[House Hearing, 113 Congress]
[From the U.S. Government Printing Office]
THREAT, RISK, AND VULNERABILITY: THE FUTURE OF THE TWIC PROGRAM
=======================================================================
HEARING
before the
SUBCOMMITTEE ON BORDER
AND MARITIME SECURITY
of the
COMMITTEE ON HOMELAND SECURITY
HOUSE OF REPRESENTATIVES
ONE HUNDRED THIRTEENTH CONGRESS
FIRST SESSION
__________
JUNE 18, 2013
__________
Serial No. 113-23
__________
Printed for the use of the Committee on Homeland Security
[GRAPHIC] [TIFF OMITTED]
Available via the World Wide Web: http://www.gpo.gov/fdsys/
__________
U.S. GOVERNMENT PRINTING OFFICE
85-688 WASHINGTON : 2013
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC
area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC
20402-0001
COMMITTEE ON HOMELAND SECURITY
Michael T. McCaul, Texas, Chairman
Lamar Smith, Texas Bennie G. Thompson, Mississippi
Peter T. King, New York Loretta Sanchez, California
Mike Rogers, Alabama Sheila Jackson Lee, Texas
Paul C. Broun, Georgia Yvette D. Clarke, New York
Candice S. Miller, Michigan, Vice Brian Higgins, New York
Chair Cedric L. Richmond, Louisiana
Patrick Meehan, Pennsylvania William R. Keating, Massachusetts
Jeff Duncan, South Carolina Ron Barber, Arizona
Tom Marino, Pennsylvania Dondald M. Payne, Jr., New Jersey
Jason Chaffetz, Utah Beto O'Rourke, Texas
Steven M. Palazzo, Mississippi Tulsi Gabbard, Hawaii
Lou Barletta, Pennsylvania Filemon Vela, Texas
Chris Stewart, Utah Steven A. Horsford, Nevada
Richard Hudson, North Carolina Eric Swalwell, California
Steve Daines, Montana
Susan W. Brooks, Indiana
Scott Perry, Pennsylvania
Mark Sanford, South Carolina
Greg Hill, Chief of Staff
Michael Geffroy, Deputy Chief of Staff/Chief Counsel
Michael S. Twinchek, Chief Clerk
I. Lanier Avant, Minority Staff Director
------
SUBCOMMITTEE ON BORDER AND MARITIME SECURITY
Candice S. Miller, Michigan, Chairwoman
Jeff Duncan, South Carolina Sheila Jackson Lee, Texas
Tom Marino, Pennsylvania Loretta Sanchez, California
Steven M. Palazzo, Mississippi Beto O'Rourke, Texas
Lou Barletta, Pennsylvania Tulsi Gabbard, Hawaii
Chris Stewart, Utah Bennie G. Thompson, Mississippi
Michael T. McCaul, Texas (Ex (Ex Officio)
Officio)
Paul L. Anstine, Subcommittee Staff Director
Deborah Jordan, Subcommittee Clerk
Alison Northrop, Minority Subcommittee Staff Director
C O N T E N T S
----------
Page
Statements
The Honorable Candice S. Miller, a Representative in Congress
From the State of Michigan, and Chairwoman, Subcommittee on
Border and Maritime Security:
Oral Statement................................................. 1
Prepared Statement............................................. 2
The Honorable Sheila Jackson Lee, a Representative in Congress
From the State of Texas, and Ranking Member, Subcommittee on
Border and Maritime Security:
Oral Statement................................................. 4
Prepared Statement............................................. 5
The Honorable Bennie G. Thompson, a Representative in Congress
From the State of Mississippi, and Ranking Member, Committee on
Homeland Security:
Prepared Statement............................................. 7
Witnesses
Rear Admiral Joseph A. Servidio, Assistant Commandant for
Prevention Policy, U.S. Coast Guard:
Oral Statement................................................. 8
Prepared Statement............................................. 9
Mr. Steve Sadler, Assistant Administrator, Transportation
Security Administration:
Oral Statement................................................. 11
Prepared Statement............................................. 12
Mr. Stephen M. Lord, Director, Forensic Audits and Investigative
Services, U.S. Government Accountability Office:
Oral Statement................................................. 15
Prepared Statement............................................. 16
Captain Marcus Woodring, USCG (Ret), Managing Director, Health,
Safety, Security, and Environmental, Port of Houston Authority:
Oral Statement................................................. 21
Prepared Statement............................................. 23
For the Record
The Honorable Sheila Jackson Lee, a Representative in Congress
From the State of Texas, and Ranking Member, Subcommittee on
Border and Maritime Security:
Letter From the American Association of Port Authorities....... 40
Statement of American Trucking Associations, Inc............... 41
The Honorable Tulsi Gabbard, a Representative in Congress From
the State of Hawaii:
Statement of the International Longshore and Warehouse Union... 44
Appendix
Questions From Chairwoman Candice S. Miller for Joseph A.
Servidio....................................................... 49
Questions From Chairwoman Candice S. Miller for Stephen M. Lord.. 51
THREAT, RISK, AND VULNERABILITY: THE FUTURE OF THE TWIC PROGRAM
----------
Tuesday, June 18, 2013
U.S. House of Representatives,
Subcommittee on Border and Maritime Security,
Committee on Homeland Security,
Washington, DC.
The subcommittee met, pursuant to call, at 10:09 a.m., in
Room 311, Cannon House Office Building, Hon. Candice S. Miller
[Chairwoman of the subcommittee] presiding.
Present: Representatives Miller, Duncan, Palazzo, Barletta,
Stewart, Jackson Lee, O'Rourke, and Gabbard.
Mrs. Miller. Good morning. The Committee on Homeland
Security, Subcommittee on Border and Maritime Security, will
come to order.
The subcommittee is meeting today to examine the future of
the TWIC program, and our witnesses today are Rear Admiral
Joseph Servidio from the U.S. Coast Guard, Steven Sadler,
assistant administrator for the Office of Intelligence and
Analysis, Transportation Security Administration, Stephen Lord
with the Government Accountability Office, and Marcus Woodring,
from the Port of Houston Authority. I will give them a more
formal introduction in just a moment.
After 9/11, Congress passed the Maritime Transportation
Security Act, or MTSA--it is sort of the acronym--to address
several security vulnerabilities within the Nation's maritime
and transportation sectors to prevent acts of terrorism that
might impact our Nation. Among the provisions of the bill was a
requirement from the Department of Homeland Security to develop
a secure biometric access credential for individuals who
require unescorted access to secure areas of regulated maritime
facilities and vessels.
Ports by their very nature may be susceptible to acts of
terrorism that could cause loss of life and severe economic
disruption. The lack of access control at the Nation's ports
was certainly a glaring security vulnerability that MTSA and
subsequently the Transportation Worker Identification
Credential--we commonly call TWIC--was intended to fix.
However, more than 11 years later, the TWIC card designed
to prevent terrorists from gaining access to sensitive parts of
the Nation's ports is currently no more than an extensive flash
pass that costs workers about $130, principally to run criminal
and terrorism background checks on prospective applicants.
Unfortunately, the biometric capabilities on the card are
of little use because delays in the pilot program and
rulemaking processes have taken longer than ever intended.
Pilot programs as envisioned by the Congress should have been
designed to assist the Coast Guard in understanding the impact
of proposed regulations on port operations and transportation
workers alike, instead have been less than useful in the
rulemaking process. Certainly, all of us are looking forward to
hearing from our witnesses today on the extent to which the
pilot was used to inform the rulemaking process.
Maritime security is not the provenance of the Federal
Government alone. Private industry and other stakeholders have
an important role to play, but the Government has introduced an
unacceptable level of uncertainty when it comes to TWIC. For
several years, Members of this committee have been calling on
the Department to release the reader rules on--or effective
assessment of the program. That strikes me as a very poor way
to run this program.
Last Congress, I introduced the SMART Port Act, which
passed through this committee and in the House, which would
have made a series of reforms to the TWIC program. Included in
that bill was a provision which required TSA to change the
requirement for TWIC applicants who currently must go to an
enrollment center twice and instead would allow for only visit
to an enrollment center by allowing cards to be sent through
the mail, just as passports and credit cards are today.
Through our efforts, that provision was attached to last
year's Coast Guard authorization act and it was signed into law
by the President. However, it does appear that TSA will not
comply with the 270-day time line in the statute. Making two
trips to an enrollment center seems to just be a very onerous
burden on transportation workers.
So I will be very interested to hear how TSA will implement
this provision, consistent with Congressional intent within
that time frame. Millions of dollars of previously allocated
and future grant spending are predicated on the TWIC providing
a tangible security benefit at the Nation's ports and maritime
facilities. We have an obligation to get this done right, and
the way this program has been run so far does not give us the
confidence that we are on the right course.
Today I hope that we will be able to examine the security
purpose of the TWIC card, principally, as well as chart out the
future of this program to ensure that we maximize security and
minimize the burden on American workers.
With that, I would yield to the gentlelady from Texas, my
Ranking Member, Ms. Jackson Lee.
[The statement of Chairwoman Miller follows:]
Statement of Chairwoman Candice S. Miller
June 18, 2013
After 9/11, Congress passed the Maritime Transportation Security
Act--MTSA--to address several security vulnerabilities within the
Nation's maritime and transportation sectors to prevent acts of
terrorism that might impact the Nation's economy. Among the provisions
of the bill, was a requirement for DHS to develop a secure biometric
access credential for individuals who require unescorted access to
secure areas of regulated maritime facilities and vessels.
Ports, by their very nature, may be susceptible to acts of
terrorism that could cause loss of life and severe economic disruption.
The lack of access control at the Nation's ports was a glaring security
vulnerability that MTSA, and subsequently the Transportation Worker
Identification Credential (TWIC) was intended to fix.
However, more than 11 years later, the TWIC card, designed to
prevent terrorists from gaining access to sensitive parts of the
Nation's ports, is currently no more than an expensive flash pass that
costs workers $129.75--principally to run criminal and terrorism
background checks on prospective applicants.
Unfortunately, the biometric capabilities on the card are of little
use because delays in the pilot program and rulemaking processes have
taken longer than ever intended. Pilot programs, as envisioned by the
Congress, should have been designed to assist the Coast Guard in
understanding the impact of proposed regulations on port operations and
transportation workers alike, instead have been less than useful in the
rulemaking process.
I am looking forward to hearing from our witnesses on the extent to
which the pilot was used to inform the rulemaking process.
Maritime security is not the provenance of the Federal Government
alone. Private industry and other stakeholders have an important role
to play, but the Government has introduced an unacceptable level of
uncertainty when it comes to TWIC.
For several years, Members of this committee have been calling on
the Department to release the reader rule to provide some certainty to
workers and industry. Finally, we have a notice of proposed rulemaking
that only requires TWIC readers to be used at the riskiest 5 percent of
all TWIC-regulated vessels and facilities, nearly 6 years after workers
were first required to pay for and obtain a TWIC card.
The proposed rule and findings of a recent GAO report, leads to
some very simple questions about the threat, risk, and vulnerability at
our Nation's ports, and how the TWIC program should be used to reduce
the risk of a terrorist attack at the handful of facilities and vessels
identified in the proposed rule.
I support a smart, risk-based approach to security, because I am
convinced that maritime security is maximized through the use of a
risk-based methodology. However, we should continue to scrutinize
troubled programs by examining the principal reason they exist--in this
case, preventing terrorists from doing economic harm to the Nation by
disrupting the supply chain.
This hearing will hopefully answer the question of whether or not
the TWIC program serves that purpose.
At this point, I believe it is still an open question as to what
degree this card enhances maritime security. To that end, I hope to
hear answers to the following questions: How many terrorist plots have
been stopped by this card? Does TWIC enhance security in a tangible
way? Can we address the security challenges at our Nation's ports in a
more cost-effective, and balanced way?
Today, we will hear from the Government Accountability Office,
which recently reported that, `` . . . DHS has not demonstrated how, if
at all, TWIC will improve maritime security.'' An assessment of how
TWIC improves maritime security should have been one of the very first
things the Department did when it began to implement the program.
It has been more than a decade since the legislation that required
TWIC was first enacted, but it is troubling that we have never done a
simple security or effectiveness assessment of the program. That
strikes me as a poor way to run a program.
Last Congress, I introduced the SMART Port Act which passed through
this committee and in the House, and would have made a series of
reforms to the TWIC program.
Included in that bill was a provision, originally authored by Mr.
Scalise, which required TSA to change the requirement for TWIC
applicants who currently must go to an enrollment center twice, and
instead would allow for only one visit to an enrollment center by
allowing cards to be sent through the mail, just as passports and
credit cards are today.
Through our efforts, that provision was attached to last year's
Coast Guard Authorization Act and was signed into law by the President.
However, it appears that TSA will not comply with the 270-day time line
in statute.
Making two trips to an enrollment center is an onerous burden on
transportation workers, and I will be very interested to hear how TSA
will implement this provision, consistent with Congressional intent
within that time frame.
Millions of dollars of previously allocated and future grant
spending are predicated on the TWIC providing a tangible security
benefit at the Nation's ports and maritime facilities.
We have an obligation to get this right, and the way this program
has been run so far does not give me the confidence that we are on the
right course.
Today, I hope that we examine the security purpose of the TWIC
card, as well as chart out the future of this program to ensure that we
maximize security and minimize the burden on American workers.
With that I will yield to the gentlelady from Texas.
Ms. Jackson Lee. Thank you. Good morning.
I want to thank you, Madam Chairwoman, for holding today's
hearing on the Department of Homeland Security's Transportation
Worker Identification Credential program, something that many
of us who have served on this committee have been dealing with
not only with our constituents, but with our individual
constituents and our corporate constituents, such as the
Houston Port Authority.
We have tried to be responsive to individuals, constituents
who simply need to get to work. To our dismay, there have been
a number of challenges with this program, though I know that
its intentions were well-intentioned. Challenges that I would
like to offer for the record are the site locations for
individuals, the hours that TWIC offices would be open, the
difficulty of those who lived away from ports or places like
Louisiana, where they had to secure them places away from their
particular home base. So there have been a lot of issues that
have arisen with TWIC, and as I indicated, the intentions were
good to give this card of identification.
As a Member of Congress representing the port of Houston,
the formal Chairwoman and Ranking Member of the Subcommittee on
Transportation Security, and now working with this committee
and Madam Chairwoman, I have been focused on the TWIC program
since its creation.
Early on, I engaged ports, workers, and other stakeholders
about the program and heard their concerns about how it was
being deployed. Like many of my colleagues, my office has
received significant amounts of TWIC casework primarily from
workers having difficulty obtaining and renewing their TWIC
cards.
While some of the issues with the program have largely been
addressed, over time, other concerns have taken their place. I
am particularly troubled by the Government Accountability
Office report released last month that found serious problems
with the TWIC reader pilot, which was intended to serve as the
basis for the TWIC reader rulemaking. GAO has found that the
pilot results were incomplete, inaccurate, and unreliable for
informing Congress and for developing a final reader rule. GAO
concluded these issues, calling to question the TWIC program's
premise and its effectiveness in enhancing security.
These concerns, coupled with prior unaddressed issues
related to security vulnerabilities with the program, prompted
GAO to recommend that the Department not move forward until a
security assessment of the program is completed. However, DHS,
which was made aware of GAO's finding in December 2012,
published a notice of proposed rulemaking for the TWIC readers
in March of this year.
The NPRM would require readers to be deployed to only the
highest-risk facilities and vessels accessed by just 5 percent
of TWIC holders. While nothing precludes DHS from expanding the
reader requirement in the future, such a limited deployment of
biometric readers is not what Congress envisioned when it
mandated the TWIC program, and I would encourage DHS to regroup
and reassess, take more advice and counsel from stakeholders,
more importantly reassess the technology. Technology is good.
But it can be even better, obviously, if we pause for a moment
and try to develop the technology that will, in fact, work.
I am not advocating for broader deployment of readers at
present, but I am concerned that DHS would ask port workers to
pay for a biometric card whose biometric capabilities
apparently may never be utilized. More broadly, I am concerned
that DHS appears to be moving forward with its long-delayed
reader rule before addressing the fundamental concerns that the
program GAO has identified in its reports.
I was pleased to invite from the port Mr. Marcus Woodring,
who we have engaged and over the years has given effective
service in the United States Coast Guard and has dealt with the
TWIC issue over and over again, to testify before the
subcommittee today to offer his port's perspective on the
issues facing the TWIC program. Besides being one of the
Nation's major ports with a significant presence of
petrochemical-related facilities and vessels, the port of
Houston has been using TWIC readers voluntarily since 2008. Mr.
Woodring currently serves as managing director for health,
safety, security, and environment at the Port of Houston
Authority, having recently served in the Coast Guard,
cumulating with service as captain of the port for the Houston
region.
I am especially interested in hearing from him about the
port of Houston's experience with TWIC readers and his views on
how the TWIC program can be strengthened going forward. I am
delighted that he is here along with all the other witnesses,
who I welcome. I want to hear from our DHS witnesses about how
they plan to address GAO's recommendation, ensure TWIC programs
become the maritime security program Congress intended, that
ports and facilities can use without undue disruption to their
businesses, and that DHS can justify asking maritime workers to
continue to pay for.
Finally, I would note that I have previously supported one
enrollment process, one fee, and one security threat assessment
for transportation workers. Madam Chairwoman, I will tell you,
with all the numbers of cards that I have heard workers having
to have, it may be well time for us to try and do that.
I would like to hear from witnesses today about how the on-
going issues of the TWIC program might affect this effort.
Again, we are grateful for the witnesses, and I want to
acknowledge Mr. O'Rourke and Ms. Gabbard present here today.
Thank you very much, Madam Chairwoman.
I yield back.
[The statement of Ranking Member Jackson Lee follows:]
Statement of Ranking Member Sheila Jackson Lee
June 18, 2013
As a Member of Congress representing the port of Houston, the
former Chairwoman and Ranking Member of the Subcommittee on
Transportation Security, and current Ranking Member of the Subcommittee
on Border and Maritime Security, I have been focused on the TWIC
program since its creation.
Early on, I engaged ports, workers, and other stakeholders about
the program and heard their concerns about how it was being deployed.
Like many of my colleagues, my office has received significant
amounts of TWIC casework, primarily from workers having difficulty
obtaining and renewing their TWICs.
While some of the issues with the program have largely been
addressed over time, other concerns have taken their place.
I was particularly troubled by the Government Accountability Office
(GAO) report released last month that found serious problems with the
TWIC reader pilot, which was intended to serve as the basis for the
TWIC reader rulemaking.
GAO found that the pilot results were incomplete, inaccurate, and
unreliable for informing Congress and for developing a final reader
rule.
GAO concluded these issues call into question the TWIC program's
premise and its effectiveness in enhancing security.
These concerns, coupled with prior, unaddressed issues related to
security vulnerabilities with the program, prompted GAO to recommend
that the Department not move forward until a security assessment of the
program is completed.
However, DHS, which was made aware of GAO's findings in December
2012, published a Notice of Proposed Rulemaking (NPRM) for the TWIC
readers in March of this year.
The NPRM would require readers to be deployed to only to the
highest-risk facilities and vessels, accessed by just 5% of TWIC
holders.
While nothing precludes DHS from expanding the reader requirement
in the future, such a limited deployment of biometric readers is not
what Congress envisioned when it mandated the TWIC program.
I am not advocating for broader deployment of readers at present,
but am concerned that DHS would ask port workers to pay for a biometric
card whose biometric capabilities apparently may never be utilized.
More broadly, I am concerned that DHS appears to be moving forward
with its long-delayed reader rule before addressing the fundamental
concerns with the program GAO has identified in its reports.
I was pleased to invite a witness from the port of Houston, Mr.
Marcus Woodring, to testify before the subcommittee today to offer his
port's perspective on the issues facing the TWIC program.
Besides being one of the Nation's major ports with a significant
presence of petrochemical-related facilities and vessels, the port of
Houston has been using TWIC readers voluntarily since 2008.
Mr. Woodring currently serves Managing Director for Health, Safety,
Security, and Environmental (HSSE) at the Port of Houston Authority,
having recently served in the Coast Guard culminating with service as
captain of the port for the Houston region.
I am especially interested in hearing from him about the port of
Houston's experience with TWIC readers and his views on how the TWIC
program can be strengthened going forward.
Similarly, I want to hear from our DHS witnesses about how they
plan to address GAO's recommendations and ensure TWIC becomes the
maritime security program Congress intended, that ports and facilities
can use without undue disruption to their businesses, and that DHS can
justify asking maritime workers to continue to pay for.
Finally, I will note that I have previously supported one
enrollment process, one fee, and one security threat assessment for
transportation workers.
I would like to hear from our witnesses today about how the on-
going issues with the TWIC program might affect this effort.
Mrs. Miller. Let me formally introduce our witnesses this
morning. Again, we welcome all of you gentlemen. We appreciate
you taking the time to be here.
