[House Hearing, 113 Congress]
[From the U.S. Government Publishing Office]



 
CHEMICAL FACILITY ANTI-TERRORISM STANDARDS (CFATS) PROGRAM: A PROGRESS 
                                 UPDATE 

=======================================================================

                                HEARING

                               BEFORE THE

              SUBCOMMITTEE ON ENVIRONMENT AND THE ECONOMY

                                 OF THE

                    COMMITTEE ON ENERGY AND COMMERCE
                        HOUSE OF REPRESENTATIVES

                    ONE HUNDRED THIRTEENTH CONGRESS

                             FIRST SESSION

                               __________

                             MARCH 14, 2013

                               __________

                           Serial No. 113-15


      Printed for the use of the Committee on Energy and Commerce
                        energycommerce.house.gov

                               ----------
                         U.S. GOVERNMENT PRINTING OFFICE 

80-377 PDF                       WASHINGTON : 2013 


                    COMMITTEE ON ENERGY AND COMMERCE

                          FRED UPTON, Michigan
                                 Chairman
RALPH M. HALL, Texas                 HENRY A. WAXMAN, California
JOE BARTON, Texas                      Ranking Member
  Chairman Emeritus                  JOHN D. DINGELL, Michigan
ED WHITFIELD, Kentucky                 Chairman Emeritus
JOHN SHIMKUS, Illinois               EDWARD J. MARKEY, Massachusetts
JOSEPH R. PITTS, Pennsylvania        FRANK PALLONE, Jr., New Jersey
GREG WALDEN, Oregon                  BOBBY L. RUSH, Illinois
LEE TERRY, Nebraska                  ANNA G. ESHOO, California
MIKE ROGERS, Michigan                ELIOT L. ENGEL, New York
TIM MURPHY, Pennsylvania             GENE GREEN, Texas
MICHAEL C. BURGESS, Texas            DIANA DeGETTE, Colorado
MARSHA BLACKBURN, Tennessee          LOIS CAPPS, California
  Vice Chairman                      MICHAEL F. DOYLE, Pennsylvania
PHIL GINGREY, Georgia                JANICE D. SCHAKOWSKY, Illinois
STEVE SCALISE, Louisiana             ANTHONY D. WEINER, New York
ROBERT E. LATTA, Ohio                JIM MATHESON, Utah
CATHY McMORRIS RODGERS, Washington   G.K. BUTTERFIELD, North Carolina
GREGG HARPER, Mississippi            JOHN BARROW, Georgia
LEONARD LANCE, New Jersey            DORIS O. MATSUI, California
BILL CASSIDY, Louisiana              DONNA M. CHRISTENSEN, Virgin 
BRETT GUTHRIE, Kentucky                  Islands
PETE OLSON, Texas                    KATHY CASTOR, Florida
DAVID B. McKINLEY, West Virginia     JOHN P. SARBANES, Maryland
CORY GARDNER, Colorado               JERRY McNERNEY, California
MIKE POMPEO, Kansas                  BRUCE L. BRALEY, Iowa
ADAM KINZINGER, Illinois             PETER WELCH, Vermont
H. MORGAN GRIFFITH, Virginia         BEN RAY LUJAN, New Mexico
GUS M. BILIRAKIS, Florida            PAUL TONKO, New York
BILL JOHNSON, Missouri
BILLY LONG, Missouri
RENEE L. ELLMERS, North Carolina
                Subcommittee on Environment and Economy

                         JOHN SHIMKUS, Illinois
                                 Chairman
PHIL GINGREY, Georgia                PAUL TONKO, New York
  Vice Chairman                        Ranking Member
RALPH M. HALL, Texas                 FRANK PALLONE, Jr., New Jersey
ED WHITFIELD, Kentucky               GENE GREEN, Texas
JOSEPH R. PITTS, Pennsylvania        DIANA DeGETTE, Colorado
TIM MURPHY, Pennsylvania             LOIS CAPPS, California
ROBERT E. LATTA, Ohio                JERRY McNERNEY, California
GREGG HARPER, Mississippi            JOHN D. DINGELL, Michigan
BILL CASSIDY, Louisiana              JANICE D. SCHAKOWSKY, Illinois
DAVID B. McKINLEY, West Virginia     JOHN BARROW, Georgia
GUS M. BILIRAKIS, Florida            DORIS O. MATSUI, California
BILL JOHNSON, Missouri               HENRY A. WAXMAN, California, ex 
JOE BARTON, Texas                        officio
FRED UPTON, Michigan, ex officio
  


                             C O N T E N T S

                              ----------                              
                                                                   Page
Hon. John Shimkus, a Representative in Congress from the State of 
  Illinois, opening statement....................................     1
    Prepared statement...........................................     2
Hon. Paul Tonko, a Representative in Congress from the State of 
  New York, opening statement....................................     2
Hon. Henry A. Waxman, a Representative in Congress from the State 
  of California, prepared statement..............................   113

                               Witnesses

Rand Beers, Under Secretary, National Protection and Programs 
  Directorate, U.S. Department of Homeland Security..............     5
    Prepared statement...........................................     7
    Answers to submitted questions...............................   117
David Wulf, Director, Infrastructure Security Compliance 
  Division, U.S. Department of Homeland Security.................    14
    Prepared statement...........................................     7
    Answers to submitted questions...............................   117
Stephen L. Caldwell, Director, Homeland Security and Justice, 
  Government Accountability Office...............................    34
    Prepared statement...........................................    36
    Answers to submitted questions...............................   143
William E. Allmond, IV, Vice President, Society of Chemical 
  Manufacturers and Affiliates...................................    63
    Prepared statement...........................................    65
    Answers to submitted questions...............................   149
Timothy J. Scott, Chief Security Officer and Corporate Director, 
  the Dow Chemical Company, on Behalf of the American Chemistry 
  Council........................................................    71
    Prepared statement...........................................    73
    Answers to submitted questions...............................   157
Charlie Drevna, President, American Fuel and Petrochemical 
  Manufacturers..................................................    78
    Prepared statement...........................................    80
    Answers to submitted questions...............................   168
Rick Hind, Legislative Director, Greenpeace......................    86
    Prepared statement...........................................    88
    Answers to submitted questions...............................   175

                           Submitted Material

Letter of March 12, 2013, from the National Association of 
  Chemical Distributors to Mssrs. Shimkus and Tonko..............   117


CHEMICAL FACILITY ANTI-TERRORISM STANDARDS (CFATS) PROGRAM: A PROGRESS 
                                 UPDATE

                              ----------                              


                        THURSDAY, MARCH 14, 2013

                  House of Representatives,
           Subcommittee on Environment and Economy,
                           Committee on Energy and Commerce
                                                    Washington, DC.
    The subcommittee met, pursuant to call, at 10:07 a.m., in 
room 2322 of the Rayburn House Office Building, Hon. John 
Shimkus (chairman of the subcommittee) presiding.
    Members present: Representatives Shimkus, Pitts, Murphy, 
Latta, Harper, Cassidy, McKinley, Bilirakis, Johnson, Barton, 
Tonko, Green, Schakowsky, McNerney, Barrow ,and Waxman (ex 
officio).
    Staff present: Nick Abraham, Legislative Clerk; Charlotte 
Baker, Press Secretary; Matt Bravo, Professional Staff Member; 
Jerry Couri, Senior Environmental Policy Advisor; David 
McCarthy, Chief Counsel, Environment and the Economy; Chris 
Sarley, Policy Coordinator, Environment and the Economy; Tom 
Wilbur, Digital Media Advisor; Jacqueline Cohen, Democratic 
Counsel; Greg Dotson, Democratic Staff Director, Energy and 
Environment; and Caitlin Haberman, Democratic Policy Analyst.

  OPENING STATEMENT OF HON. JOHN SHIMKUS, A REPRESENTATIVE IN 
              CONGRESS FROM THE STATE OF ILLINOIS

    Mr. Shimkus. I would like to call the hearing to order.
    We want to welcome our first panel, and I would like to 
recognize myself for 5 minutes for an opening statement.
    Good morning. The Subcommittee is now in order and I want 
to recognize myself for 5 minutes. Today marks the fourth 
hearing we have had on CFATS and the third consecutive one we 
have had since I became the subcommittee chairman.
    Sadly, it has been a very painful process to see how badly 
CFATS had fallen short of our expectations and to see the 
struggle, both inside of DHS as well as externally, to get the 
program back on track. There are some positive reports about 
progress from DHS, GAO, and the regulated stakeholders, but we 
have uncovered more details showing that in key areas the 
suggested progress is not what we had hoped. I think strides 
have been made to remedy many of the managerial concerns of 1 
year ago, and some of our testimony will suggest communication 
lines have been opened in a way that could lead to longer-term 
achievements for the program.
    By many accounts, Infrastructure Security Compliance 
Division Director David Wulf deserves a great deal of credit. 
Mr. Wulf, we appreciate your tireless, consistent, candid, and 
long-standing commitment to improving CFATS when others could 
not. I also think this process is merely meant to get us back 
to a semi-functional program, not a perfect or fully 
implemented program.
    Unfortunately, underlying programmatic issues we discussed 
in the last hearing--such as the fact that CFATS risk 
assessment falls far short of DHS' own National Infrastructure 
Protection Plan and the CFATS regulations, and the long time 
frame for evaluating Site Security Plans, despite the 
incomplete risk assessment--continue to threaten the 
credibility of the program not only on the Hill, but with 
regulated stakeholders who are confused by many decisions made 
within the program.
    As Chairman Upton has said before to DHS, we are all on the 
same side. The enemy here is the terrorists who would seek to 
harm our Nation. We need to work together to determine the best 
path forward for CFATS and its reauthorization, but we can't do 
so if we aren't fully informed and in a way that verifies the 
details coming forward. That is why we are going to have some 
tough and balanced assessment of the program delivered by DHS, 
the Government Accountability Office, and the CFATS stakeholder 
community.
    Our witnesses today may not tell us exactly what we want to 
hear, but they will tell us what we need to know. I want to 
thank all of these witnesses for appearing before our panel 
here today. I believe we are at a critical juncture for the 
success of the CFATS program in that the internal issues 
distracting the program are not our focus, but rather getting 
the program right, functioning effectively, efficiently, as 
Congress drafted the law. Their perspective will be crucial in 
getting serious questions answered by the program and our 
ability to work together.
    [The prepared statement of Mr. Shimkus follows:]

                Prepared statement of Hon. John Shimkus

    Today marks the fourth hearing we have had on CFATS, and 
the third consecutive one we have had since I became 
subcommittee Chairman.
    Sadly, it has been a very painful process to see how badly 
CFATS had fallen short of our expectations and to see the 
struggle, both inside DHS as well as externally, to get the 
program back on track. There are some positive reports about 
progress from DHS, GAO and the regulated stakeholders, but 
we've uncovered more details showing that in key areas the 
suggested progress is not what we had hoped.
    I think strides have been made to remedy many of the 
managerial concerns of one year ago and some of our testimony 
will suggest communication lines have been opened in a way that 
could lead to longer term achievements for the program. By many 
accounts, Infrastructure Security Compliance Division (ISCD) 
Director David Wulf deserves a good deal of credit. Mr. Wulf, 
we appreciate your tireless, consistent, candid, and long-
standing commitment to improving CFATS when others could not.
    I also think this progress is merely meant to get us back 
to a semi-functional program, not a perfect or fully 
implemented program. Unfortunately, underlying programmatic 
issues we discussed in the last hearing--such as the fact that 
CFATS risk assessment falls far short of DHS's own National 
Infrastructure Protection Plan and the CFATS regulations, and 
the long time frame for evaluating site security plans, despite 
the incomplete risk assessment--continue to threaten the 
credibility of the program not only on the Hill, but with 
regulated stakeholders who are confused by many decisions made 
within the program.
    As Chairman Upton has said before to DHS, we are all on the 
same side, the enemy here is the terrorists who would seek to 
do harm to our nation. We need to work together to determine 
the best path forward for CFATS and its reauthorization, but we 
can't do so if we aren't fully informed and in a way that 
verifies the details coming forward. That's why we are going to 
have some tough but balanced assessments of the program 
delivered by DHS, the Government Accountability Office, and the 
CFATS stakeholder community.
    Our witnesses today may not tell us exactly what we want to 
hear, but they will tell us what we need to know. I want to 
thank all of these witnesses for appearing before our panel 
here today.
    I believe we are at a critical juncture for the success of 
the CFATS program, in that the internal issues distracting the 
program are not now our focus, but rather getting the program 
right, functioning effectively, efficiently, as congress 
drafted the law. Their perspective will be crucial to getting 
serious questionsanswered by the program and our ability to 
work together.

