenue funding stream, that domestically, at least, you will 
be able to meet the deadline?
    Ms. Rossides. Yes, sir.
    Mr. Cleaver. Now, then what needs to be--there is nothing 
that needs to be done congressionally to deal with the 
international?
    Ms. Rossides. No, sir. What we are doing is we are visiting 
these countries, we are giving them our standards. We are 
assisting them with teams of TSA experts that are going there 
and assisting them to try to get their supply chains to meet 
the U.S. standards.
    It is not that we are not going to get quite far towards 
that 100 percent; we are estimating today that we will get 
about 80 to 85 percent of the way. But there will be some 
countries where it is going to be difficult to get to that 
August 2010 date.
    Mr. Cleaver. Where are we now? What percentage----
    Ms. Rossides. We are over 50 percent, both domestically and 
internationally, as of today.
    Mr. Cleaver. You have no reservations whatsoever----
    Ms. Rossides. For the domestic side, yes, sir.
    Mr. Cleaver. But your projection is perhaps under 90 
percent.
    Ms. Rossides. For the international, that is right.
    Mr. Cleaver. Madam Chairwoman, one other question that is 
related to this, because I am concerned that when the budget 
shows a reduction--and I am not sure how it can be addressed--
but when the budget shows a reduction like this--and I don't 
want you to make up stuff and pad it--you wouldn't do it 
anyway. But, you know, it does create some concern, and I am 
not sure how to address it.
    Are you familiar with H.R. 2200?
    Ms. Rossides. Uh-huh.
    Mr. Cleaver. Was the congressional action taken in that 
legislation helpful in addressing this issue?
    Ms. Rossides. Yes, sir, in a way, it does----
    Mr. Cleaver. Internationally.
    Ms. Rossides. It extends the time frame, but that 
legislation actually does not change the mandate that we have 
under the 9/11 Act, which is for the August 2010 deadline. That 
legislation is still in effect, and that is the target date we 
are working towards. That is the date we are working towards 
with our international partners, the August 2010 date.
    Mr. Cleaver. All right.
    Thank you, Madam Chairwoman.
    Ms. Jackson Lee. I thank the gentleman from Missouri.
    That last point that you made, could you restate it and 
clarify it for me, please?
    Ms. Rossides. Yes, ma'am. It is my understanding that, 
although the provision to provide for the 2 years from the date 
of the enactment of the TSA reauthorization bill recognizes--
this is what the counsel is advising me--that the mandate under 
the 9/11 Act to meet the August 2010 date doesn't change. Now, 
I may be incorrect on that, but that is my understanding, that 
we still have an August 2010 mandate under the 9/11 Act.
    Ms. Jackson Lee. That is for domestic?
    Ms. Rossides. I believe it is both domestic and 
international.
    Ms. Jackson Lee. We will pursue that further.
    Let me recognize Mr. Massa for 5 minutes.
    Mr. Massa. Thank you, Madam Chairwoman.
    Thank you, Secretary, for being here today. I would like to 
return to one topic with a follow-on question.
    You very adroitly answered a question about whole-body 
imaging. Paraphrasing what you said, I believe the word was 
``critical'' for the security of the agency to fulfill its 
mission.
    Ms. Rossides. Yes, sir.
    Mr. Massa. Am I understanding your opinion of that process 
correctly?
    Ms. Rossides. Yes.
    Mr. Massa. You also stated that passengers in all cases 
would participate voluntarily.
    Ms. Rossides. Right.
    Mr. Massa. Can you help me understand how a voluntary 
program could therefore be critical to the security of the on-
going operations, since there is no way to screen or determine 
who is going to be participating since they self-select?
    Ms. Rossides. No, sir, the way the system is designed is 
the passenger would be given the option to go through the 
whole-body imaging technology. If they pass through that 
technology, then that technology is so superb at detecting 
anything on the body that it will not require us do an officer 
do a pat-down.
    Mr. Massa. No, I understand that. Although I would never 
want to inflict anyone on my participation in this program, my 
point here is, you may the statement that the deployment of 
this technology is critical to the overall improvements in the 
security of TSA.
    Ms. Rossides. Yes, sir.
    Mr. Massa. But you also outlined and have now confirmed 
that participation by passengers is voluntary. That, to me, is 
a fundamental disconnect in logic.
    If I say that we have to do that to this group to increase 
security and then I say to this group it is voluntary to 
participate and no one opts in, how could that technology 
thereby be considered to be crucial to the increase in security 
of the group?
    Ms. Rossides. Well, sir, it is because the majority of the 
passengers are opting in, No. 1. No. 2, in order to do what we 
have to do every day, we have to be able to deploy as many 
tools as possible to help us in the screening process.
    Mr. Massa. Is it a question of speed?
    Ms. Rossides. It is a very effective process to screen 
people very quickly. It is much quicker to go through the 
whole-body imaging than it is to do a pat-down. So one is a 
passenger throughput, but the primary goal is the ability to 
detect without ever having to touch the passenger.
    Mr. Massa. So a second point I would like to ask, if you 
could just give me a few moments on this, it is my understand--
and I apologize that I arrived late; it may have been addressed 
before my arrival--that we are preparing to fulfill a 
requirement to increase security in corporate aviation.
    That brings the presence of air marshals, the screening of 
passengers, and the handling of corporate, in fact all private 
aircraft over a certain weight limit, to the standards that we 
have come to be familiar with as the general public, myself 
included, flies.
    Is that program continuing, as had been previously briefed?
    Ms. Rossides. It is subject to continuous discussions 
currently with the stakeholders. We are going to go out with a 
second round of proposed comments and a second round of a 
notice of proposed rulemaking. The goal is to listen to and 
address the concerns that the stakeholders have, but also to 
close the gap in what we see as some security vulnerabilities 
with the general aviation population.
    Mr. Massa. Is part of that enhanced security in corporate 
aviation entailed in the embarkation of air marshals on those 
aircraft?
    Ms. Rossides. It is one of the elements. Whether that 
ultimately ends up in the final decision, you know, that is to 
be determined. But it was one of the elements, to know, to have 
a law enforcement security official on board.
    Mr. Massa. So one of the concerns I have with this 
potential mandate is, where will these people come from? It is 
my understanding--and I apologize, I am just a country guy from 
upstate New York--but it is my understanding, from the reading 
of the information I have been given, that we kind of are 
looking for people anywhere and we are facing some shortages in 
that particular endeavor.
    Where will we find all the additional officers necessary to 
fulfill this requirement in general and corporate aviation?
    Ms. Rossides. I believe that the proposal would allow those 
corporations to employ their own, and then we would train them 
or offer training to a certain standard.
    Mr. Massa. Well, I would offer an observation that if a 
company is buying and training their own, we have kind of lost 
control of that particular aspect of the security operation.
    So it is my opinion, as a pilot, I am very dubious of the 
enhanced security that this particular mandate, in all of its 
factions, will bring. I am concerned about its cost-benefit 
analysis and detracting from other areas that are a much more 
significant potential threat.
    I am open to participate and offer any insight, as a guy 
with an awful lot of hours behind the stick, as to what this is 
going to mean to general and corporate aviation and to the 
traveling corporate world. This is an incredibly important tool 
to them. I don't want to put any more burdens on business when 
we don't have to.
    Ms. Rossides. We would be happy to sit down and talk to you 
and actually brief you on the comments as we go through the 
period of working with the associations.
    Mr. Massa. Thank you.
    Thank you, Madam Chairwoman. I yield back.
    Ms. Jackson Lee. Let me query my colleague, because he does 
have a lot of information.
    Before I do that, Ms. Rossides, let me suggest to you that 
we are going to look at the jurisdictional question of 9/11 
versus H.R. 2200. I would offer that clarification.
    Before Mr. Massa leaves, I wanted to query Mr. Massa before 
I move us to our next round.
    Because of your experience behind the stick, could you just 
articulate for the committee the point that you are making? 
Were you suggesting the impact on general aviation?
    Mr. Massa. Thank you, Madam Chairwoman.
    Ms. Jackson Lee. So our witness can hear it, as well, maybe 
in a clearer manner.
    Mr. Massa. Certainly. So my concerns about this particular 
proposed enhancement of security on aircraft--and I think it is 
over 18,500 pounds; I may be off on that number, but it is 
almost everything that flies--has to do with not only its 
impact on general aviation, which I believe, if fully 
implemented, will basically terminate general aviation, but 
also on the ability to use corporate aircraft as an extensive 
business tool.
    I fully understand that a three-engine Intercontinental jet 
or a Gulfstream 5 or any of the larger corporate jets 
potentially represents an aviation threat as per the nightmares 
that we have lived through in the last decade. But every 
individual on a corporate flight is self-identifying and self-
selecting. That airplane will never get off the ground unless 
everybody on the airplane knows everybody else on the airplane. 
That is the fundamental difference between corporate aviation 
and the general traveling public.
    Likewise, in light general aircraft it is much the same. If 
the airplane is small enough, you can't put the security 
measures inside of a Cessna 150 or a Cessna whatever.
    So I am very, very concerned about the impact on this 
industry. It represents a significant sector of our economy. We 
have, you know, whole cities, literally, for whom the 
construction of light and corporate aircraft is a key element.
    I do not presuppose or recommend that the current briefings 
I have received get enacted into law. This is going to be very, 
very, very problematic. Again, I am speaking to this as a guy 
who has done a lot of flying.
    So I offer those viewpoints, and I stand ready to help in 
any way possible. Although I will counsel there are a lot of 
people on this that are a lot smarter than I am. But I know the 
questions.
    Ms. Jackson Lee. I wanted you to restate your concerns on 
the record and just to say to you that, on that particular 
question, we are going to have a general aviation hearing so 
that we can respond to being helpful to TSA. TSA's regulations 
have been, if you will, somewhat challenging. I happen to err 
on the side of wanting more security, but I also want to be 
balanced and responsible.
    So I wanted you to be able to articulate that on the record 
again. Also indicate to you, Mr. Massa, that we will be having 
a hearing on this question overall of general aviation 
security.
    I would just ask the agency to be prepared, because we will 
be asking you to respond to your framework for security in that 
instance. I thank you.
    We are going to start a second round that I am going to 
start with and then yield to you, Mr. Dent. I am going to focus 
my questions on cargo and a number of other issues.
    I would appreciate, Madam Administrator, if you would 
explain to us the reduction in light of the upcoming August 
2010 100 percent cargo screening deadline for cargo on 
passenger aircraft. The reduction I am talking about, the 
fiscal year 2010 request for air cargo security programs is 
less than the enacted fiscal year 2009.
    Can you describe how the budget is changing with respect to 
the number of inspectors, as well as the resources being 
allocated to certify shippers' screening facilities?
    I have visited a number of our airports; I think I relayed 
that to you. One of the issue was the certification of the 
shippers' screening facilities, which can be helpful in moving 
cargo.
    Would you provide us with your understanding of that?
    Ms. Rossides. Yes, ma'am. The enacted 2009 cargo budget was 
for $123 million, and the request for 2010 is $108 million, and 
that difference, which is actually $15 million, represents a 
reduction from 2009 to 2010 for a one-time investment in 
technology to be deployed in pilot locations with these cargo 
facilities to test in the cargo environment the technology.
    With respect to the number of inspectors, the program level 
from 2009 to 2010, it remains the same. In fact there is a 
small increase for the cost of living for the payroll for the 
employees in the program area.
    The work that we are doing in the air cargo program is a 
very strong partnership with the external business cargo 
facilities, those who are becoming certified shippers, and that 
is on-going and we are actually making very, very good 
progress, particularly here in the United States, with 
certifying those facilities and those certified shippers so 
that we are quite confident that we will get to the 100 percent 
by August 2010 here in the United States.
    With respect to the international partners, we are doing a 
lot of work internationally, visiting those countries, really 
training them, educating them about the process that the United 
States Government has put in place here, and gaining compliance 
that way with our international partners.
    So from a budget standpoint from 2009 to 2010, that 
reduction was a one-time technology investment that does not 
impact the strength of the program from 2009 to 2010.
    Ms. Jackson Lee. That seems to be a limited window. You are 
suggesting that the work that you do between 2009 and 2010 is 
not going to be diminished. What about perspective planning, 
needing more staff to prepare for after 2010? How does this 
budget relate to those issues?
    Ms. Rossides. The projection is once we gain compliance 
with the mandate by 2010. Then those resources will be in an 
audit role. They will go out and they will visit, and we will 
have a series of ways of looking across the system, looking at 
compliance and then selecting for audit those locations where 
we believe we may have a concern. But the program will shift 
from educating to gain compliance and certification to an audit 
process.
    Ms. Jackson Lee. So what you are saying is you have enough 
personnel to certify, and you use a formula to audit and to 
check to see whether or not they are functioning properly?
    Ms. Rossides. That is correct, after they have been 
certified.
    Ms. Jackson Lee. Let me put a hold on that point and just 
raise the issue of whether or not I am comfortable with 
security being done by audit. So I know some information has to 
be gained that way as well. Why are there no new FTEs or 
funding increases for the purpose of building and expanding the 
expertise and workforce for surface transportation programs? I 
hope you and the staff will review extensively H.R. 2200 
because it does have a lot of positive aspects for surface 
transportation security.
    Ms. Rossides. First of all, let me say that we do 
appreciate the fact that with the TSA reauthorization bill, 
there is direction to TSA to focus on surface modes of 
transportation.
    With respect to our budget in 2010, it is for $128 million. 
That actually represents an increase of about $65 million over 
our enacted 2009 level. Most of that is going towards our VIPR 
teams, which are--this will create 15 permanent VIPR teams that 
will be deployed in the surface modes of transportation. In 
addition, that supports 225 surface inspectors who work across 
the system in the surface areas doing the inspection work and 
working with those industries in terms of meeting certain 
security standards that we put out across the system.
    Also, our surface program includes canines, which currently 
we have 86 teams which cover 15 different mass transit 
locations and ferries as well on a random basis.
    Ms. Jackson Lee. Let me just pursue the VIPR teams, which 
have their fans and nonfans. When you say deploy 250, are you 
talking about over various surface transportation systems?
    Ms. Rossides. Yes, ma'am. Working with our State and local 
partners, we would go into various modes of transportation. For 
example, we would work in the rails with Amtrak, we would work 
in mass transit in some of the major cities, working with them 
to put these VIPR teams, which we have found to be an excellent 
deterrence. The success of these, for example, in the last 
couple of years we have probably executed about a thousand VIPR 
team deployments, and about 45 percent of those have been in 
the surface areas. It is very much a partnership with the local 
mass transit police departments, local mass transit 
authorities, and we have done work in collaboration with the 
Coast Guard with the ferries in the Pacific Northwest.
    Ms. Jackson Lee. We have the funding to deploy them and 
have them remain in place for a period of time?
    Ms. Rossides. They would be strategically situated around 
the country to work in an area in the mass transit in those 
areas.
    Ms. Jackson Lee. Targeted or to remain on-going?
    Ms. Rossides. It would be an on-going process.
    Ms. Jackson Lee. So they would be assigned to a specific 
area when we have funding to keep them on duty?
    Ms. Rossides. Yes.
    Ms. Jackson Lee. Just for my own edification, are there 
various oversight in terms of back at headquarters on issues 
dealing with civil liberties and civil rights in terms of how 
these teams will be acting?
    Ms. Rossides. Yes, ma'am. They all have a supervisor on the 
site with them, and they have been through the training. Our 
Office of Civil Rights and Civil Liberties does monitor their 
activities, and any instances of concern are immediately 
investigated.
    Ms. Jackson Lee. Thank you.
    Last year working with Assistant Secretary Hawley, we 
discussed checkpoint evolution as TSA's new way of modernizing 
checkpoints across airports. This initiative was started at the 
end of the previous administration. Outside of BWI, it does not 
appear that many of the elements have been implemented in other 
airports. What is the status of Checkpoint Evolution?
    Ms. Rossides. Well, I am very happy to say that as of end 
of April, we have completely trained all 50,000 frontline 
officers in the training which we called ``Engage and Coach,'' 
which was a combination of providing them enhanced IED 
detection capabilities.
    Ms. Jackson Lee. So you are saying it is across all 
airports?
    Ms. Rossides. Yes, ma'am. We have trained the entire 
workforce by the end of April.
    The other part of the evolution strategy is to continue to 
focus on the training of our supervisors, which we are in the 
process of doing now. Then the third element really is the 
technology, which is the major investments in technology that 
we are making to bring the entire system at the checkpoint up 
in terms of our advance technology X-ray and continuing to 
improve the in-line baggage systems.
    Ms. Jackson Lee. What methods are you using to measure to 
check to see whether or not the Checkpoint Evolution is 
working? What are your benchmark standards?
    Ms. Rossides. The benchmarks and standards include, we have 
a pilot program on-going where we are asking the traveling 
public for feedback as soon as they have passed through the 
checkpoint. We have piloted that at BWI.
    We also are developing surveys in conjunction with several 
of the carriers to ask about passenger experience that they 
have had.
    When we have deployed any of the new technology in, for 
example, the WBI in the pilot modes, we do surveys right there 
with passengers to ask them for their feedback, and we are 
developing a series of pulse surveys that we will provide to 
the workforce that continues to focus on their ability, their 
quality of work life issues within TSA, all of which goes 
towards their ability to better do the job.
    Ms. Jackson Lee. These are good benchmarks. Do you have 
someone reviewing this and making assessment?
    Ms. Rossides. Yes, ma'am. The senior leadership team of 
TSA, and particularly our managers in our security operations, 
look at these measures and they drill them down to every 
airport in the country.
    Ms. Jackson Lee. Let me yield now. Thank you very much. Let 
me yield now to the gentleman from Pennsylvania, Mr. Dent.