First of all, Rear Admiral Joseph Servidio is the assistant
commandant for prevention policy overseeing Coast Guard
inspections and compliance, marine transportation systems, and
commercial regulations and standards. He is responsible for
navigation and boating safety, commercial vessels, ports and
facilities, merchant mariner credentialing, and vessel
documentation. We welcome you, Admiral.
Mr. Steven Sadler is the assistant administrator for the
Office of Intelligence and Analysis at the Transportation
Security Administration. In this role, he is responsible for
the alignment of intelligence functions with vetting
operations. Before joining TSA, Mr. Sadler spent 25 years in
the commercial maritime industry in a number of leadership
roles. Welcome.
Mr. Stephen Lord directs the GAO's numerous engagements on
aviation and surface transportation security issues and
regularly discusses these issues before Congress in various
industry forums. He supervised recent reviews of TSA passenger
rail security programs and the TWIC program.
I am going to ask my Ranking Member to make the formal
introduction of her constituent, who graciously joins us this
morning.
Ms. Jackson Lee. As I indicated, let me welcome all the
witnesses, but I am particularly--and thank you, Madam
Chairwoman, very much--particularly excited and pleased to be
able to welcome Mr. Marcus Woodring, retired from the United
States Coast Guard, as captain of the port of Houston-Galveston
in 2011. We are delighted that he assumed his new and current
position with the port of Houston in July of that year. He is
responsible for safety, security, environmental stewardship,
and emergency response at eight terminals along the Houston
ship channel.
Over the years, I have had the privilege of working with
Captain Woodring, and I would tell you, Madam Chairwoman, that
he is one of the most engaged public servants and a problem-
solver. I am delighted for him to bring that experience to this
committee and this hearing that is so very important today.
Welcome you and welcome you from Houston, Captain.
Mrs. Miller. Thank you very much. Other Members are
reminded that statements may be submitted for the record.
[The statement of Ranking Member Thompson follows:]
Statement of Ranking Member Bennie G. Thompson
June 18, 2013
This committee has a long history of TWIC oversight, going back
almost to its inception. Since that time, DHS has made progress in
standing up the program, vetting and enrolling approximately 2.5
million maritime workers.
Certainly, workers have done their part by applying for TWICs,
submitting to background investigations, paying for their credentials,
filing for waivers and appeals as necessary, and making multiple trips
to ultimately receive their cards.
Yet, the program has long been plagued by delays, security
vulnerabilities, and other problems.
These problems now have many questioning whether TWIC will ever be
the transportation security program Congress envisioned when it enacted
the Maritime Transportation Security Act of 2002 and the SAFE Port Act
of 2006.
Just last month, the Government Accountability Office issued its
latest in a series of troubling reports related to TWIC--this time on
the reader pilots.
GAO concluded that the pilots were so severely flawed that they
cannot be used to inform DHS' long-delayed rulemaking process for the
TWIC readers.
Despite being made aware of GAO's serious concerns about the
reliability of the reader pilot data and the TWIC program as a whole,
Coast Guard published its Notice of Proposed Rulemaking (NPRM) for the
TWIC readers earlier this year.
The NPRM divides ports and facilities into three risk groups,
requiring only those in the highest-risk group--Group A--to install
biometric readers for admittance to secure areas.
Facilities in Groups B and C can continue to allow TWICs to be used
as ``flash passes'' with only a visual inspection required to gain
access.
This means that only 5% of TWIC holders would be using their
biometric credentials as Congress intended--with a biometric reader.
The remainder of TWIC holders will continue to use their card as an
expensive flash pass.
Let me be clear--I am not advocating for deployment of readers at
additional facilities or vessels at this time.
Rather, I believe the limited deployment of readers proposed by the
rule raises some hard questions that need to be answered.
For example, what does it say about the security value of the TWIC,
and the TWIC program itself, if DHS does not believe the program needs
to be fully deployed at all regulated facilities?
And how can we continue requiring workers to pay for a biometric
credential when, in the vast majority of cases, the full capability of
that card will not be used?
To get answers to these and other vital questions, I strongly
support GAO's recommendation for an assessment of the TWIC program
prior to its continued deployment.
My staff has done significant stakeholder outreach on the rule, and
I plan to file comments based on this outreach and our oversight work
outlining my thoughts and concerns.
I look forward to a discussion today about what needs to be done to
address the persistent problems facing the TWIC program.
In particular, I hope to hear from GAO in detail about their
recommendations for the path forward for the program.
Mrs. Miller. Again, thank you all for coming. At this time,
the Chairwoman recognizes Admiral Servidio.
STATEMENT OF REAR ADMIRAL JOSEPH A. SERVIDIO, ASSISTANT
COMMANDANT FOR PREVENTION POLICY, U.S. COAST GUARD
Admiral Servidio. Good morning, Madam Chairwoman, Ranking
Member Jackson Lee, distinguished Members of the subcommittee.
I am Rear Admiral Joe Servidio, the assistant commandant for
prevention policy for the Coast Guard, and I am honored to have
this opportunity to speak before you today about the Coast
Guard's role in enforcing compliance with the Transportation
Worker Identification Credential and update you on the status
of the TWIC reader rule.
The Coast Guard views TWIC as a key component of our
layered security strategy. By providing a Nationally-recognized
vetting standard and a common credential, TWIC promotes both
security and economic efficiency. Issued under a uniform
standard, TWIC allows facility and vessel operators, as well as
law enforcement Nation-wide, to verify the identity of
individuals using a single official document. TWIC enables
transportation workers the flexibility to potentially move
among facilities, vessels, and geographic regions during
routine operations and in emergencies, maintaining security and
facilitating resiliency.
While TWIC provides a standard baseline to determine
suitability to enter the secure area of a facility or vessel
regulated under the Maritime Transportation Security Act, it is
only half of a two-part process. In addition to possessing a
valid TWIC, an individual must also be specifically granted
access to a secure area by a vessel or facility security
officer.
To re-emphasize, the possession of a valid TWIC alone is
not sufficient for the holder of a credential to access secure
areas. This two-step process provides an additional layer of
security to help protect vital maritime transportation
infrastructure from unauthorized access or exploitation.
In addition to facility and vessel operators' significant
efforts, Coast Guard inspectors have validated about 280,000
TWICs during planned and unplanned no-notice visits since 2009.
The Coast Guard also reviews approximately 3,100 facility and
11,000 vessel security plans each year.
On 22 March 2013, the Coast Guard released the TWIC reader
notice of proposed rulemaking, which outlines requirements for
certain MTSA-regulated facilities and vessels to use electronic
readers as part of their TWIC access control program. This NPRM
is an important element of maritime security, as electronic
readers allow for biometric confirmation of the TWIC holder's
identity.
As with our other security regs, the Coast Guard balanced
the expected security benefits of the requirement with the
expected costs to industry. Accordingly, the reader rule
proposes the use of TWIC readers only at the vessels and
facilities where a security incident could pose the greatest
consequence and where biometric verification of a TWIC would
reduce risk.
Vessels and facilities not required to use electronic
readers under this rule will still be required to conduct
visual TWIC verifications. The GAO released a report
questioning the security benefits of the TWIC and the way the
Coast Guard used the results of the pilot program to inform the
rule. We indicated to GAO that we were aware of the pilot
program's limitations and used pilot data with discretion in
developing the NPRM.
Moreover, we are convinced that TWIC, including the use of
biometric readers, is an important part of our maritime
security system. The GAO report was released while the NPRM
common period was open. Given the timing of the report's
release, a request by Representative Thompson and to ensure
that we captured comments informed by the report, we extended
the comment period by 30 days to 20 June 2013.
The Coast Guard hosted four public meetings around the
country, providing other outlets for public feedback on the
proposed regs. To date, we have received approximately 50
comments on the NPRM.
The Coast Guard's focus is to facilitate a secure and
efficient maritime transportation system, and TWIC is an
important tool in that effort. As part of our layered security
strategy, we are committed to establishing and enforcing
effective and efficient access control requirements through
TWIC. Our reader NPRM solicits public comment, which we
recognize as critical to port security success, and we will
continue to work with the Department, TSA, industry groups,
labor organizations, Congress, and other key stakeholders to
find ways to improve service.
We know that we have more work to do, and we will ensure
that Congress is informed of our progress. Thank you for the
opportunity to testify today, and I look forward to your
questions.
[The prepared statement of Admiral Servidio follows:]
Prepared Statement of Rear Admiral Joseph Servidio
June 18, 2013
Good morning Madam Chairwoman and distinguished Members of the
subcommittee. Thank you for the opportunity to testify before this
committee on the Coast Guard's role in enforcing compliance of the
Transportation Worker Identification Credential (TWIC) program within
the maritime transportation system.
In previous testimonies, the Coast Guard has described our
responsibility for ensuring industry compliance with TWIC regulations,
the status of our deployment of handheld readers to field units, and
our efforts to publish regulations for electronic TWIC readers in
accordance with Congressional requirements as provided in the Security
and Accountability For Every (SAFE) Port Act of 2006. This testimony
will provide an update of our on-going efforts to enhance the safety
and security of the Nation's ports through the effective implementation
of the TWIC program and recent publication of the TWIC Reader
Requirements Notice of Proposed Rulemaking (NPRM).
The Coast Guard and the Transportation Security Administration
(TSA) have formed a successful partnership in the joint management of
the TWIC program and continue to work together to effectively build,
manage, and improve it. TSA is responsible for TWIC enrollment,
security threat assessment and adjudication, card production,
technology, TWIC issuance, conduct of the TWIC appeal and waiver
process as it pertains to credential issuance, and management of
Government support systems. The Coast Guard is responsible for
establishing and enforcing access control requirements at Maritime
Transportation Security Act (MTSA) regulated vessels and facilities,
which include the requirement for TWIC.
value of twic
TWIC is one part of the layered approach to port security and
establishes a minimum, uniform, vetting, and threat assessment for
mariners and port workers across the country. It ensures that workers
needing routine, unescorted access to secure areas of facilities and
vessels are vetted against a specific list of terrorism associations
and criminal convictions and it provides a standard baseline for
determining an individual's suitability to enter the secure area of a
MTSA-regulated vessel or facility. However, it is only the first half
of a two-part process. First, vessel and facility security personnel
must determine that an individual posseses a valid TWIC.
Second, they must assess the individual's business case for
entering a vessel or facility before granting the person unescorted
access. The possession of a valid TWIC alone is not sufficient to gain
the holder of that credential access to secure areas on vessels or
facilities across the country. The TWIC provides a means by which a
vessel or facility security officer can determine that an individual
has been vetted to an established standard. It helps inform the
security officer's decision to grant unescorted access to an
individual. The facility owners/operators must maintain control of the
access privileges to their respective facilities based on the valid
TWIC and business case.
The Nation-wide recognition of TWIC promotes security and
standardization. A common credential enables facility and vessel
operators as well as Federal, State, local, Tribal, and territorial law
enforcement entities to verify the identity of individuals--a step that
was not feasible prior to TWIC implementation with potentially
thousands of different facility-specific credentials. TWIC also allows
transportation workers to move among facilities, vessels, and
geographic regions as needed for routine market demands and during
emergencies, while still maintaining security.
As required by the SAFE Port Act, the Coast Guard conducts at least
two security inspections annually at MTSA-regulated facilities, with
one inspection being unannounced. Vessels and facilities in all 42
Coast Guard Captain of the Port Zones are in compliance with TWIC
requirements, and have been since the April 15, 2009 implementation
date. In addition to the security activities taken by vessel and
facility security officers, the Coast Guard conducts regular
inspections, spot checks, and TWIC verifications at approximately 3,100
maritime facilities, 14,000 vessels, and 50 outer continental shelf
facilities. Our enforcement program also includes the use of hand-held
TWIC readers by Coast Guard personnel to conduct spot checks using the
biometric capabilities of TWIC.
reader requirements
On March 22, 2013, the Coast Guard issued the TWIC Reader
Requirements Notice of Proposed Rulemaking which outlines requirements
for certain MTSA-regulated facilities and vessels to use electronic
readers in accordance with Congressional requirements as provided in
the SAFE Port Act as part of their TWIC access control program. The
Notice of Proposed Rulemaking maintain the visual verification
requirement for remaining vessels and facilities. Per 33 CFR Parts 104,
105, and 106, this visual inspection must include, at a minimum:
A match of the photo on the TWIC to the individual
presenting it;
Verification that the TWIC has not expired; and
A visual check of the various security features present on
the card to determine whether the TWIC has been tampered with
or forged.
This Notice of Proposed Rulemaking is an important element of the
Coast Guard's maritime security mission. Electronic readers add an
important additional layer of security by providing biometric
confirmation of the TWIC holder's identity.
As you are aware, the Government Accountability Office (GAO)
recently released a report questioning the security benefits of TWIC,
and the way in which the Coast Guard used results of the pilot program
to inform the reader rule. As we indicated to GAO in our reply to their
report, we were aware of the pilot program's limitations, and used it
with discretion in developing the Notice of Proposed Rulemaking.
Moreover, we are convinced that TWIC, including the use of biometric
readers, can and should be a part of the Nation's maritime security
system. In part, because the GAO report came out while the Notice of
Proposed Rulemaking public comment period was open, we extended the
open period by 30 days to June 20, 2013, to ensure that the public had
sufficient opportunity to review and provide feedback on the proposed
regulations.
conclusion
TWIC is improving access control at vessels and maritime facilities
across the country. Its standard, Nation-wide recognition secures and
facilitates a resilient, mobile transportation workforce during routine
and emergency situations. The Coast Guard's NPRM will further increase
the security value of TWIC to the Nation by focusing on the highest-
risk vessels and facilities. We will continue to work with TSA,
industry groups, labor organizations, and other stakeholders to find
ways to reduce costs, and improve service. As part of that process, we
will continue to monitor the costs and benefits of TWIC, as well as the
external security environment. In all of these matters, our primary
concern is to provide the American people with a secure and efficient
marine transportation system. We know we have more work to do, and we
will ensure Congress is informed of our progress.
Thank you for the opportunity to testify today. I look forward to
your questions.
Mrs. Miller. Thank you very much, Admiral.
The Chairwoman now recognizes Mr. Sadler for his testimony.
STATEMENT OF STEVE SADLER, ASSISTANT ADMINISTRATOR,
TRANSPORTATION SECURITY ADMINISTRATION
Mr. Sadler. Good morning, Chairman Miller, Ranking Member
Jackson Lee, and distinguished Members of the subcommittee.
Thank you for the opportunity to speak with you today about
TSA's role in the TWIC program.
TWIC provides a uniform biometric tamper-resistant
credential that is issued following the successful completion
of the security threat assessment. For those with a business
need, the credential is required to gain unescorted access to
secure areas at port facilities and vessels regulated under the
Maritime Transportation Security Act.
TSA is responsible for enrollment and security threat
assessments, as well as system operations and maintenance. TSA
conducts a comprehensive security threat assessment, and more
than 2.3 million transportation workers hold active TWIC cards.
These credentials represent a capability that didn't previously
exist in the maritime environment.
We have taken the following steps to improve the program
and reduce burden on workers while maintaining the security
objectives of the program. In August 2012, we announced the
Extended Expiration Date TWIC initiative, a one-time effort
that runs through December 2014. This initiative allows workers
to extend their credential for 3 years at half the cost of a 5-
year credential and requires only one visit to an enrollment
center.
Last month, TSA processed over 58,000 requests for TWIC
cards. Of these, almost 23,000 were for the 3-year credential.
This means the travel burden on 39 percent of all current
applicants can be cut in half. To reduce wait times for
workers, we have added customer service representatives and
refined contractual performance standards.
We have developed a web-based process that allows workers
to apply for an Extended Expiration Date TWIC or a replacement
card, and we have a plan to increase mobile enrollment
opportunities. We are in the process of transitioning our
single enrollment and system maintenance contract to two
separate contracts. This will give us better oversight
capability and allow the contractors to focus on their core
functions.
As directed by Congress, we are reforming the program by
implementing the one-visit initiative to enable all workers to
apply for and obtain a credential with a single visit to an
enrollment center. Beginning with a pilot program in Alaska
next month, we will expand the initiative Nation-wide in 2014.
With one visit, an applicant will provide identification
and biometric information during a single visit to an
enrollment center. If approved to receive the credential, TSA
will mail the card directly to the applicants, saving the
applicant time and travel cost. We are more than doubling the
number of enrollment centers from 136 to approximately 300
sites by leveraging existing assets that will allow
transportation workers to apply for a TWIC or hazardous
material endorsement at the same location.
The SAFE Port Act directed DHS to conduct a reader pilot to
test the viability of biometric card readers. Seventeen sites
participated on a voluntary basis. These facilities started
using readers in August 2008, and despite numerous challenges
identified in our report to Congress submitted in February
2012, the pilot generated considerable data that proved helpful
in evaluating reader performance and assessing the impact of
readers at maritime facilities.
We concluded that the reader system functions properly when
designed, installed, and operated in a manner consistent with
the business requirements of the facility or vessel operation.
When TWIC readers are deployed, it will determine whether a
card is authentic, valid, and issued by TSA. They will also
facilitate access control decisions made by port facilities and
vessels. In the biometric mode, readers confirm through a
fingerprint match that the person using the card is the
rightful owner of the card.
Prior to the TWIC program, there was no standard identity
verification or background check policy for entrance to a port
facility or vessel. Today, facility and vessel owners and
operators can look for one identification document based on an
extensive background check.
The use of readers and biometric verification will enhance
security at MTSA-regulated port facilities and vessels. Thank
you for the opportunity to be here today. I look forward to
taking your questions.
[The prepared statement of Mr. Sadler follows:]
Prepared Statement of Steve Sadler
June 18, 2013
Good morning Chairman Miller, Ranking Member Jackson Lee, and
distinguished Members of the subcommittee. Thank you for the
opportunity to testify today about the Transportation Security
Administration's (TSA) role in the Transportation Worker Identification
Credential (TWIC) program.
To fulfill a security mission of such scale, the Department of
Homeland Security (DHS) leverages the expertise of its components to
evaluate the entities that comprise the maritime domain and design
security measures to counter potential threats. TWIC provides a
uniform, industry-wide, biometric, tamper-resistant credential that is
issued following successful completion of a security threat assessment
(STA). Following successful completion of the STA and payment of
relevant fees, eligible maritime workers are provided a tamper-
resistant biometric credential that permits unescorted access to secure
areas of port facilities and vessels regulated by the USCG under MTSA.
These security benefits are most fully realized when the credential is
used in conjunction with readers that can provide electronic
verification.
TSA and the United States Coast Guard (USCG) jointly administer the
fee-based TWIC program, which was established under Section 102 of the
Maritime Transportation Security Act (MTSA) of 2002. The Act required
the Secretary (at the time the Secretary of the Department of
Transportation) to issue biometric transportation security cards to
prevent unauthorized individuals from entering an area of a vessel or
facility designated as a secure area. Currently, TSA is responsible for
enrollment, STAs, and systems operations and maintenance related to
TWICs while the USCG is responsible for establishing and enforcing
access control standards including requirements for TWIC readers at
MTSA-regulated facilities and vessels.
TSA began National deployment of the TWIC program on October 16,
2007, with the enrollment of maritime workers at the Port of
Wilmington, DE. Since that time, TSA has conducted comprehensive STAs
and issued TWIC credentials to over 2.5 million workers while
identifying and preventing approximately 50,000 TWIC applicants who did
not meet the required security standards from receiving a TWIC.
twic: meeting industry needs and security requirements
The TWIC program represents an important maritime security measure
by allowing facility and vessel security operators to verify that the
holder has successfully passed the STA, through possession and visual
inspection of the TWIC credential. Workers at the approximately 13,825
vessels and 3,270 maritime facilities that the USCG regulates under
MTSA have been required to present their TWIC for unescorted entry to
secure areas of those facilities since mid-April 2009. Until TWIC
readers are in place, security access personnel are required to
visually inspect the TWIC prior to granting unescorted access to secure
areas on-board regulated vessels and at facilities.
TWIC reader systems are designed to determine whether a card is
authentic, valid, and issued by TSA. The readers also check that the
card has not expired and, by accessing the cancelled card list, can
determine if the card has been revoked or reported lost or stolen. When
used in the biometric mode, readers confirm through a fingerprint match
that the person using the card is the rightful owner of the card. The
TWIC card and reader system can perform these checks virtually anywhere
with portable or fixed readers because connectivity to an external
database is not required.