                                #  #  #

    Mr. Shimkus. And with that I would like to yield 1 minute 
to the gentleman from Texas, Mr. Barton.
    Mr. Barton. Thank you, Mr. Chairman, for holding this 
hearing today.
    Two years in a row this subcommittee has convened a hearing 
to discuss the concerns with the CFATS program. Last year, we 
became aware of an internal DHS memorandum which detailed an 
array of management flaws and achievement gaps with that 
program. One of the witnesses today was a co-author. When news 
of these problems surfaced, several Members of Congress, 
including myself, asked the GAO to determine what actions DHS 
was taking to address the problems. We learned in the GAO 
report that resulted of a 94-item Action Plan that DHS 
developed to address those various issues. I understand today 
that the most egregious examples of waste of taxpayer dollars 
have been addressed but there is still work to do. We are at a 
critical juncture.
    DHS has been reviewing information since 2007 by operators 
of over 40,000 facilities. By January of this year, they had 
identified about 4,400 as high-risk facilities. Of those, about 
90 percent were tier-based on the risk that they presented--
meaning that they would have to submit Site Security Plans for 
DHS review. We now know that there have been significant errors 
in the risk assessment methodology. We also know that only a 
few dozen of the 3,100 high-risk security plans have been 
reviewed and approved. There is much work to be done. I hope 
this hearing will facilitate some of that work.
    Thank you for the hearing and thank you for the time and I 
yield back.
    Mr. Shimkus. The gentleman yields back his time.
    The chair now recognizes the ranking member of the 
subcommittee, Mr. Tonko, for 5 minutes.

   OPENING STATEMENT OF HON. PAUL TONKO, A REPRESENTATIVE IN 
              CONGRESS FROM THE STATE OF NEW YORK

    Mr. Tonko. Thank you. Thank you, Mr. Chairman. And good 
morning and thank you to our chair for convening this hearing 
and certainly to our witnesses for participating today and 
providing your insight and offering very important information.
    Ensuring the safety of our citizens and avoiding serious 
disruption of our economy requires us to remain vigilant and to 
anticipate potential targets and actions of violent individuals 
and groups. The goal of the Chemical Facility Anti-Terrorism 
Standards, the CFATS program, is to ensure that chemical 
facilities have robust plans to prevent terrorists from 
sabotaging them and to minimize the impacts should that 
prevention fail.
    Two years ago, an internal memorandum revealed serious 
problems with the CFATS program. While some progress has been 
made to address some of the shortcomings, there is still much 
more work to be done. That work surely falls to the Department 
of Homeland Security, clearly having more work to do, but also 
it falls to Congress. Congress created the Department of 
Homeland Security in 2002 and charged DHS with coordinating 
federal policy to protect this Nation's critical 
infrastructure. This is a complex task involving not only the 
Federal Government but a partnership with state and local 
governments, as well as the private sector.
    Congress defined this complex and essential task of 
protecting chemical facilities with a paragraph in an 
appropriations bill. The deficiencies in this program are 
partly a reflection of our failure to come together and provide 
clear guidance to the administration.
    The industry has been active in this area. They have taken 
many steps through initiatives such as the Responsible Care 
Program to develop and disseminate best practices to member 
companies of industry organizations. These programs are, 
however, voluntary. Private industry does not have the tools of 
surveillance and intelligence as that which the Federal 
Government has. In order to be most effective, we must have 
partnerships working together and the program must have the 
public's confidence that their communities are indeed safe. The 
public and the industry will benefit from a federal program 
that is developed with their input and in which standards, 
practices, and policies are defined clearly by the Department 
of Homeland Security.
    The CFATS program is not the only federal program 
regulating chemical facilities. Other federal departments and 
agencies have programs with longer histories and well-
established protocols. There should be a consultation amongst 
federal agencies to apply best practices, identify gaps in 
responsibility, and to avoid conflicting regulations and 
policies.
    I hope this will not be the last hearing on this issue. 
This committee should develop legislation that provides clear 
direction to DHS, certainty to the regulated industry, and 
confidence to the public that the CFATS program is providing 
the protection we require and deserve. A paragraph in an 
appropriations bill that must be renewed annually simply does 
not meet those needs.
    I would like to thank all of our witnesses for appearing 
before us today. I look forward to your testimony and to 
hearing your views on how we can improve this most essential 
program.
    With that, I thank you. Mr. Chairman, I yield back.
    Mr. Shimkus. I want to thank my colleague. And I can 
guarantee it will not be last hearing on this issue, and we 
would like to authorize a program.
    So with that, I would like to turn to my colleagues on my 
side and ask if anyone would like to submit an opening 
statement.
    Seeing none, I turn to your side. No one? Thank you very 
much.
    Now, I would like to recognize Mr. Rand Beers, the Under 
Secretary for the National Protection and Programs Directorate 
of the United States Department of Homeland Security.
    Sir, your full statement is in the record. You are 
recognized for 5 minutes.

    STATEMENT OF HON. RAND BEERS, UNDER SECRETARY, NATIONAL 
    PROTECTION AND PROGRAMS DIRECTORATE, U.S. DEPARTMENT OF 
  HOMELAND SECURITY; AND DAVID WULF, DIRECTOR, INFRASTRUCTURE 
   SECURITY COMPLIANCE DIVISION, U.S. DEPARTMENT OF HOMELAND 
                            SECURITY

                  STATEMENT OF HON. RAND BEERS

    Mr. Beers. Thank you, Chairman Shimkus and Ranking Member 
Tonko and other members of the committee. I appreciate the 
opportunity to be before you today to talk about the 
Department's regulation of high-risk chemical facilities.
    Let me start by emphasizing that the CFATS program has 
already made the Nation more secure. The program has identified 
high-risk chemical facilities across the country. It has 
provided them with the tools to identify their vulnerabilities, 
and it has helped them to develop plans to reduce the risks 
associated with these chemicals.
    Since its inception, CFATS has helped 3,000 chemical 
facilities eliminate, reduce, or otherwise modify their 
holdings so that they no longer possess potentially dangerous 
chemicals and are no longer considered high-risk. The 
significant reduction in the number of chemical facilities that 
represent the highest risk is an important success of the CFATS 
program and is attributable both to the design of the program 
as enacted by Congress and to the work of the CFATS personnel 
and industry at the thousands of chemical facilities that we 
work with on a regular basis.
    Over the past year, NPPD has worked diligently to turn a 
corner and has addressed many of the challenges identified by 
the program's leadership. The CFATS program has made 
significant progress advancing programmatically while 
simultaneously addressing the internal operational concerns. 
Equally important, the Department remains committed to working 
with stakeholders and with the Congress on a path forward to 
ensure that the CFATS program continues to build upon the 
successes to date.
    Over the last 6 months ISCD has made considerable progress 
in conducting authorization inspections and approving Site 
Security Plans. When I was here in September, we had authorized 
73 Site Security Plans. Today, we have authorized 261. That is 
a 400 percent increase. In September we had conducted 19 
authorization inspections; today, we have conducted 141. That 
is a 700 percent increase. In September we had approved only 
two Site Security Plans; now, we have approved 52, including 3 
Alternative Security Programs.
    While these are significant achievements in the last 6 
months, we recognize that we need to do much more and we need 
to increase the pace at which we are doing it. And we are 
looking at potential approaches for increasing the pace of 
security plan reviews and inspections for the lower Tier 3 and 
Tier 4 facilities without sacrificing quality and consistency.
    NPPD will work with the regulated community to gather 
feedback and thoughts on how best to increase the pace of the 
lower tiers. For example, we have been looking with industry on 
the development of templates, or corporate alternative Security 
Programs, and we believe that the use of ASPs will 
significantly increase the pace and improve our security plans. 
We have also discussed ASPs with the Coast Guard and will apply 
the lessons that they have learned regarding their use of ASPs 
to take your point, Ranking Member Tonko, about talking to our 
partners who also have regulatory programs.
    Regarding our private sector partners, the Department has 
received primarily positive feedback on outreach and 
communications efforts from the regulated community. And we 
will continue to address specific areas of interest to the 
CFATS community. For instance, recognizing that regulated 
facilities best understand their risk drivers and in support of 
increased transparency, the Department is analyzing what 
aspects of the classified risk tiering methodology it can and 
should share with members of the regulated community. In fact, 
that particular question has been presented to the risk 
methodology external Peer Review Panel for analysis. And I 
might add that this is a peer review that includes private 
sector participation. And the Department is looking forward 
very much to the panel's recommendations with respect to this.
    The Department has also actively engaged stakeholders 
regarding personnel surety. During the last 6 months, we have 
been listening to stakeholder feedback on personnel surety and 
we have revised our program based on this feedback. We now 
believe we have a proposal which provides the regulated 
community with flexibility for carrying out the outstanding 
requirement for personnel surety and reflects input from 
facilities of all sizes. This proposal balances the need to 
conduct thorough vetting of personnel for national security 
purposes with a desire to minimize the burden on facilities. 
Our engagement with the private sector will be reflected in two 
department Notices that have gone from the Department to the 
Federal Register and will be published in the coming days.
    I close with a note regarding the Department's current 
statutory authority to implement CFATS. As you are aware, the 
CFATS authorization currently extends through March 27 of this 
year. The Department supports a permanent authorization for the 
CFATS program and we are committed to working with the Congress 
and other security partners to establish a permanent authority 
for the CFATS program in federal law. Overall, I am here before 
you today convinced that we have positioned the program firmly 
on the right track and I would be happy to respond to any 
questions that you may have.
    Thank you.
    [The prepared statement of Mr. Beers and Mr. Wulf follows:]

    [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
    
    Mr. Shimkus. Thank you.
    Also joining at the first panel is Mr. David Wulf, who is 
the director of the Infrastructure Security and Compliance 
Division. Obviously, you didn't submit an opening statement, 
nor do you have one, but if you want to have anything just for 
the record, I would like to recognize you for a few minutes.