    Mr. Dent. Thank you, Madam Chairwoman.
    The Inner City Bus Security Grant Program has provided 
grant programs to private over-the-road buses for the past 5 
years. The President's fiscal year 2010 budget request, 
however, proposes the elimination of this grant program. Can 
you tell us why the Inner City Bus Security Grant Program is 
being eliminated in this year's budget?
    Ms. Rossides. Sir, the proposal was to shift the focus from 
the grants funding per se to the work with what we call an 
ISAAC, which is an interagency advisory committee. In the 
course of looking at the entire grants process this year, those 
were not funded for 2010.
    Mr. Dent. Also, section 1604, the implementing 
recommendations act of the 9/11 Commission Act required that 
airports that have incurred eligible costs associated with the 
development of partial or completed in-line baggage systems 
before enactment of the implementing recommendations act of the 
9/11 Commission Act be included in the TSA prioritization 
schedule for airport security improvements projects. The 
President's budget request includes a significant funding 
increase of $565 million from the 2009 level for in-line 
explosive detection systems, procurement, and installation.
    Can you tell us how much of that funding will go towards 
the reimbursement of airports for in-line systems that airports 
themselves installed and paid for?
    Ms. Rossides. No, sir, at this point I can't give you an 
exact figure on that. I will tell you that we do, through a 
rather extensive process, have the airports apply, but I can 
predict the breakdown of that right now.
    Mr. Dent. The final rule for the Secure Flight was 
announced in October of last year. Can you give us an update on 
the Secure Flight implementation?
    Ms. Rossides. Yes, sir. The Secure Flight Program began to 
actually what we call cutover air carriers at the very end of 
January. As part of the building of this program and the work 
to bring it on-line, we have done an extraordinary amount of 
work with the Government Accountability Office, which has been 
a terrific partner in getting us to a program level that is 
really quite exceptional. We have met all 10 conditions that 
the GAO set before we launched the program.
    As of today, we have four or five carriers that are now 
providing their passengers' names, and TSA is screening them 
under the Secure Flight Program, and we are working with all of 
the domestic carriers to provide the dates for when they will 
begin cutover. The goal is to have all domestic carriers cut 
over and operating fully under Secure Flight by March 2010. We 
are working with them now on those schedules for the cutover. 
The ultimate goal is the international carriers will be all 
covered under Secure Flight by the end of 2010.
    Mr. Dent. Thank you. I yield back the balance of my time.
    Ms. Jackson Lee. I thank the gentleman.
    Mr. Lujan for 5 minutes.
    Mr. Lujan. Thank you, Madam Chairwoman.
    One of the questions I have in and around, and I guess most 
of my questions center around, in and around surface 
transportation, with how we are able to fully screen vehicles, 
trucks. We go back to 1995 with the Oklahoma City bombing, how 
we are screening vehicles and the importance of looking at 
container vehicles and those vehicles delivering packages to 
homes and business, and what we truly can do to ensure we are 
providing adequate screening for these vehicles.
    How is the Department ensuring that these vehicles, there 
is adequate support for surface transportation going forward?
    Ms. Rossides. Part of the dynamic is what is the TSA role 
versus the State and local role with respect to surface 
transportation, the truckers, and we do this through a series 
of assessments. We have a model where we are assessing each of 
the industries in terms of their abilities to provide training 
to their workers. We do have programs in place where we vet the 
drivers and we also have an extensive work through our grants 
administration which goes to surface in general, particularly 
with respect to rail. It is a matter of our providing them 
certain standards to meet rather than we are in there actually 
inspecting.
    Mr. Lujan. I talk about our laboratories quite a bit. I 
think they are an immense resource. But there are laboratories 
that are developing technology for quick screening but it is 
very effective screening that I hope we look to employ. One of 
the concerns that I have is a few of the programs that are 
related to surface transportation. One is the First Observer 
Program, which appears to be getting reduced, although there is 
the Highway Information Sharing Analysis Center, which is 
getting an increase, but it is part of the First Observer 
Program which appears to be getting cut. I would like to know 
how that is going to truly work or provide support from a 
surface perspective.
    Then related to the efforts with utilizing some of the VIPR 
teams, one of the concerns that I have, and I will quote from 
some information here, that the surface transportation security 
and efforts to analyze functions established in the 9/11 Act, 
it is troubling that the additional funds and personnel are not 
targeted to any of the most urgent needs or gaps in TSA's 
execution of its surface transportation security mission, such 
as the Surface Transportation Security Inspection Program, the 
Transit Security Grant Program, and building up surface 
transportation security personnel and expertise.
    Although we are seeing more support with surface 
transportation or with the VIPR programs, the resources don't 
appear to be going toward the surface transportation security 
inspectors, and I may have that unclear and if I need to clear 
that up, please let me know. But when we are utilizing these 
programs to assist or offer the initial support with transit or 
with surface, why is it that the training that is taking place 
is maybe those who have more expertise with air as opposed to 
those on surface, where in fact that program is to be managed a 
bit by the entity with the air marshals?
    Ms. Rossides. If I understand your question, on the surface 
side what we do is we help design training, we help put 
standards out. We work with whatever the mode is, whether it is 
rail, mass transit, highways, to provide training conferences. 
But a lot of that is done as part of creating a baseline of a 
standard for that particular industry.
    The VIPR program is utilizing TSA resources, TSA personnel, 
to assist, to complement, to help provide as a deterrence in 
those surface areas.
    I don't know if I have answered your question. We can go 
back and I can give you a total picture of what we are doing in 
the highway area with the ISAAC and how that is viewed as one 
of the strong partnerships between TSA and the Federal sector, 
is the work that we are doing with the highway and the motor 
carriers. But I am not sure that I am being responsive to your 
question and that I am answering your question.
    Mr. Lujan. Madam Chairwoman, I will submit the question in 
writing.
    Can you include where are the most urgent needs or gaps in 
TSA's execution of its surface transportation security mission 
exists to the committee? I think that will assist us in 
providing the needed resources and they are being targeted to 
areas where we are making sure that we are keeping our surface 
areas the safest.
    Thank you, Madam Chairwoman.
    Ms. Jackson Lee. Thank you. We would be happy to have the 
gentleman meet with representatives from TSA going forward, or 
the gentleman can engage the committee staff and we can be sure 
that his questions receive an answer in writing. That may be 
helpful to the gentleman.
    I am delighted now to recognize the gentleman from 
California, Mr. Lungren, for 5 minutes.
    Mr. Lungren. Thank you, Madam Chairwoman.
    Registered Traveler, Congress likes the idea. Congress says 
they like the idea. Congress repeats they like the idea. 
Congress puts it in legislation; and TSA says, What? What does 
it take for Congress to convince TSA and whatever 
administration it is that we are serious about Registered 
Traveler?
    Ms. Rossides. Well, sir, I think we know that you are 
serious about it, and I think one of the things that we are 
looking at is how do we create the kind of process that is 
first focused on security; second, enables us to ensure that we 
don't have what we are concerned about with respect to clean 
skins?
    Second, one of the things that the Secretary now is looking 
at is Registered Traveler-like programs across the whole 
Department, and how do we maybe bring some alignment with those 
and how do we employ those in a risk management way?
    One of the areas that will make all of our jobs easier at 
some point down the road, and hopefully in the not-too-distant 
future, is the use of biotechnology and biometric cards and 
things like that so we have a confidence in who is presenting 
that you don't have a fraudulent form of identification and 
that you create a program where you are maximizing the security 
benefits as well as the customer service benefits.
    We don't have the program today, and I will tell you that 
the Secretary is committed to looking at this as well as other 
RT-like programs across the Department.
    Mr. Lungren. What I can't understand is we use now, we use 
the license you get from a State. Some States do a better job 
than others in making sure that the person who gets it is the 
person who says he or she is. I have always thought that part 
of the equation of risk is threat consequence--threat 
vulnerability and consequence, and the only way you know the 
threat is by gathering information or intelligence. The whole 
idea of registered travelers is people expose themselves to 
more information checking for you than the average person. 
Presumably a one-time or twice-a-year person getting on the 
airplane is not going to be as interested in it as a regular 
traveler. So presumably you can do the vetting of these people 
or have the company that does the Registered Traveler Program 
do the vetting of these people on a regular basis and you would 
have more information. I don't understand. Why does giving you 
more information make it more likely that they are more of a 
threat than less information? I can't get over that. I 
understand you folks say we don't understand it, but I just 
don't understand that. I mean, I presume if you have more 
information upon which to check against somebody's bona fides, 
that is better than not having the information, isn't it?
    Ms. Rossides. It is. It is. As I said, the goal going 
forward is to look for what kind of a protocol, what kind of a 
security clearance, and what kind of a card could you have that 
would benefit the interest of folks that are looking for an RT 
versus our interest for screening.
    I would say it is still an issue on the table and we just 
haven't gotten the solution yet.
    Mr. Lungren. I understand the Behavior Detention Program at 
the checkpoints have been very effective?
    Ms. Rossides. Yes, sir.
    Mr. Lungren. Can you give us a status update on the 
program? What do you think we will be doing in 2010 funding to 
further improve the program?
    Ms. Rossides. It is basically a flat budget for behavior 
detection officers, and they are the folks that are trained to 
observe passenger behavior and then refer to the officers at 
the checkpoint if they see any anomalies in those behaviors.
    We also have a slight increase of about 55 FTE for our bomb 
appraisal officers. These are two complementary skill sets 
around the checkpoint that help with detection. Both of these 
programs have been terrific internal to TSA from a security 
standpoint, but also they have given our officers a career path 
to move from a transportation security officer up to a behavior 
detection officer or a bomb appraisal officer.
    Mr. Lungren. So from your standpoint and from your 
administration's standpoint, you think these have been 
successful programs?
    Ms. Rossides. Yes.
    Mr. Lungren. They have come through well under the testing 
and we ought to integrate them as a regular part of our 
program, correct?
    Ms. Rossides. Absolutely.
    Mr. Lungren. I don't think these programs are that well-
known here on the Hill, and I think we need to do a better job 
of letting Members know exactly what this is and the basis upon 
which you have made the evaluation so that you will have the 
support for it that I think it deserves.
    Ms. Rossides. I would be happy to brief the committee.
    Mr. Lungren. Thank you very much.
    Ms. Jackson Lee. I thank the gentleman very much, and I 
want to thank Mr. Cleaver for his patience, and I yield the 
gentleman 5 minutes for questioning.
    Mr. Cleaver. Thank you.
    Let's go back and revisit the whole issue of cargo. I have 
three quick questions. With H.R. 2200, TSA was given additional 
time to move up to 100 percent of the cargo internationally. 
Perhaps I should have asked this question a little better when 
we had our earlier exchange because I am not sure whether you 
said you still don't believe that we will get up to 100 percent 
internationally after the additional time?
    Ms. Rossides. At this point, the additional time would be 
beneficial to have. I just can't say sitting here today what 
countries will be the last to come into compliance and by what 
date we will be able to get that date. If it is August 2010, 
December 2010, that is part of the work with these 
international partners that we are trying to do. I will check 
and we will provide, I am happy to provide the committee a 
specific schedule by country when we think we will have 
compliance. But I can't answer the question right now.
    Mr. Cleaver. It would be important for me to know that 
because I remember when we had the onslaught of public 
criticism, as I am sure you do, so this is an important issue 
out in the world.
    I am a former mayor, and we have all of our police 
officers, when they stop individuals they always refer to them 
as ``Mr.'' and ``Mrs.'' because people don't like to be stopped 
so you have got to be as courteous as possible. I am familiar 
with police departments, primarily in Missouri, but the chances 
are that is the case around the Nation, for the same reasons. 
That is not a part of the training for TSA officers?
    Ms. Rossides. Yes, it is, sir. We put a lot of emphasis on 
the courtesy, the professionalism, the respect that they should 
pay passengers. We even go so far as to recommend specific 
statements that they should be making when they are approaching 
the passengers, when they are patting them down. We do focus on 
the communication with passengers.
    Mr. Cleaver. Yes, I flew out of an airport yesterday in 
Springfield, Missouri, and Bentonville, Arkansas, have a joint 
airport, and there was an older gentleman who was being 
screened and the TSA office kept saying, ``Bob, just come over 
here and sit down.'' I wanted to say something, but of course I 
thought better of it and I think I was probably smart in not 
saying anything. It just occurred to me that may not be a part 
of the training, but you are saying it is?
    Ms. Rossides. It is, sir. But there is always room for 
improvement for a workforce of 52,000 people.
    Mr. Cleaver. Yes, and that is exactly where I am going now 
because there is an increase in the training budget this year. 
Is there a certain area where you intend to go in terms of 
improving training or creating training with the additional 
money that is appropriated or will be appropriated?
    Ms. Rossides. Yes. Our focus is on their ability to detect 
small improvised explosive devices, and those training dollars 
go principally to continue to train them in that area. However, 
the training that I just described we finished to all 52,000 
employees, actually a good deal of that was on how you engage 
the passenger and how you communicate with them. One of the 
things we are looking at as well is continuing to put out 
training on that side of the equation because for the officer, 
honestly, if they have a calm passenger and they get in the 
proper kind of conversation with the passenger where they 
remain calm as they are going through the screening process, we 
actually get a higher level of screening as a result. So it is 
very much a part of the training for both improvised explosive 
device training as well as how they engage with the passengers, 
how they communicate with the passengers.
    Also, we put a tremendous amount of focus on dealing with 
people with disabilities and training for persons in 
wheelchairs and other disabilities because such a great 
percentage of our traveling population either is persons with 
disabilities or persons with artificial hips or persons with 
pacemakers, and so that is also a part of the training.
    Mr. Cleaver. I have a missing knee, my left knee, and so I 
go through it twice a week. I am perfectly willing and happy to 
do that, and I am glad that the training is moving in that area 
because this gentleman that I spoke of earlier, he was 
irritated and a little confused and then I became irritated and 
confused, as were others around me. But I held back because if 
you are a Member of Congress and you say something, you end up 
on the front page of the newspaper, maybe even get the chair, 
the electric chair.
    Ms. Jackson Lee. Would the gentleman yield?
    Mr. Cleaver. Yes.
    Ms. Jackson Lee. The gentleman has articulated a concern 
that has been constant. My recollection, Mr. Cleaver, is that 
we worked very hard to secure TSA officers or TSOs after 9/11. 
It was a massive plus-up, a surge. I am grateful for the 
wonderful Americans that rose to the cause. I think as we have 
thanked them for their service, and there are probably a number 
of individuals he might know in his own airport that he sees on 
a regular basis and says thank you, but this training issue has 
come up a number of times.
    Professional development, I would like to call it. I would 
like to work with the gentleman. In fact, we are going to be 
writing freestanding legislation on this whole question of 
professional development. I thought we had more of it in H.R. 
2200, but we had so much to do.
    Let us put this on your mind. What the gentleman has been 
saying and what we have all been saying, one of the reasons we 
went to behavioral assessment, and that information was given 
to me by another TSO who was trying to be responsive, that 
behavioral person didn't have all of the manners that I think 
they should have. Security should not be conflicted with 
manners.
    I would just like to join the gentleman. He made a simple 
point which is he could call this person mister, whoever the 
TSA officer was, but that is in a line of circumstances that we 
seem to find, and I am just going to put--I am used to putting 
gorillas on the record. No Member is asking for special 
privileges, it is not about us. But what I would say is what 
the gentleman has indicated, if we were or a good citizen were 
to offer a suggestion, think what the gentleman is saying, that 
our suggestion would be taken out of context and there is no 
question as to there is some doubt as to how it would be 
received and whether or not there would be a supervisor there 
that would welcome Congressman Cleaver's calm assessment of the 
circumstance. That is all in training and that is all in 
professional development, and at the same time balancing and 
making sure that terrorists and the shoe bomber and some other 
creative person doesn't get through.
    When we first started this, Congressman Mayor, you were a 
mayor and read about this. The baby formulas were maligned and 
mothers who were breast feeding had issues. Then we had issues 
with the hip, the artificial hip. We were just getting it 
together.
    So, Madam Administrator, as we move into this new 
administration, as we plus up on the numbers of TSOs because we 
need them, as we prepare to provide them, and this is not your 
issue, but provide them opportunity for workforce rights that 
they have been asking for, I think it is important for you to 
note, and I will yield back to the gentleman, as someone who 
has been involved either on this subcommittee for a number of 
years since 9/11, this is an issue that we must confront. We 
confront it all of the time in our law enforcement, but this is 
a new team. It looks like on this new team we should be able to 
make as much progress as we possibly can.
    I yield to the gentleman.
    Mr. Cleaver. Thank you, Madam Chairwoman. You said much 
more eloquently and clearly what I was hoping to convey. 
Whenever we increase training dollars, it seems to me that is a 
perfect opportunity to expand the teaching of courtesy.
    I yield back.
    Ms. Jackson Lee. Thank you very much for your astuteness 
and eloquence, Congressman.
    Let me conclude by giving us an update on the Secure Flight 
Program implementation. It looks like there is very little in 
the budget requested for this program, and we would like to 
have the assurance from TSA that you are budgeting 
appropriately for this program since it is supposed to be 
completed in fiscal year 2010?
    Ms. Rossides. Yes, Madam Chairwoman. We are making 
excellent progress on Secure Flight. The system is built and we 
are in the process now of working with the carriers to begin 
the transference of their system of vetting over to TSA. There 
is a schedule in place. We are working very hard with the 
carriers to keep that schedule so that the U.S. carriers have 
been cut over and their passenger records are being vetted 
under the Secure Flight Program by March of 2010, and again the 
international carriers by the end of 2010.