A TWIC is valid for 5 years. The cost is $129.75, unless a worker
has a comparable STA and uses it to establish TWIC eligibility, in
which case the cost is $105.25. In late August 2012, DHS announced the
Extended Expiration Date (EED) initiative under which eligible workers
have been able to submit a request to extend the expiration date on
their TWIC by 3 years and pay a $60 card replacement fee. The EED is a
one-time initiative through December 31, 2014. The TWIC reader
requirements have been proposed by USCG in a Notice of Proposed
Rulemaking published on March 22, 2013. The NPRM proposals, if
finalized as published, would require TWIC readers for certain high-
risk vessels and facilities. Use of readers at these sites would
enhance security by verifying the validity of the TWIC card as well as
the identity of the card owner.
TSA is committed to partnerships with stakeholders, including the
private sector, to carry out its mission. To meet the demands of the
TWIC program, the TSA will provide MTSA-regulated facility owners and
operators with a list of TWIC readers that meet current TWIC
specifications as outlined in current guidance. TSA established the
Qualified Technology List (QTL) process on November 1, 2012, with the
announcement that three National Voluntary Laboratory Accreditation
Program laboratories were accredited to accept readers for compliance
testing.
``onevisit'' initiative and other plans to enhance customer service
TSA will soon implement the ``OneVisit'' initiative to facilitate
card issuance to eligible applicants and individuals needing a
replacement TWIC. The initiative will enable individuals to apply for
and obtain a TWIC with a single visit to an enrollment center and will
begin with a pilot in Alaska this summer and expand Nation-wide in 2014
after TSA carefully evaluates the pilot results. Under ``OneVisit,'' an
applicant will visit an enrollment center to provide identification and
biometric information. Upon successful completion of an STA, TSA will
directly mail a card to the applicant. ``OneVisit'' will eliminate the
need for the transportation worker to make a follow-up visit to an
enrollment center to activate the card and select a Personal
Identification Number (PIN). Eliminating this second visit saves the
applicant time and travel costs, as well as easing crowding at
enrollment centers.
The Coast Guard and Maritime Transportation Act of 2012 mandates
that, within 270 days from the date of enactment, DHS reform the
process for TWIC enrollment, activation, issuance, and renewal to
require no more than one in-person visit to a designated enrollment
center, except in cases where extenuating circumstances exist requiring
more than one visit. DHS made clear that, while a plan would be
initiated within 270 days to reform the process, it would likely take
additional time to fully implement the provision in a manner that
preserved the security of the credential.
In addition to ``OneVisit,'' TSA is committed to providing enhanced
customer service in a variety of ways. TSA will expand the number of
TWIC enrollment centers from 136 to approximately 300 sites by
transitioning Hazardous Materials Endorsement (HME)/TWIC enrollments
sites to Universal Enrollment Service Centers. This will permit
individuals to apply for a TWIC or HME at the same location, and
shorten travel distances for many applicants. TSA is also increasing
its oversight of customer service at our enrollment centers and has
added call center representatives to reduce call wait times.
the twic reader pilot
In October 2006, pursuant to the SAFE Port Act, Congress mandated
that DHS conduct a TWIC reader pilot to inform reader requirements
prior to Nation-wide implementation and test the viability of selected
biometric card readers while examining the technical aspects of
connecting TWIC readers to access control systems. Seventeen sites
participated in the reader pilot on a voluntary basis. These facilities
used readers in conjunction with TWICs starting in August 2008. The
pilot faced several constraints, including extreme differences in the
nature of operations at participating sites. Additionally, the
participating sites had to ensure that the use of the new readers and
test protocols did not interfere with the security and daily operations
of the facilities. Notwithstanding these challenges, the TWIC reader
pilot generated considerable data that proved helpful in evaluating
reader performance and assessing the impact of using readers at
maritime facilities.
Following analysis of the pilot results, TSA concluded that TWIC
reader systems function properly when they are designed, installed, and
operated in a manner consistent with the characteristics and business
needs of the facility or vessel operation. TSA also found that reader
systems can facilitate access decisions efficiently and effectively
despite the operational and technological difficulties that affected
performance at some pilot locations. While a recent Government
Accountability Office (GAO) report evaluating the results of the TWIC
reader pilot program concluded that that DHS should not use the
analysis of the pilot program as basis for developing the final TWIC
reader regulation, the pilot did produce valuable information
concerning the environmental, operational, and fiscal impacts of the
use of TWIC readers.
conclusion
Prior to the TWIC program, there was no standard identity
verification or background check policy for entrance to a port facility
or vessel. This created opportunities for fraud as well as security
risks. Today, facility and vessel owners and operators look for one
standard identification document that confirms the holder's identity
and verifies that he or she successfully completed an STA. The use of
readers and biometric verification will enhance security at MTSA-
regulated port facilities and vessels.
TSA and its partners have taken significant steps to add layers of
security to protect our Nation's port facilities and vessels. These
steps link together information sharing, security, and law enforcement
from across TSA, USCG, DHS, and a multitude of partnerships. Each
security layer builds upon and complements the others. TWIC is one of
those layers. Thank you for the opportunity to discuss the TWIC
program. I am available to answer any questions.
Mrs. Miller. Thank you very much.
The Chairwoman now recognizes Mr. Lord.
STATEMENT OF STEPHEN M. LORD, DIRECTOR, FORENSIC AUDITS AND
INVESTIGATIVE SERVICES, U.S. GOVERNMENT ACCOUNTABILITY OFFICE
Mr. Lord. Good morning, Chairwoman Miller, Ranking Member
Jackson Lee, and other distinguished Members of the committee.
I am really pleased to be here today to discuss our recent work
on the TWIC pilot. As context, I would like to note that GAO
has conducted an extensive body of work on a TWIC program
spanning several years, which I believe gives me some unique
insights to come in on the program today.
The overall message that I wanted to convey today--I think
this is a very important message--is that the pilot results
reported to Congress in February 2012 should not be used as a
basis to inform the current rulemaking or to inform decision-
making. Why is that? As we noted in our May 2000 report, we
identified a number of planning, data collection, and reporting
challenges that we believe made the pilot results unreliable.
I am a little surprised to see on the March 22 NPRM that
the Coast Guard concluded that the cards function properly and
enhance security, as we found this very difficult to
extrapolate from the pilot results.
In terms of planning, we think it is notable that DHS did
take some important initial steps to address the pilot planning
issues we identified in our 2009 report. At the same time, it
did not develop an evaluation plan or performance standards as
we recommended. In terms of data collection, we identified
several limitations in the way data was collected during the
pilot. For example, TSA and the independent test agent did not
always record clear baseline data for comparing reader
performance. They also did not collect complete data on card
failures or the reasons an individual was denied access to a
facility.
Also, the operational impact of using TWICs, that was one
of the key purposes of the pilot, with readers was not
consistently documented across pilot sites. As a result of
these challenges, this made it really difficult to determine
whether the problems encountered at the pilot sites were due to
the card itself, the card reader, or the way the users were
using them or a combination of all three.
In terms of the report to Congress, we found that some of
the information in the report was not always supported by the
pilot data. For example, assessments of entry times at ports--
this is really important piece of data--the throughput times
were--seem to have been mixed up with the reader response time,
which is calculated in a controlled laboratory setting.
DHS's report also stated that the TWIC readers can enhance
security, even though that type of data was not collected
during the pilot, nor was it a purpose of the pilot. Thus, it
is still unclear how TWICs--using TWICs with readers will
improve security even though we recommended that the Department
assess this in our May 2011 report.
To be fair, DHS officials, TSA officials did note that
several challenges affected their ability to collect reliable
data. For example, TSA noted that pilot participation was
voluntary and, in some cases, it was analogous to herding cats.
It is difficult to ensure consistency.
TSA and the Coast Guard also said the independent test
agent did not always collect and record key data consistently.
We spoke to the independent test agent. He identified some
resource constraints. Basically, they didn't have the physical
presence in all locations to really figure out why the cards
weren't working. However, we believe these risks could have
been mitigated through better pilot planning and
implementation.
In closing, given the many issues we identified, we believe
Congress should consider repealing the requirement that the
final regulations for the card readers be consistent with the
findings of the pilot. Essentially, we think those two events
should be de-linked.
Instead, we still believe Congress should require DHS to
complete a security assessment to clearly show how using TWICs
with readers will actually improve security over and above the
systems that are already in place. This is something we
recommended in our May 2011 report, which is still an open
recommendation. As part of this assessment, we believe they
should consider alternative credentialing approaches, including
consideration of a more decentralized approach. We think it is
really important to look at other approaches for achieving the
same goal.
Madam Chairwoman, other Members of the committee, this
concludes my prepared statement. I look forward to your
questions. Thank you.
[The prepared statement of Mr. Lord follows:]
Prepared Statement of Stephen M. Lord
June 18, 2013
transportation worker identification credential.--card reader pilot
results are unreliable; security benefits should be reassessed
gao-13-695t
Chairman Miller, Ranking Member Jackson Lee, and Members of the
subcommittee: I am pleased to be here today to discuss our work
examining the Department of Homeland Security's (DHS) Transportation
Worker Identification Credential (TWIC) program. Ports, waterways, and
vessels handle billions of dollars in cargo annually, and an attack on
our Nation's maritime transportation system could have serious
consequences. Maritime workers, including longshoremen, mechanics,
truck drivers, and merchant mariners, access secure areas of the
Nation's estimated 16,400 maritime-related transportation facilities
and vessels, such as cargo container and cruise ship terminals, each
day while performing their jobs.\1\
---------------------------------------------------------------------------
\1\ For the purposes of this statement, the term ``maritime-related
transportation facilities'' refers to seaports, inland ports, offshore
facilities, and facilities located on the grounds of ports.
---------------------------------------------------------------------------
The TWIC program is intended to provide a tamper-resistant
biometric credential \2\ to maritime workers who require unescorted
access to secure areas of facilities and vessels regulated under the
Maritime Transportation Security Act of 2002 (MTSA).\3\ TWIC is to
enhance the ability of MTSA-regulated facility and vessel owners and
operators to control access to their facilities and verify workers'
identities. Under current statute and regulation, maritime workers
requiring unescorted access to secure areas of MTSA-regulated
facilities or vessels are required to obtain a TWIC,\4\ and facility
and vessel operators are required by regulation to visually inspect
each worker's TWIC before granting unescorted access.\5\ Prior to being
granted a TWIC, maritime workers are required to undergo a background
check, known as a security threat assessment.
---------------------------------------------------------------------------
\2\ A biometric access control system consists of technology that
determines an individual's identity by detecting and matching unique
physical or behavioral characteristics, such as fingerprint or voice
patterns, as a means of verifying personal identity.
\3\ Pub. L. No. 107-295, 116 Stat. 2064. According to Coast Guard
regulations, a secure area is an area that has security measures in
place for access control. 33 C.F.R. 101.105. For most maritime
facilities, the secure area is generally any place inside the outermost
access control point. For a vessel or outer continental shelf facility,
such as offshore petroleum or gas production facilities, the secure
area is generally the whole vessel or facility. A restricted area is a
part of a secure area that needs more limited access and higher
security. Under Coast Guard regulations, an owner/operator must
designate certain specified types of areas as restricted. For example,
storage areas for cargo are restricted areas under Coast Guard
regulations. 33 C.F.R. 105.260(b)(7).
\4\ 46 U.S.C. 70105(a); 33 C.F.R. 101.514.
\5\ 33 C.F.R. 104.265(c), 105.255(c).
---------------------------------------------------------------------------
Within DHS, the Transportation Security Administration (TSA) and
the U.S. Coast Guard (USCG) jointly administer the TWIC program. USCG
is leading efforts to develop a new TWIC regulation (rule) regarding
the use of TWIC cards with readers (known as the TWIC card reader
rule). The TWIC card reader rule is expected to define if and under
what circumstances facility and vessel owners and operators are to use
electronic card readers to verify that a TWIC card is valid. USCG
published the TWIC card reader notice of proposed rulemaking (NPRM) on
March 22, 2013, and has since extended the public comment period to
June 20, 2013.\6\
---------------------------------------------------------------------------
\6\ 78 Fed. Reg. 17,782 (Mar. 22, 2013); 78 Fed. Reg. 27,335 (May
10, 2013).
---------------------------------------------------------------------------
To help inform this rulemaking and to fulfill the Security and
Accountability For Every Port Act of 2006 (SAFE Port Act)
requirement,\7\ TSA conducted a TWIC reader pilot from August 2008
through May 2011 to test a variety of biometric readers, as well as the
credential authentication and validation process. The TWIC reader
pilot, implemented with the voluntary participation of maritime port,
facility, and vessel operators, was to test the technology, business
processes, and operational impacts of deploying card readers at
maritime facilities and vessels prior to issuing a final rule.\8\ Among
other things, the SAFE Port Act required that DHS submit a report on
the findings of the pilot program to Congress.\9\ DHS submitted its
report to Congress on the findings of the TWIC reader pilot on February
27, 2012.\10\ The Coast Guard Authorization Act of 2010 required that,
among other things, GAO conduct an assessment of the report's findings
and recommendations.\11\
---------------------------------------------------------------------------
\7\ Pub. L. No 109-347, 104(a), 120 Stat. 1884, 1888 (codified at
46 U.S.C. 70105(k)).
\8\ The SAFE Port Act required the Secretary of Homeland Security
to conduct a pilot program to test the business processes, technology,
and operational impacts required to deploy transportation security card
readers at secure areas of the maritime transportation system. 46
U.S.C. 70105(k)(1)(A).
\9\ 46 U.S.C. 70105(k)(4).
\10\ Department of Homeland Security, Transportation Worker
Identification Credential Reader Pilot Program: In accordance with
Section 104 of the Security and Accountability For Every Port Act of
2006, Pub. L. 109-347 (SAFE Port Act) Final Report. Feb. 17, 2012.
\11\ Pub. L. No. 111-281, 802, 124 Stat. 2905, 2989.
---------------------------------------------------------------------------
We have been reporting on TWIC progress and challenges since
September 2003.\12\ Among other issues, we highlighted steps that TSA
and USCG were taking to meet an expected surge in initial enrollment as
well as various challenges experienced in the TWIC testing conducted by
a contractor for TSA and USCG from August 2004 through June 2005. We
also identified challenges related to ensuring that the TWIC technology
works effectively in the harsh maritime environment.\13\ In November
2009, we reported on the design and approach of a pilot initiated in
August 2008 to test TWIC readers, and found that DHS did not have a
sound evaluation methodology to ensure information collected through
the TWIC reader pilot would be complete and accurate.\14\ Moreover, in
May 2011, we reported that internal control weaknesses governing the
enrollment, background checking, and use of TWIC potentially limit the
program's ability to provide reasonable assurance that access to secure
areas of MTSA-regulated facilities is restricted to qualified
individuals.\15\
---------------------------------------------------------------------------
\12\ GAO, Maritime Security: Progress Made in Implementing Maritime
Transportation Security Act, but Concerns Remain, GAO-03-1155T
(Washington, DC: Sept. 9, 2003).
\13\ GAO, Transportation Security: DHS Should Address Key
Challenges Before Implementing the Transportation Worker Identification
Credential Program, GAO-06-982 (Washington, DC: Sept. 29, 2006). TWIC
readers and related technologies operated outdoors in the harsh
maritime environment can be affected by dirt, salt, wind, and rain.
\14\ GAO, Transportation Worker Identification Credential: Progress
Made in Enrolling Workers and Activating Credentials but Evaluation
Plan Needed to Help Inform the Implementation of Card Readers, GAO-10-
43 (Washington, DC: Nov. 18, 2009).
\15\ GAO, Transportation Worker Identification Credential: Internal
Control Weaknesses Need to Be Corrected to Help Achieve Security
Objectives, GAO-11-657 (Washington, DC: May 10, 2011).
---------------------------------------------------------------------------
My statement today highlights the key findings of our May 8, 2013,
report on the TWIC program, which addressed the extent to which the
results from the TWIC reader pilot were sufficiently complete,
accurate, and reliable for informing Congress and the TWIC card reader
rule.\16\ For the report, among other things, we assessed the methods
used to collect and analyze pilot data since the inception of the pilot
in August 2008. We analyzed and compared the pilot data with the TWIC
reader pilot report submitted to Congress to determine whether the
findings in the report are based on sufficiently complete, accurate,
and reliable data. Additionally, we interviewed officials at DHS, TSA,
and USCG with responsibilities for overseeing the TWIC program, as well
as pilot officials responsible for coordinating pilot efforts with TSA
and the independent test agent (responsible for planning, evaluating,
and reporting on all test events), about TWIC reader pilot testing
approaches, results, and challenges. Our investigators also conducted
limited covert testing of TWIC program internal controls for acquiring
and using TWIC cards at four maritime ports to update our understanding
of the effectiveness of TWIC at enhancing maritime security since we
reported on these issues in May 2011. Our May 2013 report includes
additional details on our scope and methodology. We conducted this work
in accordance with generally accepted Government auditing standards,
and conducted the related investigative work in accordance with
standards prescribed by the Council of the Inspectors General on
Integrity and Efficiency.
---------------------------------------------------------------------------
\16\ GAO, Transportation Worker Identification Credential: Card
Reader Pilot Results Are Unreliable; Security Benefits Need to Be
Reassessed, GAO-13-198 (Washington, DC: May 8, 2013).
---------------------------------------------------------------------------
twic reader pilot results are not sufficiently complete, accurate, and
reliable for informing congress and the twic card reader rule
Our review of the pilot test identified several challenges related
to pilot planning, data collection, and reporting, which affected the
completeness, accuracy, and reliability of the results.
Pilot Planning
DHS did not correct planning shortfalls that we identified in our
November 2009 report.\17\ We determined that these weaknesses presented
a challenge in ensuring that the pilot would yield information needed
to inform Congress and the card reader rule and recommended that DHS
components implementing the pilot--TSA and USCG--develop an evaluation
plan to guide the remainder of the pilot and identify how it would
compensate for areas where the TWIC reader pilot would not provide the
information needed. DHS agreed with the recommendations; however, while
TSA developed a data analysis plan, TSA and USCG reported that they did
not develop an evaluation plan with an evaluation methodology or
performance standards, as we recommended. The data analysis plan was a
positive step because it identified specific data elements to be
captured from the pilot for comparison across pilot sites. If accurate
data had been collected, adherence to the data analysis plan could have
helped yield valid results. However, TSA and the independent test agent
did not utilize the data analysis plan.\18\ According to officials from
the independent test agent, they started to use the data analysis plan
but stopped using the plan because they were experiencing difficulty in
collecting the required data and TSA directed them to change the
reporting approach. TSA officials stated that they directed the
independent test agent to change its collection and reporting approach
because of TSA's inability to require or control data collection to the
extent required to execute the plan.
---------------------------------------------------------------------------
\17\ GAO-10-43.
\18\ To conduct the TWIC reader pilot, TSA contracted with the
Navy's Space and Naval Warfare Systems Command (SPAWAR) to serve as the
independent test agent to plan, analyze, evaluate, and report on all
test events.
---------------------------------------------------------------------------
Data Collection
We identified eight areas where TWIC reader pilot data collection,
supporting documentation, and recording weaknesses affected the
completeness, accuracy, and reliability of the pilot data.
1. Installed TWIC readers and access control systems could not
collect required data on TWIC reader use, and TSA and the
independent test agent did not employ effective compensating
data collection measures.--The TWIC reader pilot test and
evaluation master plan recognizes that in some cases, readers
or related access control systems at pilot sites may not
collect the required test data, potentially requiring
additional resources, such as on-site personnel, to monitor and
log TWIC card reader use issues. Moreover, such instances were
to be addressed as part of the test planning. However, the
independent test agent reported challenges in sufficiently
documenting reader and system errors. For example, the
independent test agent reported that the logs from the TWIC
readers and related access control systems were not detailed
enough to determine the reason for errors, such as biometric
match failure, an expired TWIC card, or that the TWIC was
identified as being on the list of revoked credentials. The
independent test agent further reported that the inability to
determine the reason for errors limited its ability to
understand why readers were failing, and thus it was unable to
determine whether errors encountered were due to TWIC cards,
readers, or users, or some combination thereof.
2. Reported transaction data did not match underlying
documentation.--A total of 34 pilot site reports were issued by
the independent test agent. According to TSA, the pilot site
reports were used as the basis for DHS's report to Congress. We
separately requested copies of the 34 pilot site reports from
both TSA and the independent test agent. In comparing the
reports provided, we found that 31 of the 34 pilot site reports
provided to us by TSA did not contain the same information as
those provided by the independent test agent. Differences for
27 of the 31 pilot site reports pertained to how pilot site
data were characterized, such as the baseline throughput time
used to compare against throughput times observed during two
phases of testing. However, at two pilot sites, Brownsville and
Staten Island Ferry, transaction data reported by the
independent test agent did not match the data included in TSA's
reports. Moreover, data in the pilot site reports did not
always match data collected by the independent test agent
during the pilot.
3. Pilot documentation did not contain complete TWIC reader and
access control system characteristics.--Pilot documentation did
not always identify which TWIC readers or which interface
(e.g., contact or contact-less interface) the reader used to
communicate with the TWIC card during data collection.\19\ For
example, at one pilot site, two different readers were tested.