                     STATEMENT OF MR. WULF

    Mr. Wulf. That would be great. Thank you so much, Chairman 
Shimkus. I would like to thank you, Ranking Member Tonko, and 
the other members of the subcommittee for the opportunity to 
testify here today.
    ISCD has made great progress in addressing the challenges 
described in the internal memo and associated Action Plan that 
we presented to Under Secretary Beers in the fall of 2011. With 
strong support from leadership in the National Protection and 
Programs Directorate and the Office of Infrastructure 
Protection and through much hard work on the part of the 
talented men and women of ISCD, we have completed 88 of the 95 
items outlined in our Action Plan. We have developed improved 
policies, procedures, and training to ensure that inspections 
are conducted in a consistent and thorough fashion. We have 
implemented an effective streamlined SSP review process, a 
process that has greatly enhanced our ability to authorize, and 
as appropriate, grant final approval for Site Security Plans.
    We have also done much to stabilize our organization and 
our leadership cadre by hiring permanent supervisors, including 
a permanent deputy director, and we continue to foster 
transparency and open communication throughout our 
organization.
    I would like to recognize our workforce, which truly has a 
passion for the mission of chemical facility security. And I 
would like to recognize also the American Federation of 
Government Employees which represents our bargaining unit 
employees in the field, and has done much to expedite its 
review of key policies and procedures over the past several 
months.
    In September I reported that we had turned an important 
corner in the implementation of CFATS. I am pleased to be able 
to report today that not only has that corner been turned, but 
we are moving confidently down the road to realizing the full 
potential of the program. ISCD and the CFATS program are moving 
forward in a way that will foster continued advances in the 
security of America's highest-risk chemical facilities. We have 
achieved a marked increase in the pace of SSP authorizations, 
facility inspections, and approved Site Security Plans.
    As the Under Secretary noted, we have authorized more than 
260 SSPs and granted final approval for 52 of those. We 
anticipate completing approvals of Site Security Plans for 
facilities in the highest-risk tier, Tier 1, by September of 
this year and completing final approvals of Tier 2 SSPs by May 
of 2014. Reviews and authorizations of Tier 3 SSPs are now 
underway as well.
    However, recognizing that we must find ways to become ever 
more efficient and effective in our inspection and SSP review 
processes, we will be looking closely at, and soliciting 
stakeholder input on, options to streamline the review and 
approval cycle for facilities in Tiers 3 and 4. I do anticipate 
that ASP templates will be an important tool to enhance the 
efficiency of our reviews. The American Chemistry Council 
recently worked with us to develop an ASP template and we 
continue to work with industry associations such as SOCMA, 
AFPM, and the National Association of Chemical Distributors, 
who are all considering the adoption of ASP templates for their 
member companies.
    So even as we continue to seek ways to improve, it does 
bear noting that ISCD's chemical security inspectors are today 
providing compliance assistance to facilities and conducting 
inspections at an unprecedented rate. And I am pleased to 
report that I have received much favorable feedback from our 
industry stakeholders about their experience with these 
inspections. As you know, and this is something for which I am 
profoundly grateful, our stakeholders are not shy when it comes 
to expressing their candid thoughts and concerns about the 
program. So I am confident that when I am hearing positive 
things from industry about their facilities inspections-related 
experiences, we are on the right track.
    I would like to share one quote from Cathi Cross, Director 
of Security for Phillips 66 regarding a recent inspection in 
Oklahoma. Ms. Cross conveyed to me that her facility's 
experience with the DHS inspectors ``was a very positive 
one...that the members of the ISCD inspection team were 
knowledgeable, courteous, and quite helpful in their 
collaborative approach as they evaluated the facility, its SSP 
draft, and planned measures.'' Continuing, Ms. Cross noted that 
``the inspectors provided thoughtful comments and were 
receptive to alternate proposals for meeting security 
objectives.''
    So ISCD continues to fully engage with our industry 
stakeholders, and I very much appreciate industry's continued 
support for the program. And our stakeholder engagement 
continues to take many forms. At the facility level, in 
addition to inspections, we continue to conduct compliance 
assistance visits and other outreach to work with the 
facilities as they develop their Site Security Plans. We also 
engage with stakeholders on important programmatic issues. We 
continue to work on the development of ASP templates, and we 
are in the process of gathering industry feedback as we move 
forward to improve our suite of online tools.
    Also, as the Under Secretary noted, we recently concluded a 
productive and extensive series of discussions on the important 
issue of personnel surety. Ensuring that those who seek 
unescorted access to high-risk chemical facilities are vetted 
for terrorist ties is a critical piece of the CFATS effort and 
one that we must move forward to implement in the near term.
    I am also appreciative of the work done by GAO and the 
perspectives GAO has offered us on the CFATS risk-tiering 
methodology and on the management and tracking of our 
stakeholder outreach activities. With regard to our risk-
tiering efforts, while I am confident that our current 
methodology, with its focus on the consequences of a potential 
terrorist attack, is appropriate for a regulatory compliance 
program such as CFATS, considering ways in which our tiering 
efforts may be enhanced is something to which we are very much 
open at ISCD.
    I am very much eagerly anticipating the results of our 
external peer review in this regard on risk-tiering and any 
recommendations that may be forthcoming from the Peer Review 
Panel.
    As for our external outreach, ensuring that we 
appropriately track and manage our outreach activities is an 
important priority for ISCD and one that we will pursue.
    Thank you again for the opportunity to provide an update on 
the forward progress the CFATS program continues to make. It is 
an honor and a privilege to serve with the dedicated 
professionals at ISCD. I firmly believe we have made much 
progress in coming together as a regulatory compliance 
organization, and along with rest of the ISCD team, I am 
excited and optimistic about the future of the CFATS program.
    Thank you again for the opportunity and I welcome any 
questions that you may have. I apologize for the extra 30 
seconds.
    Mr. Shimkus. Oh, you are fine. Thank you, Mr. Wulf.
    And before I recognize myself for the first round of 
questions, I think just a comment for staff--especially, I 
think we have some guests in the room--is that maybe we need to 
put up a placard that defines these acronyms, because if you 
are visiting this room and you have no idea what these acronyms 
are, you are like probably listening to Chinese. So stuff like 
CFATS--Chemical Facility Anti-Terrorism Standards. We will talk 
about NIPP, which is the National Infrastructure Protection 
Plan. We will talk about ASP, Alternate Security Plan. So we 
know there are a lot of you that are well knowledgeable out 
there, but we probably could do better by having a display of 
some of these acronyms out there. So I am from the military a 
long time ago so we were acronym-focused also.
    So I will recognize myself for the first 5 minutes of 
questions and my questions will be directed to Mr. Beers.
    Mr. Beers, GAO says CFATS does not consider or analyze 
vulnerability threat or economic consequence during the tiering 
process. We knew about the vulnerability gap but not the 
others. But in GAO's testimony--Government Accounting Office--
when would the regulated community, the Hill, and others have 
learned of this?
    Mr. Beers. Sir, I do not know when the vulnerability issue 
surfaced specifically, but I do know that it surfaced within at 
least the last year as far as I am aware. With respect to the 
economic consequences issue, as I was not present when the 
program was originally briefed to this committee and other 
committees, I am simply unaware of when or whether that might 
have been brought to the Committee's attention.
    Mr. Shimkus. Yes. So the follow-up is, had not Chairman 
Upton, Joe Barton, Henry Waxman not asked for this GAO report, 
we on the Hill and stakeholders may not have learned of the 
vulnerability gap. Is that safe to say?
    Mr. Beers. Sir, that is certainly a conclusion that can be 
drawn from that. But one thing that I would add to that, which 
David and I have both spoken of, is that one of the things that 
we have asked of the peer review committee after our own 
internal review is that this methodology be looked at 
independently. Obviously, we are going to take note of the 
GAO's comments on this and it is certainly our intention to 
have full disclosure with you all, and if some of the material 
is classified, we will do that in a classified setting.
    Mr. Shimkus. Thank you. According to the National 
Infrastructure Protection Plan, risk is a function of three 
components: consequence, threat, and vulnerability--we did this 
in the last hearing--and a risk assessment approach must assess 
each one. Have you analyzed the effect of not considering 
vulnerability for all the regulated facilities?
    Mr. Beers. Sir, we have. The rationale behind that is that 
while we have----
    Mr. Shimkus. Did your mike go off or it is not pulled close 
enough?
    Mr. Beers. Let me start over again. We looked at 
consequences and threats and gave them a definition in the 
tiering methodology, but because vulnerability was what the 
whole program was about reducing and because we did not have 
the kind of data that we needed in order to be able to assign 
vulnerability factors with specific and differentiated levels, 
we chose to hold that constant, tier on the basis of threat and 
consequence, and ask the facilities then to come back to us 
with an indication of what their vulnerabilities were and to 
work with them on Site Security Plans to deal with those 
vulnerabilities.
    The consequence of this is that the tiering works to set 
them aside by threat and vulnerability and the whole endgame is 
about reducing vulnerability or risk. So we chose to hold that 
constant in the tiering; we chose to deal with that through the 
Site Security Plan process.
    Mr. Shimkus. And I guess then our follow-up would be we 
think you have evaluated part of the threat, not the entire 
threat, and there is no economic process that has been defined 
so far which is a part of that whole calculation. But you did 
identify in your comment about up-to-date data. So what is the 
effect of not using up-to-date threat data in the risk-tiering 
approach?
    Mr. Beers. Sir, as we go through this process, if there is 
additional threat data or altered threat data, our intention is 
to include that. That is certainly something that we are 
talking with the Peer Review Committee about and my guess is we 
will get some different information.
    David, do you want to add to that?
    Mr. Wulf. Yes, I would. Yes, the tiering methodology, as it 
currently exists, is certainly very much consequence-based. I 
think that consequence is tied very much directly to threat as 
we use the threat in the tiering engine. Targets that have high 
value from a terrorist perspective in terms of the consequence 
will also typically have a pretty high score on the threat 
side. We are certainly very much open to ways in which we can 
enhance the tiering methodology and that is the very reason we 
are having this external peer review.
    But I think focusing principally on consequence in a 
regulatory compliance framework is an appropriate way to tier 
facilities. If we focused heavily on vulnerability in the 
actual tiering, we would have potential situations in which a 
facility would tier highly because of a heightened 
vulnerability that it identified. As a result of tiering 
highly, it would put into place hopefully significant and 
successful security measures to address the vulnerability. The 
vulnerability would then be diminished and theoretically that 
facility would tier out, not have those requirements any 
longer, conceivably have its vulnerability go up again, tier 
back in, and we would have sort of a roller coaster effect.
    So I think the way in which we and the CFATS program have 
woven the vulnerability factor into the remainder of the 
program in the facilities, assessment of vulnerabilities, in 
the development of their security vulnerability assessments, 
and in their development of Site Security Plans makes sense. 
That is not to say there isn't room for improvement and I 
certainly anticipate we will get some solid recommendations in 
those regards from the Peer Review Panel.
    Mr. Shimkus. Thank you. My time has expired. The chair now 
recognizes Mr. Tonko for 5 minutes.
    Mr. Tonko. Thank you, Mr. Chair.
    It appears that the Department of Homeland Security has 
good progress to report implementing their Action Plan to 
strengthen the CFATS program, but I am concerned that 
fundamental problems may still exist. I would like to focus on 
one of those concerns and that has just been the focus of the 
chair's address and that being the tiering of facilities.
    CFATS is a risk-based program meaning that facilities 
placed in a high-risk tier have to meet higher standards, I am 
told, for security. Lower-tiered facilities then meet lower 
standards. An error in tiering could mean that a high-risk 
facility is not adequately secured or that the owners and 
operators of a low-risk facility have to invest in unnecessary 
security measures. The tiering process must be, therefore, as 
accurate as possible.
    The Department published a National Infrastructure 
Protection Plan in 2006 and I believe revised it in 2009. This 
plan discusses how risk analysis for terrorism threats should 
be conducted. Under Secretary Beers, should the CFATS program 
be consistent with that plan, the developed plan of 2006, and 
improved in '09?
    Mr. Beers. Sir, the National Infrastructure and Protection 
Plan is a global statement of risk. All of the programs in the 
Department of Homeland Security should be in rough alignment 
with that. But we also have to recognize that different sectors 
and different companies may have some specifics that cause some 
alteration or some specific requirement relevant to them and 
perhaps only to them. But as a general measure, yes, that is 
correct, sir.
    Mr. Tonko. So as a general measure, we say yes. And 
according to the National Infrastructure Protection Plan, risk 
assessments must account for threat, vulnerability, and 
consequences. But that is not what CFATS, as a program, 
currently does. GAO is critical of the fact that apparently DHS 
completely ignores the potential economic consequences of a 
terrorist attack when conducting a risk assessment. And GAO is 
not the first to say this. In 2010, the National Academies 
published a report, requested by Congress, on department-wide 