    We have had great success with those carriers, albeit they 
are small carriers, and our capability to vet them under the 
Secure Flight Program. There is a very strong management team 
in place, and as I stated earlier, we have met all of the 
conditions under the Government Accountability Office for this 
program to be a very strong program. We will keep the committee 
apprised of the progress we are making as we are bringing the 
major carriers into the system.
    Ms. Jackson Lee. I appreciate if you would keep us 
informed. It is very important. I also ask, we have language in 
H.R. 2200 on these foreign repair stations. This has been a 
continuing issue for this committee. We want to see TSA take 
our interests seriously and begin to look at the structure that 
you need to put in place and the requirements that you need to 
put in place.
    There is no doubt that every time a catastrophic incident 
happens in the air, or one that happens on the ground, such as 
Mumbai, which was our latest, and we had Spain and some other 
areas, that was surface transportation, but the recent 
Brazilian Air France air crash, those of us on this committee's 
immediate response is not to be hysterical but it is to think 
of anything so catastrophic, disappearing, no evidence, at 
least in the most recent hours, begin to think of all kinds of 
unfortunate incidents. Those foreign repair stations are one of 
the stopgaps to that kind of unfortunate circumstance possibly 
occurring, as it was with the question of interline bags that 
we addressed, tragically probably too late in the case of Pan 
Am 103, which was preceding 9/11.
    So what is the hold-up or the issue with the foreign repair 
stations?
    Ms. Rossides. Madam, the rule is within review still within 
the administration, and we are working very diligently to get 
it out so that it will be something that we can work on. We are 
staying in very close touch with the FAA on it, and it is a 
matter of getting it through the review process currently 
within the administration.
    Ms. Jackson Lee. I want to leave these points on the 
record. Mr. Reitinger has gone and this is not in his absence, 
but if you can convey to him, I think I made a point about 
being apprised and kept in sync with what you are doing on 
outreach. I know that TSA, the whole agency is looking to 
provide, to ensure that they have the right kind of staffing. 
Some people would say, as I mention this on the record, that I 
am speaking the obvious because there is possibly new attitudes 
here in Washington, and I respect that and I am excited about 
it, but I hope that we are keeping in mind diversity, and that 
includes region, that includes ethnicity, racial. Sometimes 
that overlaps. That includes both, if you will, gender, that is 
diverse, so we will look in far ranges of opportunities.
    I hope that we will look at the Nation's colleges. The 
class of 2009 is now ready to work. There are small and large 
universities. I am always hearing from my constituents, they 
didn't come to ABC, 2,500-student campus, I know you can't do 
that, but with e-mail and outreach, I frankly believe some 
notice should be at all of the campuses across America, at 
least those that may have programs, and that includes 
historically black colleges, Hispanic-serving colleges, and any 
other college, community colleges, Ph.D., MIT, all those that 
have a range of diversity.
    I think the other point of it is that goes to the idea of 
contracting. H.R. 2200 gives some impetus or push to science 
and technology that has not been very responsive. There are all 
sorts of small inventors and others with creative ideas that 
need to be before you and need to be on your list if they are 
adequate. That needs to be diverse as well. Talent is diverse. 
Maybe we will have an opportunity for us to get back and show 
some data that indicates that you have seen the light as you 
move forward to building your team and obviously getting all of 
the personnel that the Secretary needs at DHS.
    Ms. Rossides. Thank you, Madam Chairwoman. I would love to 
come back and brief you on specifically the initiatives TSA has 
put in place on diversity. We have some superb programs with 
colleges and programs where we are offering our officers 
associate degrees. We have extensive intern programs now that 
are in place, and I would love to be able to brief you or the 
committee and your staff on those programs.
    Ms. Jackson Lee. We will be delighted, and you will get 
your chance.
    Ms. Rossides. Thank you.
    Ms. Jackson Lee. Let me ensure that I have no further 
questions. I think I have asked the question on Secure Flight.
    I thank the witnesses for appearing before us today and the 
Members for their question. The Members of the subcommittee may 
have additional questions for the witnesses, and we ask that 
you respond to them expeditiously in writing.
    Hearing no further business, let me thank you very much for 
your presentation. The subcommittee now stands adjourned.
    [Whereupon, at 3:58 p.m., the subcommittee was adjourned.]


                            A P P E N D I X

                              ----------                              

Questions From Chairwoman Sheila Jackson Lee for Phillip R. Reitinger, 
 Deputy Under Secretary, National Protection and Programs Directorate, 
                    Department of Homeland Security
    Question 1. There has been a lot of discussion about the permanence 
of NPPD. As we all know, it is a disparate collection of entities that, 
in some cases, do not appear to have a unifying focus beyond being 
security programs. With that said, does this budget set the stage for a 
reorganization of NPPD before or after the delivery of the Quadrennial 
Homeland Security review next winter?
    Answer. The National Protection and Programs Directorate (NPPD) is 
a diverse organization with a vital cross-cutting and unifying mission 
of risk reduction. The Directorate works to reduce risks to the Nation 
through five mission areas: Protect the Nation's citizens and visitors 
against dangerous people, protect the Nation's critical infrastructure, 
protect and strengthen the Nation's cyber and communications 
infrastructure, strengthen the Department's risk management platform, 
and strengthen partnerships to foster collaboration and 
interoperability.
    NPPD has just passed the 2-year anniversary of the establishment of 
the organization and much has been accomplished during this time to 
solidify NPPD as a permanent organization within the Department. While 
building an organization that is best aligned to meet critical mission 
needs is always under review, there are currently no plans to eliminate 
or reorganize NPPD before the delivery of the Quadrennial Homeland 
Security Review (QHSR). The findings of the QHSR will be incorporated 
during the fiscal year 2011 and 2012 budget cycles. It is premature at 
this time to speculate whether the QHSR findings will impact the 
organizational make-up of NPPD.
    The fiscal year 2010 President's budget request included the 
proposed transfer of the Federal Protective Service (FPS) to NPPD from 
U.S. Immigration and Customs Enforcement. The proposed transfer aligns 
the FPS mission of Federal facilities infrastructure protection within 
the NPPD mission of critical infrastructure protection. Further, NPPD 
chairs the operations of the Interagency Security Committee, a group 
that includes the physical security leads for all major Federal 
agencies and whose key responsibility is the establishment of 
Government-wide security policies for Federal facilities. These 
missions are complementary and mutually supportive, and the alignment 
improves and advances the mission effectiveness of both FPS and NPPD.
    Question 2. As you can imagine, the subcommittee is concerned with 
the level of personnel NPPD employs. The subcommittee was happy to 
learn from your testimony that NPPD has brought on-board 300 new 
employees over the last 12 months, and currently has approximately 800 
Federal employees on board out of the 1,064 fiscal year 2009 positions. 
We were pleased to learn from your budget request that you intend to 
bring on additional personnel. Please describe NPPD's efforts to employ 
additional personnel and how this will affect current contracts at the 
Department.
    Answer. There are additional personnel coming on-board each pay 
period. The National Protection and Programs Directorate (NPPD) has 859 
employees on-board as of July 6, 2009. There are an additional 184 
selections in the pipeline, which are currently in the tentative job 
offer, security, or final job offer phases of the hiring process.
    Additional efforts to increase NPPD's staffing include:
    1. Within the past 100 days NPPD has switched their contract for 
        hiring support from Booz Allen Hamilton to the Office of 
        Personnel Management (OPM). In addition to a cost savings, 
        OPM's processes have streamlined several of the hiring steps 
        and have provided NPPD with a more comprehensive tracking 
        system, which allows a more accurate identification and 
        determination of where delays are occurring in the hiring 
        process as well as the ability to quickly address the 
        underlying cause(s) for those delays.
    2. The Deputy Under Secretary has implemented internal procedures 
        that ensure appropriate coordination and hiring decisions are 
        made within defined timelines.
    3. An improved process has also been implemented to review requests 
        by candidates for recruitment incentives.
    4. There have been a number of steps undertaken by the Office of 
        Security to streamline the clearance process. In addition to 
        those steps, NPPD has received approval to assign a Federal 
        employee full-time to coordinate the preliminary checks to 
        abbreviate the amount of time required for a completed security 
        package to get from the candidate to the security adjudicators.
    5. Since there have been frequent delays in the amount of time 
        selectees take to complete their security paperwork and have 
        their fingerprints taken, tentative job offer letters now 
        require candidates to complete their security paperwork and 
        fingerprinting within a week of receiving the pre-appointment 
        letter. If the required documents have not been submitted with 
        a week of the offer letter the individual is called to 
        determine if they need any assistance in completing this 
        requirement and provided with 1 additional week if there is a 
        reasonable justification for their delay. At that time they are 
        also informed that if the paperwork is not completed within the 
        second week, the job offer will be rescinded and DHS will need 
        to go to the next candidate under consideration. Additional 
        extensions are only approved for extenuating circumstances.
    6. The Director of Resource Administration is also working with the 
        components and the Human Capital Office to ensure that standard 
        or existing position descriptions (PDs) are being utilized to 
        fill current vacancies. The length of time required to draft, 
        review, and acquire approval for PDs prior to announcing a 
        position has been identified as a significant point of delay in 
        the hiring process.
    Based upon on board strength, the current list of candidates within 
the pipeline and the additional process changes undertaken, NPPD expect 
to be able to reach a required staffing level of more than 1,000 for 
fiscal year 2009, with selections made against another 10% of existing 
vacancies.
    In regard to `` . . . how this will affect current contracts at the 
department''; as FTE positions are filled with Federal employees it 
will reduce NPPD's reliance on contractors. As NPPD hires additional 
Federal personnel we are validating if contractor support positions 
need to be replaced. Once this determination is made NPPD will 
coordinate with the Office of Procurement Operations to request 
appropriate contractual action (i.e. reevaluating exercising contract 
of options periods and/or de-scope the contract requirements, etc.)
    Question 3a. As you know, the subcommittee has been quite concerned 
about the progress and authority of the Office of Risk Management and 
Analysis. As directed, RMA has been providing quarterly updates to 
staff. From these updates, it appears that RMA has quite an ambitious 
agenda, ranging from a national risk assessment to the informing of 
budget cycles to a heavy presence in the development of the Quadrennial 
Homeland Security Review.
    How, then, is approximately $9 million enough for fiscal year 2010?
    Answer. The Office of Risk Management and Analysis (RMA) has two 
strategic objectives: (1) Establish an integrated approach to risk 
management within the Department of Homeland Security (DHS); and (2) 
conduct systematic, rigorous risk analysis methodologies to execute 
assessments in support of Department-wide decision-making. To work 
towards these objectives, RMA has planned and budgeted for the drafting 
of an Integrated Risk Management Framework and development of 
supporting materials and processes; execution of the Risk Assessment 
Process for Informed Decision-making (RAPID) tool; and leading a study, 
under the auspices of the Quadrennial Homeland Security Review, to 
develop a process and identify the level of required resources to 
produce a Homeland Security National Risk Assessment (HSNRA) which will 
serve as a tool to provide strategic guidance and inform high-level 
Departmental resource allocation in a meaningful way. Following the 
HSNRA study, RMA will review the scope of requirements and with 
guidance from Department leadership reevaluate the resources needed to 
accomplish their mission.
    Question 3b. Staff was told last week that 19 of 26 FTEs are 
filled. How quickly can it be at full capacity, given the vast hiring 
bureaucracy at NPPD?
    Answer. RMA has 13 Government personnel on board and 11 on-site 
contractors. In addition, 7 applicants have accepted FTE offers. Five 
of the 7 accepted offers are Presidential Management Fellows. The 
remaining vacancies within RMA are not due primarily to the perceived 
limitations of the hiring business process within DHS, but rather, the 
difficulty of finding qualified applicants with the technical and 
scientific expertise required for conducting risk analytics. RMA has 
the National Academies and individuals from the private sector and 
academia assisting with the recruitment efforts. RMA is also 
considering filling at least one of the technical billets using an 
Intergovernmental Personnel Assignment (IPA).
    Question 4. The President's budget request cuts $11 million from 
IP's National Infrastructure Protection Program efforts. Please explain 
the rationale behind these cuts, given that most companies are not 
regulated for security purposes and many do not have the financial 
resources in this economic climate.
    Please also explain whether other departments and agencies--which 
partner with DHS under the NIPP--will be providing resources to further 
security efforts under the NIPP in fiscal year 2010.
    Answer. The Department of Homeland Security (DHS) must prioritize 
limited resources towards the highest priority programs. The reductions 
to the National Infrastructure Protection Plan (NIPP) program efforts 
were required to fund other critical DHS responsibilities.
    Maintaining the greatest possible degree of engagement and 
information-sharing with our private-sector critical infrastructure and 
key resources (CIKR) partners and coordination with the Sector Specific 
Agencies (SSAs) will continue to be a main focus of the Office of 
Infrastructure Protection (IP).
    These funding reductions will result in DHS relying more heavily on 
its sector-specific partners to use their own existing expertise and 
sustain service capabilities. SSAs will need to assume a greater role 
in managing, developing, and producing sector programs, reports, and 
metrics. The private-sector is actively engaged in the public-private 
partnership. They contribute their subject-matter experts (SMEs) and 
bring corporate representatives to the table at their own cost and 
time. Several of the partnership trade member associations have taken 
on some of the sector support responsibilities including planning, 
analysis, and writing support for tailoring products to their members' 
interests. DHS will work diligently with remaining resources to ensure 
that the value found in information sharing and coordination remains 
high between DHS and our private-sector partners.
    Although DHS will not be able to provide the same amount of in-
person interaction with the private-sector and State, local, Tribal, 
territorial, and regional governments and organizations, the Department 
is promoting on-line conference capabilities and delivering web-based 
training on the Homeland Security Information Network for Critical 
Sectors. DHS will continue to foster relationships with private-sector 
entities while promoting mutual-aid agreements within and among CIKR 
partners in the industry.
    The SSAs outside of IP provide funding to develop and implement a 
wide range of CIKR programs. The budget requests for each of these 
sectors are at least partially captured in their Sector CIKR Protection 
Annual reports. Due to the reduction, DHS will no longer provide on-
site contract SME support to departments and agencies with SSA 
responsibilities, and they will need to assume a greater role for the 
development, coordination, and final submission of the sector metrics, 
Sector CIKR Protection Annual Reports, Sector-Specific Plans (annual 
reviews and triennial rewrites), and other required information.
    Question 5. As you know, the expiration of the Chemical Facility 
Anti-Terrorism Standards is of great import to this committee. Is the 
Department prepared to ask for an extension of the legislation? If so, 
what resources are needed for fiscal year 2010 for CFATS? Your 
testimony requests $103.4 million for fiscal year 2010, which includes 
268 Federal staff, and this is to be allocated for high-risk chemical 
facilities and to establish ammonium nitrate regulations. Under this 
request, how much is going to the CFATS program?
    Answer. The President's budget submission included a request to 
extend authorization of the Chemical Facility Anti-Terrorism Standards 
(CFATS) for a period of 1 year to give us time to evaluate what is 
needed for a permanent authorization. For fiscal year 2010, the 
Department of Homeland Security has requested funding in the amount of 
$103.4 million to continue its efforts under CFATS and to develop 
ammonium nitrate regulations.
    The Department's fiscal year 2010 request included 268 FTP and 246 
FTE Federal staff. Of the requested $103.4 million in funding, the 
Department has proposed to direct $33.5 million to salaries and 
benefits, $55.5 million to CFATS and $14.4 million to ammonium nitrate 
regulations.
    Question 6. As you know, the committee championed the resilience-
based approach to critical infrastructure protection during the last 
Congress. Your testimony and the budget request highlight five Regional 
Resiliency Assessment projects at IP. Please describe these projects, 
their resources, and their objectives.
    Answer. Much of the Nation's critical infrastructure and key 
resources (CIKR) are not part of a single, integrated system that can 
be controlled and monitored from a single location. High-priority CIKR 
are a complex ``system of systems''--a loosely woven network of 
localized infrastructure, each with unique characteristics and 
vulnerabilities. Recognizing this, the Office of Infrastructure 
Protection (IP) has adopted a resilience-based approach to protecting 
Nationally significant CIKR. This shift is reflected in the 2009 
National Infrastructure Protection Plan (NIPP), Partnering to Enhance 
Protection and Resiliency, which focuses on protection and resiliency 
as National priorities. Resilience of critical infrastructure focuses 
on systems as a whole--particularly on investments that make a system 
better able to absorb the impact of an event without losing the 
capacity to function. The resilience of critical infrastructure also 
includes the protection and physical survivability of key National 
assets and structures. Because of the regionally clustered distribution 
of CIKR, the protection of component assets is best planned, 
coordinated, and executed locally. The Department of Homeland Security 
(DHS) developed the Regional Resiliency Assessment Program (RRAP) to 
analyze and build resilient assets, systems, and communities at the 
regional level.
    The RRAP is a cooperative Government-led assessment of designated 
CIKR facilities and regional analysis of the surrounding 
infrastructure. It provides Federal, State, local, Tribal, territorial, 
and private sector stakeholders with an awareness of the geographic 
area's National and regional impact, vulnerabilities, dependencies, 
interdependencies, resiliencies, and necessary protective measures. The 
RRAP:
   Examines vulnerabilities, threats, and potential 
        consequences from an all-hazards perspective using enhanced 
        assessment methodology;
   Identifies CIKR dependencies, interdependencies, resiliency 
        characteristics, and gaps;
   Evaluates the prevention and protection capabilities of 
        owners/operators, local law enforcement, and emergency response 
        organizations;
   Supports required grant applications;
   Provides baseline examination of risk and metrics to measure 
        mitigation; and
   Coordinates and integrates other protection programs, 
        including assessments, training, economic analysis, IED 
        awareness, geospatial products, information sharing and 
        exercises.