However, the pilot site report did not identify which data were
collected using which reader.
---------------------------------------------------------------------------
\19\ As used in this statement, ``contact-less mode'' refers to the
use of TWIC readers for reading TWIC cards without requiring that a
TWIC card be inserted into or make physical contact with a TWIC reader.
4. TSA and the independent test agent did not record clear baseline
data for comparing operational performance at access points
with TWIC readers.--Baseline data, which were to be collected
prior to piloting the use of TWIC with readers, were to be a
measure of throughput time, that is, the time required to
inspect a TWIC card and complete access-related processes prior
to granting entry. However, it is unclear from the
documentation whether acquired data were sufficient to reliably
identify throughput times at truck, other vehicle, and
---------------------------------------------------------------------------
pedestrian access points, which may vary.
5. TSA and the independent test agent did not collect complete data
on malfunctioning TWIC cards.--TSA officials observed
malfunctioning TWIC cards during the pilot, largely because of
broken antennas. If a TWIC with a broken antenna was presented
for a contactless read, the reader would not identify that a
TWIC had been presented, as the broken antenna would not
communicate TWIC information to a contactless reader. In such
instances, the reader would not log that an access attempt had
been made and failed.
6. Pilot participants did not document instances of denied
access.--Incomplete data resulted from challenges documenting
how to manage individuals with a denied TWIC across pilot
sites. Specifically, TSA and the independent test agent did not
require pilot participants to document when individuals were
granted access based on a visual inspection of the TWIC, or
deny the individual access as may be required under future
regulation. This is contrary to the TWIC reader pilot test and
evaluation master plan, which calls for documenting the number
of entrants ``rejected'' with the TWIC card reader system
operational as part of assessing the economic impact. Without
such documentation, the pilot sites were not completely
measuring the operational impact of using TWIC with readers.
7. TSA and the independent test agent did not collect consistent
data on the operational impact of using TWIC cards with
readers.--TWIC reader pilot testing scenarios included having
each individual present his or her TWIC for verification;
however, it is unclear whether this actually occurred in
practice. For example, at one pilot site, officials noted that
during testing, approximately 1 in 10 individuals was required
to have his or her TWIC checked while entering the facility
because of concerns about causing a traffic backup. Despite
noted deviations in test protocols, the reports for these pilot
sites do not note that these deviations occurred. Noting
deviations in each pilot site report would have provided
important perspective by identifying the limitations of the
data collected at the pilot site and providing context when
comparing the pilot site data with data from other pilot sites.
8. Pilot site records did not contain complete information about
installed TWIC readers' and access control systems' design.--
TSA and the independent test agent tested the TWIC readers at
each pilot site to ensure they worked before individuals began
presenting their TWIC cards to the readers during the pilot.
However, the data gathered during the testing were incomplete.
For example, 10 of 15 sites tested readers for which no record
of system design characteristics were recorded. In addition,
pilot reader information was identified for 4 pilot sites but
did not identify the specific readers or associated software
tested.
According to TSA, a variety of challenges prevented TSA and the
independent test agent from collecting pilot data in a complete and
consistent fashion. Among the challenges noted by TSA: (1) Pilot
participation was voluntary, which allowed pilot sites to stop
participation at any time or not adhere to established testing and data
collection protocols; (2) the independent test agent did not correctly
and completely collect and record pilot data; (3) systems in place
during the pilot did not record all required data, including
information on failed TWIC card reads and the reasons for the failure;
and (4) prior to pilot testing, officials did not expect to confront
problems with nonfunctioning TWIC cards. Additionally, TSA noted that
it lacked the authority to compel pilot sites to collect data in a way
that would have been in compliance with Federal standards. In addition
to these challenges, the independent test agent identified the lack of
a database to track and analyze all pilot data in a consistent manner
as an additional challenge to data collection and reporting. The
independent test agent, however, noted that all data collection plans
and resulting data representation were ultimately approved by TSA and
USCG.
Reporting
As required by the SAFE Port Act and the Coast Guard Authorization
Act of 2010, DHS's report to Congress on the TWIC reader pilot
presented several findings with respect to technical and operational
aspects of implementing TWIC technologies in the maritime environment.
However, DHS's reported findings were not always supported by the pilot
data, or were based on incomplete or unreliable data, thus limiting the
report's usefulness in informing Congress about the results of the TWIC
reader pilot. For example, reported entry times into facilities were
not based on data collected at pilot sites as intended. Further, the
report concluded that TWIC cards and readers provide a critical layer
of port security, but data were not collected to support this
conclusion.
Because of the number of concerns that we identified with the TWIC
pilot, in our March 13, 2013, draft report to DHS, we recommended that
DHS not use the pilot data to inform the upcoming TWIC card reader
rule. However, after receiving the draft that we sent to DHS for
comment, on March 22, 2013, USCG published the TWIC card reader NPRM,
which included results from the TWIC card reader pilot.\20\ We
subsequently removed the recommendation from our final report, given
that USCG had moved forward with issuing the NPRM and had incorporated
the pilot results into the proposed rulemaking. In its official
comments on our report, DHS asserted that some of the perceived data
anomalies we cited were not significant to the conclusions TSA reached
during the pilot and that the pilot report was only one of multiple
sources of information available to USCG in drafting the TWIC reader
NPRM. We recognize that USCG had multiple sources of information
available to it when drafting the proposed rule; however, the pilot was
used as an important basis for informing the development of the NPRM,
and the issues and concerns that we identified remain valid.
---------------------------------------------------------------------------
\20\ 78 Fed. Reg. 17,782 (Mar. 22, 2013).
---------------------------------------------------------------------------
Given that the results of the pilot are unreliable for informing
the TWIC card reader rule on the technology and operational impacts of
using TWIC cards with readers, we recommended that Congress consider
repealing the requirement that the Secretary of Homeland Security
promulgate final regulations that require the deployment of card
readers that are consistent with the findings of the pilot program,\21\
and that Congress should consider requiring that the Secretary of
Homeland Security complete an assessment that evaluates the
effectiveness of using TWIC with readers for enhancing port security.
This would be consistent with the recommendation that we made in our
May 2011 report. These results could then be used to promulgate a final
regulation as appropriate. Given DHS's challenges in implementing TWIC
over the past decade, at a minimum, the assessment should include a
comprehensive comparison of alternative credentialing approaches, which
might include a more decentralized approach, for achieving TWIC program
goals.
---------------------------------------------------------------------------
\21\ 46 U.S.C. 70105(k)(3).
---------------------------------------------------------------------------
Chairman Miller, Ranking Member Jackson Lee, and Members of the
subcommittee, this concludes my prepared statement. I would be happy to
respond to any questions that you may have.
Mrs. Miller. I thank the gentleman. The Chairwoman now
recognizes Captain Woodring.
STATEMENT OF CAPTAIN MARCUS WOODRING, USCG (RET), MANAGING
DIRECTOR, HEALTH, SAFETY, SECURITY, AND ENVIRONMENTAL, PORT OF
HOUSTON AUTHORITY
Captain Woodring. Good morning, Chairman Miller, Ranking
Member Jackson Lee, and distinguished Members of the
subcommittee. We would like to thank Chairman Miller for
holding this important hearing today. I must also recognize
Ranking Member Jackson Lee for inviting the Port of Houston
Authority as the industry witness. As you know, the port of
Houston is in the Ranking Member's district, and we have
benefited from both her leadership and advocacy on behalf of
the port.
The port of Houston is comprised of the Port Authority's
eight public terminals, along with more than 150 private
terminals. The port is consistently ranked first in the United
States in foreign waterborne tonnage, first in imports, second
in export tonnage, and second in total tonnage. The port of
Houston is also home to the largest petrochemical complex in
the Nation.
Results of a recent economic impact study show that ship
channel-related businesses at the port of Houston are
responsible for more than 2.1 million jobs and annually
generate $499 billion in economic activity, contributing over
$52 billion in tax revenue Nationally.
The Port of Houston Authority was not part of the TWIC
reader pilot program but has been utilizing installed TWIC
readers since 2008, so we speak from real-world experience. The
Port of Houston Authority started very early, with the
installation of access point hardware, which could utilize the
features of the TWIC card. The initial infrastructure was
purchased with close to $10 million in port security grant
funding.
The Port of Houston Authority currently has over 350 access
points that can read the TWIC card, of which 73 are biometric.
Not all access points used the biometric or coded access
technology due to the tremendous flow of commerce through our
gates. Our Bayport container terminal, for example, handles
close to 19,000 vehicles a week. To facilitate commerce, we
currently use the TWIC as a flash pass in our vehicle entrance
lanes in conjunction with our visitor management system.
Let me expand on that point for just one moment. Having a
TWIC is just one part of the regulated access control. I have a
TWIC, but that does not give me unfettered access to any
restricted port in the country. I must also have a valid
business reason to be there. Management of that validation is
left to terminal operators.
For repeat visitors, we issue a Port of Houston Authority
ID card. For occasional visitors, we have designated certain
trusted agents to enter names into our visitor management
system. On any given day, we average over 3,000 names in that
system, all that have a valid business reason for being on-
board our facilities and overall have more than 35,000 TWIC
cards registered with our credentialing office. The key
takeaway is the possession of a TWIC itself is just a piece of
the overall security process.
During my time as captain of the port for the U.S. Coast
Guard, the TWIC was first being introduced and issued in
Houston. It took me several months to obtain my initial TWIC
card. I recently applied for the 3-year extension and witnessed
some process improvements.
I would also like to note that when I was with the U.S.
Coast Guard, I had the pleasure of accompanying the Ranking
Member Jackson Lee to the TWIC office in Houston to activate
her card in August 2008. Ma'am, I would like to take this
opportunity to remind you that your card expires in 60 days.
[Laughter.]
Captain Woodring. The benefits of the TWIC reader program
are clear. Individuals have a Federally-issued tamper-proof
credential that can be used Nation-wide. The program ensures
that individuals have been screened against the terrorism
database, something I cannot do. The threat of a transportation
security incident is reduced at the macro level, but there are
still gaps in the system.
Most ports issue their own credentials in addition to the
TWIC card. I personally carry a port of Houston ID and my TWIC
card on a daily basis. Secondly, the background check is only
conducted at a very high level for very serious crimes. As a
facility owner and operator, we strive to prevent any crime on
our docks and still conduct our own local background checks on
our employees for lesser crimes, such as driving while
intoxicated, theft, or assault. These lesser crimes are just as
important to us.
Finally, the TWIC background check is a snapshot in time.
Unless self-reported, there does not appear to be a constant
and on-going linkage between the TWIC issuance and local
criminal databases. Currently, the background check of the TWIC
program is only as good as the day it was conducted.
I would like to leave the subcommittee with two thoughts
today. The Port of Houston Authority has received over $60
million in port security grant funding, and it continues to be
vital to our security posture. We are in the process of making
application for the 2013 port security grants, one of which
will request handheld TWIC readers. It is critical to our
National security that the port security grant program remain
independent of other grant programs and that the erosion of the
funding level ceases.
Second, the initial intent of the Transportation Worker
Identification Credential program was to credential all
transportation workers in all transportation modes. It was
envisioned as a Nation-wide solution to be used at airports,
seaports, rail, pipeline, trucking, and other mass transit.
Someday this program will theoretically expand to all those
modes of transportation, and what comes out of hearings such as
this will more broadly impact the future of the TWIC program.
Thank you, and I look forward to your questions.
[The prepared statement of Captain Woodring follows:]
Prepared Statement of Captain Marcus Woodring
June 18, 2013
Chairman Miller, Ranking Member Jackson Lee, and Members of the
subcommittee, I am Marcus Woodring. I serve as the managing director
for health, safety, security, and environmental (HSSE) at the Port of
Houston Authority.
We would like to thank Chairman Miller for holding this important
and vital hearing today. I must also recognize Ranking Member Jackson
Lee for inviting the Port of Houston Authority as the industry witness.
As you may know, the port of Houston is in the Ranking Member's
district and we have benefitted from her leadership and advocacy on
behalf of the port.
Security of our Nation's borders, both land and maritime, is a
vexing problem with many different components and concerns. While I
certainly do not have the solutions to all the challenges, I can tell
you about our maritime port facilities, how we operate, and the impact
of the TWIC program.
First, let me begin by giving you a short background about myself.
I earned an undergraduate degree at Brown University, and a Masters
degree at Cornell University. I'm fairly new at the Port of Houston
Authority, having been hired in 2011 after ``retiring'' from a 27-plus
year career in the U.S. Coast Guard. My U.S. Coast Guard service
culminated as the Captain of the Port for the Houston region.
There is a saying that if you've seen one port, you've seen one
port--every port in the country is organized differently. But let me
tell you about ours. The port of Houston is comprised of the Port
Authority's eight public terminals along with 150-plus private
industrial terminals along the 25-mile long upper Houston Ship Channel.
Each year, more than 229 million tons of cargo moves through the
port of Houston, with more than 8,100 vessel calls and 200,000 barge
transits, trading with over 200 countries around the globe. The port is
consistently ranked first in the United States in foreign waterborne
tonnage, first in U.S. imports, and second in U.S. export tonnage, and
it is also ranked second in the United States in total tonnage.
The port of Houston is the largest importer and exporter of
petroleum and petroleum products in the United States, which is no
surprise, as it is home to the largest petrochemical complex in the
United States, and is the second-largest petrochemical complex in the
world.
As one of the world's busiest ports, the port of Houston is a large
and vibrant component of the regional economy. Results of a recent
economic impact study show that ship channel-related businesses at the
port of Houston were responsible for more than 1 million jobs
throughout Texas. This activity helped generate more than $178.5
billion in State-wide economic impact and more than $4.5 billion in
annual State and local tax revenues. For the United States, the port's
impact is even greater, with 2.1 million jobs, $499 billion in economic
activity and $52.1 billion in tax revenue.
Considering this economic impact and the volume of cargo traveling
the waterways of the port of Houston, there are potentially significant
National implications should a Transportation Security Incident occur
within our maritime domain. Now I will get more specific in answering
the questions on today's agenda.
(1) current use of twic readers
I have read the recent GAO report, but the Port of Houston
Authority was not part of the TWIC Reader Pilot Program. Instead, we
have been utilizing installed TWIC readers since 2008, so I will speak
from that experience. In an attempt to meet the ``spirit of the
regulations'', the Port of Houston Authority started very early with
the installation of access point hardware which could utilize the
features of the TWIC card. The initial phases of the TWIC reader
installation project was funded close to $10 million dollars in Port
Security Grant funding ($6.3 million in Round 5, $1.7 million in Round
7, and $1.2 million in Round 8). The Port of Houston Authority
currently has over 350 access points which can read the TWIC card, of
which 73 are biometric.
Not all access points use the biometric or coded access technology
due to the tremendous flow of commerce through our gates. For example,
the Bayport Container Terminal handles close to 19,000 vehicles a week.
That equates to an average of almost two trucks per minute, around the
clock, at just one of our three major terminals. To facilitate
commerce, we currently use the TWIC as a ``flash pass'' in our vehicle
entrance lanes, in conjunction with our Visitor Management System
(VMS).
Let me expand on that point for a moment, having a TWIC is just one
part of regulated access control. I have a TWIC, but that does not give
me unfettered access to any restricted port in the country. I must also
have ``a valid business reason'' to access the restricted or secure
area. Management of the validation of that ``business reason'' is left
to terminal operators, and managed at the Port of Houston Authority by
our Credentialing Office. For our repeat visitors, we issue a Port of
Houston Authority ID card. For occasional visitors, we have designated
certain ``trusted agents'' to enter names into our Visitor Management
System. On any given day, we average over 3,000 names in our system
that all have a ``valid business reason'' for being on-board our
facilities, and overall have 35,000 TWIC cards registered with our
Credentialing Office. The key ``take-away'' is that possession of a
TWIC itself is just a piece of the overall security process.
(2) enrollment and issuance of twic
In 2008, during my time as Captain of the Port for the U.S. Coast
Guard, the TWIC was first being introduced and issued in Houston. I
heard many stories about the issuance process and while not required by
law to obtain a TWIC (my military ID and status as a member of the U.S.
Coast Guard precluded the requirement), I chose to personally apply and
pay for a card so that I could witness the process first-hand, desiring
to validate the stories I was hearing. The initial call to schedule an
appointment took over 3 hours on the phone. After several months, I was
able to determine my card was ready for pick-up. I made an appointment
for 0630 and was told my card could not be located. After revealing my
position with the U.S. Coast Guard, another search quickly located my
card. The activation was fairly easy.
Knowing that my card was due to expire in early 2013, I recently
applied for the 3-year extension option. Again, the phone call took
over 2 hours. The turn-around time was much quicker, and I was notified
within several weeks that my new card was ready for activation. My
appointment time had five other people, and we all lined up in front of
computers and activated our new cards in less than 30 minutes, a vast
improvement in the processing.
(3) security benefits or problems with twic program
The benefits are clear, individuals have a Federally-issued,
tamper-proof credential that can be used Nation-wide. The program
ensures that individuals have been screened against a terrorism
database (aka the Security Threat Assessment), which I cannot do. The
threat of a Transportation Security Incident is reduced at the macro
level. It also allows facilities to automate access by coding the TWIC
to activate unmanned entrance points.
But there are still gaps in the system.
Most ports still issue their own credentials in addition to
requiring a TWIC; I personally carry a Port of Houston
Authority ID and my TWIC on a daily basis. The Port of Houston
Authority ID is required to prove that I have a ``valid
business reason'' for being on the docks.
Second, the background check is only conducted at a very
high level, for serious crimes. As a facility owner and
operator, we strive to prevent any crime on our docks and still
conduct our own local background checks on our employees for
lesser crimes, such as driving while intoxicated, theft, or
assault. These ``lesser crimes'' are just as important to me in
keeping our facilities safe and secure.
Finally, the TWIC background check is a ``snapshot'' in
time. Unless self-reported, there does not appear to be a
constant and on-going linkage between the TWIC issuance and
local criminal databases. Again, I have over 35,000 TWIC cards
registered in my access system, and the background check of the
TWIC program is only as good as the day it was conducted.
(4) thoughts concerning the twic reader nprm
The Port of Houston Authority has already submitted ``comments for
the docket'' concerning the TWIC Reader NPRM. I will briefly summarize
those comments as they are available for public viewing on the docket
website and included as an attachment to my prepared testimony.
As I mentioned earlier, the TWIC is just a piece of the overall
security process. The TWIC Reader Rule emphasizes the need to ensure
the TWIC is valid, thereby simply ensuring the ``Security Threat
Assessment'' is valid. There is enormous cost involved to ensure this
sense of security. The background check associated with the TWIC card
isn't the risk point, the risk point is when the ``valid business
reason to be in the secure area'' is accepted by the individual
facilities, allowing access to the waterfront. That part of the process
is more critical than obtaining the TWIC card itself, but unregulated
and left to individual facility security officers.
We also asked for clarification of several items:
The process for reporting inoperable readers to the U.S.
Coast Guard, and associated waiver process, is problematic if
it stops the flow of commerce while awaiting permission.
The definition of ``CDC in bulk'' is vital to which
determining which level of TWIC compliance a facility must
obtain, and we asked for the term to be better defined.
Recordkeeping requirements at a cruise terminal also need
clarification as the Facility Security Plans are often
``shared'' between the cruise line and facility owner.
Finally, we requested that the ``recurring unescorted
access'' waiver be better defined to accommodate workers such
as porters, who may be required to enter and exit a cruise
terminal up to 30 times each, per day.
I would like to leave the subcommittee with two thoughts today--the
Port of Houston Authority alone has received over $60 million dollars
in Port Security Grant funding to date, and it continues to be vital to
our security posture. We are in the process of making our applications
for the fiscal year 2013 Port Security Grants, one of which will
request handheld TWIC readers for our remote access points and for use
during heightened levels of MARSEC. It is critical to our National
security for the Port Security Program to remain independent of other
grant programs, and that the erosion of the funding level cease.
Second, the initial intent of the Transportation Worker
Identification Credential program was to credential all transportation
workers in all transportation modes. It was envisioned as a Nation-wide
solution to be used at airports, seaports, rail, pipeline, trucking,
and other mass transit facilities. Someday, this program will
theoretically expand to all those modes of transportation, and what
comes out of hearings such as this will more broadly impact the future
of the TWIC program.
This concludes my prepared statement. I would be pleased to respond
to any questions that you may have. Thank you.