efforts to analyze risk. And the Academies approved of the 
framework in the National Infrastructure Protection Plan but 
found that ``many of the Department's risk-analysis models and 
processes are weak and are not on a trajectory to improve.'' 
According to Academies, the methods were not ``documented, 
reproducible, transparent, or defensible.''
    These are very serious criticisms and to address these 
issues the National Academies made a number of specific 
recommendations. So my question to you, Under Secretary, is 
that did the Department ever provide a formal response to the 
National Academies' report?
    Mr. Beers. Sir, there was a response by the Department to 
that. I can get you a copy of that. I don't have it on hand at 
this particular point in time. But we were certainly aware of 
the Academies' report and we did respond to it.
    Mr. Tonko. Under Secretary Beers, can you please explain 
the process you are currently engaged in to improve the risk 
assessment done in the CFATS program and whether it will 
respond to the recommendations made by GAO and the National 
Academies?
    Mr. Beers. Sir, let me respond on two levels here, first, 
to go back to the original premise, which is the threat, 
consequences, and vulnerability address how one should be 
dealing with risk and simply say we believe in the CFATS 
program that we do address all three of those aspects even 
though the tiering methodology, which is not the entire dealing 
with risk, only focuses on consequences and threat and holds 
vulnerability constant. But as I said in my earlier response to 
the chairman's question, we believe that the vulnerability part 
of that equation is dealt with in the development of the Site 
Security Plans.
    With respect to the larger question, I think that what we 
are trying to do here is work through a regulatory program 
which is different--the NIPP was really written in association 
with voluntary programs, which meant that while we could lay 
out best practices or standards or thoughts on how to deal with 
this, it was really entirely up to the companies in order to do 
that. And in the regulatory program, we have the ability to 
state whether or not their response is in fact adequate to the 
regulatory requirement that we have. And that makes it somewhat 
different from the framework in which the NIPP was written.
    But let me also turned to David Wulf to add anything that 
he may wish to add.
    Mr. Wulf. I would just add a couple of things. We committed 
to do three things when we encountered some issues with the 
tiering methodology. One was to do an internal documentation of 
our processes and our methodology, do sort of an internal 
department look at the CFATS methodology and to do what is 
ongoing right now, the external peer review. As we conducted 
our documentation, we have tried to be transparent about what 
we found. We have talked through issues with staff up here, 
with our industry stakeholders, and have tried to keep everyone 
abreast of the progress we are making on the economic 
criticality piece of this, of the consequence assessment in the 
tiering methodology.
    In that regard, I would note for the Committee that we are 
actively engaged in trying to address the economic consequence 
part of the equation. We are working with Sandia National Labs 
on that effort. I received a briefing I want to say a couple of 
months ago. Our expectation is that Sandia's work--and it is 
difficult stuff assessing economic consequences of potential 
terrorist attack--will be complete in early 2014. We anticipate 
talking through the Sandia findings with our stakeholders. We 
are not going to proceed in a vacuum as we look to incorporate 
economic consequence into the model, but I do believe, as I 
think you do as well, that it is an important piece to the 
puzzle. So we are going to continue to seek to improve the 
methodology.
    The thing we struggle with is trying to be a continually 
improving program, at the same time trying to afford a degree 
of certainty to our industry stakeholders for whom it would be 
difficult to have an ever-changing target in terms of the 
tiering. So we have to balance all of that, but we are taking a 
hard look at it all.
    Mr. Tonko. Thank you.
    Mr. Shimkus. The gentleman's time has expired.
    Again the NIPP is the National Infrastructure Protection 
Plan again for our guests who are now leaving.
    So the chair now recognizes the gentleman from 
Pennsylvania, Mr. Pitts, for 5 minutes.
    Mr. Pitts. Thank you, Mr. Chairman. Under Secretary Beers, 
according to the NIPP, risk management should help focus 
planning and allocate resources. How can you prioritize 
resources and manage risk if you don't differentiate between 
threat or vulnerability?
    Mr. Beers. Sir, we definitely do differentiate between 
threat and vulnerability. What we have tried to do here is 
ensure that the compliance part of the effort which is to buy 
down risk, it was measured against the threat-and-consequence 
tiering of the tiering methodology. So the whole program is 
designed to reduce the vulnerability to the American people, to 
the communities that surround those facilities. And every 
effort is made through the risk-based performance standards to 
help those facilities produce Site Security Plans that in fact 
protect the communities in which they live far more than when 
there was no regulation on those facilities. Which is not to 
say that they weren't trying in their own way to do that, but 
what we have tried to do is to provide a general way in which 
they can approach that to help them or to give them thoughts 
about other ways that they might think about buying down that 
risk by reducing the vulnerabilities through their Site 
Security Plans.
    David, would you add anything?
    Mr. Wulf. No. I think that pretty well covers it. The 
vulnerability is, as I have expressed, woven through the fabric 
of the program in the security vulnerability assessments that 
facilities conduct, and in their development of Site Security 
Plans.
    Mr. Pitts. Given incomplete aspects of your risk assessment 
model, are you confident that the CFATS risk-tiering approach 
adequately tiers facilities?
    Mr. Beers. Based on the way that we have put forward the 
methodology, we are confident that the general model is 
correct, as has been indicated here. We are going to look at 
economic consequences to see whether or not--and if so, how--
that ought to be injected into the methodology. And we are 
reviewing the threat information as well. So this, as David 
just said, is not a static program and we are looking for 
assistance and help from the peer review effort to see how we 
might do a better job. But as David also said, we want to do 
this in a fashion in which we are not constantly changing and 
moving everything because industry also needs a degree of 
stability as they consider how to improve their own site 
security.
    Mr. Pitts. Now why do you collect data, information that 
you do not use? Regulated facilities are required to provide 
substantial information to facilitate the tiering process but 
ISCD only uses a small amount of this data.
    Mr. Wulf. My assessment is that all of the data that we 
take in is valuable to the program, and it is useful as we 
evaluate, not only the tiering as we assign risk tiers but as 
we look at evaluation of Site Security Plans. So the questions 
and the information that is provided in response to those 
questions I think goes a long way toward prompting facilities 
to give thought to their vulnerabilities and to incorporate 
appropriate responses to those vulnerabilities and to implement 
security measures appropriate to respond to those 
vulnerabilities as they develop their Site Security Plans.
    Mr. Pitts. My time has expired. Thank you.
    Mr. Shimkus. The gentleman's time has expired. I would hope 
that he will pay close attention to the GAO report because they 
say, obviously, there is a lot of data that is not used and 
that is the reason why that question is asked.
    Five minutes to Mr. Green.
    Mr. Green. Thank you, Mr. Chairman.
    Welcome to our panel. Under Secretary Beers, in your 
testimony for today's hearing you state that DHS will be 
publishing a revised Personnel Surety Program rule next week. 
Regarding the PSP, are you able to commit today that the new 
rule will allow similar credential programs like the TWIC 
program for land-based--so we would have one ID for employees 
whether they work for a company's land-based site or the water-
based site?
    Mr. Beers. Sir, you are correct. We have provided our 
Personnel Surety Program notice to the Federal Register and the 
Department has provided a TWIC Reader Rule Requirement Program 
to the Federal Register also this week. Those will be 
published, I am told, next week. It takes that long to actually 
put it out. It will include the ability to use a TWIC card as a 
personnel identification and personnel surety credential within 
the program for those who qualify for the program. The larger 
TWIC reader rule will allow companies, facilities to know what 
kind of a validation system they have in order for those TWIC 
cards to be validated as individuals pass into those 
facilities. That was, as you will recall, an original 
requirement of the whole TWIC program, which has been operating 
unfortunately without that reader rule requirement up to this 
point in time.
    Mr. Green. Well, and we have talked about this for a couple 
of years now and I appreciate the agencies doing that because a 
lot of plants have waterside and land-based--and employees move 
back and forth and most of the time the employees have to buy 
those cards themselves and it just seems like it did not make 
any sense to make an employee, you know, have to buy two cards 
that really should be issued by the Federal Government. You 
only need one.
    Mr. Beers. I couldn't agree with you more, sir.
    Mr. Green. And can you share the efforts the Department 
made to incorporate both employee and union interest, because I 
know of some in my area--we have steelworkers that represent my 
refiners and chemical plants, a number of them. Were they 
involved in this decision or received input?
    Mr. Wulf. The earlier information collection request that 
was withdrawn during the summer was open for comment across the 
board. We did not work specifically or discuss any of this 
specifically with labor unions.
    Mr. Green. OK. Well, I know one of their concerns is that 
their members would have to have these two cards. And when does 
your agency anticipate to complete the site security program 
review for all facilities and including Tier 3 and 4?
    Mr. Wulf. As I mentioned, we are looking to be through with 
Tiers 1 and 2 by the first part of 2014. With regard to Tiers 3 
and 4, we are looking at ways that we can increase the pace of 
the review. I know the GAO, looking at sort of the current 
pace, has projected it could take between 6 to 9 years. That is 
a pace that is, in our view, not an acceptable one. I think 
that we are going to continue to see the pace quicken. I don't 
want to provide a certain date because I am sure I will be 
slightly off.
    But I think as we move forward with the heightened pace of 
inspections as we learn more about how to achieve efficiencies 
in the SSP reviews and the inspection process, we will get 
better at doing them and be able to inspect, review, and 
approve larger numbers of SSPs. I think the alternative 
security programs will provide a means to heighten the pace as 
well. So as those templates come into greater use, and 
particularly as they are used by multiple facilities within the 
same company, I think we will see the pace quicken 
significantly. We will also continue to look at the resources 
we have to do those inspections. We are bringing on board 
another 18 inspectors which will increase our capacity. We will 
continue to look at whether there might be a possibility of 
getting some additional folks on board as well.
    Mr. Green. Mr. Chairman, I know my time is--but there has 
been a substantial public sector investment and private sector 
investment and we would hope to see some of that, that they 
would have their security plans at least on what they have 
invested literally hundreds of millions of dollars on, both, 
like I said, public money and private money.
    Thank you, Mr. Chairman.
    Mr. Shimkus. The gentleman's time has expired. Before I 
move to Mr. Cassidy, just for clarification, Mr. Wulf, and for 
the transcriber, when you said the 6 to 9 years did you say is 
not an acceptable or did you say not unacceptable?
    Mr. Wulf. I said it is not acceptable.
    Mr. Shimkus. OK.
    Mr. Wulf. It is not an acceptable----
    Mr. Shimkus. Great. Thank you. It caught my attention there 
for a second.
    So now the chair recognizes the gentleman from Louisiana, 
Mr. Cassidy, for 5 minutes.
    Mr. Cassidy. Hey, gentlemen. Thank you for being here. I 
understand that you all have done a heck of a lot of work to 
address some of the issues and as I have obviously been a sharp 
critic, so first, I thank you for your hard work that you have 
done.
    With that said, you might guess I have got a couple other 
concerns. The fact that you can----
    Mr. Wulf. I said I suspected you might.
    Mr. Cassidy. The fact that you can buy down risk or buy 
down vulnerability by decreasing threat suggests that risk is 
some constant. You have some number for risk, however you 
calculate that number, that you would like to address. It is 
also my understanding, I think you said earlier, the review 
panel will come up with a new model in which they will assess 
both the economic consequences and life consequences and all 
these other factors in a more sophisticated fashion than 
currently you are doing. Are they going to have access to your 
data--this category of data, this continuum of data that you 
have--in order to see the robustness of their model?
    Mr. Wulf. Yes, sir. The Peer Review Panel has access to 
everything that we have, classified and otherwise.
    Mr. Cassidy. Now, is it possible that that will show that 
what you are currently doing is--I suppose that means if they 
are coming up with a new model, it will show either that you 
are doing a good job or that you are not doing a good job. 
Correct?
    Mr. Wulf. Well, I don't know that it is fair to say that 
the panel's charter is to come up with a new model. The charter 
is to take a fresh look at what we are doing.
    Mr. Cassidy. But if you don't currently have--I don't mean 
to interrupt, I am sorry. It is limited time. If you don't have 
economic consequences in there, and I understand at some point, 
reading the testimony or GAO report, that population density 
wasn't factored in some places. It certainly seems that you 
need a new model. Does that make sense? I mean if we are going 
to include economic consequences, and what you are doing now 
does not do so, then clearly you need new model.
    Mr. Wulf. As we look to incorporate economic consequences--
and I should mention that at Sandia National Labs that is doing 
the work for us on economic consequences--but certainly 
something the Peer Review Panel can, and I suspect will, look 
at as well. As we move to incorporate that into the model 
certainly we would have to revise the model.
    Mr. Cassidy. So you do anticipate giving them access to 
your compendium of information for them to check to see the 
robustness of the model?
    Mr. Wulf. Absolutely.
    Mr. Cassidy. And will you share that with the Committee?