    The RRAP analyzes gaps using multiple assessments and surveys 
including Site Assistance Visit (SAV)\1\ and Enhanced Critical 
Infrastructure Protection (ECIP)\2\ assessments, Buffer Zone Plans 
(BZPs),\3\ the Computer-Based Assessment Tool (CBAT),\4\ independent 
subject matter expert analysis, Emergency Services Capabilities 
Assessment (ESCA),\5\ System Recovery Analyses (SRA),\6\ Multi-
Jurisdiction Improvised Explosive Device Security Planning 
(MJIEDSP),\7\ National Capabilities Analysis Database (NCAD) 
assessments,\8\ and other tools designed to capture the region's 
dependencies, interdependencies, and resiliency characteristics. The 
results are used to enhance the overall security posture of the 
facilities, the surrounding communities, and the geographic region 
using short-term improvements and long-term investments in equipment, 
planning, training, and resources to mitigate risk.
---------------------------------------------------------------------------
    \1\ SAVs are facility vulnerability assessments focused on 
identifying security gaps and recommending protective measures. SAVs 
are conducted by DHS/IP in coordination with other Federal, State, and 
local government entities and CIKR owners and operators.
    \2\ ECIP visits are conducted by DHS/IP in coordination with 
facility owners and operators and other Federal, State, and local 
partners to assess overall site security and recommend protective 
measures at facilities, track implementation of new protective 
measures, and build public-private relationships.
    \3\ BZPs are strategic documents developed by local jurisdictions 
with support from DHS that assist State and local law enforcement and 
other first responders in developing site-specific preventive and 
protective measures that make it more difficult to successfully target 
and attack CIKR sites.
    \4\ CBAT blends vulnerability assessment data, structural 
schematics, and other relevant site data with 360-degree spherical 
color video of facilities, surrounding areas, routes, and other areas 
of interest to create an interactive visual guide of any location.
    \5\ ESCA examines the region's emergency services capabilities in 
the context of all-hazard events such as natural disasters or terrorist 
attacks.
    \6\ SRA examines the region's interdependencies in the context of a 
tailored scenario, such as large-scale system failures or industrial 
accidents.
    \7\ MJIEDSP examines the region's IED security plans in the context 
of integration of assets and capabilities from multiple jurisdictions 
and emergency service sectors, providing DHS officials and regional 
authorities and responders with an accurate picture of current 
preparedness and response capabilities for IED security.
    \8\ NCAD assessments of bomb squads, explosive-detection canine 
units, SWAT teams, and public-safety dive teams use a task-based model 
to examine IED security operations capabilities and readiness.
---------------------------------------------------------------------------
    Each RRAP produces an Integrated Protective Measures Analysis 
(IPMA) Report and a self-executing CBAT multi-media file for use as a 
State and regional planning and response tool. The IPMA and CBAT 
multimedia file documents the resiliency of critical nodes in the 
region; dependencies and interdependencies among the assets and 
possible cascading effects from loss, destruction, disruption, or 
degradation of one or more of these systems; gaps and corresponding 
options for consideration, to be used for continued planning to buy 
down risk; and individual assessment reports and plans.
    The IPMA can be used by the State to inform their Buffer Zone 
Protection Program (BZPP) grant applications. RRAP-identified gaps and 
options for consideration are mapped directly to the multi-jurisdiction 
Vulnerability Reduction Purchasing Plan (VRPP) required as part of the 
BZPP application. In this way the RRAP supports more effective resource 
allocation decisions. For each RRAP BZPP grant funding is used address 
RRAP-identified planning and equipment needs of the local law 
enforcement agencies responsible for protecting the CIKR sites.
    Five (5) RRAPs will be completed in fiscal year 2009. RRAP 
locations were selected by DHS in coordination with the States based on 
relative risk profile and feasibility of the assessment process. 
Programmatically, each RRAP costs between $596,500 and $686,500 for DHS 
to conduct. This cost does not include BZPP grant funding, which are 
funds provided directly to local law enforcement.
    Based on the budget request for fiscal year 2010, IP will conduct 
six (6) RRAPs. The regions will be selected by DHS based on input from 
the States through the Tier 1 and Tier 2 data call. The revised data 
call allows States to nominate ``critical clusters'' that meet the Tier 
1 and Tier 2 criteria. Critical clusters are groups of similar 
infrastructure that can be disrupted through a single incident, whether 
natural or manmade, and the disruption of which could cause Nationally 
or regionally critical consequences meeting the Tier 1 and Tier 2 
thresholds. IP is currently assessing high-risk clusters across the 
U.S. as well as preparing guidance and a data call to States. Potential 
locations for the fiscal year 2010 RRAP include: Detroit International 
Transportation Hub, Colonial Pipeline (Atlanta Hub), Louisiana Highway 
1 (LA1), Port of Long Beach, Las Vegas Strip, and Henry Hub Pipeline in 
Louisiana.
                               (nppd) oec
    Question 7. Within NPPD sits the Office of Emergency Communications 
(OEC), which has, among many responsibilities, ownership of the 
Integrated Wireless Network, or IWN. This is supposed to be an 
interoperable communications network for all Federal law enforcement 
officials--including DHS, DOJ, and Treasury. To date, however, OEC has 
done nothing to advance the implementation of IWN. In your view, is 
interoperability a priority for Federal law enforcement officials? If 
so, what role do you believe OEC should play in that effort? How should 
this office work with the Office of the CIO, as well as the CIOs of DHS 
components, to advance interoperability within DHS?
    Answer. The Office of Emergency Communications (OEC) and Federal 
law enforcement officials recognize the importance of interoperability 
with other Federal, State, local, and Tribal agencies. However, 
existing Federal tactical wireless infrastructure is outdated, 
resulting in an inability to meet both intra- and inter-agency 
communications needs. Federal tactical wireless capabilities must be 
modernized and basic operability shortfalls addressed before 
interoperability can be achieved. Historically, these modernization 
efforts have been underfunded, which limits interoperability efforts.
    The Department of Homeland Security (DHS) believes that the 
original Integrated Wireless Network (IWN) concept of a single, Nation-
wide, consolidated network is no longer viable due to funding 
limitations and the disparate requirements of Federal law enforcements 
users. OEC and the Office of the Chief Information Officer (OCIO) are 
working together to implement the underlying IWN concepts of 
intergovernmental partnerships, joint requirements gathering, and 
integrated short- and long-term planning to improve mission-critical 
wireless capabilities and promote interoperability while reducing 
costs. OEC's inherent interagency and intergovernmental roles and 
responsibilities are appropriate to drive joint requirements 
development, planning, and implementation efforts. However, this can 
only be achieved with a true stakeholder-driven approach in concert 
with Federal users and managers from partner agencies and components.
    OEC, the DHS OCIO, and the DHS Component OCIOs are working together 
through the Wireless Working Group to develop a consolidated 
Departmental strategy for the modernization of DHS tactical wireless 
infrastructure. This strategy will address immediate mission-critical 
tactical voice requirements while driving toward an integrated 
interoperable long-term solution. OEC supports the Department's 
strategic planning efforts by identifying opportunities for resource 
sharing with external agencies across all levels of government and by 
helping to define and shape interoperability standards and external 
relationships for long-term coordination. Through the Emergency 
Communications Preparedness Center, OEC is advocating the need for 
Federal tactical wireless communications modernization and will elevate 
the issue to senior officials throughout the Federal emergency 
communications community. In addition, OEC is adding value to Federal 
efforts by sharing its knowledge of State and local activities across 
the Nation to help identify opportunities for resource sharing across 
various levels of government.
    Question 8. The stimulus bill signed earlier this year provided $60 
million for Customs and Border Protection to procure and deploy 
tactical wireless communications equipment. How is OEC working with CBP 
to ensure that this money is spent on equipment that would fit within 
the DHS vision of IWN and within the DHS vision for having an 
interoperable communications system for all its law enforcement 
officials?
    Answer. In the case of the stimulus bill, the Office of Emergency 
Communications (OEC), the Office of the Chief Information Officer 
(OCIO), and the Department of Homeland Security (DHS) Wireless Working 
Group are working closely together to ensure development of a common 
strategy for both Customs and Border Protection and U.S. Immigration 
and Customs Enforcement that improves interoperability and cost 
efficiencies through the acquisition of standards-based technologies 
(e.g., Project 25) while promoting the sharing of resources, to include 
spectrum, infrastructure, engineering, and acquisition. Per DHS 
Management Directive 4100.1, OCIO is responsible for the internal 
coordination of wireless investments across the Department, which it 
does through the DHS Wireless Working Group. OEC identifies 
opportunities for DHS components to coordinate with other Federal, 
State, local, Tribal, and territorial agencies external to DHS.
    Question 9. IWN has been under the purview of OEC for several years 
now. As you have become familiar with the work of NPPD during your time 
at DHS, what, if anything, have you seen done to date by OEC on IWN? Do 
you think that OEC has a role in overseeing a Department-wide effort to 
build an interoperable communications system for Federal law 
enforcement officers, given the lack of operational expertise in the 
Office?
    Answer. The Department of Homeland Security (DHS) believes that the 
original Integrated Wireless Network (IWN) concept of a single, Nation-
wide, consolidated network is no longer viable because of funding 
limitations and the disparate requirements of Federal law enforcements 
users. OEC and the Office of the Chief Information Officer (OCIO), 
through the Wireless Working Group are working together to implement 
the underlying IWN concepts of intergovernmental partnerships, joint 
requirements gathering, and integrated short- and long-term planning, 
thereby improving mission-critical wireless capabilities and promoting 
interoperability while reducing costs.
    OEC works through the DHS Wireless Working Group and the OEC-
chaired Federal Partnership for Interoperable Communications for 
operational expertise. OEC plays an important role in the Department-
wide effort to build an interoperable communications system for Federal 
law enforcement officers. OEC's core roles and responsibilities are 
appropriate to drive joint requirements development, planning, and 
implementation efforts. However, this can only be achieved with a true 
stakeholder-driven approach in concert with Federal users and managers 
from partner agencies and components. OEC provides comprehensive 
knowledge and understanding of requirements and activities across 
departments and various levels of government to identify opportunities 
for resource sharing and to help define and shape external 
relationships for long-term coordination. Through the Emergency 
Communications Preparedness Center, OEC is advocating the need for 
Federal tactical wireless communications modernization and will elevate 
the issue with senior officials throughout the Federal emergency 
communications community.
    Question 10. In the DHS response to the GAO Report on Radio 
Communication (report number 09-133, dated December 2008), the reason 
giving for abandoning the joint IWN program was, ``Because DOJ and DHS 
have different regional priorities--a common system will not work at a 
national level . . . '' Given that, why has DHS not at least embraced 
IWN within its own Department? Wouldn't the IWN program provide the 
cost savings, efficiencies, and interoperability needed between DHS 
agencies, such as CBP, ICE, Coast Guard, and others?
    Answer. The Department of Homeland Security (DHS) believes that the 
Integrated Wireless Network (IWN) concept of a single, Nation-wide, 
consolidated network is no longer viable both for DHS and as part of an 
interagency partnership because of cost and schedule constraints. The 
Office of Emergency Communications (OEC) and the DHS Office of the 
Chief Information Officer (OCIO) are working together through the DHS 
Wireless Working Group (WWG) to implement the underlying IWN concepts 
of intergovernmental partnerships, joint requirements gathering, and 
integrated short- and long-term planning, thereby improving mission-
critical wireless capabilities and promoting interoperability while 
reducing costs. Each of these organizations includes representation 
from U.S. Immigration and Customs Enforcement (ICE), Customs and Border 
Protection (CBP), and the U.S. Coast Guard (USCG), as well as the other 
DHS components.
    OEC, the DHS OCIO, and DHS components including CBP, ICE, and USCG 
are integrating these concepts as they develop a consolidated 
departmental strategy for the modernization of DHS tactical wireless 
infrastructure through the DHS WWG. This collaborative effort will 
result in a strategy that addresses immediate mission-critical tactical 
voice requirements while driving toward an integrated interoperable 
long-term solution. A key element of the DHS strategy is to ensure that 
investments are coordinated with internal and external partners and 
that opportunities to share resources are appropriately considered. In 
addition, DHS components including CBP, ICE, and USCG are examining 
common architectures and standards so as not to preclude future 
interoperability or resource sharing if current operational priorities 
dictate the need to modernize independently in some areas.
    Question 11. The White House Web site states the Federal Government 
will ``support efforts to provide greater technical assistance to local 
and state first responders and dramatically increase funding for 
reliable interoperable communications systems.'' Given the minimal 
budget change in the President's fiscal year 2010 request for the 
Office of Emergency Communications, how does NPPD intend to meet the 
increasingly high demand for technical assistance across the country?
    Answer. The National Protection Programs Directorate/Office of 
Emergency Communications (NPPD/OEC) Interoperable Communications 
Technical Assistance Program (ICTAP) provides direct support through 
the development and delivery of training, tools, and on-site services 
to State, Tribal, territorial, regional, and local agencies for the 
implementation of the National Emergency Communications Plan (NECP) and 
the advancement of public safety emergency communications, operability, 
and interoperability capabilities.
    NPPD/OEC technical assistance is provided at no cost to States/
territories with the stipulation that the services support the 
implementation of the State's Statewide Communication Interoperability 
Plan and promote achievement of the NECP goals. Using the NPPD/OEC 
Technical Assistance Catalog, the States may submit up to five requests 
for services annually (an average State has more than 30 applicable 
initiatives). Although participation by the States/Territories is 
voluntary, during fiscal year 2009 all 56 States/Territories have 
requested (or indicated that they will request) NPPD/OEC technical 
assistance, with more than 90 percent submitting the maximum five 
service requests. Nation-wide, 240 technical assistance requests have 
been (or will be) submitted. In considering these requests, NPPD/OEC 
uses a needs-based approach, incorporating the State's risk and 
communications capability, to determine how best to allocate its 
technical assistance resources.
    The President's fiscal year 2010 budget request includes an 
additional $3.8 million for OEC. If enacted, the increased funding will 
provide some additional support to State and local interoperable 
communications technical assistance. Specifically, assistance will be 
provided to State and local governments to achieve response-level 
emergency communications by the designated goal deadlines.
    The fiscal year 2009 NPPD/OEC budget for State-requested technical 
assistance was $5.2 million. OEC's strategy for meeting the current 
demand is based on innovative restructuring and the re-scoping of 
services. We try to minimize the travel cost by working remotely or 
conducting multiple engagements during a single trip. During the 
project-planning phase, OEC scopes the engagement in the most cost-
effective manner. Our project managers look for additional cost-cutting 
measures by leveraging personnel with broad skill sets that allow them 
to conduct multiple facets of a Technical Assistance delivery, 
minimizing the need to send additional personnel. Lastly, we look to 
other programs to transfer applicable requests, such as the Public 
Safety Interoperable Communications Grant Program. Our diligent efforts 
to maximize the productivity of each Technical Assistance dollar enable 
us to fulfill more than half of the States' fiscal year 2009 requests.
    Although it remains unclear how many ICTAP requests NPPD will 
receive for fiscal year 2010, we are confident that strong program 
management, responsible and creative engagement scoping, and the 
leveraging other programs will maximize the available fiscal year 2010 
funding to ensure that State, territorial, local, and Tribal 
governments receive critical Technical Assistance services to address 
key emergency communications gaps.
    Question 12. Nearly 8 years have passed since the tragic attacks of 
9/11 and 3 years since the devastating storms of Hurricane Katrina. 
Congress responded and created the Office of Emergency Communications 
at DHS to be the focal office responsible for emergency communications 
in the Post-Katrina Emergency Management Reform Act of 2006. Despite 
efforts made by Congress, I remain very concerned by the various 
components at the Department with stronger influences over first 
responder communications capabilities. For example, some argue that the 
relationship between the OEC and FEMA Disaster Emergency Communications 
(DEC) is a complementary relationship, while others view their missions 
as overlapping, identical, or competing. Can you explain how you intend 
to strengthen the OEC within this budget request and streamline 
interoperable emergency communications issues at the Department and 
within the Federal Government?
    Answer. Secretary Napolitano has made unifying the Department of 
Homeland Security (DHS) as ``One DHS'' a top priority. Within the 
Department, the Office of Emergency Communications (OEC) is the focal 
point for National planning and coordination for interoperable 
emergency communications, and Departmental leadership will continue to 
support OEC's efforts to strengthen and coordinate emergency 
communications activities both within the Department and across other 
Federal Government agencies.
    The Department plans to facilitate intra- and inter-departmental 
coordination on emergency communications and interoperability issues. 
Inter-departmental coordination will occur within the Emergency 
Communications Preparedness Center framework. Intra-departmental 
efforts will occur within the framework of a DHS-wide working group, 
led by OEC and dedicated to coordinating emergency communications 
issues across the Department. The intra-Departmental working group will 
include components such as OEC, the Federal Emergency Management 
Agency, the National Communications System, and the Command, Control 
and Interoperability Division of the Science and Technology 
Directorate.
    Question 13a. As you know, PKEMRA created the Emergency 
Communications Preparedness Center (ECPC) to serve as the focal point 
and information clearinghouse for Federal interagency emergency 
communications efforts. However, in order for the ECPC to be 
established, DHS, through the OEC, must complete a charter with the 
signatures from all the appropriate Department heads across the Federal 
Government. The ECPC charter was due to Congress last year, but it has 
yet to materialize.
    What assurances can you provide to the committee about the 
Department's commitment to taking the issue of operability and 
interoperability seriously both at DHS and throughout the Federal 
Government?