Attachment.--Port of Houston Authority's Comments for Docket
re: TWIC Reader NPRM
We appreciate the effort being put forth with the TWIC program to
ensure each potential port worker has been screened with a background
check. Unfortunately, the background check doesn't go deep enough to
ensure we are protected from crime. The TWIC Reader Rule wrongly
emphasizes the need to ensure the TWIC is valid, thereby simply
ensuring the very broad background check is valid. There is enormous
cost involved to ensure this small sense of security. The background
check associated with the TWIC card isn't the risk point, the risk
point is when the ``valid business reason to be in the secure area'' is
accepted by the individual facilities, allowing access to the
waterfront. That part of the process is more critical than the TWIC
card itself, which is easy to obtain, yet totally unregulated and left
to individual facility security officers. This TWIC Reader Rule does
not address the true risk decision point.
The process for reporting inoperable readers to the USCG, and the
associated waiver process, needs to be clarified. Are facilities
allowed to switch methods, so as to not impede commerce, and then
notify the U.S. Coast Guard? Or must commerce stop until the U.S. Coast
Guard is notified and permission received to deviate from the TWIC
Reader Rule? We suggest that facilities take prudent actions required
to maintain their level of security, and simply notify the U.S. Coast
Guard of the deviation within a set time frame (say 30 minutes). To
pause, and await permission, will impact the movement of cargo.
The term ``CDC in bulk'' is used several times in the NPRM.
According to 33CFR160.204, carried in bulk means ``a commodity that is
loaded or carried on board a vessel without containers or labels and
received and handled without mark or count''. We assume this is the
same definition being used in the NPRM. As a large container facility,
with several hundred CDC iso-tanks present in a fairly confined area at
any given time, we would like to ensure that we are not handling ``CDC
in bulk''. Request the definition being used in the NPRM be clarified
in the final rule for vessel and facility grouping purposes.
As a facility that does not ``handle CDC in bulk'', are we allowed
to provide a layberth for a vessel that carries CDC in bulk, but that
we have no capability of handling? If the ship is in Group A, does the
facility have to match that Group? Conversely, can a Cruise Ship
Terminal (a Group A facility) act as a Group B layberth for a bulk ship
when not operating as a Cruise Terminal?
The record-keeping requirement also requires clarification. As a
Port Authority, we maintain the FSP for our cruise terminal. When a
cruise ship is in port, the cruise line security operates under their
own FSP. Who maintains the records? We assume the Port Authority would
continue to maintain the records and provide them to the U.S. Coast
Guard should they desire to inspect the cruise line security operation.
Request clarification in the rule making.
At a cruise terminal, porters are required to enter and exit the
secure area up to 25 times a day each. With 35 porters (for example)
working, that is hundreds of verifications in a single day. Please
clarify the process for seeking relief from this apparently cumbersome
process.
With the TWIC Reader Rule coming to fruition, the QTL should be
expanded to include not just the authorized TWIC readers but also any
supporting software, particularly for record-keeping requirements.
Mrs. Miller. Thank you very much, all of you. Excuse me.
I think I am going to just start with you, Captain. I
appreciate your testimony. I was taking a couple notes as you
were talking, and what you just said at the end there, that
someday this would be a much more comprehensive kind of a
program that could be utilized intermodally for all the various
types of transportation. Well, actually, that probably was the
original vision, I think, of Congress with this program, but
what has happened has become rather unrecognizable from what
our original vision was, because--excuse me--you have got the
airports that do their own thing now, really, and even on our
highways and that, with hazardous material endorsements, the
way that those are handled through the States as an add-on to a
commercial driver license, et cetera.
You also mentioned that in your observation that the TWIC
card currently is sort of a flash pass. It is something that we
say here, a very expensive flash pass, and whether or not it
actually works. Just listening to your testimony about how you
have your own ID cards in the port of Houston, and most ports
do, have their own--sort of a layered approach, I suppose, at
all of these individual ports of what they have.
Let me just ask you. Do you think the TWIC is really a
critical component of security at your port?
Captain Woodring. The TWIC card gives me comfort that a
background check or a threat assessment has been done against
the terrorism database which I cannot do. That is at the macro
level. As Admiral Servidio said, it is a piece of the process
of the layers that come with it. We have two reasons for
issuing our own Port of Houston Authority ID card. One is to
validate that business reason for being on the docks, which
speeds up commerce going through the gates. You don't have to
check in the computer to see if they are on the list for today.
I simply show them that, and it speeds commerce through. But
that card also allows me to code that card with other things.
The TWIC card can be coded in our credentialing office to
beep at the gate and do those kinds of things. Our Port of
Houston Authority ID card can also be coded up to do other
things. So we have split purposes. The TWIC card will get you
into the restricted area. The port of Houston ID card has a
flash pass, will show you a valid business reason, but it will
also beep on the doors in the executive building and get us in
there.
Mrs. Miller. I see. Admiral, really, the proposed
rulemaking for the reader really only includes the highest-risk
facilities. Without going into details of what those all are,
it has been the one-digit numerals apparently of what the high-
risk facilities actually are.
So you still have--who are required to have a TWIC card, so
you still have 90-some percent of those who needed a TWIC card.
I am just wondering, what is the rationale for requiring the
entire universe of everyone to be having these TWIC cards if
you are only--there is such a small percentage that you are
really looking at.
Admiral Servidio. Madam Chairwoman, we do see that the TWIC
is an enabler for the future, in addition to allowing a
migratory worker population to move between various facilities.
As Captain Woodring said, the port of Houston is the port
authority. When I was in St. Petersburg, there were about 80
different facilities, and over half of those were not part of
that port authority terminal. So technically, you could have a
worker that would need to have 30 to 40 to 80 different
identification credentials to get around the port environment.
It is a very different environment than an airport environment.
So having a single credential, I have seen how that has
increased security in that the gate guards can look at one
credential and try to figure out, what are the security
measures on that card, and to verify it.
Also, we see biometrically that this is the direction we
need to go. The Coast Guard has approximately 300 biometric
hand-held readers that we use every time we do an inspection,
either a regular inspection or a no-notice inspection. We know
that there are 75 to 100 facilities that have already used the
TWIC as their one access credential to that port. Some of them
could potentially biometrically validate those people when they
come in during high-risk.
We see--this is the direction that we need to have in the
future, is a biometrically-enabled, risk-based methodology
moving forward. At the present time, our cost-benefit analysis
clearly identified for risk group A that the benefits far
outweigh the costs, which are about $26 million, I think,
annualized. We see in the future that there might be changes in
cost, and we would expand that population.
Mrs. Miller. Thank you, Admiral.
Just one other question, Mr. Sadler. I mentioned in my
opening statement that last year we passed a SMART Port Act,
where we are trying to assist the customer group, I suppose,
and obviously security is the marquee issue always, so that
they didn't have to go to more than one place to access the
TWIC card. We gave the--we said that we needed to have that
done, gave the Department 270 days, actually, I think in
statute, but you were just mentioning that at this point you
hope to have a pilot program or you will have a pilot program
in Alaska next month.
I just mentioned that sort of like, what is the hold-up? I
think you--the frustration that the Congress always has--
although I have to tell you the truth that sort of what is
happening--what you just testified to--is indicative of this
entire program, it seems, during a number of years. So why is
there such a lag in what the Congress's intent was and the
application of that?
Mr. Sadler. Thank you, Chairwoman. We think that the One-
Visit is the right way to go, and we appreciate Congress's
direction on the One-Visit program. To put it in some context,
currently we are transitioning one system, which I will call
the legacy system, which was used to enroll TWIC workers, to a
new system, a more modernized system. That is going to allow us
to roll an individual once and use that enrollment for multiple
credentials.
So, for instance, if you get a person who is enrolling for
a TWIC card or an HME background check, we will be able to
enroll that person once. We will be able to use that background
check for both of those programs. So when we looked at the 270-
day time line, we determined that we would have to make
significant changes, very costly changes to the legacy system
that may or may not be able to be carried over to the
modernized system. That was one of the first things that
happened.
Then doing that, you would have to modify a number of
contracts, as well, on the legacy side, as well as the
contracts on the system for modernization. So when we looked at
the overall risks and did our rough order of magnitudes for
cost estimates, we determined that in order to get this right,
because we obviously are fully aware of the work the GAO has
done with us--and we appreciate their work, as well--in order
to get this right and make such a significant change in the
program, because this is one of the most significant changes we
have made, we are going from two enrollments to one enrollment,
we determined that the best course of action would be to
implement a pilot, get some lessons learned, particularly in an
area like Alaska, which is similar to Hawaii. You have an upper
peninsula of Michigan. You have a lot of challenges for people
traveling.
Let's do it in Alaska. Let's get some lessons learned.
Let's start building those requirements into the new system and
then take a--go to another location late this year or early
calendar year of 2014, and then from there move into Nation-
wide enrollment--or, excuse me, deployment, once we get the new
system in place next spring. That was our thought process for
this, ma'am.
Mrs. Miller. Thank you. I appreciate that. At this time, I
will recognize the Ranking Member.
Ms. Jackson Lee. Thank you very much, Madam Chairwoman, and
I think the testimony of all the witnesses have been
contributing. Hearings by Members are to be part of problem-
solving. So I would indicate to all the witnesses, and
particularly to you, Admiral, that you are really working with
the cards that you are dealt, and I appreciate you rising to
the occasion to do the best that you can, but I am not
comfortable that we are where we should be and that we are at
our best.
I do, Captain Woodring, thank you very much, and it is good
to get a personal notice of expiration, and so I will look
forward to doing it again timely. Thanks for giving me the 60-
day notice. It will be up to me now, after being told, to rush
quickly to get it done.
But I want to--you said one--a number of things that I
think are important that I would like to pursue. First of all,
the enormity, the largeness of the size of the Houston port is
a very good prototype because of the numbers of vehicles,
Bayport, 19,000 vehicles, and I didn't hear whether it is
19,000 a week, a month. I didn't hear the number.
Captain Woodring. Yes, ma'am, 19,000 vehicles per week at
just the Bayport container terminal.
Ms. Jackson Lee. I think--let me take a point of personal
privilege to invite my colleagues and the Chair to join me for
a site visit at the Houston port, Madam Chairwoman. I would
love to host you there and the committee, as well. So that nod
is on the record, and it was a nodding yes.
[Laughter.]
Mrs. Miller. I would be delighted to do that.
Ms. Jackson Lee. It is on the record now. Captain is
writing it down.
But in any event, you said something about you having the
ability to access the terrorist lists. Could you just expand on
that, how important that is for you? Then could you expand on
your renewal? You said the phone call was 2 hours. Frankly, I
believe that is too long. Is there something we can do to
expedite that?
Captain Woodring. Yes, ma'am. First, on my renewal, when
the cards first came out, I got my initial card. I was on the
phone for about 3 hours, made the appointment, went to the TWIC
center. They couldn't find my card initially, and I revealed
who I was with the Coast Guard at the time, and they did
another search in the back room and found it. So that was my--
--
Ms. Jackson Lee. What center did you go to?
Captain Woodring. I went to the one up by the Turning
Basin, ma'am.
Ms. Jackson Lee. Yes, thank you.
Captain Woodring. You know the one. But that was 5 years
ago. When I renewed this time for the 3-year extension, the
phone call took me about an hour-and-a-half, and I understand
they have now a web-based ability to do that, or at least I
heard that in the testimony this morning. Then when I went, it
was very easy. There were five of us at a long table, and they
were able to activate all those cards simultaneously. So the
process had greatly improved over time.
Ms. Jackson Lee. But there was--and then, could you just
expand quickly on the value of being able to access the
terrorist list that the TWIC card provides?
Captain Woodring. Yes, ma'am. I personally cannot run a--I
can run a background check through our police department
through different databases. I cannot access the terrorism
database at the National level, and that is what the TWIC card
brings to the table for me.
Ms. Jackson Lee. So if we could--if we formulated something
else that was more responsive, moved more quickly, but still
gave access to the terrorist card, you could be open to that?
Captain Woodring. I believe in the beginning there was some
discussion of allowing law enforcement to somehow vet people
against that list. I am not sure where that went, but we have
the system we do today, and we appreciate the ability to have
that.
Ms. Jackson Lee. Yes, and I wouldn't offer the law
enforcement. I would just say something more effective than
where we are with the TWIC card. You would be open to it as
long as we had--that whatever the new substitute would be would
have access to that list?
Captain Woodring. Absolutely, yes, ma'am.
Ms. Jackson Lee. Let me go to Admiral and Mr. Sadler. I
just want to have a pointed question. The GAO reported last
month that not all TWIC reader cards underwent both the
environmental and functional tests in a laboratory prior to use
in the pilot. Instead, an initial evaluation was enhanced by
TSA, and 30 TWIC card readers were approved for use by a pilot
participant. However, none of the 30 readers underwent and
passed all tests. Why were the readers deployed if they had not
passed the proper test? What effect did this have on the pilot
and the resulting data?
I am going to ask two questions back-to-back, because I
want to get Mr. Lord, and your report is quite thought-
provoking, if I might say. I do want to go back to your point
about asking us to repeal a requirement, I guess, to rely upon
the data and to go in another direction. If I am going to ask
Mr. Sadler and then, Mr. Lord, would you follow with your
recommendation, expand on that recommendation?
But, gentlemen, could you both answer that? Mr. Admiral, do
you want to go first, or Mr. Sadler?
Mr. Sadler. I will go first, ma'am, because we were in
charge of the pilot, and that was our responsibility. So as we
started to move forward on the pilot, we did a number of tests
on the readers that were available at the time. We did some
initial tests in a lab. We did an environmental test. Then we
did operational tests in the field prior to the implementation
of the pilot program.
So all the readers that were put into the field passed an
operational test prior to starting the pilot program at that
particular location. The situation we got into was, because of
the time it was taking to send all the readers and the cost--
all the readers through these testings--or these different
tests, we made a determination that we would do a test on a
certain number of readers and then we would allow the other
readers to be used in the marketplace. That is how we got to
that decision, ma'am.
Ms. Jackson Lee. That is how you got to some of the errors,
because you tested some and didn't test others?
Mr. Sadler. I am not sure that is the reason, ma'am,
because all the readers worked. They were operationally tested
in the locations prior to the start of the pilot program. There
were a number of different reasons that you couldn't get a read
on the card. There may have been reader issues; there may have
been card issues. One of the challenges that we had is it is
difficult to get error information from these readers because
they are not designed to do that. They are designed to
facilitate access control decisions.
Ms. Jackson Lee. Admiral, do you quickly want to have a
comment so I can hear from Mr. Lord? Thank you for your
service.
Admiral Servidio. Thank you, Ranking Member. I would like
to point out that, again, when the pilot first started, the
systems are more robust than what they were at that time. We
are looking to have a QTL, a qualified technology list, that
would show that these readers have been tested and that they
work properly.
Our NPRM is soliciting comments from industry specifically
on whether this is a good rule or bad rule, and we have seen in
the past that the comments we received will make a better rule
than what we initially proposed. We intentionally have not
included some of those high-throughput facilities, like
container terminals or row-row terminals, because we feel that
we will get better data initially from the cost-benefit
analysis and how we are proposing the NPRM.
Ms. Jackson Lee. Mr. Lord.
Mr. Lord. Did you want me to respond to the recommendation
to de-link those two events? Well, obviously, we found some
limitations in the pilot, and TSA and the Coast Guard were
directed to use the pilot to help develop the rule. Given the
importance of the rule, we believe some of the limitations we
noted we are suggesting, well, they should be relieved of that
requirement.
Ms. Jackson Lee. So what should they base the rule on?
Mr. Lord. Well, as the agencies noted in the rule, they
used other sources of information to inform the rulemaking.
Obviously, that is not the only source of information, although
we view it as a key source, but just to ensure the integrity of
the process, if the data is no good, we don't believe people
should be asked to use it.
Ms. Jackson Lee. Thank you, Madam Chairwoman. I yield back.
Mrs. Miller. At this time, the Chairwoman recognizes the
gentleman from South Carolina, Mr. Duncan.
Mr. Duncan. Thank you, Madam Chairwoman.
First off, let me just say that, after 11 years, this
program should be a lot further along than it is. I was reading
some of the notes, and it said there are disqualifying factors
that can be waived with proper authority, and they include
transportation security crimes, improper transportation of
hazardous material, unlawful handling of explosive devices,
murder, any threat or purposely false information concerning an
explosive device in a public or Government facility. That is
abysmal, the fact that we are going to waive entry for folks
that have committed those type of crimes. So that needs to be
addressed, and that is not where I am going to go today, but I
would throw that out there for future hearings and
conversation.
I was contacted by a constituent from South Carolina, and I
would just like to read some of his e-mail to me, because he is
a contractor providing some of the hand-held scanners, I think,
that the admiral talked about. But he said just yesterday, he
spent nearly half-an-hour on the phone with the vice president
of SSA, one of the Nation's largest container terminal
operators. During that conversation, he told me that TWIC was
dead and suggested I look for another market. We have had a
team of consultants that work for us in the Texas market, and
they are hearing much the same thing from many of their
contacts. This was on June 5.
He said that the notice of proposed rulemaking is under the
comment period, which will close the 20th of this month. The
NPRM was very disappointing, as it only requires Class A
facilities to electronically validated TWIC cards and
biometrically identify the holder. All Class B and Class C
facilities will be allowed to continue to use the TWIC as a
flash pass.
Even though this was never the intent, I have spent the
last several months on ports and private terminal operators'
location and can tell you that the word flash really is the
appropriate term. The drivers never take their TWIC out of its
plastic protective case, which is typically on a lanyard around
their neck, and hold it up for a security guard to see.
For the most part, the name is not even readable from the
distance they are viewing it from, certainly not the expiration
date. My understanding of the current role and the new NPRM is
that it is the responsibility of the security staff to
accomplish three things when allowing a visitor on the port
facility. One is to get the authenticity of the TWIC. The
second is to verify the expiration date. The third is to
positively identify the holder by comparing the picture on the
TWIC with the face of the individual presenting the TWIC.
This process should take approximately 15 to 20 seconds if
it is done correctly. We all experience similar things at TSA,
as we see airline personnel and TSA personnel and other clear
people go through TSA screening. However, this is never done.
In addition, we spend the time and money to publish a CCL so
that we make sure we are not allowing an individual on the
ports that has caused their name and number to be placed on the
list. However, no Class B or Class C port or private terminal
facility has the ability to check against a certain list. I
think we heard some of that earlier.
Even if such a list were made available to them, it would
disrupt the entire operation and to take the necessary time to
check the list. No one seems to be able to publish a document
that clearly states that TWIC is not dead, but moving forward.
It is concerning to me that I am hearing from someone and
from my State that is involved. This is real life. This was an
e-mail. I didn't make this up. So this is the real-life example
of where we are failing America in this process of making sure
that our port facilities are safe.
I agree with the admiral. I think we can have the hand-held
scanners that you are using. I think that is a very verifiable
way to identify and make sure that that cardholder is holding a
valid TWIC, that it is that person that is holding it, it is
not fraudulent, and it doesn't take that long to validate that.
Now, I know there are costs involved. But I would be
willing to bet that over the past 11 years, the money that has
been spent developing this program that is so far behind
schedule that we could have probably paid for those type items.
So the question I have for the witnesses is: Do you believe
that the TWIC program is dead? Or should it be continued? When
do you believe we will see some clarity on that issue? I will
just start and go down the list. Admiral?
Admiral Servidio. Thank you, sir, and thank you for the
question. I strongly feel that TWIC is not dead. We, the Coast
Guard, see great value in having a single credential with the
background and the biometrically enabled. I think what is
important is not just to look at the past, but to look at the
future, and we do need something in the environment we are
going to be going in that will allow real-time biometric
enabling to verify a person is who they are when they are going
in there.
Mr. Duncan. I agree with you. Thank you.
I will go down the list. Is TWIC dead? Should it continue?
When do you think we will see some clarity?
Mr. Sadler. TWIC is not dead. It should continue. I think
we will see some clarity when the Coast Guard finishes getting
its comments for the NPRM and adjudicates those comments and
comes out with a good reader rule, because that is the key to
this. The TWIC card is one element in the process. The reader
is the key to using that card.
Mr. Duncan. Do you agree with me that it is being used as a
flash pass now, Class B and Class C terminals?
Mr. Sadler. Currently, in many terminals, it is being used
as a flash pass. That is why the reader rule is so important to
get the readers out there.
Mr. Duncan. Let's go down the list. Is it dead? Or should
it continue? Some clarity?
Mr. Lord. Obviously, it is not dead. It is--I think we need
to rethink the approach, perhaps focus on more higher--use at
higher-risk facilities, more selective use. That would help
address some of the issues we have identified in our past work,
but, again, that is up for Congress.
Mr. Duncan. You are a class A terminal in Houston?
Captain Woodring. Right now, we are not classified, because
the NPRM is what groups you or classifies you right now. We
currently use the card as a flash pass.
Mr. Duncan. Flash pass?
Captain Woodring. In the new rule, we would be a Group B,
which means we would not have to have the biometrics unless the
MARSEC level changed, in which case we would have to
biometrically check.
Mr. Duncan. Thank you, gentlemen. My time is up. I will
yield back.