    Mr. Wulf. We can certainly look at that----
    Mr. Cassidy. I mean, like, why wouldn't you?
    Mr. Wulf. I don't see why not.
    Mr. Cassidy. Yes. Now, if you decide upon this model as 
being that model which you should use, would you share it with 
the industry?
    Mr. Wulf. The underlying information?
    Mr. Cassidy. No, not the underlying information, the model 
itself. Because if, Mr. Beers, you say that they can buy down 
vulnerability by whatever--addressing in a greater way threat--
I imagine you have some retrogression analysis and that you can 
plug these things in. Really, right now, it appears that there 
is a certain degree of subjectivity.
    Mr. Wulf. Well, looking----
    Mr. Beers. Sir, we are committed. And that is one of the 
questions that we have asked the peer review to look at is, 
what should we share from the tiering methodology with them? 
Now, we have some parts of it which are currently classified. 
We are also looking at the possibility of declassifying some of 
that information as well. Because we firmly believe as the 
program has matured that the transparency of the tiering model 
is important. That will help them think about their own Site 
Security Plans in a better way than to simply use the risk-
based performance standards by themselves. The objective here 
is to reduce risk. The objective here is to reduce 
vulnerability and we believe as we have considered this, that 
that kind of transparency is necessary.
    If there remains classified parts of the program, we will 
look at whether or not we can at least have some industry 
representatives, as we do generally with the National 
Infrastructure Protection Plan, cleared to receive classified 
information even if we can't make it broadly available.
    Mr. Cassidy. So I am asking now, not to challenge but 
rather for information, if you have a formula by which someone 
can decide what their relative risk is, you plug in these 
variables and you come up risk, it seems to me that--I don't 
know whether that would be classified. Listen, a 15-foot fence 
will get you here and a 30-foot fence will get you there and 
video cameras will get you here and armored cars will get you 
there. So knowing that some of the information is classified, 
are the variables that you plug in classified?
    Mr. Beers. David?
    Mr. Wulf. Some of the factors that go into the calculation 
of the risk score are classified. But I would just echo the 
Under Secretary's comments that fostering greater transparency 
for our stakeholders in tiering is one of our goals and 
certainly one that we are going to pursue.
    Mr. Cassidy. Last question--and you may have mentioned this 
earlier--when do you expect the panel to come back with their 
report and then ideally to run some of those compendium of 
information to check out what you have been currently doing and 
et cetera?
    Mr. Wulf. We are anticipating a report from the Peer Review 
Panel this summer.
    Mr. Cassidy. OK. Thank you. I yield back.
    Mr. Shimkus. The gentleman yields back his time. The chair 
now recognizes the ranking member of the full committee, Mr. 
Waxman, for 5 minutes.
    Mr. Waxman. Thank you, Mr. Chairman. Today's hearing 
underscores the need for reform of this program, and in my 
view, this committee should develop comprehensive 
reauthorization legislation.
    Today, GAO will testify that it will take 8 to 10 years 
before the Department can review and approve the Site Security 
Plans it has already received. Additionally, the Department 
must revise its risk analysis model, which could mean that the 
current tiering of facilities will have to be revised, 
requiring many facilities to begin the process over again.
    In the 111th Congress, the Committee produced a 
comprehensive Chemical and Water Facility Security Bill to 
finally set this program on the path to sustainable success. 
Mr. Beers, you testified in support of that bill as did 
representatives of the labor community, the environmental 
community, water utilities, and the chemical industry. At that 
time you said, ``given the complexity of chemical facility 
regulation, the Department is committed to fully exploring all 
issues before the program is made permanent.'' I agree with 
that statement and I would like to explore some of those issues 
with you today.
    Mr. Beers, does the administration still support closing 
security gaps for wastewater and drinking water facilities?
    Mr. Beers. Yes, sir.
    Mr. Waxman. Does the administration still support 
maintaining EPA as the lead agency for drinking water and 
wastewater facilities with the Department supporting EPA's 
efforts?
    Mr. Beers. That is our position.
    Mr. Waxman. Does the administration still believe that all 
high-risk chemical facilities should assess inherently safer 
technology and that the appropriate regulatory entity should 
have the authority to require the highest-risk facilities to 
implement those inherently safer technologies if feasible?
    Mr. Beers. The statement at that time still remains the 
administration's position, sir.
    Mr. Waxman. Since we worked on that bill 3 years ago, 
additional challenges have come to light. Specifically, the 
internal review and memorandum prepared in November 2011 found 
serious problems. The Department produced an Action Plan to 
address these problems. That Action Plan included the formation 
of a task force to develop recommendations for legislative and 
regulatory changes to the CFATS program. My understanding is 
that the Department reports that it has completed development 
of those recommendations. Mr. Beers, when can we expect to see 
those recommendations?
    Mr. Beers. Sir, I will have to get back to you on that. I 
don't have specific answer on that question.
    Mr. Waxman. OK. Well, I look forward to you getting back 
and to have the record held open so that we can get that 
response.
    Mr. Shimkus. Without objection. So ordered.
    Mr. Waxman. As the Committee further considers the CFATS 
program, having your legislative recommendations for reforming 
the program would obviously be very helpful.
    Thank you, Mr. Chairman. I yield back my time.
    Mr. Shimkus. The gentleman yields back his time. The chair 
now recognizes the other gentleman from Pennsylvania, Mr. 
Murphy, for 5 minutes.
    Mr. Murphy. Thank you, Mr. Chairman. And thank you, to the 
panel.
    According to the CFATS rule, a high-risk chemical facility 
is one that, in the discretion of the Under Secretary, presents 
a high risk of significant consequences for human life and 
health and now security and critical assets. Let me ask you a 
few comments on this. If, as a result of your work with Sandia 
National Laboratories economic consequences are incorporated 
into the CFATS risk-tiering approach, how will this impact the 
current list of related facilities and do you expect more 
facilities to be covered?
    Mr. Wulf. I think it is hard to say right now. Depending on 
what we get back and our analysis of Sandia's work, it could 
impact the number of facilities that are covered in a few 
different ways. Depending on the weighting that is given to the 
economic consequence piece of the equation and really the 
general fabric of the assessment on economic consequences. So I 
don't think I am in a position today to forecast that.
    Mr. Murphy. Can you give any estimates at all how much you 
think it is going to cost to incorporate the results of the 
Sandia National Laboratories work into the current CFATS risk 
assessment approach?
    Mr. Wulf. I don't at this time, not without the assessment 
from Sandia.
    Mr. Murphy. Well, given also it is going take approximately 
7 to 9 years for ISCD to review plans submitted by regular 
facilities, how practical is it for you to expand the program 
to include additional facilities?
    Mr. Wulf. We are going to, first, as I said, the 6 to 9 
years is not an acceptable pace and we are going to do 
everything in our power to pick up that pace. I think though 
that it is important that we foster enhanced security for all 
chemical facilities that are high risk in nature. So, to the 
extent the universe of high-risk facilities is framed and 
includes in the calculation of that universe or in the 
formation of that universe the economic consequences and the 
universe grows, we will look at ways to make that work.
    As I said, we are bringing on additional inspectors; we are 
improving our processes and procedures. We are going to get 
better and better at this. So, if that challenge presents 
itself, we will meet the challenge.
    Mr. Murphy. I know we have talked about these things in 
other hearings that the chairman has conducted here, and you 
are expecting about 30 to 40 site plan approvals per month. 
That is your anticipated goal for the future?
    Mr. Wulf. That is our current pace.
    Mr. Murphy. The current pace. Well, how may did you approve 
in January of 2013?
    Mr. Wulf. I would have to get that to you specifically.
    Mr. Murphy. February? Just last month, any idea?
    Mr. Wulf. I would imagine between 20 and 30 in February.
    Mr. Murphy. So you said you expect----
    Mr. Wulf. Yes.
    Mr. Murphy. You are currently at 30 to 40 but you are half 
that in February. I am just trying to----
    Mr. Wulf. Yes. I expect it is going to continue to ramp up 
because what we are doing more of in January and February was 
authorizing plans. And as we authorize the plans, we schedule 
the inspections. That is what leads to the approvals. So the 
approval pace will pick up. We anticipate by the end of 
September being up to upwards of 350 approvals. So that will be 
all of Tier 1 and probably about halfway through the Tier 2 
facilities. So, actually, in 6 months, 6\1/2\ months from now, 
we will likely be doing about 50 approvals a month for the next 
foreseeable future.
    Mr. Murphy. You have a mechanism for continuous improvement 
as you go through these to speed them up, for example, getting 
feedback as you go through these approval processes--feedback 
from people you have worked on with those saying what we could 
have done to make this better, faster, more thorough?
    Mr. Wulf. Yes, we sure do. We are constantly evaluating our 
processes and looking at ways we can do things better.
    Mr. Murphy. Is that an internal process? Do you also get 
external feedback on that?
    Mr. Wulf. Well, it is an internal certainly within the 
division and the relevant branches within the division. But 
also we are talking consistently with our stakeholders, and I 
was able to share one comment we received back during my 
opening statement. But we are always talking to our 
stakeholders about improving. And one of the things we have 
done to pick up the pace and to increase the pace of SSP 
authorizations and approvals specifically has been to include 
our field inspectors, who are most familiar with the facilities 
in the authorization and approval loop early in the processes. 
As issues are identified, those SSPs are kicked out to the 
field and squared away and kicked back into the authorization 
and approval loop more quickly.
    Mr. Murphy. In my remaining time I just want to ask real 
quick. We understand there are some documentation issues 
regarding the CFATS risk-tiering approach. Can you give me a 
little information of what those documentation issues are? Is 
that something slowing you down, too, or what are those 
documentation issues?
    Mr. Wulf. No, I don't think so. The documentation I 
referenced earlier was our effort over the past year to 
thoroughly document the tiering methodology.
    Mr. Murphy. Is that also improving over time? Thoroughly 
documenting so you are----
    Mr. Wulf. Yes.
    Mr. Murphy. Well, I am out of time here I know but I will 
follow up on the other questions. Thank you.
    Mr. Wulf. OK.
    Mr. Shimkus. The gentleman's time has expired.
    The chair now recognizes the gentleman from California, Mr. 
McNerney, for 5 minutes.
    Mr. McNerney. Thank you, Mr. Chairman.
    Mr. Wulf, is the ISCD responsible for addressing cyber 
threats to chemical plants?
    Mr. Wulf. Yes, sir. Yes, sir. One of our Risk-Based 
Performance Standards, RBPS 8, relates to cyber.
    Mr. McNerney. So are there specific cyber threats for 
potential catastrophic results to human beings that you know 
of?
    Mr. Wulf. I think potentially there could be, which is why 
CFATS addresses cyber. It focuses within the CFATS framework on 
industrial control systems, on systems that can impact the 
release of chemicals, and on systems that can impact the 
security of a facility.
    Mr. McNerney. So how effective then is the DHS in 
addressing these potential cyber threats?
    Mr. Beers. Sir, we have the best team in the country to 
deal with industrial control systems as announced by Security 
magazine. The ICS or Industrial Control Systems team that we 
have in our cyber office is absolutely the best in the country. 
They provide regular assessments on requests from people. We 
are expanding that program. It will also be part of the work 
that we are doing with respect to the Executive Order on 
cybersecurity and the Presidential Policy Directive that came 
out, both for those in February, a major area of concern and a 
major area of involvement. We are basically teaching the rest 
of the government how to deal with this issue.
    Mr. McNerney. Good. Good. In my mind there are two aspects 
of cyber defense: protection and retaliation. Maybe that is not 
the way that you look at it, but a kinetic attack will almost 
certainly involve a strong response from this government. But 
on the other hand, a cyber attack may not elicit a response. So 
the question I have is, are there rules of engagement for cyber 
attacks on chemical facilities in this country?
    Mr. Beers. Sir, there are general rules of engagement that 
is not part of the DHS activity set. That belongs to the 
Department of Defense. But we and the Department of Defense and 
the Department of Justice have a very robust effort to work 
together on a regular basis at all of those things short of an 
actual attack. I mean, we are, as you well know, in a sort of 
cold state of a lot of reconnaissance, a lot of intellectual 
property theft that is going on now that the three departments 
are working mightily to try to deal with. But the offensive 
side is the domain of the Department of Defense. We are aware 
of what they do in a general sense but it is not part of our 
responsibility.
    Mr. McNerney. So I mean there must be some coordination 
then. I mean cyber attacks are happening on a continuing basis, 
some of them less of a threat and some of them more of a 
threat. And so what I would like to get is some comfort that 
there is going to be a consequence to conducting cyber attacks 
at any level on facilities in this country.
    Mr. Beers. Sir, I certainly can't comment on that in this 
unclassified setting.
    Mr. McNerney. OK. Mr. Chairman, I yield back.
    Mr. Shimkus. The gentleman yields back the time.
    The chair now recognizes the gentleman from West Virginia, 
Mr. McKinley, for 5 minutes.
    Mr. McKinley. Thank you, Mr. Chairman. This is an 
interesting subject.
    Mr. Shimkus. Mr. McKinley, can you turn your mike on, I 
think?
    Mr. McKinley. It is on.
    Mr. Shimkus. Oh, you do.
    Mr. McKinley. Yes, this is an interesting subject. As an 
engineer and as someone who has worked in some of these 
chemical plants, I am curious to learn more about what we have 
been doing and how long it has been going on. I am just 
curious, first, I guess is, do either of you feel are terrorism 