    Answer. The Department of Homeland Security (DHS), through its 
Office of Emergency Communications (OEC), is fully committed to 
establishing the Emergency Communications Preparedness Center (ECPC) as 
the focal point for interagency efforts and as a clearinghouse for 
intergovernmental information to support and promote communications 
operability and interoperability. OEC created an ECPC working group in 
September 2007 as the primary collaborative mechanism to establish the 
ECPC and facilitate its activities. In its first action, the ECPC 
working group solicited and coordinated Federal agency input to the 
National Emergency Communications Plan (NECP), which was published in 
July 2008. The ECPC working group also drafted and internally approved 
an ECPC Charter. The Charter was approved by the DHS Secretary on June 
8, 2009, and distributed to member departments and agencies for 
approval and designation of their official representatives.
    With the approval of the ECPC Charter by the Secretary of Homeland 
Security and continued planning within the OEC, the committee can be 
assured that DHS is seriously addressing the issues of operability and 
interoperability. OEC is actively supporting the following actions:
   Close coordination with ECPC member agencies to gain 
        approval of the Charter and to identify representatives to 
        serve on the ECPC executive and steering committees. To date, 
        the Charter has been approved by six of the 12 ECPC member 
        agencies;
   Content development and agenda planning for the inaugural 
        ECPC executive committee and steering committee meetings to be 
        convened upon final charter approval by member agencies;
   Development and testing of ``beta'' version of a secure 
        emergency communications clearinghouse capability for rollout 
        in January 2010;
   Continued execution of targeted focus group activity in the 
        area of emergency communications technical assistance and grant 
        guidance coordination. For example, the technical assistance 
        focus group has successfully cataloged Federal Technical 
        Assistance programs and begun identification and sharing of 
        best practices for effectively administering Technical 
        Assistance; and
   Execution and completion of the initiatives and milestones 
        identified in the NECP.
    DHS is optimistic that full approval of the ECPC Charter by member 
agencies will be achieved by September 2009.
    Question 13b. From your assessment, what are some of the major 
hindrances to OEC fulfilling this requirement?
    Answer. Approval of the Charter and designation of formal 
representatives to the ECPC have been delayed because of the impact of 
the Presidential transition and the resulting Departmental appointments 
and confirmations of personnel needed to review and approve agreements. 
We believe this to no longer be an issue.
    Question 13c. What Congressional assistance is needed for the 
Department to complete this requirement?
    Answer. We believe that progress is being made more quickly now 
with the ECPC Charter and the designation of representatives from the 
Federal agencies. In addition, we will continue to develop the agenda 
for the initial ECPC session.
                              (nppd) cyber
    Question 14. How will the President's announcement of the creation 
of a new ``cyber coordinator'' in the White House affect the 
Department's cybersecurity mission?
    Answer. As the Nation becomes ever more dependent upon cyber 
networks, we must address cybersecurity strategically. Overcoming new 
cybersecurity challenges is a difficult task requiring a coordinated 
and focused approach to better secure the Nation's information 
technology and communications infrastructures. President Obama's 
Cyberspace Policy Review reaffirms that cybersecurity is among the most 
significant issues facing the Nation's economy and national security, 
and it solidifies the priority that the administration places on 
improving cybersecurity.
    The Department of Homeland Security (DHS) believes the creation of 
a senior-level cyber position within the White House will help ensure 
coordination and collaboration across Government agencies. No single 
agency is responsible for cyberspace and the success of our cyber 
mission relies on more than one department. As such, the many 
Government players with complementary roles--including DHS, the 
intelligence community, the Department of Defense, the Department of 
Justice, and other Federal agencies--require coordination and 
leadership to ensure effective, and efficient execution of the overall 
cyber mission.
    DHS will continue to have a preeminent role in ensuring the 
cybersecurity of the Federal domain and collaborating with the private 
sector to improve the security of private sector networks, and it will 
have a significant role in accomplishing near-term actions outlined in 
the report, including updating the National strategy, strengthening 
private sector and international partnerships, increasing public 
awareness and preparing a National response plan. The operational goals 
of the comprehensive National strategy will include better 
coordination, response, recovery, and mitigation across stakeholder 
communities.
    Furthermore, DHS works closely with its Federal partners, and the 
leadership and staff of the National Security Staff in the development 
and continued tracking, coordination, and execution of the 
Comprehensive National Cybersecurity Initiative. The Department also 
maintains close working relationships with the 18 Critical 
Infrastructure and Key Resources (CIKR) sectors, and their Federal 
sector-specific agencies, under the National Infrastructure Protection 
Plan Partnership Framework.
    Question 15. How does the Department intend to work with other 
relevant agencies to secure the electric grid from cyber attack?
    Answer. In May 2004, DHS created the Control Systems Security 
Program (CSSP) within the National Cyber Security Division (NCSD) to 
lead a cohesive effort focused on reducing the cyber risks to the 
control systems within critical infrastructure. A control system is a 
general term that encompasses several types of systems, including 
Supervisory Control and Data Acquisition, process control, and other 
automated systems that are most often found in the industrial sectors 
and critical infrastructure. These systems are used to operate physical 
processes in industries such as electricity, oil and gas, water, and 
critical manufacturing. Control system security in the electric power 
grid is particularly important because of the significant 
interdependencies inherent with the use of electricity in all other 
critical infrastructure sectors. In addition, operations of Federal, 
State, and local government rely on the electric grid. Therefore, 
assessing risk and effectively securing industrial control systems is 
vital to maintaining the Nation's strategic interests, public safety, 
and economic prosperity.
    The CSSP currently partners with several Federal, State, and local 
agencies to provide analysis capabilities for technologies affecting 
control systems that impact the electric grid. Among these 
organizations are the Army Corps of Engineers, Department of Defense, 
Department of Energy, Department of Justice, Department of the Navy, 
Department of the Treasury, Department of Transportation, Environmental 
Protection Agency, Federal Energy Regulatory Commission, Nuclear 
Regulatory Commission as well as representatives from law enforcement 
and the intelligence community. These relationships provide reciprocal 
coordination on efforts as emerging technologies, and the cyber issues 
affecting critical infrastructure, are evaluated. Most importantly, the 
CSSP's Advanced Vulnerability Discovery facility, funded by DHS and 
housed at the Idaho National Laboratory, offers a world-class test 
environment where technical experts continuously evaluate nearly every 
major control system used in the critical infrastructure.
    In 2006, DHS issued the National Infrastructure Protection Plan 
(NIPP) that identified the CSSP as responsible for coordinating 
activities to reduce the likelihood of success and severity of impact 
of a control systems cyber attack against CIKR sectors through risk 
mitigation activities. DHS recognizes that control systems exist across 
sectors and must be secured from cyber attacks, the effects of which 
could result in significant consequences. To address this, the CSSP has 
built a culture of reliability, security, and resiliency by partnering 
with government agencies, industry, and international entities to 
reduce the cyber risk to all 18 CIKR sectors. The CSSP leverages the 
risk management framework and partnership model described in the NIPP, 
which provides a mechanism for coordination among CIKR stakeholders, 
Government, and industry associations.
    To assist public and private sector partners in identifying and 
mitigating the risks to their control systems, the CSSP provides 
leadership and subject matter experts through partnerships with key 
stakeholders. It develops recommended vulnerability mitigation 
strategies, practices, informational products, and assessment tools and 
delivers focused training. Recognizing that stakeholders must be 
involved in the process of identifying vulnerabilities and developing 
strategies to improve their security posture, the CSSP developed the 
first widely available control system cybersecurity self-assessment 
tool, which employs a systematic and repeatable approach for owners and 
operators to assess the security of their industrial control systems 
network. It also offers recommendations based on industry standards 
that are customized to the operating characteristics of each control 
systems facility.
    While valuable products and tools such as these allow asset owners 
to understand the cyber risk to their control systems, it is also 
imperative that all stakeholders have a full understanding of the 
underlying fundamentals of control systems security. Consequently, the 
CSSP developed an advanced training center at the Department of 
Energy's Idaho National Laboratory that includes functional models of 
critical infrastructure equipment. This center provides hands-on 
training in a realistic, scenario-based environment. Since the 
program's inception, more than 14,000 professionals have received 
training through both classroom and web-based instruction.
    To execute its mission and lead a cohesive effort between 
Government and industry, the CSSP created two overarching initiatives: 
The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) 
and the Industrial Control Systems Joint Working Group (ICSJWG). The 
ICS-CERT, in coordination with the United States Computer Emergency 
Readiness Team (US-CERT), is an operational entity that responds to and 
analyzes control systems-related incidents, conducts analysis on 
vulnerabilities and malicious software, or malware, and disseminates 
cybersecurity guidance to all sectors through informational products 
and alerts. The ICS-CERT provides more efficient coordination of 
control system-related security incidents and information-sharing with 
Federal, State, and local agencies and organizations, the intelligence 
community, private-sector constituents including vendors, owner-
operators, and international and private-sector CERTS.
    The ICSJWG follows a structured approach supported by the NIPP 
Partnership Framework and the Critical Infrastructure Partnership 
Advisory Council to continue the successful efforts of the Process 
Control System Forum to accelerate the design, development, and 
deployment of more secure industrial control systems. This group held 
its inaugural meeting on March 25, 2009 and is comprised of industry 
representatives from both Sector and Government Coordinating Councils 
under the NIPP Partnership Framework. The ICSJWG will provide a vehicle 
for communicating and partnering across all CIKR sectors among Federal, 
State, and local agencies, and private asset owner-operators of 
industrial control systems. CSSP engages through the ICSJWG with 
several Federal agencies on the issues of cybersecurity and industrial 
control, which include matters impacting legacy electric grid 
technologies and the enabling technologies used to deploy the ``SMART 
GRID'' systems. Departments and agencies participating in the ICSJWG 
include the Army Corps of Engineers, Department of Agriculture, 
Department of Defense, Department of Education, Department of Energy, 
Department of Health and Human Services, Department of Justice, 
Department of State, Department of the Interior, Department of the 
Navy, Department of the Treasury, Department of Transportation, 
Environmental Protection Agency, Federal Aviation Administration, 
Federal Energy Regulatory Commission, Food and Drug Administration, 
National Institute of Standards and Technology, National Science 
Foundation, and the Nuclear Regulatory Commission as well as 
representatives from law enforcement (FBI, Secret Service) and the 
intelligence community.
    DHS identifies vulnerabilities and works with the vendors, owners, 
and operators of control systems to develop mitigation strategies 
tailored to their use and application in each of the critical sectors. 
There can be a gap between identification of a vulnerability and 
development of a vendor patch or full solution. To address this, the 
CSSP has developed a Vulnerability Management Process operated by the 
ICS-CERT, in conjunction with trusted partners, to identify interim 
mitigation and consequence management approaches. CSSP also engages 
with other Federal partners in this process--such as the Departments of 
Defense and Justice and the intelligence community--to address equities 
and mitigate risks as vulnerability identification, risk assessment, 
mitigation development, and promulgation of these mitigation efforts 
are advanced.
                               (nppd) fps
    Question 16a. The fiscal year 2010 budget request proposes the 
transfer of the Federal Protective Service (FPS) from Immigration and 
Customs Enforcement (ICE) to the National Protection and Programs 
Directorate, with level funding for FPS. FPS was previously transferred 
from the Government Services Administration (GSA) into DHS on March 1, 
2003; a move that brought with it a number of management and 
contracting issues, as well as budgetary shortfalls. Even prior to the 
transfer, GAO noted in a 2004 report that GSA could not collect 
sufficient funds through fees to pay for FPS security services and had 
to provide FPS with supplemental funding from the GSA Federal building 
fund in order to cover the FPS deficits. Once under DHS, the Office of 
the Inspector General repeatedly identified poor contract oversight as 
another major issue for FPS, and a major cause of FPS' budget problems. 
In hearings held by this committee and reports to congressional 
appropriators, FPS identified methods of cutting costs that revolved 
around increasing fees, reductions in its staffing, and reductions in 
the hours those Federal employees work, but not in a reduction of 
contract guards.
    Given that FPS has been plagued by problems with financial 
management throughout its time in the Department of Homeland Security, 
how does NPPD plan to address these issues?
    Question 16b. Does NPPD project FPS to run a budget deficit in its 
first fiscal year under NPPD?
    Question 16c. Does NPPD plan to continue cost-cutting measures for 
FPS? If so does NPPD plan to use the ICE model for cutting costs, or 
will it create its own plan to address the financial problems at FPS?
    Question 16d. Does NPPD have a plan for improving the contract 
guard procurement process?
    Answer. The National Protection and Programs Directorate (NPPD) is 
working with U.S. Immigration and Customs Enforcement (ICE) and the 
Federal Protective Service (FPS) to ensure FPS' critical operation and 
management functions continue without interruption during the 
transition. NPPD already uses ICE as its service provider for the 
accounting and financial system services. ICE will continue to provide 
these services to NPPD, and subsequently to FPS, if Congress approves 
its transition. NPPD is also evaluating FPS' processes and internal 
controls in the areas of budget and financial management. NPPD has 
already identified several improvements that will be implemented 
beginning in fiscal year 2010. Based on current cost and revenue 
projections, NPPD does not expect FPS to run a budget deficit next 
year.
    NPPD is evaluating the operating costs of FPS to identify areas 
where there is insufficient funding. NPPD is also studying where 
funding might be better utilized for improved operations. NPPD is also 
evaluating the FPS staffing and workforce composition to ensure that 
FPS has the appropriate level and mix of Federal staff and contractors. 
NPPD is not considering cutting FPS operational staff. NPPD has 
identified FPS billing and collections as an area that can be staffed 
more effectively to provide better customer service. Additionally, NPPD 
is reviewing the historical amounts of outstanding FPS collections to 
determine if the collections process can be improved.
    ICE and FPS are currently developing and implementing improvements 
in the areas of acquisition and contract oversight staffing, training, 
and policy development. ICE and FPS are also working on a number of 
standardization initiatives to address challenges in contract guard 
oversight and management. The proposed transfer of FPS to NPPD, if 
approved by Congress, will not delay or otherwise alter the steps 
currently being taken by ICE/FPS.
    In addition, DHS is conducting a major coordinated review regarding 
the way forward with FPS in light of the recent GAO report. The DHS 
review will be provided to Congress in the next several weeks.
                             (nppd) ip/rma
    Question 17. How are you expediting the security and suitability 
review process at NPPD? I hear that wait times for a clearance to be 
transferred can take as many as 6 months. Can Congress help expedite 
this process?
    Answer. The National Protection and Programs Directorate (NPPD) 
faces many challenges in the security and suitability clearance 
processes. While we have made progress in on-boarding Federal 
employees, we still face a large backlog of people we need to bring on-
board. However, we are working to increase the number of people 
assigned to the staffing process to expedite hiring. That said, work 
also remains to be done in reconciling the suitability process specific 
to the Department of Homeland Security (DHS) with the overall security 
clearance process. While this one instance of what NPPD is doing 
internally to accelerate the process, we are receiving assistance from 
DHS in improving the process.
    The Under Secretary for Management is also committed to working 
with NPPD to resolve these issues, and we continue to work together to 
coordinate our efforts. For example, we implemented a system wherein 
NPPD is responsible for the initial steps in the clearance process, 
including inviting the candidate to access the on-line system to enter 
required information and loading candidate information into the 
Integrated Security Management Systems (ISMS), the Office of Security's 
tracking database. This has shortened the timeline form the issuance of 
a tentative job offer to the entry of personal data into ISMS, which 
initiates the background investigation. Additionally, the Office of 
Security no longer requires original signatures before initiating a 
background investigation. This will shorten the time associated with 
mailing original signatures and improve timeliness of decisions. 
Collectively, these changes should significantly impact the wait times 
for a clearance.
    Question 18. In your testimony, you say that IP has ``[p]rovided 
physical security and risk data to 5,000 registered Homeland Security 
Information Network-Critical Sector (HSIN-CS) users responsible for 
critical infrastructure . . . .'' Our hearing on the Mumbai attacks in 
March revealed that DHS' response--in terms of outreach to the private 
sector--was hobbled and confused. Can you demonstrate the satisfaction 
of these users with HSIN-CS?
    Answer. The Mumbai attacked occurred over the Thanksgiving holiday 
weekend on November 26-29, 2008. During the Mumbai attacks, DHS 
provided the private sector incident-related documentation and reports 
via the Homeland Security Information Network--Critical Sectors (HSIN-
CS). HSIN-CS housed 26 documents related to the Mumbai attacks, 
including sector-specific vulnerability reports for the Transportation 
and Commercial Facilities sectors. Content also included post-incident 
analysis, protective measure reports, and future threat analysis. DHS 
posted the Office of Intelligence & Analysis' warning product, ``(U//
FOUO) Islamic Militant Group Attacks Multiple Locations in Mumbai, 
India'' on HSIN. Once a clear picture of the attacks emerged after the 
initial chaos, products such as the Technical Resource for Incident 
Prevention's (TRIPwire) ``Analysis of Mumbai Combined Arms Operation 
and Recommended Protective Measures'' were posted.
    As indicated in the graph below, during the week of the incident 
period (notably a holiday timeframe) stakeholders accessed HSIN-CS 
content 280% more (195 sessions/day) and remained on-line 86% longer 
(6.5 minutes) than is typical during a holiday. The length of a session 
reflects the user's interest in accessing relevant content. 

[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]


    The second graph below (HSIN-CS Daily Session Volume and Length: 
Nov 19-Dec 9 2008 Workdays) provides further context of HSIN-CS usage 
during the Mumbai attacks as compared to the weeks immediately before 
and after the incident.
    As not all private entities in the Commercial Facilities Sector are 
registered users of HSIN-CS, DHS communicates using a variety of 
methods. The Commercial Facility SSA directly contacted private sector 
partners in the immediate aftermath of the Mumbai attacks, in 
particular the Lodging Subsector. The Commercial Facility SSA urged 
private sector partners to review their protective posture and 
electronically re-distributed awareness tools such as the ``Active 
Shooter'' materials (booklet, poster, wallet cards). 