Mrs. Miller. The Chairwoman now recognizes the gentleman
from Texas, Mr. O'Rourke.
Mr. O'Rourke. Thank you, Madam Chairwoman.
I wanted to start with a statement that I believe I heard
Mr. Lord make, which is that you were unable to determine how
using TWIC has improved security. I just want to make sure I
heard you correctly.
Mr. Lord. Yes, the assumption is--and I know the Coast
Guard and TSA strongly believe that is the case--but we--in
terms of an analytical perspective or analysis, we have yet to
see anything comparing TWIC before and after. That is what we
essentially were asked--calling for in our so-called
effectiveness study back in 2011.
So the presumption is it would enhance security, but don't
forget, a lot of these facilities already have access control
systems in place. They are already using local credentials, as
the gentleman to my left just explained, so we would like to--I
guess we are slightly skeptical and just need to see the
analysis, and that is why we made that recommendation in 2011.
Mr. O'Rourke. You know, I think it is important for us to
move forward with objective, verifiable data. If we have
spent--as I understand it--more than $500 million so far on
this program that we know, it is objective, hard data, if we
are going to be asked to spend anywhere from $700 million to
more than $3 billion going forward in the future, I think we
need to know how and to what degree this improves security.
So because the GAO and Mr. Lord were not able to determine
that from the information that you provided, Admiral or Mr.
Sadler, do you have anything that you could add now at this
hearing that would give us some comfort in moving forward with
this program?
Admiral Servidio. Yes, sir. The Coast Guard does an
assessment every year--at minimum annually--through what we
call the MSRAM, which is the Maritime Security Risk Assessment
Model, and we take a look at the whole--all of the components
of port security. Access control is part of it, and TWIC is
just part of that access control. So doing an assessment on
just a subcomponent of one of the components is quite difficult
at this time. We do agree that we should be doing assessments,
we should have better measures. We feel that when there is a
reader rule out there, we can look at the effectiveness of
having those biometrics and other types of things. We are
looking internally in how we are using the hand-held readers
and what the effectiveness of using those hand-held readers are
to biometrically verify people.
Mr. O'Rourke. But without any data, without you being able
to give me hard numbers, how could I support authorizing
another dime for this program? If we do authorize another dime,
how do we decide whether it is $3 billion or $10 billion or $1
trillion if you are not going to give us any reliable cost-
benefit analysis to this?
We don't have unlimited money to spend on security, and we
have some troubling lack of evidence as to whether or not this
is improved security at all so far, and yet we are being asked
to spend more and perhaps expand this to other modes of
transportation and other frontiers in National security.
I also heard Mr. Lord say that in the data that you made
available, throughput times were mixed up with reader response
times. That is of particular concern to me in El Paso, Texas, a
big trade corridor, more than $90 billion in U.S.-Mexico trade
moving through there. If we slow down already long wait times
even further, with a system that doesn't work or with a system
whose effect on throughput we cannot ascertain, that to me is
troubling, as well.
Do you have a response to the statement he made about
throughput times?
Admiral Servidio. Okay, sir, if I could answer the first
part with regards to the assessment, I guess there are two
different answers. I can give you hard numbers on how we have
reduced risks in our ports using the MSRAM data each and every
year as a result of the actions we have taken in implementing
the Maritime Transportation Security Act and the international
ship and port facility security code.
We do have numbers saying that we have reduced
vulnerabilities and we have reduced risks in our ports.
Anecdotally, I have been the captain of the port at three
different locations, sir, and I can tell you that we have come
a long way in accepting any credential and what the guards
would look at to where we are today in TWIC. Are we where we
need to be? No, sir, but I think we are moving in that right
direction.
Mr. O'Rourke. Was it worth $500 million? Is it worth an
additional $3.2 billion, what you have seen so far? If you
can't give us the numbers here, can you tell us in your best
judgment whether that is good value for the taxpayer?
Admiral Servidio. I can you tell, sir, that our NPRM has an
annualized cost of $26 million for the implementation of TWIC
readers at Group A facilities. That is a good investment in
money, sir. As we end up maturing the technology, I believe
that we will be able to justify why we should roll this out to
Group B facilities and potentially to other facilities, sir.
Mr. Sadler. Yes, sir, I would like to add a couple of
things. On the transaction times, that was our responsibility
in the reader pilot. We made a determination as we were going
through the pilot to use transaction times from the card
itself, because we were having difficulty collecting the
information on throughput times through these access points.
That is one of the challenges that we faced.
So if you think about throughput, whether it is a
pedestrian coming up to a gate and presenting the card, or
whether it is a truck coming up to a gate and presenting a
card, it got to the point that if a truck comes up to the gate,
for instance, and the individual has the card on a lanyard and
has to back up or move closer to the reader, is that part of
the throughput time that is affected by the TWIC?
For us, that throughput time would be standard, no matter
who was going through that gate. For us, we were concerned with
the transaction time of the card. When the person actually put
the card up to the reader, put the fingerprint down or finger
down to check the fingerprint, and collect that transaction
time, because that was going to determine, you know, how we
affected the actual throughput of an individual or a vehicle.
On the card itself--and as far as security is concerned--we
believe that the card does improve security. Having gone
through ports and facilities for over 20 years myself, I know
that you can get through gates or used to be able to get
through gates with multiple credentials. I never had to go
through a gate with one common credential. I never had to go
through a gate with a biometric credential.
I don't think there was a background check at that time. We
have got a standard background check. We have got an
adjudication process. There are a lot of things that we have
done with this card that were never done before in this
maritime environment.
Then last thing, if I could just finish, sir, on the cost
estimate, the numbers you are referring to, the $3.2 billion,
that is our life-cycle cost estimate for the program through a
10-year estimate. We did that, if I remember correctly, in
2007-2008. I would have to check that number.
So to date, we have spent $394 million on the program--this
is in the GAO report--approximately $100 million on
appropriations, and $294 million in fees, because it is a fee-
funded program.
Mr. O'Rourke. Madam Chairwoman, I know my time is up. I
just want to say that I appreciate your belief that this makes
us more secure. The concept is a good one. But we need facts if
we are to make informed decisions going forward. Thank you.
Mrs. Miller. Thank you.
The Chairwoman now recognizes the gentleman from Utah, Mr.
Stewart.
Mr. Stewart. Thank you, Madam Chairwoman.
To the witnesses, thank you all. Thanks for your service.
Thanks for your expertise and being with us today. I know that
you have a difficult task. The challenges confronting us as a
Nation and as a people that you have been involved with over
the last 10 or 12 years are in some cases enormous, and we
appreciate that.
I think one thing that--an observation, if I could--and I
would like to keep my comments and then my specific questions
to you very big picture--being kind of new to this, I was a
military officer for 14 years. I understand some of the
security concerns. I also understand a little bit about how
Government bureaucracies work.
I think one of the things--an observation that many of us
would agree with, and that is that Government sometimes creates
bad legislation when that legislation is created in a time of
perceived crisis. When there is a great urgency like we
experienced after
9/11 and there was this cry to do something, and we did
something, and some of that has been very effective and very
important, but some of it has been less so, because it was
perhaps not as thoughtful as we would have done had we not been
under this--again, this sense of urgency, this sense of crisis.
There were many who warned at the creation of the
Department that it would become a big bureaucracy, that it
would become unyielding and unresponsive to some of the needs
of the people. I think that that is a fair observation. I
think--I don't know anyone who would disagree with that, that
like any Government agency, that there are some issues with the
Department of Homeland Security that could be made better. I
think, frankly, this is a pretty good example of that. What the
Department has done is good, and there are many great success
stories, but, again, I think that there is criticism there that
we can take and probably try to apply.
Again, I think the TWIC program is--as you have indicated,
I think all of you--and as has been indicated in the
questions--it has been troubled from the very beginning. Since
its initiation in 2002, DHS has failed to meet every time
requirement, essentially. We are, what, 5 years behind what our
goal was and where we wanted to be?
So, Mr. Sadler, maybe I will ask you, but then, Admiral, I
would like to come to you, as well. Help me understand the big
picture. If you can, answer this question not in a couple
paragraphs, but answer it in a sentence or two sentences, if
you will. What is the greatest challenge we have had? What is
the one thing that we can--you know, that you would say this is
the problem or this is the most important problem, and then how
do we fix that one problem?
Mr. Sadler.
Mr. Sadler. Well, thank you, sir. This is important to
understand, so I can put some context around it. We started
with nothing in the beginning of the program. So what I mean by
that is, there was no common credential. There was no common
background check. There was no adjudication process. There was
no appeals process or waiver process or administrative law
judge review. There was no waiver process. There were no
disqualifiers. I will try and keep my answer short, but this is
very important. When we started this program, the program as it
exists today did not exist then.
Mr. Stewart. So then are you alluding that that is the
great challenge, because we started from zero?
Mr. Sadler. I think that is one of the challenges. That is
a challenge, because we had to design all these things to get
to this point. Another challenge is that we are taking this
security and we are applying it across the maritime
environment. I know Captain Woodring or Admiral Servidio would
say, if you have seen one port, you have seen one port. There
are different throughputs. There are trucks. There are
vehicles. There are pedestrians. There are service workers.
There are tremendous challenges in this program.
Mr. Stewart. Okay.
Mr. Sadler. So I think that is the answer. I think we had
to design something that didn't exist. Although there were
other cards and credentials and programs out there, it didn't
exist in the maritime environment, and just the maritime
environment itself is very challenging.
Mr. Stewart. Okay, and I appreciate that, and I know you
are not trying to evade the question or the answer, but when
you say it is difficult and we had to start from zero, it has
still been a long time, and we have still spent a lot of money.
I am not sure any of us are satisfied with the result of where
we are now.
I was hoping that you would be able to say--and maybe you
can't--I was hoping you would be able to say, this is the
challenge we have. This is the one thing that if we did this or
these two things, if we did this, this would be better, this
would be--we would be able to make progress now. We wouldn't
get this sense that we are just kind of spinning our wheels.
Admiral, do you have any comments on this? Can you help me
understand, you know, the one or two things that we could fix
that would help this process?
Admiral Servidio. Yes, sir. I believe the two issues are,
we have one single credential now, one background credential,
the TWIC card, and getting the socialization of that concept,
getting the implementation of that has been a challenge. But we
have done that.
I think the greatest concern going forward is customer
service, and I think we need to decouple customer service
issues to trips and other types of issues, being on the phone
for 3 hours or 2 hours, from the value in having a single
credential with a common background and making it easier for
our ports to implement.
I really think we have made progress on going to the single
credential. I think we still have work to do on the customer
service, and we are working actively with TSA and the
Department on addressing those concerns.
Mr. Stewart. All right. Thank you. I am out of time, Madam
Chairwoman.
Mrs. Miller. I thank the gentleman very much.
The Chairwoman now recognizes the gentlelady from Hawaii,
Ms. Gabbard.
Ms. Gabbard. Thank you, Madam Chairwoman.
Thank you, gentlemen, for your time, your service, and your
work here. Like my colleagues, of course, we are concerned
about--at the bottom line, how are we addressing potential
threats and alleviating threats that we see today, as well as
going forward along our borders and at our maritime ports?
As you can imagine in Hawaii, this is something that is
particularly of interest to us, as we receive close to 95
percent of all of our goods coming through our ports. I have a
few questions regarding the actual TWIC card. I know you have
said that this is just one component of the overall maritime
security plan, but looking at the level of threat that we see
coming through our containers, coming through the cargo that is
coming in, I am curious about how many either specifically or a
ballpark figure, maritime figures you have found using this
National terrorism database--have found to be on that list?
Mr. Sadler. Well, ma'am, if I could speak to you outside of
public forum, I would be happy to give you those numbers, but I
am just not comfortable discussing it in this forum.
Ms. Gabbard. Have you seen that this is a prevalent issue?
Mr. Sadler. It is an issue, but, frankly, I would like to
discuss it outside of the open forum.
Ms. Gabbard. The reason I ask is because I have had
conversations with many of our maritime workers that I have
seen in our States. I have visited our various harbors and
ports and have seen, more often than not, frustration at a
basic level of dysfunction. Not only--you have talked about the
readers and the other issues that have been there, but with
folks who have been working at our ports for 12, 15, even 20
years, erroneously being flagged as they go through the
screening process and then are put out of work for 1 month, 6
months, 8 months, which creates a tremendous hardship on their
families and our workers, and to have to undergo this screening
not only on an annual basis, you are saying that there is a 3-
year plan now that people can apply for, but also the hardship,
as we see in Hawaii, of having to travel to the mainland for
this screening.
How do you reduce these erroneous disqualifications that
are occurring?
Mr. Sadler. Well, we are required to adjudicate the
backgrounds against certain disqualifying criminal issues.
There are approximately 27 crimes that we look at. Some of them
we look back for an unlimited period of time. Some are 5 years
from conviction or 7 years from a release from incarceration.
That is a statutory requirement.
So one of the things that we do is, we have a robust
appeals, waivers, and review process, and as soon as an
individual is flagged for having some type of issue, we
immediately get a letter out to that person once we have
identified that person or that issue, and then we try and get
them into this review process, so we can clear up whatever that
issue is.
One of the challenges that we have with that type of
background check is, the States need to upload their
information into the database that we use from the FBI, all
right? At this point, we are getting State records from
approximately 40 States. They may be more complete than the
Federal database. They may not be. They may be more extensive.
If we got the records from all the States, that would help us a
lot.
It--I am sorry. What were your other questions, ma'am? Oh,
on the travel. So, for instance, on the travel, we are doing a
couple of things. We are increasing our enrollment sites from
136 to over 300, so if you have a TWIC enrollment site or a
hazardous material enrollment site, you will be able to apply
for both of those background checks at the same place, and you
can get a discount on the background check if you choose to get
both of them.
We are also extending the One-Visit pilot program to
Nation-wide in 2014, which will only require one visit for all
individuals. Then currently, we have the extended expiration
date TWIC, the 3-year card, that only requires one visit. So we
are taking positive steps to try and reduce that burden,
whether it is through an adjudication process or whether it is
through the actual visits to an enrollment center.
Ms. Gabbard. Admiral, maybe you could answer this question.
How does this background check that our maritime workers are
undergoing compare to a background check that a brand-new
enlistee in the uniformed services undergoes? I am not talking
about a secret clearance. I am just talking about walking in
the door.
Admiral Servidio. I am not sure exactly what background
check we do when someone comes in, so I am going to have to get
back to you on the record. I can tell you that the background
check we do for TWIC is different than what we require for a
merchant mariner, because of just the interaction with the
public and other types of things. So we do tailor some of those
background checks to what we are looking for with that part of
the industry.
Ms. Gabbard. The reason I ask is because I am wondering if
in some ways you are saying we are starting from ground zero,
there has been nothing like this put in place before, but when
you look at our U.S. military, for example, I know some of the
branches have different and higher levels of requirement, but
at a baseline level, you have a criminal background check much
like the States already provide at the local level.
Without a secret clearance, that is kind of it. There are
different requirements there that they are undergone, but you
have an ID card with the biometric system that is accessible at
military bases around the world, that it is rugged, it is
supposed to be durable, and it seems like this is a system that
has already been in place and it has worked, and I am not sure
why we are investing in something that has now already been
done.
Mr. Sadler. Well, our credential--the TWIC card is accepted
at DOD facilities. It is--the basic card is the same card as
the CAC card, the DOD card. It is a card that we get from the
GSA schedule. So it is tested to the same standards, and we
believe it probably has about the same failure rate, because it
has similar use.
I think the main difference outside of the card itself is
the fact that this is a commercial environment, it is all about
high volume and throughput and speed. So that is where our
challenge comes in, but the card itself is the same card stock
that any Federal agency would buy off the GSA schedule.
Ms. Gabbard. Thank you very much. Thank you, Madam
Chairwoman.
Mrs. Miller. I thank the gentlelady.
I certainly thank all the witnesses. You can see by the
level of frustration, some of the questions that we are asking,
I am sure you all share that. We will see what happens here
with this TWIC card, but it is a very important issue. We
appreciate all of your attendance here today.
Ms. Jackson Lee. Madam Chairwoman----
Mrs. Miller. I would--yes, the Ranking Member?
Ms. Jackson Lee. Yes, before we end, might I ask to put in
the record three things? One, the letter from the American
Association of Port Authorities on this very issue, I ask
unanimous consent.
Mrs. Miller. Without objection.
[The information follows:]
Letter From the American Association of Port Authorities
June 13, 2013.
U.S. Department of Transportation,
Docket Management Facility (M-30), West Building Ground Floor, Room
W12-140, 1200 New Jersey Avenue, S.E., Washington, DC 20590.
RE: Comments of the American Association of Port Authorities on the
NPRM, Transportation Worker Identification Credential (TWIC) Reader
Requirements Docket: USCG-2007-28915.
Dear Sir/Madam: Seaports deliver prosperity by serving as critical
links for access to the global marketplace. Safe and secure seaport
facilities are fundamental to both protecting our borders and moving
goods. The American Association of Port Authorities (AAPA), on behalf
of its U.S. members, welcomes this opportunity to comment on the Coast
Guard's (USCG) Notice of Proposed Rulemaking (NPRM) related to the
Transportation Worker Identification Credential (TWIC) Reader
Requirements. Our U.S. members handle containers, auto and ro/ro cargo,
cruise passengers, as well as many bulk and breakbulk cargos, all of
which would be impacted by this rule.
While the comments below address specific issues raised in the
NPRM, AAPA is concerned about the findings in the recent Government
Accountability Office (GAO) May 8, 2013 report, Transportation Worker
Identification Credential: Card Reader Pilot Results Are Unreliable;
Security Benefits Need to Be Reassessed GAO-13-198. GAO recommended
that Congress halt DHS's efforts to promulgate a final regulation until
the successful completion of a security assessment of the effectiveness
of using TWIC readers. While we understand that there may be some
disagreements over these findings, we do ask the Department to consider
delaying the implementation date of the rule, and we stand ready to
assist in further analysis of TWIC reader operational problems
identified in the report.
Below are specific recommendations related to the NPRM.
In the final rule, USCG should be more specific in defining what
are considered TIER A, B, and C facilities and utilize a risk-based
approach to reader requirements that more clearly addresses the
particular circumstances of each port area and the facilities that fall
within the category requiring readers.
As noted in AAPA's May 13, 2009, comments on the TWIC rule, we
support the Maritime Transportation Security Act (MTSA) regulatory
system that is performance- and risk-based. Unlike earlier TWIC
proposals, the NPRM proposes a risk-based approach. While this is an
improvement from the previous proposal, we do not believe the system as
proposed should be adopted. We are concerned that the three categories
for TWIC reader use are based upon the passenger capacity of vessels,
bulk of hazardous material, and the facilities that they use, rather
than taking an approach that is more specific to the individual
circumstances of each facility. (It is unclear, for example, how
Strategic Ports will be classified based on the criteria listed.)
AAPA recommends that USCG expand the risk-based concept and include
a more performance-based and flexible system as reflected in other MTSA
regulations. Every port is different and in making evaluations about
risk, USCG should aggregate risks to the port area first, followed by a
second layer of risk at the facility level using a Maritime Security
Risk Analysis Model (MSRAM), including an evaluation of what other
facilities are in close proximity. This would result in a flexible, but
risk-based system. Therefore, a facility's risk and associated reader
requirements should be based on a variety of risk factors, not just
what type of vessels call on it or the type of cargo that it handles.
At certain facilities, TWIC should be checked by electronic reader
at the beginning of a shift but then afterward and for the duration of
the shift employees should be able to walk into and out of the secure
area only having to flash their card or show some other identification
to the guard. At cruise terminals, for example, porters walk into and
out of the secure area 25-30 times during their shifts. Having to stop
and use the reader every time that movement into the secure area is
made could well create an unnecessary burden, delay work, impact vessel
schedule, and result in unnecessary expenses. While it is true that,
according to the NPRM, the Captain of the Port (COTP) has the power to
suspend the reader requirement if it is unduly holding up cargo or
passenger processing, this particular exception to the rule should be
codified before the fact and not reliant upon an after-the-fact
assessment. Differing assessments by individual COTP's could
inequitably impact inter-port competitiveness.
According to the NPRM, the Captain of the Port is authorized to
suspend the reader requirement in the event that a reader malfunctions
or some other event transpires that makes the reader requirement unduly
onerous. AAPA recommends that in the event of a minor occurrence, such
as a reader malfunction, the port should immediately be able to
continue to process workers using an alternative means that has
previously been identified in the approved Facility Security Plan.
Rather than being required to contact USCG for approval to resort to
the previously-approved alternate plan, the port should be able to
resort to the plan and then log the occurrence for review by USCG after
the fact. USCG will be able to monitor how frequently or infrequently
the alternate plan is used and address irregularities without holding
up the process at the time.