threats on the rise? Is it status? What is happening in this 
country? I am just curious.
    Mr. Beers. Yes, sir. That is a very good question. I think 
what we have seen since 9/11, a continued threat within the 
country that has been primarily executed by individuals who 
have been inspired by the rhetoric of the jihadists to conduct 
acts within the country. Fortunately, we have been able to 
thwart most of them. Some of them just simply failed because 
they weren't very well executed. The Bureau has a very 
extensive program trying to detect this. Could something happen 
from overseas again? Yes, that is always a possibility, but 
that is a major effort that we and the other departments are 
working on.
    Mr. McKinley. Well, again, are the attacks on the rise? 
Threats I should say. Are threats of attacks on the rise?
    Mr. Beers. Are threats of attacks on the rise? The threat 
and capability, because aspirational threats----
    Mr. McKinley. It should be just a yes or no. Isn't it a yes 
or no?
    Mr. Beers [continuing]. Occur on a regular basis and you 
could look--and there is something every day. Threat and 
capability matched with one another----
    Mr. McKinley. Are threats on the rise?
    Mr. Beers [continuing]. I think at this point are not on 
the rise.
    Mr. McKinley. OK. That is fine.
    Mr. Beers. Are not on the rise.
    Mr. McKinley. What is their objective? Is it just to have 
access? Are they trying to just blow up a facility? What is the 
threat that you are hearing? What are they trying to 
accomplish?
    Mr. Beers. So there is the local objective and there is the 
broader objective, and they think in both of these realms. The 
local objective is to have an event that is sufficiently 
newsworthy, sufficiently damaging, that it causes people to 
take notice of it and gives them credit for the ability to 
actually execute. The broader issue, though, is to destroy--and 
bin Laden and his successors have been very clear about this--
is to destroy the will of the West, and the will of the United 
States to oppose them and withdraw from the region.
    Mr. McKinley. So if I can continue with the question, can 
you give me an example of a chemical facility that has been 
attacked successfully in the West?
    Mr. Beers. No, sir. Unless you want to include the Amenas 
plant in Algeria, which is the one recent one----
    Mr. McKinley. OK. That is fair.
    Mr. Beers [continuing]. That we had, but other than that, I 
can't tell you.
    Mr. McKinley. It is one thing if they want to disrupt it, 
would we not pose a threat also in where the products that we 
are producing in these chemical plants--does it extend your 
risk assessment and evaluation? Does that also go to the 
distribution centers and transportation or is it just at the 
plant?
    Mr. Beers. It is in all of those, sir, depending upon the 
holdings, where the holdings are----
    Mr. McKinley. So you go the whole route. You are not just 
on risk assessment----
    Mr. Beers. But again, if the holding isn't large enough to 
be tiered in by the consequence, then they are not regulated. 
But we do look at distribution centers as well. David, you want 
to----
    Mr. Wulf. But CFATS focuses on facilities. So there are 
other agencies that deal with the transportation sectors. So 
the transportation of hazardous materials is covered by the 
Department of Transportation and the Transportation Security 
Administration. CFATS is focused on facilities but certainly 
including distribution centers. And among the chemicals of 
interest that we assess are those chemicals that could be 
successfully used by terrorists in an attack as well as 
chemicals that can be released.
    Mr. McKinley. In the time frame that I have left, are the 
four other European nations, do they have something comparable 
to what we are doing here?
    Mr. Wulf. I think in many ways we are on the cutting edge 
here. And I think CFATS is a sound program and really a model 
that, were it implemented elsewhere could be of value to 
securing chemical facilities and hardening them against 
potential terrorist attacks.
    Mr. Shimkus. Gentleman's----
    Mr. McKinley. OK. Time has expired on that, but I just want 
to say, even though they have not had an attack in Europe and 
they don't have anything comparable to this, I am just curious.
    Mr. Wulf. I think Congress' assessment and our assessment 
as well is that high-risk chemical facilities pose a very 
attractive target to terrorists.
    Mr. McKinley. Thank you.
    Mr. Shimkus. The gentleman's time has expired.
    The chair will now recognize the gentleman from Ohio, Mr. 
Johnson, for 5 minutes.
    Mr. Johnson. Thank you, Mr. Chairman.
    Mr. Beers, the Department of Homeland Security has adjusted 
its chemicals-of-interest release model because of errors in 
the formula. Are you aware of any other issues that may affect 
this or any other models within the risk assessment approach?
    Mr. Beers. Sir, I am not, but let me turn to my expert here 
and ask him if there is anything you want to add to that.
    Mr. Wulf. No. Our documentation found some minor issues 
that we have briefed staff on and that we have addressed and 
that have not led to significant re-tierings or significant 
numbers of re-tierings of facilities. So we are looking forward 
to receiving the report from the Peer Review Panel and any 
recommendations for improvements they may have for the tiering 
engine.
    Mr. Johnson. Is this the expert panel review that you are 
talking about?
    Mr. Wulf. That is right.
    Mr. Johnson. OK. Before you became aware of problems with 
the chemicals-of-interest release model, had you conducted any 
evaluations, Mr. Beers, of the risk-tiering approach?
    Mr. Beers. Sir, before we became aware of that particular 
problem, I am not aware of any reviews that had taken place. 
Having said that, it was, as we look backward on when that 
matter was brought to my attention, that there were questions 
about it a year prior to that. And the review that happened at 
that time turned out not to be an accurate review. So in that 
sense, there were anomalies that were looked at; unfortunately, 
they failed to detect the problem that ultimately surfaced 
several years ago.
    Mr. Johnson. OK. All right. In regards to the expert panel 
review, it is our understanding that the current expert panel 
review will not include a formal validation or verification of 
the model. How does that impact the value of the review?
    Mr. Wulf. We have asked the panel to take a full look at 
the program, at the tiering methodology, and to give us an 
assessment as to whether it is, in fact, a sound methodology 
for assessing risk and also to provide us any recommendations 
for potential enhancements and improvements to the methodology. 
So I don't anticipate a formal stamp of approval, but I expect 
that they will let us know how they feel about what we are 
doing in the tiering arena.
    Mr. Johnson. But it is important though, right? I mean, it 
is important to get that information, to get that stamp of 
approval.
    Mr. Wulf. I think that is why we are doing this. Not to----
    Mr. Johnson. But you said you are not expecting a stamp of 
approval.
    Mr. Wulf. Well, not----
    Mr. Johnson. So there is----
    Mr. Wulf [continuing]. An actual stamp, I guess.
    Mr. Johnson. Yes.
    Mr. Wulf. I am----
    Mr. Johnson. We don't want them to just look at it; we want 
them to give us a validation and verification that the model is 
accurate according to what we know today. Correct?
    Mr. Wulf. Yes. We want them to look at the methodology and 
let us know their thoughts on whether it works and if there are 
ways in which it could work better.
    Mr. Johnson. OK. Given that you have not been able to 
review the Site Security Plans for the Tier 3 and 4 facilities, 
how would you characterize how they are currently being 
regulated?
    Mr. Wulf. Well, I would mention that we have begun review 
of the Tier 3 Site Security Plans and I have authorized some of 
those. But that is admittedly in the early stages.
    Mr. Johnson. Tier 3 and 4, or just 3?
    Mr. Wulf. Tier 3. Tier 3.
    Mr. Johnson. OK. So 4 is not being included?
    Mr. Wulf. Tier 4 reviews have not begun on the SSPs. But I 
would say that across the tiers to include Tiers 3 and 4 CFATS 
has had an impact. Those Tier 3 and Tier 4 facilities have gone 
through the top screen process, have developed security 
vulnerability assessments, have, in most cases, met directly 
with CFATS inspectors who have worked with them through 
compliance assistance visits and other outreach in the order of 
more than 3,000 such visits and encounters to work with them on 
the development of their Site Security Plans. So I think in all 
cases, even without authorization or approval of those 
facilities, their security has been enhanced by CFATS and the 
work of our inspectors.
    Mr. Johnson. OK. With that I yield back, Mr. Chairman.
    Mr. Shimkus. The gentleman's time has expired.
    The chair now recognizes the gentleman from Mississippi, 
Mr. Harper, for 5 minutes.
    Mr. Harper. Thank you, Mr. Chairman.
    Thank you, gentlemen for being here. I know this is always 
an exciting time, but we welcome you and appreciate the 
insight. We are obviously concerned about security for these 
facilities, how we accomplish that. And as we are looking at 
the number of facilities we have, has there ever been any 
thought on your side of maybe just limiting the scope of 
regulating facilities only to the Tier 1 and Tier 2 facilities? 
Has there been any thought on that?
    Mr. Wulf. I would say that, no, there hasn't. Inasmuch as 
all four tiers represent high-risk chemical facilities and a 
relatively small percentage of the total number of chemical 
facilities in the country, our assessment is that all four 
tiers are worth covering under CFATS.
    Mr. Harper. Do you agree with that?
    Mr. Beers. Sir, remembering that this is a consequence-
focused----
    Mr. Harper. Yes, sir.
    Mr. Beers [continuing]. Issue, the original decision on all 
four of the tiers were that the consequences, the potential 
loss of life in the vicinity of those facilities--this is the 
primary reason----
    Mr. Harper. Yes, sir.
    Mr. Beers [continuing]. Was significant in terms of the 
communities that surrounded them. So it is, as you well know, 
impossible to put a cost on the loss of even one life. So that 
is why this is such an important decision and why we really 
haven't gone that step and said, no, that 3 and 4 are not high-
risk.
    Mr. Harper. OK. Let me ask this: as you are establishing 
these, you do a preliminary tier risk rating and then you do 
further evaluation--the SVA--and you determine what the final 
rating is.
    Mr. Beers. Yes.
    Mr. Harper. And once that is established, what is the 
review process after that? Is there a time with that final tier 
risk rating that it might change in the future? How often are 
you going back to review those?
    Mr. Wulf. As facilities make changes to their chemical 
holdings or to their processes, they may submit a request for 
redetermination or may submit a revised top screen to ISCD and 
we will, you know, rerun that and assign as appropriate a----
    Mr. Beers. So the nearly 3,000 changes that have been 
made----
    Mr. Harper. Sure.
    Mr. Beers [continuing]. Including tiering out are a result 
of changes in holdings that have been able----
    Mr. Harper. OK.
    Mr. Beers [continuing]. To be recognized in that fashion.
    Mr. Harper. So is that possible review or change of a tier 
risk, is that something that you have to wait on them to notify 
you or are you on a schedule? Do you go back and review those 
yourself even if you are not notified of any changes on their 
part?
    Mr. Wulf. To the extent that our inspectors are out working 
with these facilities through compliance assistance visits or 
other outreach----
    Mr. Harper. OK.
    Mr. Wulf [continuing]. That is sort of the form that would 
take. So our involvement would happen in that way but there is 
not a formal process for going back and----
    Mr. Harper. Not a calendar date say every 2 years, 3 years 
we are going to come back and review? OK. Now, it is my 
understanding that if you have two facilities that have the 
same chemical of interest, one that has very little physical 
security near a major city, and another stored with the same 
chemical in an extremely secure location near that same major 
city, they would be tiered identically? Is that accurate? If it 
is the same chemical of interest, regardless of the level of 
security near that major city, in two different facilities, 
would they be tiered the same?
    Mr. Wulf. I think that is accurate.
    Mr. Harper. OK.
    Mr. Wulf. The tiering is based on the potential consequence 
of that.
    Mr. Harper. All right. Is that a good way to manage and 
mitigate chemical facility terrorism risk?
    Mr. Wulf. Well, I think it is in that the facility, without 
the hardened security would, as a result of being tiered, have 
to look to implement security measures, develop a Site Security 
Plan that would bring it up to an acceptable level of security.
    Mr. Beers. The whole notion here is we want to level the 
playing field so----
    Mr. Harper. Sure, but----
    Mr. Beers [continuing]. A secure facility is great. An 
unsecured facility is something that we would want to change. 
We want to take the unsecured facility and raise it to roughly 
equivalent standards to the secure facility.
    Mr. Harper. But it appears to me that perhaps we are 
discouraging high-risk chemical facilities from increasing 
security at their facilities and making them stronger. And I 
don't know that that is having the desired effect that you are 
saying you want. Is it having that impact? And my time is up, 
so I guess I won't get a formal answer from you.
    And I yield back.
    Mr. Shimkus. The gentleman yields back his time.
    And I see no other members. But before I dismiss the panel, 
I just want to reference the law. Because, Mr. Beers, you keep 
saying a consequence, which is something that we need to be 
concerned about. But that is not what the law says. The law 
says a risk-based system.
    Mr. Beers. Yes, sir.
    Mr. Shimkus. Consequence is a part of that but it is not 
the whole calculation. I think you have caused more questions 
by this testimony today than answered questions.
    So I think we will have them back, Mr. Ranking Member, to 
keep ferreting this out because the law is pretty clear. And 
you can see there are still a lot of questions on how we are 
trying to define this.
    So we do thank you for coming. We do have the ability to 
offer written questions as the ranking member of the full 
committee asked. And with that, we would dismiss the first 
panel.
    Mr. Beers. Sir, may I respond to the question that you 
posed in writing?
    Mr. Shimkus. Correct. You may. I would be happy to----
    Mr. Beers. I think if you are still not satisfied, then we 
have more work to do to----
    Mr. Shimkus. I think you have a lot more work to do.
    So we will dismiss this panel and we will have the second 
panel.
    Staff, if I can get the back doors closed. Someone? Then we 
can move promptly.
    We would like to continue the hearing and welcome our 
second panel, a one-member panel, so we can put full attention 
to the testimony and answer questions. So we would like to 
welcome Mr. Stephen Caldwell, Director of Homeland Security and 
Justice from the Government Accountability Office.
    Sir, your full statement is in the record. You are 
recognized for 5 minutes.