[GRAPHIC(S)] [NOT AVAILABLE IN TIFF FORMAT]

                            (nppd) us-visit
    Question 19. The committee understands that DHS has begun piloting 
two different biometric collection methods at airports for the US-VISIT 
program, one involving TSA at the checkpoint and the other using CBP 
officers at the gate. We are aware that the program has roughly $30 
million in carry-over monies to use for the pilots, but we are 
concerned it may need additional funds. If the pilots indicate that the 
CBP or TSA collection methods are optimal, will you have the funding 
necessary to implement biometric exit in fiscal year 2009 or fiscal 
year 2010?
    Answer. Approximately $28 million remains available from prior-year 
appropriations for testing technological solutions with pilot scenarios 
for the Biometric Exit project. The Department of Homeland Security 
(DHS) originally intended the collection of biometrics--with the costs 
involved--to be borne by the commercial carriers. DHS published this 
intent in a notice of proposed rulemaking (NPRM) in the Federal 
Register on April 24, 2009.
    Congress included a provision in the Consolidated Security, 
Disaster Assistance, and Continuing Appropriations Act, 2009, that 
restricted DHS from obligating US-VISIT funds for a final comprehensive 
air exit solution until additional tests were completed. US-VISIT 
conducted pilot tests with the Transportation Security Administration 
(TSA) at the security checkpoint in the Hartsfield-Jackson Atlanta 
International Airport and with U.S. Customs and Border Protection (CBP) 
at the boarding gate in the Detroit Metropolitan Wayne County Airport. 
After a review within DHS, the results of the CBP and TSA pilot tests 
will be reported to the House and Senate Appropriations Committees and 
reviewed by the Government Accountability Office. Both pilots began on 
May 28, 2009, and concluded on July 2, 2009--a period of 35 days.
    Based on the results of the pilots and comments to the NPRM, DHS 
plans to publish a final rule, tentatively scheduled for March 2010, 
which will direct the implementation of new biometric procedures for 
non-U.S. citizens departing the United States via airports and 
seaports.
    If DHS goes forward with a final rule implementing the solution as 
stated in the NPRM--that commercial air carriers and vessel carriers 
will collect and transmit biometrics--no further funding would be 
required to implement Air/Sea Biometric Exit. If the evaluation and 
analysis of the air exit pilots recommend selection of a Government-
operated option, such as CBP at the boarding gate or TSA at the 
security checkpoint, US-VISIT anticipates that additional funding will 
be required to implement such a recommended option. In that case, US-
VISIT needs to develop a new cost estimate to determine the amount of 
additional funds required.
    Question 20a. Last year's DHS appropriations bill required the 
Department to complete two biometric exit pilots at airports: (1) Where 
the airlines collect and transmit biometric exit data and (2) where CBP 
collects such information at departure gates. It is our understanding 
that the Department has yet to partner with any airline but that it has 
moved forward with the CBP pilot as well as an additional pilot 
performed by TSA personnel.
    What can you tell the committee about the exit pilots currently 
being performed by US-VISIT?
    Answer. US-VISIT conducted a pilot with Customs and Border Patrol 
(CBP) collecting biometrics at boarding gates at the Detroit 
Metropolitan Wayne County Airport in Detroit, Michigan, and another 
pilot with the Transportation Security Administration (TSA) collecting 
biometrics at a security checkpoint at the Hartsfield-Jackson Atlanta 
International Airport in Atlanta, Georgia. Both pilots began on May 28, 
2009, and concluded on July 2, 2009--a period of 35 days.
    CBP operated at the departure gate at Detroit Metropolitan Wayne 
County Airport. This pilot evaluated the operational impact of 
collecting biometric information from, and verifying the identity of, 
passengers at the departure gate before leaving the United States for a 
foreign destination. CBP collected biographic and biometric information 
from in-scope travelers near the departure gate. The biometric 
information collected consisted of electronic fingerprints: Either a 
right-hand, four-finger scan or two single-finger scans. The biographic 
information was collected from travel document information--such as 
name, date of birth, document issuance type, country, and document 
number--all of which are contained in the document's machine-readable 
zone of a machine-readable travel document.
    CBP used two different biometric collection devices during the Air 
Exit pilots: The 3M RT mobile passport and ID reader; and the portable 
Cross Match Guardian R Jump Kit. CBP used both collection devices to 
determine which device type would better serve the needs of its 
collection staff. CBP followed its established reporting requirements 
regarding the air carriers and processes to minimize interference with 
the air carrier boarding process.
    TSA operated at the security checkpoint at Hartsfield-Jackson 
Atlanta International Airport. This pilot evaluated the operational 
impact of collecting biometric information from, and verifying the 
identity of, passengers at TSA security checkpoints before leaving the 
United States. Those foreign passengers with an international 
destination were directed to an area within the checkpoint where the 
biographic and biometric information were collected. The biometric 
information collected consisted of two electronic single-finger scans. 
The biographic information was collected from travel document 
information--such as name, date of birth, document issuance type, 
country, and document number--all of which are contained in the 
document's machine-readable zone of a machine-readable travel document. 
TSA chose to use the 3M RT mobile passport and ID reader device for 
biometric collections.
    A total of 34,485 transactions were collected from May 28 to July 
1, 2009.\9\ CBP collected 10,903, and TSA collected 23,582. Passengers 
were compliant and familiar with the process because of their 
experience with biometric collection and verification at ports of entry 
upon their entry to the United States. The results of this test are 
currently under evaluation at DHS.
---------------------------------------------------------------------------
    \9\ The biometrics were collected from passengers through July 1; 
none were collected on July 2, 2009. The processing of the collected 
biometrics through US-VISIT systems continued through July 2, and the 
decommissioning of the devices was completed that day. Thus the air 
exit pilots began on May 28, 2009, and were completed on July 2, 2009.
---------------------------------------------------------------------------
    Question 20b. What progress has DHS made in addressing the air 
carriers' concerns?
    Answer. The Department of Homeland Security (DHS) officials reached 
out to the airline industry on numerous occasions to address its 
concerns and to identify potential partners for biometric air exit 
pilot efforts. Despite on-going US-VISIT discussions with the Air 
Transport Association and its member carriers, no airline volunteered 
to participate in the biometric exit pilot required by the fiscal year 
2009 DHS Appropriations Act. The airline industry made clear in many 
forums its concerns about DHS requiring the collection of biometrics by 
carriers.
    Question 20c. If DHS is unable to complete the air carrier pilot, 
what will be the Department's next steps?
    Answer. Based on the results of the exit pilot tests and the 
comments received from the notice of proposed rulemaking, DHS will 
determine which methodology for collecting biometrics best addresses 
the dual needs of security and facilitation. Once a solution is 
identified, DHS will publish a final rule and deploy the solution at 
the air and sea ports.
    Question 21. Secretary Napolitano's Southwest Border Initiative 
calls for the installation of license plate readers on outbound lanes 
throughout the southwest border. These readers will be instrumental in 
controlling the exit of smugglers attempting to move drugs, weapons, 
and cash out of the country and into the hands of the cartels. What 
role, if any, will US-VISIT play in gathering and analyzing the exit 
information that is collected from the license plate readers?
    Answer. US-VISIT does not play any role in gathering or analyzing 
the exit information that is collected from the license plate readers. 
The US-VISIT Arrival and Departure Information System (ADIS) is a 
person-centric system.
    ADIS does not receive license plate reader information from U.S. 
Customs and Border Protection (CBP). However, ADIS is currently in a 
planning stage for creation of an interface this year with TECS, a CBP 
database to receive Western Hemisphere Travel Initiative/Vehicle 
Primary information.
  Questions From Chairwoman Sheila Jackson Lee for Gale D. Rossides, 
      Acting Administrator, Transportation Security Administration
    Question 1. The fiscal year 2010 request for air cargo security 
programs is less than the enacted fiscal year 2009 amount. Can you 
please explain this reduction in light of the upcoming August 2010 100% 
cargo screening deadline for cargo on passenger aircraft?
    Can you describe how the budget is changing with respect to the 
number of inspectors, as well as the resources being allocated to 
certify shippers' screening facilities?
    Answer. The fiscal year 2010 budget submission was built on the 
fiscal year 2009 enacted appropriation, which included a one-time 
increase of $18 million to expand air cargo screening technology 
pilots. The $18 million increase was not mandated to recur in the 
fiscal year 2010 budget. As a result, the fiscal year 2010 request of 
the Transportation Security Administration (TSA) was lower than its 
fiscal year 2009 enacted budget. The funds requested for fiscal year 
2010 are adequate for TSA's current initiatives. Currently, TSA's 
workforce of 450 Transportation Security Inspectors for Air Cargo (TSI-
C) cover air cargo operations at 121 main hub airports and their spoke 
operations. These inspectors provide inspection oversight, respond to 
air cargo related incidents, provide outreach and industry support, and 
conduct investigations into violations of security programs and 
regulations for 1,500 domestic and international carriers operating in 
the United States, and over 10,000 indirect air carriers. Considering 
the current number of regulated entities, TSA has adequate resources 
for fiscal year 2010.
    TSA expects to issue an interim final rule this fall to meet the 
2010 statutory deadline. The rule is expected to increase the number of 
regulated entities by approximately 8,000 as TSA certifies additional 
cargo screening facilities. It is important to note that it will take 
time to certify these facilities. After certification of all new 
regulated entities and upon full implementation of the Certified Cargo 
Screening Program (CCSP) in 2011, the current number of TSI-C will be 
re-evaluated to determine if additional TSI-C are needed to continue 
their current air cargo oversight mission as well as oversee the new 
CCSP program.
    Question 2. In light of significant delays in issuing regulations 
and processing grant awards and applications, combined with the 
imbalance of expertise in surface transportation modes compared with 
aviation, why were there no funding or FTE increases requested for 
``Surface Transportation Security Operations and Staffing''?
    Answer. The fiscal year 2010 budget request for the Transportation 
Security Administration (TSA) for surface transportation security 
includes an increase of $64,985,000 and 192 Full-Time Equivalents (FTE) 
over the fiscal year 2009 enacted levels for surface transportation 
security. The request includes a funding increase of 25 percent for 
``Surface Transportation Security Operations and Staffing'', and would 
substantially expand TSA's field expertise in surface transportation 
security and capability to conduct joint security augmentation 
operations in the surface modes. Of the proposed increase, $50 million 
will be used to support an additional 15 Visible Intermodal Prevention 
and Response (VIPR) teams (comprised of 169 FTEs) to enhance the 
security of the Nation's surface transportation modes. The teams will 
be dedicated to conducting VIPR operations. In addition, the fiscal 
year 2010 budget request annualizes increases in the fiscal year 2009 
surface transportation security appropriation made to further implement 
the 9/11 Act requirements. This includes the increase of 50 additional 
surface transportation security inspectors, and additional funding for 
exercises with surface transportation providers.
    The responsibility for processing grant awards and applications 
relating to the Transit Security Grant Program (TSGP) lies with the 
Federal Emergency Management Agency, Grant Programs Directorate (GPD). 
GPD received funding in FEMA's fiscal year 2009 budget to hire 
additional FTEs. GPD is in the recruitment and selection process and 
plans to triple the size of staff managing this program by the end of 
the current fiscal year.
    Question 3a. Last year, Assistant Secretary Hawley discussed 
Checkpoint Evolution as TSA's new way of modernizing checkpoints across 
airports. This initiative was started at the end of the previous 
administration. Outside of BWI, it does not appear that many of the 
elements have been implemented at other airports. What is the status of 
Checkpoint Evolution?
    Has it been implemented across all airports?
    Question 3b. What elements of Checkpoint Evolution provide TSA with 
metrics by which to measure enhanced security at airports?
    Answer. Checkpoint Evolution was the term used to brand the 
approach to aviation security that the Transportation Security 
Administration (TSA) is implementing at airports across the country. 
While TSA included many discreet elements at Baltimore/Washington 
International Thurgood Marshall Airport (BWI) to accomplish as part of 
a security strategy, TSA is continuing many elements to evolve and 
enhance our security performance by developing our officers and 
leaders, fielding new technology, and adjusting the approach to 
deploying these assets to evolving threats.
    The installation at BWI included a range of security elements, many 
of which have been developed for Nation-wide deployment. The following 
reports on the implementation of those elements throughout the TSA 
screening workforce:
   Enhancements for Employees:
    Over a 6-month period ending in April 2009, two training courses, 
        developed to improve security and increase engagement with 
        passengers, were given to the more than 50,000 front-line TSA 
        employees. The response to the training classes called ENGAGE! 
        and COACH! was overwhelmingly positive as officers leveraged 
        their experience and used newly developed skills to calm down 
        unruly travelers at checkpoints and better detect those with 
        hostile intent.
    TSA has also improved the career development and employment of our 
        Transportation Security Officers (TSOs) by increasing the 
        Behavior Detection Officers (BDO) program, fully implementing 
        training programs, and incorporating passenger engagement as 
        part of our mandate to verify travel documents, which we 
        assumed from the airlines. When officers demonstrate attentive, 
        interactive, and appropriate command presence, a passenger's 
        common, natural anxieties associated with the screening 
        experience are calmed. Passengers who have hostile intent see 
        engaged interactions as a threat to their goals, making their 
        behaviors stand out and easier to detect by officers trained to 
        spot anomalies. Engaged TSOs present a far more formidable 
        opponent to those with harmful intent than technology and 
        process can offer alone. TSA is also using our field 
        intelligence officers, shift briefings, and other communication 
        approaches to enable TSOs to perform their jobs efficiently and 
        effectively.
    As we make strides to improve the professionalism of our officers, 
        one aspect of that effort has been the conversion to new 
        uniforms on September 11, 2008. These uniforms were developed 
        to enhance the professional appearance of the screening 
        workforce and to recognize their vital role in securing the 
        Nation's commercial aviation system.
    TSA continues, through passenger feedback and surveys, to evaluate 
        impact and public perceptions of security measures and officer 
        performance. These internally and independently executed 
        measures will provide additional information on security impact 
        to which Evolution enhancements are a contributor.
   Enhancements to Process:
    One element of the Evolution training was to empower the TSOs to 
        use their experience and intelligence-driven intuition to 
        mitigate the threat by utilizing additional screening 
        techniques described in the standard operating procedure (SOP) 
        or by involving other members of their security network. This 
        empowerment of critical thinking by the front-line officer is a 
        key element of the dynamic security at the heart of Evolution.
   Enhancements to Technology:
    Additional technology solutions, such as imaging technology and 
        Advanced Technology X-Ray were part of the BWI installation and 
        continue to be rolled out at airports Nation-wide. Technology 
        to help identify fraudulent documents was also deployed at the 
        Travel Document Checker position. TSA has piloted and is now 
        prepared for Nation-wide deployment of ``wireless whisper'' 
        radio communications equipment to airport checkpoints. This 
        technology will improve officer communication capabilities and 
        reduce the background noise levels, allowing for enhanced 
        threat detection and improved security. TSA also continues to 
        pilot new technologies that enhance security and improve 
        passenger movement through checkpoints, including mobile 
        boarding pass scanners.
   Security Metrics:
    Completion and measured reinforcement of ENGAGE! training and 
        principles should be viewed as a predictive measure for 
        employee engagement and security effectiveness. Training 
        completion rates and reinforcement efforts are actionable items 
        that address known symptoms of security performance and 
        effectiveness. Though they are lagging indicators, survey 
        ratings, standardized performance assessments, ASAP results, 
        Red Team results, TIP scores, absentee rates, attrition rates, 
        numbers and types passenger complaints, numbers and types of 
        Ombudsman contacts, numbers and types of disciplinary actions, 
        numbers of behavior-initiated detections or security incidents, 
        etc., can all be influenced by the delivery and application of 
        ENGAGE! training and the consistent reinforcement of its 
        principles. The principles taught in the Evolution training 
        address the root causes of issues in all the lagging indicators 
        listed above. Compliant delivery of Evolution training and 
        principle reinforcement is a high-impact driver of performance 
        in all aspects currently evaluated with lagging indicators.
    TSA continually adapts to stay ahead of the threat. Other specific 
initiatives include:
   Capturing best practices by aggregating successful ideas for 
        training sustainment and distributing them to other airports 
        Nation-wide;
   Utilizing employee surveys, to determine the degree to which 
        Evolution training principles have been adopted by the 
        workforce; and
   Tracking of technology deployment, which will lead to 
        enhanced detection and improved security.
    Question 4. Please provide detail on the Secure Flight program 
implementation. There is very little in the budget request on this 
program, and the subcommittee would like assurance that TSA is 
budgeting appropriately for this program, as it should be completely 
implemented in fiscal year 2010.
    Answer. The Transportation Security Administration (TSA) is pleased 
to report that Secure Flight implementation is currently underway and 
the fiscal year 2010 budget request contains sufficient funds to 
continue its implementation. Initial deployment began in late January 
2009 with four aircraft operators. TSA continues to follow a structured 
implementation plan that systematically adds additional aircraft 
operators and flights as the program stands up in order to limit risk. 
Domestic implementation is scheduled to be completed by the end of the 
first quarter of calendar year 2010. International implementations will 
begin in late calendar year 2009 and are scheduled to be completed by 
the end of calendar year 2010. The fiscal year 2010 Secure Flight 
budget request supports the schedule of implementation activities 
during that period. Those activities include coordinated implementation 
with aircraft operators by government and contractor staff, operation 
and maintenance of the Secure Flight system/Secure Flight Service 
Center, and support for the Secure Flight IT systems development. They 
also include funding to support the high standards of privacy, 
security, Independent Validation and Verification, and other program 
management services required by the program. Aircraft operators covered 
by the Secure Flight final rule are required to modify their systems 
and procedures to send and receive Secure Flight passenger data within 
scheduled time frames that are keyed to the Secure Flight 
implementation schedule. There is no mandate to completely implement 
Secure Flight in fiscal year 2010. The TSA PLAN is to complete 
implementation by calendar year 2010 which the Secure Flight fiscal 
year 2010 budget supports.