The NPRM requires that ports submit an updated Facility Security
Plan describing what procedures will be used to comply with the new
reader requirement, once it goes into effect. AAPA recommends that
ports be permitted to submit TWIC updates within the 5-year plan
resubmission, rather than be required to submit immediate amendments to
already-existing security plans.
Sincerely yours,
Kurt J. Nagle,
President and CEO.
Ms. Jackson Lee. A letter from the American--excuse me,
statement from the American Trucking Association on this issue.
Mrs. Miller. Without objection.
[The information follows:]
Statement of American Trucking Associations, Inc.
June 18, 2013
introduction
The American Trucking Associations (ATA), founded in 1933, is the
Nation's preeminent organization representing the interests of the U.S.
trucking industry. Directly and through its affiliated organizations,
ATA encompasses over 37,000 companies and every type and class of motor
carrier operation.
The trucking industry is an integral component of our Nation's
economy, transporting more than 80% of our Nation's freight bill and
employing approximately 7 million workers in trucking-related jobs,
including over 3 million commercial drivers. It is important to note
that the trucking industry is comprised primarily of small businesses,
with 97% of trucking companies operating 20 trucks or less, and 90%
operating six trucks or less.\1\ More importantly, about 80 percent of
all U.S. communities depend solely on trucks to deliver and supply
their essential commodities.
---------------------------------------------------------------------------
\1\ American Trucking Associations, American Trucking Trends 2011
(March 2011).
---------------------------------------------------------------------------
background
As ATA has testified on several occasions at Congressional
hearings, including before the House Homeland Security Committee, both
the private sector and Government agencies continue to struggle to find
the right balance between improving security while facilitating
commerce throughout our Nation's transportation sector. The motor
carrier industry believes that security and commerce are not mutually
exclusive goals throughout the transportation system and the
increasingly sophisticated supply chains that move global trade. To
truly enhance security without disrupting the flow of commerce,
security regulations and programs must be implemented in a cost-
effective and coordinated manner. A key goal of such an effort must be
that individual programs should be designed in a way that they can be
leveraged to comply with a multiplicity of regulations and security
requirements. The trucking industry believes that the Transportation
Worker Identification Credential (TWIC) can be such a program if
implemented and utilized in an appropriate manner.
ATA has long supported the original concept of the TWIC: One
application/enrollment process, one fee, one security threat assessment
(STA), and a single credential that transportation workers may utilize
to demonstrate compliance with multiple security requirements. However,
commercial drivers today continue to face multiple security
credentialing requirements. For example, in addition to the TWIC,
drivers must undergo separate STAs for the Hazardous Materials
Endorsement (HME), the Free and Secure Trade (FAST) program for border
crossings, to name a few. The cost to drivers and companies of these
separate STAs and credentialing programs is almost $300 in fees alone,
not including the costs associated with drivers' lost wages and fuel
costs while traveling to and from multiple enrollment centers, and the
aggravation of providing fingerprints multiple times for each program
that performs the same background check.
Over 10 years ago, Admiral James Loy, then the second-most senior
official at the Transportation Security Administration) TSA, summed up
the concept and the purpose of the TWIC, stating:
``A fourth initiative also underway is development of a Transportation
Worker Identification Credential or TWIC . . . The idea is to have
these [transportation] employees undergo only one standard criminal
background investigation . . . I've heard that there are some truck
drivers currently carrying up to 23 ID cards around their necks. I
wouldn't want to pay that chiropractor bill. Under the TWIC program
drivers and other transportation workers will only have one card to
deal with which would be acceptable across the United States.\2\
---------------------------------------------------------------------------
\2\ Remarks of Admiral James M. Loy, Under Secretary of
Transportation for Security, Transportation Security Administration,
during Transportation Research Board 82nd Annual Meeting Chairman's
Luncheon, January 15, 2003.
Unfortunately, the TWIC program/concept has not lived up fully to
its promise and has become another expensive, duplicative security
credential that truck drivers must obtain to access maritime
facilities. TWIC works, but the goal of universal acceptance of a
single security credential has yet to be implemented by TSA. It is not
too late to enhance TWIC's capabilities and acceptance across multiple
programs to improve its benefits and reduce the need for multiple
screenings through the same databases. In essence, implement the long-
established Department of Homeland Security principle of ``enroll once,
use many.''
twic challenges and opportunities
The TWIC program has had to confront strong criticism since it was
first proposed in an NPRM in 2006 implementing statutory requirements
mandated under the Maritime Transportation Security Act of 2002. Some
of the key criticisms that the TWIC has encountered include:
The excessively high cost of the TWIC: $132.50 (reduced to
$129.50 in 2012);
The extended time the application process requires of
applicants, taking time off work twice: Once to apply and
provide the biometrics, a second visit to pick up the
credential;
The failure to expand TWIC's utilization to satisfy other
Federal STA regulatory requirements, including sister programs
within TSA;
The lack of TWIC enrollment facilities Nation-wide to
facilitate the enrollment of transportation workers who live
far from either coast;
The failure to implement TWIC with its essential counterpart
reader rule, annulling the credential's technology benefits and
serving only as an expensive ``flash-pass''.
ATA generally agrees with these criticisms of the TWIC program and
we have expressed such concerns in past testimony before Congressional
Committees as well as in comments to TSA, The United States Coast Guard
(USCG), and the Department of Homeland Security (DHS). However, our
greatest concern at this point is the multiplicity of background
checks, and their associated costs and burdens, which drivers undergo
to perform their everyday work responsibilities, from transporting
hazardous materials and delivering at maritime facilities, to crossing
our international land borders and transporting air cargo.
As a matter of policy, ATA has long supported a system and process
that provides for a Criminal History Records Check through National
databases. But today's state of affairs in which commercial drivers
undergo multiple STAs is untenable, excessively burdensome, and
patently inefficient. Because of this, ATA has taken the position to
support the TWIC as the potential single credential and STA that can
demonstrate and provide compliance with multiple programs and
regulations that require a STA through a single enrollment, a single
fee, a single background check and a single credential.
Although TSA has not provided for full recognition of one STA for
compliance with another regulatory STA, for example allowing TWIC
holders seeking an HME to show their TWIC as proof of already having an
equivalent STA--a policy supported statutorily by Section 1556 of the
9/11 Commission Act--other Federal agencies are accepting the TWIC for
compliance with their credentialing requirements. For example, the
Department of Defense (DoD) has an established policy allowing
commercial drivers transporting freight in and out of appropriate
military facilities to use a TWIC in lieu of obtaining a DoD issued
Common Access Card (CAC). DoD acceptance of the TWIC for such purposes
is recognition of the strength of the TWIC STA process and its
compliance with Federal Personal Identity Verification (PIV) standards
used by millions of Federal employees.
In its latest report regarding the TWIC card reader pilot
results,\3\ the U.S. Government Accountability Office (GAO) criticized
TSA's planning shortfalls for implementing the TWIC reader pilot in a
manner that did not yield usable information due to data-collection
challenges. ATA is aware that TSA faced some technology challenges in
collecting TWIC-reader functionality data, including that the first
generation of TWIC cards had faulty antennas embedded in the cards
which rendered them useless when utilized with contactless readers.
However, ATA is also aware of certain facilities that have been using
the TWIC readers successfully to verify the credential's status,
identity, and improving throughput for truck operations. Perhaps
additional focus should be given to facilities that have successfully
implemented the TWIC readers and utilize such ``lessons-learned'' that
can be applied to other facilities facing reader challenges.
---------------------------------------------------------------------------
\3\ U.S. Government Accountability Office; Transportation Worker
Identification Credential: Card Reader Pilot Results Are Unreliable;
Security Benefits Need to be Reassessed; May 2013.
---------------------------------------------------------------------------
GAO's concerns and suggestions should be given careful
consideration by DHS in improving the development and implementation of
TWIC-readers at regulated facilities. ATA also agrees that Congress
should continue to carefully assess the overall implementation of the
TWIC program. However, ATA is concerned with GAO's suggestion that
Congress consider ``alternative credentialing approaches, which might
include a more decentralized approach for achieving TWIC program
goals.'' A decentralized approach could result in an environment in
which each State or location performs STAs and issues separate
credentials for truck drivers to access maritime facilities throughout
the country. Such a scenario would result in an increasingly
burdensome, inefficient, and ineffective system for transportation
workers who work and operate at multiple MTSA-regulated facilities. The
TWIC is a robust, Nation-wide and uniform STA that can be utilized at
multiple locations when matched with the appropriate readers. TSA and
USCG need to focus their efforts in ensuring the deployment of TWIC
readers nationwide rather than creating a vast assortment of individual
systems.
With the appropriate leadership within TSA and with clear guidance
from Congress, the TWIC has the potential to serve as a valuable tool
to ensure that personnel working throughout our country's critical
transportation infrastructure have been screened appropriately and
continue to be vetted frequently through relevant databases. Moreover,
when the credential is utilized with the appropriate readers it can
ensure the validity of the card, match the TWIC to the cardholder and
allow for improved throughput when entering secure areas requiring such
systems.
conclusion
Notwithstanding that the TWIC continues to face several challenges
to gain broad support from various sectors within Government--as
demonstrated by the latest GAO TWIC report--as well as private-sector
entities, the TWIC's future utility is robust if implemented as
originally intended by leveraging its applicability throughout other
security programs. But appropriate efforts and policies must be
implemented by DHS, TSA, USCG, and other Federal entities to coordinate
the utility of such a PIV for compliance with multiple STA
requirements. The 2.4 million transportation workers in possession of a
TWIC, including over 400,000 commercial drivers, are already heavily
invested in the program. It would be a disservice to these workers to
consider doing away with the TWIC when they have spent resources and
time to obtain the credential.
ATA urges the Homeland Security Committee and its various relevant
subcommittees to:
Continue supporting the TWIC as a viable STA program used by
millions of personnel to access secure areas of maritime
facilities as well as various Federal facilities;
Authorize and mandate the use of the TWIC for compliance
with equivalent STA programs;
Analyze and require TSA to significantly reduce the high
cost of the TWIC and ensure ample geographic coverage of
enrollment centers;
Not overlook the fact that the TWIC, as a stand-alone
credential, provides a solid STA component and a perpetual
vetting process that offers a high degree of security;
Allow the USCG to move forward with the implementation of
the TWIC readers, after careful consideration of industry
comments and recommendations.
The implementation of the TWIC readers is essential to leverage
properly the technology embedded in the TWIC and to establish uniform,
secure, and efficient access procedures at secure areas of MTSA-
regulated facilities. Even with the very high cost of the TWIC, at
roughly $130.00, it is a more cost-efficient scenario rather than
paying multiple fees and undergoing multiple enrollment and finger-
printing processes. The trucking industry asks that these costs be
reasonable and part of an efficient, risk-based process. ATA supports
an approach that is good for security--and good for commerce.
ATA appreciates the opportunity to offer this written statement and
we look forward to continue working with this subcommittee and the
Homeland Security Committee to further improve the security of our
transportation system, doing so in a coordinated and efficient manner.
Ms. Jackson Lee. For the record, a question to the Coast
Guard and TSA to provide us in writing whether you have the
tools to assess and evaluate the effectiveness of using the
TWIC with readers for enhancing port security. I think we need
a--I need a focus one, two, three, four, in relation to the GAO
report in 2011 and 2013.
I thank the Chairwoman, and I think this has been a very
helpful hearing from all of the witnesses and look forward to
maybe providing some legislative fix. I yield back to the
Chairwoman.
Mrs. Miller. I thank the gentlelady. Any Members of the
committee that might have some additional questions for the
witnesses there, we will--pursuant to the committee rule, the
hearing record will be open for 10 days for those.
Ms. Gabbard. Excuse me, Madam Chairwoman. Just briefly
request----
Mrs. Miller. Gentlelady from Hawaii.
Ms. Gabbard [continuing]. Unanimous consent to insert
testimony we have here submitted for the record from the
Longshore and Warehouse Union, representing port workers in
Hawaii and the western region for the record.
Mrs. Miller. Without objection.
[The information follows:]
Statement of the International Longshore and Warehouse Union
June 18, 2013
The International Longshore and Warehouse Union (``ILWU'')
represents port workers in California, Oregon, Washington, Alaska, and
Hawaii, as well as warehouse, maritime, agriculture, and hotel and
resort workers. The ILWU's membership includes the approximately 22,000
longshore workers, marine clerks and foremen who load, unload, track,
monitor and oversee the movement of cargo into and out of all of the
major ports on the West Coast, Alaska, and Hawaii. We appreciate the
opportunity to submit these comments on the TWIC Program.
The ILWU and its members have been active participants in the
development and roll-out of TWIC since its inception. The union's
experience of the program and deep knowledge of the waterfront have
shown that TWIC does not improve port security and unfairly burdens
working people. The program is now at a crossroads. The program stands
poised to expand through the mandatory installation of expensive TWIC
readers at approximately 570 locations pursuant to proposed regulations
currently under review by the Coast Guard.\1\ According to the GAO, the
TWIC Program has cost more than $500 million and will cost between $690
million and $3.2 billion more over the next 10 years, not counting the
costs of installing and operating readers.\2\ In one of its multiple
recent reports critical of the program, GAO concluded: ``11 years after
initiation, the TWIC program continues to be beset with significant
internal control weaknesses and technology issues, and . . . the
security benefits of the program have yet to be demonstrated. The
weaknesses we have identified suggest that the program as designed may
not be able to fulfill the principal rationale for the program--
enhancing maritime security.''\3\ Before proceeding further, we urge
this committee to re-think the wisdom of TWIC. We believe that careful
consideration of the facts on the ground will reveal that TWIC does not
make our Nation safer, hurts American workers, and is a poor use of
limited Government dollars.
---------------------------------------------------------------------------
\1\ Notice of Proposed Rulemaking on TWIC Readers, 78 Fed. Reg. 56
(March 22, 2013) at 17782, et seq.
\2\ ``Transportation Worker Identification Credential: Card Reader
Pilot Results are Unreliable; Security Benefits Need to Be
Reassessed'', GAO-13-198, Appendix III, p. 59-60 (May 2013).
\3\ ``Transportation Worker Identification Credential: Card Reader
Pilot Results are Unreliable; Security Benefits Need to Be
Reassessed'', GAO-13-198, at p. 42 (May 2013); see also ``Security
Benefits Need to Be Reassessed,'' GAO-13-198 (May 2013);
``Transportation Worker Identification Credential: Internal Control
Weaknesses Need to be Corrected to Help Achieve Security Objectives,''
GAO-11-657 (May 2011).
---------------------------------------------------------------------------
First, the fundamental focus of the TWIC program is wrong. If
preventing terrorism is the goal, then targeting American workers for
screening, as opposed to targeting containers and cargo, is the wrong
approach. On the modern container facilities through which most of our
imports and exports travel, port workers like those whom we represent
have no real access to the cargo or the documentation associated with
the containers' contents. Thus, requiring that workers be screened does
not help to prevent facilities from being used to transport items that
could be used to commit an act of terrorism.
Moreover, the majority of the facilities themselves (whether
container terminals or bulk operations) are large, decentralized spaces
with workers, cargo, and equipment typically spread out across many
acres. These characteristics make the facilities poor targets for a
terrorist hoping to have a significant impact on commerce or on the
public. Thus, screening the facilities' workforces is not a meaningful
way to prevent a terrorist attack.
Second, the TWIC program unfairly targets working people and has
caused substantial hardships for workers and their families with no
added security benefit. In 2006, when TWIC was still in the planning
stages, ILWU longshore workers and marine clerks went through a Coast
Guard-mandated threat assessment screening to ensure that they did not
pose a National security risk.\4\ The ILWU cooperated with the Coast
Guard and TSA to complete this process. The ILWU is not aware of any
members being found to pose a risk.
---------------------------------------------------------------------------
\4\ 71 Fed. Reg. 82 (April 28, 2006) at 25067 (requiring the ILWU
to provide the Coast Guard with identifying information, including
Social Security Numbers and alien identification numbers for all
longshoremen to permit TSA to ``analyze . . . whether or not an
employee or longshoreman poses or is suspected of posing a security
threat warranting denial of access to the port facility'' and stating
that anyone meeting those criteria will be denied access).
---------------------------------------------------------------------------
In 2008, when the Department of Homeland Security began to require
TWICs to obtain unescorted access to longshore workplaces, the ILWU
membership was screened again.\5\ ILWU members applied for TWICs, were
fingerprinted, had their irises scanned, underwent criminal background
checks, and paid $129.75 each out of their own pockets to obtain these
technologically-advanced cards. Almost none of these expensive
technologies were ever put to use.
---------------------------------------------------------------------------
\5\ 72 Fed. Reg. 3492 (Jan. 25, 2007); 33 CFR 101.514,
104.115(d).
---------------------------------------------------------------------------
The Government databases relied upon in evaluating TWIC
applications contain an abundance of incomplete and faulty
information.\6\ Due to this fact and delays by TSA, some of our members
languished for months, unable to work, and unable to support their
families while they tried to obtain TWICs.\7\ The following are only a
few examples:
---------------------------------------------------------------------------
\6\ U.S. Attorney General, ``The Attorney General's Report on
Criminal History Background Checks,'' at page 3 (June 2006) (concluding
that FBI's database was ``missing final disposition information for
approximately 50% of its records''); see also ``A Scorecard on the Post
9/11 Port Worker Background Checks: Model Worker Protections Provide a
Lifeline for People of Color, While Major TSA Delays Leave Thousands
Jobless During the Recession,'' National Employment Law Project (July
2009), available at http://www.nelp.org/page/SCLP/PortWor-
kerBackgroundChecks.pdf?nocdn=1.
\7\ The National Employment Law Project, which represented or
assisted more than 450 workers seeking to obtain TWICs estimated that
workers waited almost 4 months on average to obtain an initial decision
from TSA on their TWIC applications and workers waited an average of 7
months for their appeals or waiver requests to be reviewed. ``A
Scorecard on the Post-
9/11 Port Worker Background Checks: Model Worker Protections Provide a
Lifeline for People of Color, While Major TSA Delays Leave Thousands
Jobless During the Recession,'' National Employment Law Project (July
2009), at p. at 5-6.
---------------------------------------------------------------------------
William Ericson, a lonsghore worker from Seattle was
erroneously denied a TWIC based on incorrect or incomplete
information in the notoriously flawed FBI database. Despite 12
years of work history on the waterfront, Brother Ericson sat
unable to work for 6 months, exhausted his savings and came
close to having his home foreclosed upon before he was able to
finally convince TSA that the agency had made a mistake.
Another member from Seattle, Steven Richards, was born
outside of the United States on a military base. Even though he
was a citizen and met all of the qualifications to obtain a
TWIC, TSA denied his application. He found himself stuck in the
bureaucratic snarl and unable to work for months while TSA
obtained the records that proved his citizenship and
eligibility.
Another member in the San Francisco Bay Area was denied a
TWIC because he had previously been convicted of a marijuana-
related offense even though the court had expunged his
conviction.\8\ He had been a hard-working longshore worker for
18 years and had no other convictions. He spent months waiting
for TSA to rule on his initial application and, then even
longer waiting for TSA to review his request for a waiver. In
the meantime, he was unable to work and his family struggled to
avoid losing their home.
---------------------------------------------------------------------------
\8\ To protect the member's privacy, we do not include his name.
---------------------------------------------------------------------------
These members and others like them posed no risk to the security of
the United States.
These members are not alone. The Department of Homeland Security
reports that, as of May 21, 2013, it had issued initial TWIC
disqualification letters to 120,224 people.\9\ TSA has two procedures
whereby someone can challenge the denial of a TWIC--appeal and
waiver.\10\ Appeal is available to an applicant who was wrongly denied
a TWIC. In other words, the applicant met all of the statutory and
regulatory criteria for obtaining a TWIC but TSA erroneously denied his
or her application anyway.\11\ Waiver can be sought by an applicant who
does not meet all of the statutory and regulatory criteria for
obtaining a TWIC but who nonetheless ``does not pose a security
threat.''\12\ As of May 21, 2013, DHS had received 54,271 appeals and
had granted 52,299 (more than 96%). In addition, DHS had received
14,593 waiver requests and granted 12,289 (more than 84%). While these
numbers indicate the absolute necessity of having an appeal and waiver
process available, they also indicate that TSA initially denied TWICs
to more than 50,000 people erroneously and to more than 12,000 people
who posed no security threat. Almost certainly, there are tens of
thousands more workers who met the requirements to obtain a TWIC but
did not or could not appeal their denial or seek a waiver. These people
are being wrongly denied access to work for no good reason.
---------------------------------------------------------------------------
\9\ http://www.tsa.gov/sites/default/files/publications/pdf/twic/
monthly_dashboard_cur- rent.pdf.
\10\ 49 C.F.R. 1515.6-1515.7.
\11\ Id. 1515.6(b).
\12\ Id. 1515.7(b).