 STATEMENT OF STEPHEN L. CALDWELL, DIRECTOR, HOMELAND SECURITY 
         AND JUSTICE, GOVERNMENT ACCOUNTABILITY OFFICE

    Mr. Caldwell. Thank you very much, Chairman Shimkus and 
Ranking Member Tonko. I appreciate being here to talk about 
CFATS and the findings in our about-to-be released report on 
the program.
    As you know, our earlier report focused on an internal DHS 
memo documenting management problems with the CFATS program and 
agency efforts to come up with corrective actions. But our 
current report focuses on agency efforts to do three things 
related to its core mission. The first of those is assess risks 
at the facility, which we have talked about quite a bit; review 
the Site Security Plans; and work with industry to improve 
security.
    Let me start with the risk assessments. As noted, both the 
Department and GAO have established criteria for risk 
assessments and these were not followed closely in the CFATS 
program. Specifically, the three elements of risk--threat, 
vulnerability, and consequence--were not all used. As has been 
discussed, vulnerability has not been used even though DHS does 
collect extensive information on it. Some of the CFATS program 
criteria in its own 2007 rule, including the economic 
consequences, also have yet to be implemented.
    Regarding the Site Security Plans, we found that the 
Department had a cumbersome process in place for reviewing the 
security plans which led to a backlog of security plans 
awaiting approval. The Department has attempted to streamline 
the review process by doing concurrent reviews among its 
experts when it had formerly been doing sequential reviews. 
However, the impacts of the streamlining is not known because 
no metrics were kept on how long the old process was taking.
    But even with a more streamlined review process, as we have 
noted in our statement, we are estimating 7 to 9 years to 
improve those facilities that have been tiered. But our 
estimate does exclude some of the important parts of the regime 
as a whole, such as the compliance inspections.
    Regarding industry, the CFATS program has increased its 
outreach, and this was noted in the inquiries we made through 
industry associations representing chemical facilities. The 
industry also expressed concerns about the burden of submitting 
and updating information to DHS, as well as frustration in 
wanting more details on the how and why the facilities were 
tiered a certain way. Some of these issues, as has been noted, 
may be resolved in terms of the Department is considering what 
information on its tiering process it might provide to 
industry. Nevertheless, the CFATS program could benefit from 
systematically monitoring the effectiveness of its outreach 
activities.
    In closing, I would like to briefly look back at our 
previous report, which commented on the serious management 
problems within the CFATS program. Because of a lack of 
documentation in the earlier years, we were really unable to 
determine the root causes for a lot of those problems. And this 
condition was found in our current work. As an example, we 
found no documentation as to why the current incomplete 
approach to risk assessment was chosen. So to some extent, the 
current program is still recovering from some of those earlier 
management problems.
    But we have found the Department to be responsive to our 
recent recommendations and our current findings. We hope their 
positive attitude continues to result in improvements.
    And related to this, I would like to note that my written 
statement is titled ``Preliminary Observations.'' Because we 
are still awaiting Department comments on the recommendations 
in our current draft report, we will finalize that report once 
we receive those comments and we anticipate issuing that in 
early April.
    With that, I am happy to respond to any questions.
    [The prepared statement of Mr. Caldwell follows:]