    Question 5a. According to GAO, the DHS Inspector General, and 
multiple stakeholders, the role, purpose, and activities of the VIPR 
program with respect to surface modes are ambiguous and often poorly 
communicated to relevant transit agencies. With the exception of 
surface inspectors, each of the components named in your written 
testimony has little to no role or expertise in securing surface modes. 
In fact, the program is housed and managed by an aviation security 
component, comprised almost totally by aviation security personnel, and 
lacks any defined objectives or meaningful performance measures 
specific to surface modes. Accordingly:
    Please explain in detail how TSA determined that allocating 
virtually the entire increase in funding and FTEs for surface 
transportation security to the VIPR program is the best way to maximize 
these security resources, given the severe backlog of transit security 
grant awards and overdue regulations, as well as an understaffed 
surface inspection program.
    Question 5b. Please explain how such an allocation of resources is 
consistent with a risk-based strategy for securing surface 
transportation systems and facilities.
    Question 5c. Please explain the delay in submitting to the 
Committee on Appropriations the report on performance standards and 
resource allocation for the VIPR program, as required in the report 
accompanying the fiscal year 2009 Appropriations Act, and provide 
information on the status of that report.
    Answer. The requested additional funding will specifically address 
the inherent vulnerabilities of our Nation's surface transportation 
systems and better position the Transportation Security Administration 
(TSA) to more readily and proactively perform its surface security 
mission as outlined in the 9/11 Act. With the requested funding, TSA 
plans to add an additional 15 Visible Intermodal Prevention and 
Response (VIPR) teams to be based in strategic locations throughout the 
country. Each of the dedicated teams will support a distinct region, 
which include airports and other transportation venues. This will allow 
the teams to be cognizant of their respective regional needs for 
enhanced security and law enforcement operations within the entire 
transportation domain, while allowing them to be scalable and flexible 
to respond and surge based on on-going threat streams. The full 
complement of dedicated VIPR Teams (25) will focus their efforts in the 
surface modes of transportation, consistent with the Secretary's vision 
for transportation security.
    Working with the TSA's Office of Intelligence, the VIPR Program 
develops intelligence-driven deployment plans based on credible threat 
intelligence. Through the use of risk management principles, VIPR teams 
are deployed to implement flexible and nimble security operations at 
high-risk transportation assets. Utilizing the Department of Homeland 
Security (DHS) Risk Analysis Model, VIPR teams are deployed to surface 
and aviation modes to implement security operations at high-risk 
transportation sites. To date, the primary focus of these efforts has 
included the Focus 40 Airports (Category X and Category I), the 
identified 60 High Threat Urban Areas and the 20 High Threat Maritime 
Cruise Ship Ports.
    VIPR teams provide a tool with unique capabilities to the 
transportation system. Deterrent effect is best achieved through 
development and implementation of a joint plan for unpredictable 
deployment of varying force packages at differing times and locations. 
VIPR teams also augment security during periods of heightened threat as 
well as during special events, such as political conventions, major 
sporting events, and other occurrences of national or regional 
significance that raise security concerns. Use of VIPR teams in this 
manner builds a trained and tailored security augmentation capability 
for deployment in periods of heightened threat or in response to 
security incidents.
    VIPR teams are deployed through deliberate planning using a risk-
based approach to work with Federal, State, and local security and law 
enforcement officials for the purpose of augmenting resources in 
response to an intelligence-driven threat or to provide a deterrent 
presence. The program optimizes the ability to leverage a variety of 
resources quickly to supplement local aviation, passenger rail, cruise 
line and mass transit agency security capabilities.
    VIPR allows TSA to respond quickly to unplanned or incident-driven 
events and execute its response and recovery capabilities. Most VIPR 
team activities are scheduled in advance to cover high-risk 
infrastructure, address intelligence-driven threats or support special 
event operations. These core elements dictate VIPR deployments across 
transportation sectors.
    Although TSA recognizes that additional work is needed to complete 
hiring of its Transportation Security Inspector workforce, TSA's Office 
of Security Operations has been moving aggressively to perform the 
necessary recruitment. As planned, all inspector positions will be 
filled in fiscal year 2010 and these positions will be working as an 
integral component of VIPR deployment operations. TSA is also working 
with the Department and key stakeholders to address regulatory and 
grant management issues to provide additional security and efficiencies 
to the surface transportation domain.
    Although earlier reports generated by Government Accountability 
Office and DHS Office of Inspector General have detailed issues 
regarding planning and execution of VIPR operations in collaboration 
with transportation stakeholder/partners, TSA has made great inroads 
with transportation stakeholder/partners all across the Nation and 
provides the bridge to all key components for VIPR operations. There 
have been over 1,600 VIPR operations conducted in the surface modes 
since inception. TSA now enjoys a robust relationship with its 
stakeholders/partners, State, local and international due to the proven 
capabilities that it brings to the enhancement of security and law 
enforcement capabilities at all transportation modes.
    Transportation stakeholder/partners have reacted positively to the 
VIPR concept and often request TSA to augment their forces. TSA 
provides proactive public affairs information in locations were VIPR 
operations occur.
    The fiscal year 2009 report to Congress regarding VIPR deployment 
and performance measures was recently submitted to the Senate and House 
Appropriations Committees on June 25, 2009.
    Question 6. Earlier this year, GAO released a classified technology 
report highlighting some of the certification and deployment challenges 
faced by TSA regarding checkpoint technology. The report indicated 
that, since 2003, over $700 million has been invested in the 
development, procurement, and deployment of checkpoint technologies. 
What mechanisms are in place to ensure that adequate investments are 
made in technologies and that proper and timely certification, 
procurement, and deployment of checkpoint screening technologies are 
carried out by TSA?
    Answer. The Transportation Security Administration (TSA) has 
developed a comprehensive Passenger Screening Program (PSP) that 
encompasses a collection of threat detection devices and projects in 
various states of exploration, development, and deployment based on 
commercial availability and program requirements. The program has a 
mixed lifecycle of technology to include legacy systems, systems in the 
process of deployment, and future systems that are undergoing testing 
and evaluation. The program focuses on deploying screening equipment 
with improved detection capabilities in addition to the lifecycle 
maintenance and replacement of existing (legacy) locations and 
equipment.
    PSP continues to use a sound methodology to procure new emerging 
technologies. As a requirement of the Department of Homeland Security 
(DHS) Acquisitions Directive (AD) 102, projects are required to 
generate Life Cycle Cost Estimates (LCCEs) based on known and estimated 
costs that are presented at prescribed instances, known as Acquisition 
Decision Events (ADEs), to the proper reviewing authority along with 
documentation displaying the benefits of the technology. On an annual 
basis, the PSP participates in both TSA and DHS Acquisition Review 
Boards to review specific project costs and benefits.
    The Program works with the respective stakeholders to develop a 
tailored plan for each project that identifies primary objectives, 
risks, as well as schedule and execution strategies for the procurement 
and deployment of technology. To that end, the PSP must be flexible and 
able to adapt quickly to changes in terrorist tactics. The PSP strives 
towards optimizing technological investments based on thorough analysis 
and risk management principles, as well as the collaborative testing 
and evaluation of new technologies.
    The PSP has implemented a formal testing process as documented in 
our Test and Evaluation Master Plan (TEMP), which establishes a 
framework of the testing processes followed for all PSP technology 
investments to ensure products meet specifications, are safe and are 
operationally effective. TSA is in the process of improving the already 
robust Testing and Evaluation (T&E) paradigm to ensure that operational 
effectiveness and suitability of candidate security technology systems 
are evaluated prior to deployment. Employing the concept of independent 
and integrated testing and evaluation in support of acquisition 
decision events and other program reviews, this process leverages data 
from multiple developmental and operational testing sources, accredited 
vendor data, modeling and simulation, and other special analyses (as 
required), in accordance with testing and evaluation and systems 
engineering principles and best practices, to streamline testing and 
evaluation requirements while still providing a credible and 
comprehensive evaluation product.
    The deployment team has been increased and structured into a 
regional paradigm with specialized knowledge of each respective region 
and the attendant airport requirements for permitting and other 
deployment logistics. Deployment Planning and Execution is organized 
across three regional areas (East, Central, and West). The deployment 
process makes use of the integrated product team (IPT) approach to 
develop strategies, monitor overall performance and achieve deployment 
program goals.
    Question 7a. On June 2, 2009, committee staff received an 
announcement from TSA indicating that TSA is ``currently denying air 
service by Delta to Nairobi and Monrovia until security standards are 
met or security threat assessments change.'' What steps did TSA take to 
reach this decision?
    Did you engage Delta throughout your decisionmaking process?
    Question 7b. When was Delta informed of your decision to deny air 
service to Nairobi and Monrovia?
    Answer. The Transportation Security Administration Representative 
(TSAR) for Africa and a team of TSA inspectors completed a 
comprehensive security assessment of Roberts International Airport 
(ROB) in Monrovia, Liberia and Jomo Kenyatta International Airport 
(NBO) in Nairobi, Kenya. TSA also conducted a Man Portable Air Defense 
Systems (MANPADS) Assistance Visit of NBO and worked with the U.S. 
intelligence community to develop a full understanding of the terrorist 
threat to civil aviation in Africa.
    Upon completion of these initial airport assessments of NBO and 
ROB, the TSA Office of Global Strategies (OGS) led a TSA Integrated 
Product Team (IPT) that included representatives from TSA's Offices of 
Intelligence (OI), Law Enforcement/Federal Air Marshal Service (OLE/
FAMS), Transportation Sector Network Management (TSNM), and Chief 
Counsel (OCC), to ensure that a thorough evaluation of security 
conditions was performed, training and assistance provided, and 
additional security measures implemented, as appropriate.
    TSA is continuing to work with the Liberian Civil Aviation 
Authority to assist it in achieving compliance with international 
security standards, and with the Kenyan Civil Aviation Authority to 
address identified security vulnerabilities and implement mitigating 
measures. TSA will reassess the situation at ROB and NBO as appropriate 
measures are implemented.
    TSA actively engaged Delta Air Lines representatives throughout the 
decision-making process. TSA OGS senior leadership met with Delta Air 
Lines corporate senior security officers on several occasions at TSA 
Headquarters, including on December 11, 2008, January 6, 2009, April 2, 
2009, and April 30, 2009.
    TSA's decision to deny Delta's proposed air service to NBO and ROB 
was communicated to Delta Air Lines on June 1, 2009, based on TSA's 
determination that security was not yet adequate to allow these 
airports to be served. On April 2, TSA briefed Delta Air Lines on the 
observations made by the security inspectors at ROB, and on April 30, a 
similar briefing was provided to Delta regarding the observations made 
by the security inspectors at NBO. During each of these meetings, TSA 
advised Delta Corporate Security officers that while a final decision 
would be made by TSA's Acting Assistant Secretary, in consultation with 
Secretary Napolitano, the TSA IPT was recommending that Delta not 
initiate service to ROB or NBO due to identified security deficiencies 
and/or assessed security concerns.
    Question 8. DHS, and specifically TSA, has had significant 
challenges in its acquisition process, notably in the Secure Flight 
Implementation, Business Operation (IBO) program, and the Information 
Technology Infrastructure Program (ITIP). What steps have you taken to 
ensure that TSA is progressing and improving its acquisition process to 
ensure that procurements are done efficiently and competitively, and 
that there is integrity in the process?
    Answer. The Transportation Security Administration (TSA) has 
confronted many acquisition challenges since its founding only 7 years 
ago. However, TSA takes competition and the integrity of its 
procurements very seriously. The Secure Flight Implementation and the 
Business Operation (IBO) and Information Technology Infrastructure 
Program (ITIP) are competitively awarded procurements. They represent a 
significant advancement and evolution in acquisition strategy. For 
example, the ITIP effort evolved into a performance-based service 
acquisition, in which the scope of the predecessor contract was 
separated into multiple fixed-priced acquisitions instead of a time and 
materials contract. While difficult and challenging, this strategy 
provides for better performance measurement, and the ability to 
incorporate best industry practices.
    TSA has made significant strides to establish processes and 
procedures to ensure consistent, efficient, and effective acquisitions. 
TSA exceeded the competition goal established by the Department of 
Homeland Security Chief Procurement Officer by awarding 71 percent of 
all contract dollars on a competitive basis. In fiscal year 2008, TSA 
awarded 1,100 contracts and only 12 protests were submitted to the 
Government Accountability Office. Also, TSA awarded over 20 percent of 
all contract dollars to small businesses. All of Tier 1 and 2 (TSA's 
largest programs) have certified Program Managers and Contracting 
Officer's Technical Representatives. TSA has pursued several 
initiatives to improve the acquisition process including: (1) 
Implemented several initiatives to ensure the TSA acquisition workforce 
has the appropriate skills; (2) completed an exhaustive lean six sigma 
effort to identify, document, and improve the efficiency and 
effectiveness of acquisition processes; (3) instituted a phased review 
program, in which procurements are reviewed prior to solicitation and 
award and after execution; and implemented an aggressive small business 
program which has produced marked improvement in awarding contracts to 
small business.
                             (tsa) aviation
    Question 9a. Earlier in the Congress, the House unanimously passed 
H.R. 559, FAST Redress Act of 2009. The legislation required the 
Department of Homeland Security to develop a ``comprehensive cleared 
list'' which will enhance the overall efficiency and effectiveness of 
the DHS Traveler Redress Program. The President's budget has requested 
$1.3 million and 1 FTE for the management of the program.
    How will the additional funding and staffing allocation improve the 
overall effectiveness of the program?
    Question 9b. Additionally, the President's budget discusses the 
``centralization of the DHS TRIP processing system''; could you please 
expand on what this ``centralization'' entails and how it will work 
with Secure Flight in the future?
    Answer. The Department of Homeland Security (DHS) Travel Redress 
Inquiry Program (DHS TRIP) serves as the centralized U.S. Government 
customer service office for traveler-related redress concerns. While 
the program office has made substantial progress in establishing a 
robust redress process, it can enhance performance further through 
centrally automating key process functions--such as inquiry intake, 
routing, vetting, tracking, reporting, and response. The objective is 
to gain operational efficiencies and to reduce the overall time 
required to process traveler requests. The fiscal year 2010 budget will 
accomplish this objective through investing in DHS TRIP technology and 
staffing capabilities.
    DHS plans to direct over half of the requested funding toward 
Information Technology (IT) improvements for DHS TRIP through an 
enhanced case management system. This case management system will 
leverage lessons learned since the launch of DHS TRIP in February 2007 
to centralize and improve inquiry intake, routing, tracking, reporting, 
and response functions. DHS plans to direct the remaining funding and 
its staffing allocation to develop and implement additional 
enhancements (i.e., call center support and an improved vetting 
process) that will strengthen customer service. These investments will 
also allow DHS to expand redress support to non-travel related 
watchlist vetting programs in the Department, supporting DHS's 
objective of reusing redress results across vetting programs.
    These IT improvements will allow programs such as Secure Flight to 
use the results of the redress process more effectively to reduce 
occurrences of misidentifications during vetting. DHS TRIP currently 
provides a listing of cleared individuals to the airlines and to Secure 
Flight to assist in the watch list matching process. This cleared list 
contains individuals for whom the redress process has determined are 
not on the watch list but may be prone to misidentification due to the 
similarity of their names and biographic information to records in the 
watch list. Once the new DHS TRIP IT system is implemented, Secure 
Flight (as well as other DHS vetting programs) will benefit by 
receiving automated inquiry updates of cleared individuals on a more 
frequent basis and in a more efficient format. As a result, DHS can 
better prevent future inconveniences to misidentified travelers.
    Question 10a. Throughout meetings between committee staff and TSOs, 
a number of concerns have been raised on TSA's ability to provide 
adequate training for all TSOs who may need recurrent training on 
certain technologies at checkpoints. Additionally, TSOs indicated that 
very few of them were cross-trained to serve in more than one position 
at an airport checkpoint.
    How is TSA able to verify that appropriate recurrent training is 
made available to TSOs who need it at any given time?
    Question 10b. Additionally, does TSA cross-train TSOs to be able to 
serve multiple positions at checkpoint? If so, what percentage of TSOs 
is trained to serve multiple locations at a checkpoint?
    Answer. The Transportation Security Administration (TSA) has 
established an annual National Training Plan. Specific recurrent 
security training courses are loaded into the learning plans of all 
Transportation Security Officers (TSO) on the On-Line Learning Center 
(OLC). TSOs are required to complete this training to ensure they 
maintain proficiency of skills learned during basic training. 
Additionally, the recurrent courses are designed to keep the workforce 
up-to-date with procedural changes; build upon existing skills and 
abilities, new technologies introduced into the screening operations; 
equipment used by the TSOs in the performance of their duties; and, new 
threat items. Recurrent training is available via web-based training on 
the OLC, through instructor-led classes, and hands-on training at the 
checkpoint. Additional training can be assigned to TSOs by the field 
training staff to target TSOs' individual training needs (e.g. X-Ray 
Image Interpretation).
    All TSOs must participate in an Annual Proficiency Review to ensure 
that they meet the qualifications and performance standards required to 
perform their duties as set forth under the Aviation and Transportation 
Security Act (ATSA). TSOs are certified annually based on their overall 
annual performance as defined by the Performance Accountability and 
Standards System (PASS). One of the components of PASS is that TSOs 
must complete all assigned training. Training is recorded and tracked 
through the OLC.