---------------------------------------------------------------------------
Third, TWIC has shown itself to be of little to no value if the
goal of the program is to limit facility and vessel access. As ILWU
members like those discussed above struggled and were denied the
ability to work for lack of a TWIC, the ILWU has watched as unknown
truckers, rail crews, vessel crews, maintenance workers, and
construction crews without TWICs routinely enter and work at marine
terminal facilities. Sometimes these workers are ``escorted'' by people
with TWICs. However, in many cases the ``escort'' is more theoretical
than real and individuals without TWICs work on the facilities largely
unmonitored. What is more, these workers have no lasting relationship
with the facility owner or operator and therefore pose an arguably more
serious security risk than ILWU members.
In addition, while ILWU members' backgrounds have been scrutinized
in the name of National security, the union has watched waterfront
employers eliminate people and protocols that actually improve security
and replace them with cost-cutting technologies that are no substitute.
For example, many marine terminal operators used to require that seals
on stuffed containers be visually checked to ensure that they had not
been tampered with. They also previously required that empty containers
be opened and checked. To cut costs and speed up the movement of cargo,
many employers now use only a camera linked to a monitor at a remote
location. But a camera cannot tug on the seals to make sure they are
intact, or open empty containers.
The ILWU has been advised by some facility owners and operators
that, if TWIC readers become mandatory, the employers intend to use the
readers to further cut costs by eliminating security guards. Facility
security personnel know the regular workforce on the docks and,
therefore, know who belongs and who does not. Again, technology is no
substitute, particularly given the serious flaws with TWIC card
technology and readers noted by the GAO.\13\
---------------------------------------------------------------------------
\13\ GAO-13-198, ``Transportation Worker Identification Credential:
Card Reader Pilot Results Are Unreliable; Security Benefits Need to Be
Reassessed,'' (May 8, 2013) at 25 (``according to officials from two
pilot sites, approximately 70 percent of the TWICs they encountered
when testing TWICs against contactless readers had broken antennas or
malfunctioned. Further, a separate 2011 report commissioned and led by
USCG . . . identified one site where 49 percent of TWICs could not be
read in contact-less (or proximity mode, and two other sites where 11
percent and 13 percent of TWICs could not be read in contact-less mode.
Because TWIC cards malfunctioned, they could not be detected by
readers.'').
---------------------------------------------------------------------------
For all of these reasons, TWIC is misguided. It does not improve
port security and it unfairly targets working people. Public monies can
and should be put to better use.
The ILWU appreciates the opportunity to submit these comments and
thanks the committee for its consideration.
Ms. Gabbard. Thank you.
Mrs. Miller. Again, thank you to the witnesses very much.
The committee is now adjourned.
[Whereupon, at 11:25 a.m., the subcommittee was adjourned.]
A P P E N D I X
----------
Questions From Chairwoman Candice S. Miller for Joseph A. Servidio
Question 1. A Coast Guard official started in an interview with a
Fierce Homeland Security reporter ``there is not a real strong nexus
between the results of the pilot program and what is in the reader
regulation.'' However, the pilot was referenced several times in the
NPRM. What data from the TSA pilot were used to inform the NPRM? Could
this information have been provided through other means? How can the
Coast Guard be certain the NRPM will not have negative impacts on
business operations knowing that this system has not truly been tested?
Had the TSA pilot been more complete or shown a strong feasibility in
carrying out the biometric requirements of the TWIC program, would the
rule have sought to regulate more than 5 percent of all MTSA-regulated
vessels and facilities?
Answer. The Coast Guard used the best available data to
characterize economic impacts, which in some cases resulted in using
sources other than the TWIC pilot. Specifically, the TWIC pilot was the
main data source associated with the cost to install TWIC readers, as
well as the number of readers required per access point, throughput
times, and failure rates of readers. However, TWIC pilot data was
supplemented with other available data sources to provide preliminary
estimates of other costs and benefits. Other data sources included the
Marine Information for Safety and Law Enforcement (MISLE) database for
population figures, the Marine Security Risk Assessment Model (MSRAM)
for risk hierarchy and consequence data, the General Services
Administration (GSA) schedule for reader hardware and software costs,
and other literature for basic background on TWIC reader deployment.
Based on the judicious use of all data sources, the Coast Guard has
confidence in the proposed regulation's limited impact on business
operations as noted in the Regulatory Assessment.
Decisions regarding application of TWIC reader requirements were
not driven by any limitations of the TWIC pilot, but rather by
comparing costs of the requirements versus benefits gained. In the case
of vessels, given the inherent limits on manning for barges (and
thereby the limited utility for using a reader to verify the identity
of mariners accessing any secure spaces on a barge), barges were
excluded from TWIC reader requirements, thus eliminating approximately
51 percent of the MTSA population (includes vessels and facilities).
Similarly, other vessels with lower risk (e.g., vessels not engaged in
transport of hazardous cargoes) and/or with fewer than 14 TWIC-holding
crewmembers were eliminated given relatively low utility for the cost.
This eliminated another 32 percent of the MTSA population (for a total
of about 83 percent of the MTSA population exempted in the current
proposal). Similar logic was applied to facilities, with requirements
imposed on those 20 percent of MTSA facilities that comprised
approximately 80 percent of the risk exposure. By eliminating lower
risk facilities, another 13 percent of the MTSA population was exempted
from requirements for a total of about 95 percent of the MTSA
population exempted from reader requirements.
Question 2. Since 9/11, Congress has implemented legislation
specifically addressing perceived vulnerabilities with containerized
cargo entering the United States. However, no container facilities will
fall within Risk Group A, and thus will not be impacted by the proposed
reader regulations at this time. Does containerized cargo deserve to be
in a higher-risk group, or are earlier concerns regarding the threat
within containerized cargo overstated? If container facilities are a
major vulnerability, why are they not widely impacted by the proposed
card reader rule?
Answer. In the development of the NPRM, the Coast Guard evaluated
TWIC reader requirements alternatives to those proposed in the NPRM
including an alternative that would have required the installation of
TWIC readers at Risk Group A facilities and all container facilities.
The Coast Guard considered this alternative because container
facilities are perceived to pose a unique threat to the maritime sector
due to the transfer risk associated with containers (i.e., there is a
greater risk of a threat coming through a container facility and
inflicting harm or damage elsewhere than with any other facility type).
However, as discussed in the preamble of the NPRM, many of the high-
risk threat scenarios at container facilities would not be mitigated by
TWIC readers. Although TWIC readers serve as an additional access
control measure, they do not mitigate the threat associated with the
contents of a container, and would not improve screening of cargoes for
dangerous substances or devices.
Additionally, the costs/impacts for TWIC readers at container
facilities would not be justified by the amount of potential risk
reduction at these facilities. This alternative would increase the
burden on industry by increasing the affected population from 532
facilities to 651 facilities. The discounted 10-year costs would go
from $186.1 million to $624.9 million. The inclusion of container
facilities would also potentially have adverse environmental impacts
due to increased air emissions due to longer queuing times and
congestion at facilities.
Question 3. In recent years, many port facilities have designated
Port Security Grant funds specifically to procure TWIC readers and
other equipment associated with TWIC implementation. How many
facilities not in Group A, have received funding for TWIC card readers
and infrastructure? Is it your expectation that Group B and C
facilities, which are not required to purchase card readers, will still
go ahead with the investment? Did the Coast Guard take into
consideration, while drafting the NPRM, whether or not risk Group B or
C facilities have already obtained Port Security Grant funding to
purchase card readers?
Answer. In the development of the TWIC Reader NPRM, the Coast Guard
specifically focused on risk, security, and economic impacts rather
than taking into consideration whether or not facilities had
voluntarily purchased electronic TWIC Readers (with or without PSG
funding). The Coast Guard expects that each facility in Groups B and C
will make a determination on whether to implement readers based on what
best meets its specific business and security needs and assessments.
Absent of regulatory requirement, there is no expectation for B and C
facilities to implement readers.
The PSG Program allocates funds towards maritime security risk
mitigation projects based on risk. Eligible PSG applicants may request
several different projects within an application of which a TWIC
project may be one of the projects or part of a project.
PSG Program financial data is maintained via methodology
established by Congress for Federal grant funding. From fiscal year
2007 through fiscal year 2012, a total of 401 TWIC implementation
projects were approved by DHS, and a total of $144.7 million was
awarded for TWIC projects. Funding awarded for TWIC projects
represented 7.5% of the total PSG Program funding ($1.92 billion)
awarded during the period.
Question 4. The crewmembers operating the Saugatuck Chain Ferry,
out of Saugatuck, Michigan are required to carry a TWIC card. Given the
low threat nature of this vessel as it operates on a fixed chain system
propelled by a hand crank does it make sense for crewmembers of this
vessel to be required to carry a TWIC card? Has there been any
consideration to waive the requirement for crewmembers to obtain a TWIC
card for vessels like this?
Answer. The Saugatuck Chain Ferry (also known as the M/V DIANE) is
a Coast Guard inspected 46 CFR Subchapter `T' small passenger vessel
that operates on the Kalamazoo River (a navigable waterway). In
accordance with Coast Guard Policy Letter 11-15, since the Saugatuck
Chain Ferry does not meet the applicability requirements of maritime
security for vessels (33 CFR 104.105) and therefore is not required to
maintain a Vessel Security Plan (VSP), a credentialed mariner operating
the vessel is not required to retain a Transportation Worker
Identification Credential (TWIC).
However, individuals applying for their initial Merchant Mariner
Credential (MMC) are required to apply for a TWIC in order to undergo a
Security Threat Assessment (STA). Such persons would only need to pass
the STA in order to obtain their MMC. There is no requirement for that
individual to actually hold a valid TWIC unless they are working on a
vessel required to hold a VSP. Additionally, the Coast Guard will not
require a mariner who holds or has held a TWIC to renew it in order to
renew their current credential.
Because of the Saugatuck Chain Ferry's route and service, the
operator of the vessel is required to possess a Coast Guard issued MMC.
The Coast Guard does not have the authority to waive this statutory
requirement. Therefore, any person applying for their initial MMC who
would like to then use that MMC to operate the Saugatuck Chain Ferry
would have to apply for a TWIC in order to undergo a STA, but would not
be required to carry the TWIC.
Questions From Chairwoman Candice S. Miller for Stephen M. Lord
[Note.--The responses are based on work associated with our
previously issued products.]\1\
---------------------------------------------------------------------------
\1\ See GAO, Transportation Worker Identification Credential: Card
Reader Pilot Results Are Unreliable; Security Benefits Need to Be
Reassessed, GAO-13-198 (Washington, DC: May 8, 2013); Transportation
Security: Actions Needed to Address Limitations in TSA's Transportation
Worker Security Threat Assessments and Growing Workload, GAO-12-60
(Washington, DC: Dec. 8, 2011); Transportation Worker Identification
Credential: Internal Control Weaknesses Need to Be Corrected to Help
Achieve Security Objectives, GAO-11-657 (Washington, DC: May 10, 2011);
Transportation Worker Identification Credential: Internal Control
Weaknesses Need to Be Corrected to Help Achieve Security Objectives,
GAO-11-648T (Washington, DC: May 10, 2011); and Transportation Worker
Identification Credential: Progress Made in Enrolling Workers and
Activating Credentials but Evaluation Plan Needed to Help Inform the
Implementation of Card Readers, GAO-10-43 (Washington, DC: Nov. 18,
2009).
---------------------------------------------------------------------------
Question 1. Although TWIC was originally intended to be the common
credential for workers in all modes of transportation, it has been
limited to strictly a maritime security access control credential. The
Coast Guard has further limited its scope by developing a Notice of
Proposed Rulemaking (NPRM) which applies to less than 5 percent of all
MTSA-regulated vessels and facilities. Given that the reader
requirement is not being applied to Group B and C facilities should
TWIC be further reduced by limiting issuance and use to only the
highest-risk maritime facilities?
Answer. Given the current uncertainties surrounding the
implementation of the TWIC program in the maritime environment, and the
program weaknesses highlighted in our 2011 and 2013 reports, limiting
the use of TWIC to maritime facilities where the Coast Guard can
clearly demonstrate that use of TWIC will effectively mitigate the
three terrorist scenarios illustrated in the March 2013 NPRM (i.e., a
truck bomb, a person/passenger carrying an improvised explosive device
(IED), or a terrorist assault team) would be consistent with our
findings and recommendations.\2\ As highlighted in our May 2013 report,
the TWIC pilot conducted to test the use of TWICs with biometric card
readers and other supporting analyses did not provide DHS with complete
and accurate information on the impact of TWIC on facility and vessel
operations or the added security benefits that the TWIC may provide.\3\
For example, we found that the pilot test's results were unreliable,
and that DHS has not assessed the effectiveness of TWIC at enhancing
security or reducing risk at Maritime Transportation Security Act
(MTSA)-regulated facilities and vessels. While the current NPRM is
aimed at implementing the use of TWIC with readers at Group A/highest-
risk-vessels and facilities, the NPRM suggests allowing for the
expanded use of TWIC with readers at lower-risk facilities in the
future.
---------------------------------------------------------------------------
\2\ GAO-11-657 and GAO-13-198.
\3\ GAO-13-198.
---------------------------------------------------------------------------
Question 2. DHS argues that the decentralized security credential
similar to the airport's Secure Identification Display Area (SIDA)
badge is not comparable to TWIC because airport workers generally work
at only one airport and disagrees with the GAO assessment that
``maintaining site-specific credentials enhances security.'' Why do you
believe decentralized security ``enhances security?'' What examples of
such a decentralized approach would you recommend DHS evaluate for use
at port facilities?
Answer. Based on findings from our prior work, a decentralized
credentialing approach could help remediate internal control weaknesses
identified in our May 2011 report, and may therefore enhance
security.\4\ Among others, we reported that TWIC program controls are
not in place to determine whether an applicant has a need for a TWIC,
and that our investigators were successful in obtaining authentic TWIC
cards despite going through the background-checking process. As
implemented, a uniform TWIC credential is issued by TSA after it
conducts a security threat assessment. Operator participation is not
required as part of this centralized TWIC enrollment, security review,
or issuance process. According to our review of the evidence, operator
participation, as would be required under a decentralized credentialing
approach using facility- or port-specific credentials, could help
validate an individual's identity and need for a credential to access a
specific facility or vessel prior to issuing the credential. Maritime
vessel and facility operators have a paramount interest in securing
their assets. Involving operators in the credentialing process gives
them more control and insight into the risks posed by people seeking
access to secure areas, and could better ensure operators and the
Federal Government of the individual's identity, need for a credential,
and need for access to specific vessels and facilities.
---------------------------------------------------------------------------
\4\ See, for example, GAO-13-198; GAO-12-60; and GAO-11-657.
---------------------------------------------------------------------------
As we reported in May 2011, the TWIC program's internal controls
for positively identifying an applicant, arriving at a security threat
determination for that individual, and approving the issuance of a
TWIC, are not designed to provide reasonable assurance that only
qualified applicants can acquire TWICs. If an individual presents an
authentic TWIC acquired through fraudulent means when requesting access
to the secure areas of a MTSA-regulated facility or vessel, the
cardholder is deemed not to be a security threat to the maritime
environment because the cardholder is presumed to have met TWIC-related
qualifications during a background check. In such cases, these
individuals could inappropriately gain unescorted access to secure
areas of a MTSA-regulated facility or vessel, as our investigators did
for our May 2011 report and again for our May 2013 report.
Through our work on the TWIC program, we have not identified any
industry-wide common credential--beyond TWIC--that is used as a
security tool for controlling access to individual, and often
privately-owned, entities. Moreover, the Federal Government, which
provides access to its many departments and agencies, does not use a
single identification credential for controlling access to its
facilities and vessels. Under the Federal model, agencies apply a
standard for conducting background checks and creating the credentials.
For example, as we reported in May 2011, TWIC is unlike other
Federally-sponsored access control credentials, such as the Department
of Defense's Common Access Card--the agency-wide standard
identification card--for which sponsorship by an employer is required.
For these Federal credentialing programs, employer sponsorship begins
with the premise that an individual is known to need certain access as
part of his or her employment. Further, the employing agency is to
conduct a background investigation on the individual and has access to
other personal information, such as prior employers, places of
residency, and education, which it may confirm as part of the
employment process and use to establish the individual's identity.
According to our analysis, use of a decentralized credentialing
approach could enhance the TWIC program's identity verification,
vetting, and issuance controls by leveraging the employer and
operator's knowledge of the individual's background and need for an
access credential prior to conducting the Federal security threat
assessment required as part of the TWIC program. In addition, localized
control over credential issuance could enhance security by making it
easier for individuals to replace lost or nonfunctioning credentials on
site, and forgo potential travel times and waiting periods currently
experienced under the TWIC program.
Similarly, the decentralized aviation model may enhance security to
a greater extent than the TWIC because this model includes employer
sponsorship, background vetting at the local level, a Federal security
threat assessment, and card revocation at the local level. For example,
based on our prior work, in order to receive a SIDA, a person seeking a
credential is sponsored by a previously vetted and authorized
individual within the airport. This process provides greater assurance
that the person seeking the credential has a real need for the
credential and that the person is the person he or she claims to be on
the application. Further, since the credential is valid only within a
given airport, the person holding the credential cannot use that
credential to access other airports where he or she has no legitimate
need to gain access. As demonstrated by our covert tests, having a TWIC
provided the appearance of legitimacy for our testers and allowed them
to access multiple facilities with a single card. Moreover, the SIDA
vetting process allows local airport authorities to see the criminal
background check information pulled by DHS from the Federal Bureau of
Investigation (FBI). Airport authorities use this information to make
the determination about whether to grant or deny a credential. This
allows the totality of an individual's criminal background to be
considered, not just disqualifying offenses. We found that the
Transportation Security Administration (TSA) has the authority and
discretion to do this for the TWIC program but has seldom done so as
part of the adjudication process.\5\ Consequently, under the SIDA
model, airport authorities have greater control and ability to watch
over the vetting process. Similarly, when local credentials are granted
by local authorities, they can be customized for the unique needs of
the facilities and can be revoked by the facilities, thus providing the
facilities with greater control. As we found during our December 2011
work on local credentialing programs, when Florida repealed provisions
of law requiring workers accessing the State's 12 active deepwater
public ports to undergo a State criminal history records check,
individuals with criminal backgrounds who were kept out of the ports
were allowed to return to work because they possessed a TWIC.\6\
---------------------------------------------------------------------------
\5\ GAO-11-657.
\6\ GAO-12-60.
---------------------------------------------------------------------------
Regarding TSA's assertion that the lack of a common credential
across the industry could leave facilities open to a security breach
with falsified credentials, DHS has not provided or discussed with us
any studies or evidence showing that use of a centralized common access
credential enhances security beyond use of port- or facility-specific
credentials supplemented by a Federal security threat assessment. As we
reported in May 2011, unlike prior access control approaches that
allowed access to a specific facility, the TWIC potentially facilitates
access to thousands of facilities once the Federal Government attests
that the TWIC holder has been positively identified and is deemed not
to be a security threat. Further, DHS argues that the aviation
industry's SIDA badge is not comparable to TWIC because airport workers
generally work at only one airport. However, during the course of our
work, DHS did not provide us with analysis on the number of TWIC
holders that are ``transient'' or for whom a local port-specific
credential(s) could necessitate the need for multiple credentials.
Further, DHS did not provide us with analysis demonstrating that the
majority of people seeking access to maritime facilities require more
access control credentials than individuals working in the airport
environment, or showing the extent to which requiring multiple access
control credentials negatively affects security. Use of a single
credential to access thousands of maritime facilities Nation-wide may
prove to be more convenient for certain individuals or segments of the
transportation industry. However, the TWIC program's primary intention
is to enhance security. Given the lack of validated analysis available
to support DHS's position on the security merits of using a common
credential such as TWIC instead of a local port- or facility-specific
credential supplemented by a Federal security threat assessment, we
continue to believe that our May 2011 recommendation to DHS that it
conduct an effectiveness assessment of the TWIC program, has merit and
should be implemented. We also continue to believe that our May 2013
suggestion to Congress that it consider requiring that DHS complete
such an assessment, including a comprehensive comparison of alternative
credentialing approaches, which might include a more decentralized
approach for achieving TWIC program goals, before implementing a final
regulation requiring the use of TWIC cards with biometric readers, has
merit and should be implemented.
Question 3. Considering the numerous delays and tribulations with
the TWIC program over the past 11 years would the Department be able to
produce a better product if only one component was responsible for the
entire program?
Answer. It is unclear that making one component responsible for the
entire TWIC program would enhance the program at this time. The Coast
Guard has primary responsibility for ensuring the safety and security
of maritime ports and has individuals stationed at the ports, among
other things. However, TSA manages the resources for conducting
required security threat assessments for TWIC and other transportation-
related credentials. Therefore, moving the security threat assessment
function to the Coast Guard may create duplication, though we have not
conducted work in this area.
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|