    TSOs are trained to perform checkpoint screening functions, checked 
baggage functions or both. TSA does not have multiple positions at the 
checkpoint, but multiple functions. TSOs rotate and perform the various 
functions. Upon successful completion of Basic Screener Training and 
On-the-Job Training, as well as achievement of passing scores on all 
tests associated with this training, 100 percent of the TSOs certified 
to perform checkpoint screening functions can perform each of those 
functions, therefore, no cross-training is required.
    The TSO workforce is comprised of 16,980 TSOs who can perform all 
checkpoint screening functions; 5,626 TSOs who can perform checked 
baggage screening functions, and 23,753 TSOs who can perform both 
checkpoint and checked baggage functions.
    Question 11. Last year, Assistant Secretary Hawley discussed 
Checkpoint Evolution as TSA's new way of modernizing checkpoints across 
airports. This initiative was started at the end of the previous 
administration. Outside of BWI, it does not appear that many of the 
elements have been implemented at other airports. What is the status of 
Checkpoint Evolution, has it been implemented across all airports? What 
components in Checkpoint Evolution provide TSA with metrics in which to 
measure enhanced security at airports?
    Answer. Response was not received at the time of publication.
    Question 12. So much of the aviation security budget is geared 
towards passenger checkpoint and baggage screening. Please provide us 
with an explanation as to how the agency will balance the need to 
quickly roll out new technologies against the realistic budgetary 
constraints that force TSA to prioritize how new checkpoint and baggage 
screening equipment is allocated at airports.
    Answer. The Transportation Security Administration's (TSA) 
Passenger Screening Program (PSP) has been aggressively engaged in the 
national deployment of new technologies at the screening checkpoint. 
The defined strategy of deploying to high-risk, high-volume airports is 
used to prioritize and determine when each airport will receive the new 
technology. PSP has gained and implemented a host of best practices 
from the recent deployments of Advanced Technologies (ATs) and 
passenger imaging technologies. The preparations for the accelerated 
deployments have been predicated upon these best practices. The 
deployment team has been increased and structured into a regional 
approach with specialized knowledge of their region and the various 
airport requirements for permitting and other deployment logistics. 
There has been dedicated space identified at the Technology System 
Integration Facility for the swift and massive undertaking to provide 
daily monitoring and teaming of the upcoming deployments. Site designs 
are already in the process of being drawn up in anticipation of the 
accelerated deployments thereby shortening the time required to plan 
and install. Finally, there is a streamlining of the contract vehicle 
for deployments with the single systems integrator contract currently 
under competition.
    Question 13. In fiscal year 2010, for Explosives Detection Systems 
(EDS) purchase and installation there is $250 million in mandatory 
spending from the 9/11 Act, $856 million for discretionary spending in 
the fiscal year 2010 budget request, and also $700 million in Recovery 
Act funding. Can you please give the committee a perspective on how 
this money will be allocated and prioritized in deploying these systems 
at airports Nation-wide?
    Answer. The additional funding from the American Recovery and 
Reinvestment Act and fiscal year 2010 budget request will enable the 
Transportation Security Administration (TSA) to accelerate its 
implementation of the Electronic Baggage Screening Program (EBSP). As 
stated in the American Recovery and Reinvestment Act (ARRA) expenditure 
plan, the additional $700 million will shorten the timeline of full 
optimal system deployment by up to 2 years. The initial ARRA spend plan 
included 16 EDS aiport projects to receive the first infusion of ARRA 
funds. Per congressional direction, quarterly updates addressing ARRA 
spend plan changes and fiscal year 2009 appropriation changes will also 
be submitted to Congress.
    Funding considerations for the EBSP include: Program Operations and 
Management (O&M), previously committed multi-year agreements for 
facility modifications, purchase and install of explosives detection 
systems equipment, new terminals, compliance, fulfilling existing 
agreements, equipment for new projects, new funding for facility 
modifications, and technology/engineering initiatives. In developing 
the spend plan, TSA first considers the funding needed to keep the 
organization operating--the Program O&M costs. Next, TSA identifies the 
funding required for previously committed multi-year agreements. Then 
funding is identified for the purchase and installation of this 
equipment to fulfill existing agreements, equip new terminals, address 
compliance issues, and include new projects not requiring facility 
modifications. TSA tries to accommodate all of these projects since 
they are required for 100 percent compliance of the requirement to 
screen all checked baggage for explosives, fulfilling previous 
agreements, equipment-only requests, and new terminal operations. With 
any remaining funds, TSA will prioritize facility modification requests 
and balance those with technology and engineering initiatives for 
system improvements and cost management opportunities.
    Question 14. The overall number of Transportation Security Officer 
FTEs remains about the same in the fiscal year 2010 budget request as 
in previous years with just under 46,000 personnel. At the same time, 
more of these FTEs are performing specialized functions such as 
Behavioral Detection and Travel Document Checking. Please explain how 
you determine what the right amount of passenger and baggage screeners 
is for the current volume of passenger traffic, and how shifting more 
personnel into other specialized security roles impacts traditional 
passenger and baggage screening.
    Answer. The Transportation Security Administration (TSA) utilizes a 
discrete event simulation commonly known as the Staffing Allocation 
Model to determine base staffing requirements for baggage and passenger 
screening activities. The inputs for this model includes multiple 
variables such as an airport's physical configuration, flight 
schedules, passenger volumes, and type and number of screening 
equipment on hand. This level of detail ensures staffing allocations 
are molded to the demand and are sufficient to cover all operations. 
Furthermore, field engineers and workforce utilization experts conduct 
routine analyses to verify that the model inputs remain accurate 
throughout each year. Shifting personnel into specialized security 
roles has no adverse effect on the traditional passenger and baggage 
screening, and improves our overall security posture. TSA has become 
more efficient in its utilization of resources and technology. The 
shifting of resources was not done at the expense of passenger and 
baggage screening, but rather as a result of increased efficiencies 
identified through the use of advanced technologies along with improved 
resource utilization.
    Question 15. The fiscal year 2010 budget contains a modest increase 
over last year's enacted amount for Transportation Security Officer 
training programs. Please highlight where TSA intends to focus with 
respect to allocating training resources. Can you say that TSOs have 
access to appropriate facilities at work to participate in training? 
Have you heard any complaints from the TSO workforce about training 
issues, and if so, have there been any corrections or improvements made 
in this area?
    Answer. With the rapid pace of change and implementation of new 
concepts, demographic challenges, and enabling technologies, the 
Transportation Security Administration (TSA) constantly seeks to 
improve ways to help the security workforce be successful on the job 
with the right knowledge and skills. Therefore, acquiring and using 
emerging technologies and innovative ways to deliver training is 
critical to the success of the mission.
    We recognize that training space constraints continue to be a 
challenge, and we continue to provide off-site space to address space 
restrictions at many airports. Although Transportation Security 
Officers (TSOs) may not have immediate access to training at the 
checkpoints, appropriate facilities are available at every airport for 
TSOs to complete training.
    Question 16. There is a modest increase in the fiscal year 2010 
budget request for Aviation Regulation that includes the inspection 
programs for international programs, repair stations, and the canine 
training program. Given the upcoming cargo-screening mandate, can you 
say that the regulatory programs are adequately resourced?
    Answer. The fiscal year 2010 budget request by the Transportation 
Security Administration (TSA) provides adequate regulatory oversight 
resources to screen 100 percent of passenger cargo originating at U.S. 
airports.
    Question 17. The budget very briefly states in the Tort Claims 
section that TSA screens over 50 million bags per month and reimburses 
passengers that have experienced baggage loss or damage due to TSA 
negligence. Please describe how this process is working in terms of 
outstanding and adjudicated claims.
    Answer. In fiscal year 2008, the Transportation Security 
Administration (TSA) received and adjudicated approximately 17,600 
claims, 19 percent of which resulted in payments to the claimant. In 
fiscal year 2009, through June, TSA has received just over 10,000 
claims. Fiscal year 2009 payment percentages remain consistent with 
fiscal year 2008. TSA is processing claims within the 6-month deadline 
established by the Federal Tort Claims Act, with the exception of 
certain special cases, such as claims that are in litigation. As of the 
end of June 2009, TSA had 2,666 claims under adjudication (i.e., 
outstanding). Of these claims, over 80 percent have been received since 
May 1, 2009.
                      (tsa) surface transportation
    Question 18. Please explain the reasoning behind the allocation of 
surface transportation security resources toward the VIPR program, 
including whether any Federal entities (such as GAO or the DHS 
Inspector General) or non-Federal stakeholders were consulted about 
surface transportation security priorities, and whether any new 
surface-focused components are envisioned for VIPR teams devoted to 
surface activities.
    Answer. The requested additional funding will specifically address 
the inherent vulnerabilities of our Nation's surface transportation 
systems and better position the Transportation Security Administration 
(TSA) to more readily and proactively perform its surface security 
mission as outlined in the 9/11 Act.
    Through Visible Intermodal Prevention and Response (VIPR), TSA 
teams State and local agencies with additional Federal Air Marshals 
(FAMs), Transportations Security Inspectors--Surface, Behavior 
Detection Officers, and Bomb Appraisal Officers. Each element brings 
expertise to the surface modes of transportation in a collaborative 
effort to deter, disrupt, and defeat possible terrorist or criminal 
actions towards the Nation's transportation system. Utilization of 
these assets has been proven effective through the collaborative 
deployment of over 1,600 VIPR operations in the surface modes using 
existing resources not specifically dedicated to VIPR operations. 
Dedication of these assets will create an even greater deterrence and 
public awareness to the surface transportation domain, especially given 
the enhanced level of coordination and communication that now exists 
between TSA and its VIPR partner agencies.
    For example, all of TSA's operational components collaborate on 
plans to deploy VIPR resources in the surface transportation domain and 
TSA's Office of Transportation Sector Network Management meets 
regularly with its stakeholder/partners, collaborating on best 
practices to secure the transportation domain. TSA's transportation 
stakeholder/partners provide necessary and regular feedback and input 
into the plans TSA proposes for future VIPR operational deployments and 
this relationship has strengthened considerably since the Government 
Accountability Office and the Department of Homeland Security Office of 
Inspector General audits. Moving forward, TSA expects these working 
relationships to continue to improve at a national level, particularly 
if additional resources are made available to support the VIPR program 
as requested in the President's budget.
    Question 19. Please explain why only 18 additional canine teams are 
supported by the budget request for surface transportation, and why 
some of those teams are targeted for the ferry sector rather than rail 
and transit activities.
    Answer. The Transportation Security Administration's (TSA's) 
funding of an additional 18 canine teams for surface transportation 
security represents an appropriate allocation of resources within the 
TSA budget. These teams will be under the control of local law 
enforcement responsible for surface transportation security in their 
respective jurisdictions. This is in addition to 82 canine teams in the 
National Explosive Detection Canine Team Program (NEDCTP) that are 
already dedicated to surface transportation security. The NEDCTP will 
continue to monitor its budget during fiscal year 2010 to determine if 
additional surface canine teams can and should be funded.
    With respect to ferry teams, NEDCTP worked with other offices 
within TSA to identify surface transportation security requirements, 
which included ferry systems. The NEDCTP based its decisions for team 
locations on system-wide surface transportation security needs, 
deployment requirements, and overall concept of operations. Ferry 
systems were chosen based on passenger ridership and U.S. Coast Guard 
risk management data.
    Question 20. Please clarify what is happening to the First Observer 
program. This program is supported by the Trucking Security Grant 
Program, which is targeted for termination; yet, the budget 
justification for TSA's request with regard to surface transportation 
security states that the Highway Information Sharing and Analysis 
Center (ISAC) will be continued through fiscal year 2010. The ISAC is 
part of the First Observer Program, which, as noted, is supported by 
the trucking grants. How is this program going to continue if the 
source of its funding is being eliminated?
    Answer. The First Observer program was funded for $15.5 million by 
the fiscal year 2008 Trucking Security Program (TSP) grant, which has a 
36-month period of performance. The HMS Company was awarded the fiscal 
year 2008 TSP grant for the First Observer program, and it developed 
its budget, which includes funding for the Information Sharing and 
Analysis Center (ISAC) for 41 months from the date of award. The grant 
award date was July 15, 2008 and the period of performance is August 1, 
2008 through December 31, 2011. Therefore, the Information Sharing and 
Analysis Center will continue to operate through December, 2011, funded 
by the fiscal year 2008 TSP grant.
    Question 21. Does the ``inter-modal security training and exercise 
program'' referenced in your written testimony and the budget 
justification include the outstanding training regulations for transit, 
rail, and bus workers required under the 9/11 Act? Where is it housed 
within TSA? And for the purposes of this program, does ``inter-modal'' 
include aviation? Please explain how this budget request reflects the 
importance of supporting TSA's regulatory functions to address the long 
delays in issuing these critical security regulations.
    Answer. Three sections of the Implementing Recommendations of the 
9/11 Commission Act of 2007 (9/11 Act) require the establishment of a 
program for conducting security exercises for public transportation 
agencies, railroad carriers, and over-the-road buses. The 
Transportation Security Administration (TSA) has developed the 
Intermodal Security and Training Exercise Program (I-STEP) under the 
auspices of the TSA Office of Transportation Sector Network management 
(TSNM) to provide these exercises. The intermodal programs under the I-
STEP do not include aviation.
    The I-STEP Program does not address the development of regulations 
calling for security training for frontline employees in certain modes, 
as required by the 9/11 Act. TSA is actively developing regulations to 
fulfill these requirements. Once these regulations are issued as final 
rules, I-STEP will reinforce the training standards during exercises. 
The funds needed for continued regulatory development are included in 
the fiscal year 2010 budget request.
    Question 22. In your written testimony you reference the 
International Working Group on Land Transport Security and state that 
TSA is engaged with that organization to promote best practices, 
capacity building, and information sharing. Please describe all of 
TSA's activities with respect to the International Working Group, and 
elaborate on how this budget reflects the significance of those 
activities.
    Answer. The United States proposed the creation of an international 
land transport security working group at the Japanese Ministerial 
Conference on International Transport Security in January 2006. The 
purpose was to create a forum within which the international 
transportation security community could improve land transport security 
by sharing best practices, enhancing cooperation between government 
authorities and industry, and sharing technology information. Three 
years after its inception, members now include: Australia, Canada, 
China, the European Commission, France, Germany, India, Indonesia, 
Israel, Italy, Japan, Malaysia, Netherlands, Philippines, Republic of 
Korea (South), Russia, Spain, United Kingdom, and the United States.
    The Transportation Security Administration (TSA), hosted the 4th 
and 5th International Working Group on Land Transport Security (IWGLTS) 
sessions on behalf of the United States. During the 4th session in 
November 2008, the following priorities for IWGLTS were agreed upon by 
the participating States: (1) Information sharing as an overarching 
theme and the No. 1 priority; (2) creating a compendium of smart 
practices; further developing the secure web board for IWGLTS efforts; 
(3) conducting inter-sessional work; and (4) reaching out to other 
organizations (e.g., International Union of Railways--UIC) to maximize 
efforts; and conducting a survey of members' current and planned 
technologies in land transport security.
    Identifying specific deliverables within the previously agreed-upon 
priorities (Mitigation Activities, Risk Assessment, Technology, Public 
Awareness and Stakeholder Partnerships), prioritizing and deciding 
which deliverables will be pursued before the 6th Session, and 
identifying leads/co-leads for each deliverable for work to begin 
during inter-session periods were accomplished at the 5th session in 
May 2009. IWGLTS members not only identified, prioritized, and 
committed to several deliverables, but also began establishing 
timelines and planning inter-session efforts for the following 
activities: (1) Conduct a survey of members' mitigation security 
measures for land transportation modes--U.S. lead; (2) conduct a survey 
of members' current/future land transport security technologies--
Australia lead; (3) develop a risk assessment matrix of land transport 
modes--France lead; and (4) develop presentations and discussion on 
Public Awareness campaigns (India, Indonesia, and United States will 
present at the next IWGLTS meeting)--U.S. to coordinate during inter-
session periods.
                             small business
    Question 23. As of June 22, 2008, TSA was no longer exempt from 
complying with the Federal Acquisition Regulation. How has this change 
impacted minority-owned, woman-owned, and veteran-owned businesses?
    Answer. Although mandated to comply with the Federal Acquisition 
Regulation since only June 2008, the Transportation Security 
Administration (TSA) has been a strong advocate for small business 
since its inception and has developed a strong and robust small 
business program. Prior to 2007, TSA developed internal management 
directives and processes based upon acquisition best practices to 
ensure small business participation. In 2007, TSA was required to 
comply with the Small Business Act. In fiscal year 2008, TSA awarded 
over 20 percent of contract dollars to small businesses, an increase of 
5.3 percent from fiscal year 2003. In addition, TSA awarded 6.7 percent 
of contract dollars to small disadvantaged business, exceeding the goal 
of 5 percent. TSA also awarded 2.6 percent of contract dollars to small 
businesses owned by disabled veterans.
    Question 24. In order to receive grant funding from TSA, do State 
and local governments that plan to utilize funds in a competitive 
manner have to comply with any Federal rules/regulations on minority 
business or disadvantaged business utilization?
    Answer. The Transit Security Grant Program (TSGP) Grant Guidance 
and Application Kit that is published for each grant cycle includes 
language on Disadvantaged Business Requirements. Both the fiscal year 
2009 TSGP Guidance (page 49) and the fiscal year 2009 American Recovery 
and Reinvestment Act TSGP Guidance (page 53) state ``Applicants are 
advised that, to the extent that recipients of a grant use contractors 
or subcontractors, such recipients shall use small, minority, women-
owned or disadvantaged business concerns and contractors or 
subcontractors to the extent practicable.''





NEWSLETTER
Join the GlobalSecurity.org mailing list