    [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
    
    Mr. Shimkus. Thank you, Mr. Caldwell.
    I would like to recognize myself for 5 minutes for the 
first round of questions.
    You were in here for the last panel and probably listened 
to my last exchange based upon the language of the law. Could 
you understand my frustration with the question based upon what 
members had said before about the formula for risk and if there 
are two variables that are undefined, how do you identify risk?
    Mr. Caldwell. Yes. I guess I agree with your point. The law 
calls for an assessment of risk, not of consequence. I think 
the DHS response we have heard today kind of indicates that the 
exclusion of vulnerability was part of a well-laid-out and 
thoughtful methodology and analysis that they used from the 
start. We certainly found no evidence of this. I mean our early 
discussions with methodology with them last year indicated the 
fissures did not know why the current methodology was picked or 
why vulnerability was left out. And there certainly was no 
documentation on that. It was really only when we raised the 
issue of the lack of the consideration of vulnerability----
    Mr. Shimkus. It was?
    Mr. Caldwell [continuing]. That the current narrative 
emerged that you heard today. So I think that really reinforces 
the need for an independent peer review, preferably earlier in 
the process than now because the problems they will have if 
they find major changes. And I have some other comments on peer 
review I can make as well.
    Mr. Shimkus. Did you get any comfort from the response that 
the formula is being reviewed by Sandia? And I think the 
frustration from my end was that we might take it; we might 
consider it. I mean, it was pretty vague as to whether all of 
this work that they would even consider is part of a fix to the 
formula.
    Mr. Caldwell. Yes. Let me make two comments on the peer 
review. I think based on our work today--and they have been 
sharing a lot of information with us--but we are still not sure 
how much of a free hand and leeway this new peer review is 
going to have, this expert panel. Will they have the leeway to 
really start from scratch and kind of come up with fundamental 
changes from the model if they think they are needed?
    And then, of course, we are also not really sure and the 
Department really hasn't committed to really how they would 
receive any major recommendations for changes because of 
impacts it could have on the peering process. So that is what I 
will call the peer review's need to do a review of the 
methodology.
    But what the peer review would also need to do to be 
comprehensive would be what is called the V and V, or a 
verification and validation. We know that there was some 
miscalculations found in the formula. This did lead to the re-
tiering of several facilities. Also, in the course of our work, 
we found out there was an omission of certain locations such as 
Hawaii, Alaska, and Puerto Rico from the data in the model 
calculations. And they don't think this will lead to any 
changes in tiering, but, I mean, together they certainly don't 
give us a warm, fuzzy feeling that they have looked at the 
actual mechanics of the model to make sure that even if the 
methodology is correct that the model is working the way it was 
intended to. So it is also important that the peer review do a 
V and V, a verification and validation, to actually look at the 
model, play with the numbers, do calculations, ensure they are 
correct, and maybe do some sensitivity analysis as well.
    Mr. Shimkus. Well, and just kind of following up on this 
line of questions because it was asked by one of my colleagues 
on data, data collection, and what is it used for. Again, a 
pretty vague answer by our first panel as to what they really 
needed, what they had, and why they had it. You found that 
owners and operators were spending unnecessary resources 
complying with CFATS data collection requirements. Can you 
elaborate on your findings?
    Mr. Caldwell. Well, I will say two things. I think whether 
the industry feels that they misspent funds or wasted funds, I 
will leave maybe for the third panel. You can ask them that. 
But in terms of the question about whether all this 
vulnerability data was useful that the Department is capturing 
but is not using, I think the way they put it is that it is 
data that then the facilities have been able to use or could 
use. So again, that is a question for the facilities. I mean, 
you could ask the facilities and industry----
    Mr. Shimkus. But the facilities are the ones who provide 
the data. So it is kind of like we got the data, we gave it to 
Homeland Security, and then Homeland Security says we got the 
data, here is your data because it is going to help you out, or 
the collection of that data will help you out. I mean, it is 
just----
    Mr. Caldwell. Yes.
    Mr. Shimkus [continuing]. Counterintuitive. I am struggling 
with this.
    Mr. Caldwell. We found that the Department is not using the 
vulnerability data at all that it collected from facilities.
    One other thing on that point, when we talked to them about 
why they were not using the vulnerability data, they said, 
well, they were concerned because it was self-reported and thus 
might be either exaggerated or not exaggerated. But everything 
in this thing is self-reported until--I mean everything going 
into tiering about how much chemicals they have and where they 
have them and the method of storage--all of that is self-
reported. So I am not sure that I agree with that distinction.
    Mr. Shimkus. You are not helping me very much but thank 
you. My frustration level continues to mount.
    So I would like to recognize the ranking member, Mr. Tonko, 
for 5 minutes.
    Mr. Tonko. Thank you, Mr. Chairman. I hope you can relax 
for a moment.
    I thank you, Mr. Caldwell, for appearing here today.
    GAO's analysis reveals significant concerns about this 
important national security program and the sufficiency of the 
Department of Homeland Security's Action Plan to address these 
concerns. We heard from the Department on the first panel that 
they are taking GAO's findings seriously and intend to follow 
GAO's recommendations to strengthen the risk assessment models 
used in their programs.
    It seems that some of these concerns are long-standing. For 
instance, stakeholders have long called for a greater 
transparency in the risk assessment process. I welcome the 
GAO's testimony today and have a few questions that, I think, 
would be helpful in providing the information we require. To 
the DHS methodology itself, does it appropriately, in your 
opinion, account for threat?
    Mr. Caldwell. Threat is a little tougher. And so I think in 
our own analysis we have been less critical of the Department 
on that. And the reason that threat is more difficult is 
because the threat comes from a potentially adaptive adversary 
that can see where vulnerabilities have been reduced or maybe 
where vulnerabilities still exist and change their targets. But 
even more so, when you are looking at these chemical 
facilities, the facilities themselves could be attacked or some 
of the chemicals at those facilities could be stolen or 
diverted and then moved and then used again in a population 
center or any other location. So I think it is very difficult, 
and also I think in terms of some of the questions about threat 
there were asked, there just really is not a lot of actionable, 
real intelligence that shows there is a threat against these 
facilities or specific facilities.
    Mr. Tonko. Thank you. And to that methodology again, does 
it account for the two minimum components of consequences, that 
being human consequences and economic consequences?
    Mr. Caldwell. It does not include economic consequences. As 
the Department has stated, they have now engaged Sandia 
National Labs to do that but it has been a while. I mean, the 
rule came out in 2007 that specifically said that they would 
include that at some point. And if you look at the National 
Infrastructure Protection Plan it does say at a minimum 
consequence needs to include both human casualties and 
fatalities, those things, as well as the economic consequences.
    Mr. Tonko. Thank you. And I would imagine that GAO has 
looked at risk assessments prepared by many different agencies 
over the years. How would you say the CFATS risk assessments 
compare to the work at those other agencies?
    Mr. Caldwell. Well, there are a couple of examples I can 
think of. At the Coast Guard, for example, we have done 
extensive work on their risk assessment model. It is called the 
Maritime Security Risk Assessment Model. And it does include 
all the components. And that is probably the most sophisticated 
model within DHS because it also takes into account the 
mitigation efforts that a facility is doing and how that 
impacts the risk.
    There have been other cases--I believe it is TSA--I will 
have to correct my statement if I find that it is a different 
agency--where we found that vulnerability was also being held 
constant and we have made those recommendations that they not 
do that and that that particular component agreed with that 
recommendation.
    Mr. Tonko. Thank you. During the first panel Director Wulf 
indicated that including vulnerability in risk assessments 
would lead to an ever-changing tier assignment for a given 
facility. Is this a valid enough reason for leaving the 
criteria out of the assessment?
    Mr. Caldwell. Well, I think if in the beginning that was 
thought through and done on purpose, I could have maybe given 
him a little more sympathy if he is trying to design something 
to do that. But as I said, that narrative was developed pretty 
recently as to why was left out. There is a problem now in that 
a lot of these facilities, thousands of these facilities--and 
if there are major changes in their model because of the peer 
review or things we have said or adding the economic 
consequences, this could reasonably change the tiering of those 
facilities.
    Mr. Tonko. And this committee is aware of two mis-tiering 
incidences at the Department were facilities where placed in 
the wrong tier because of errors made by the Department. That 
is a serious problem. But now we hear from GAO that none of the 
more than 3,500 tiering decisions that have been made are 
reliable. They are all based on a risk assessment methodology 
that is seriously lacking. Is that an accurate assessment?
    Mr. Caldwell. I wouldn't use the term that this is a fatal 
flaw or things like that. But certainly we are questioning why 
they haven't included vulnerability. I think that we have a 
concern. Now, we do believe the best way to address that would 
be to have a peer review come in externally, review it. As we 
have said before, and as you said before, the National 
Academies of Sciences came in and found very similar problems 
across the Department that we are talking about here within the 
CFATS program.
    Mr. Tonko. Well, I see that my time has expired so I will 
yield back, Mr. Chairman.
    Mr. Shimkus. Thank you.
    The chair now recognizes the gentleman from Pennsylvania, 
Mr. Pitts, for 5 minutes.
    Mr. Pitts. Thank you, Mr. Chairman.
    Mr. Caldwell, you noted in your statement that it could 
take 7 to 9 years before ISCD completes the review of the 3,120 
security plans currently in the review queue and that the 
estimate does not include work by ISCD on other missioned 
activities. What are some examples of these ISCD activities?
    Mr. Caldwell. Well, that estimate does not include about 
900 facilities that have yet to be assigned into a final tier. 
Also, the time required to review the plans to resolve issues 
related to personnel surety take some time because some of the 
plans have been provisionally or conditionally approved. So 
they have to go back and revisit that once the personnel surety 
rule is in place. And then there are the compliance inspections 
that they would do which are separate from the plan approval, 
but those are generally done a year after. So you are looking 
at another year out there for individual facilities before they 
have the compliance inspections. And really, it is only until 
you have the compliance inspection whether you know that the 
facility is actually implementing the things in its security 
plan.
    Mr. Pitts. So will implementing these mission activities 
further delay full CFATS program implementation?
    Mr. Caldwell. Well, certainly until all of the pieces are 
in place, it is not going to be there. And I think several 
figures have been thrown out; 8 to 10 years we said in our last 
hearing. I mean, now, we are looking at 7 to 9 just for the 
approval plan. So it is going to be some time before this 
regime is completely in place. It is in contrast to maybe some 
of the other programs that were put in place after 9/11.
    Mr. Pitts. Now, the regulated industry says that ISCD's 
efforts to communicate regarding CFATS-related issues are mixed 
in effectiveness. Does ISCD measure the effectiveness of its 
outreach efforts and could they?
    Mr. Caldwell. No, they don't. They measure some of the 
things like how many meetings they have and those kinds of 
things, but they haven't outreached really to find out whether 
these have been effective so we are considering----
    Mr. Pitts. Should they or could they?
    Mr. Caldwell. Yes. And we are considering a recommendation 
with the Department. We are in discussions with a 
recommendation that we ask that they do so.
    Mr. Pitts. What should we take away from the input that you 
got from trade associations?
    Mr. Caldwell. Some of the things are working pretty well. 
The meetings with this Sector Coordinating Council seem to be 
effective according to industry. Also some of the visits to 
facilities, a little bit mixed there. I think the more recent 
things based on some of the testimony you will hear later today 
is that the officials doing those inspections from DHS do seem 
qualified and helpful, whereas I think some of the early 
responses that they were very reluctant to actually make useful 
concrete suggestions on how to improve security.
    Mr. Pitts. Now, you found that owners and operators were 
spending unnecessary resources complying with CFATS data 
collection requirements. Would you elaborate on that?
    Mr. Caldwell. I don't believe we ever said they were 
unnecessary. I just think they were worried about a substantial 
burden in terms of the cost it was taking to do these, 
particularly, if something changed and they did this. I think 
one of the things industry may tell you about in the next panel 
is the chemical industry can be a complicated business, so 
sometimes they change mixes of their chemicals in terms of some 
of their processes. And there has been a debate about whether 
then do they have to go back to DHS and resubmit everything 
because their mixture of chemicals is slightly different? It is 
a concern.
    Mr. Pitts. And what in your view is the difference between 
the current Site Security Plans and Alternative Security Plans?
    Mr. Caldwell. Well, I think the Alternative Security Plans 
look a little simpler. I think that they have some of the same 
information but perhaps in a more useful way because it is 
portrayed as a plan as opposed to a data dump of a lot of 
individual information that is in the DHS tool.
    Mr. Pitts. Thank you, Mr. Chairman.
    Mr. Shimkus. Thank you.
    The chair now recognizes the gentleman from California, Mr. 
McNerney, for 5 minutes.
    Mr. McNerney. Thank you, Mr. Chairman.
    Mr. Caldwell, we have been hearing this morning a lot about 
tiering formulas and about the risk assessment models. How 
familiar are you with the details of these models and formulas?
    Mr. Caldwell. We have not done the kind of verification and 
validation that a peer review of experts might do. So we have 
talked through what they use, we have discussed the factors, 
but I can't say we have tried to reproduce their models or do 
sensitivity analysis.
    Mr. McNerney. Are these by-and-large Excel spreadsheets or 
what do they look like? What form do they take or how do people 
have access to the models?
    Mr. Caldwell. It is an online tool so it is some kind of 
relational database. But beyond that, I can't tell you too much 
about the formulas or what the actual algorithms are.
    Mr. McNerney. And what sort of security do the models have 
in terms of making changes to parameters--not parameters but 
the way the models are executed? Is there a very secure 
methodology that is required for someone within DHS to change 
the model itself?
    Mr. Caldwell. We have not looked at the internal controls 
or the security settings on the model.
    Mr. McNerney. So as far as you know somebody in one of 
these departments can say, well, gee, I think this model is a 
little off; I am going to change it? I mean, there has to be 
some sort of control on these things.
    Mr. Caldwell. There should be, yes, sir.
    Mr. McNerney. Is that something you think you can find out 
or make an assessment?
    Mr. Caldwell. We can certainly ask the Department and 
answer that as a question for the record or if you could direct 
it to the Department, then that might expedite things or not.
    Mr. McNerney. All right. Thank you. I have a question. Were 
you assured by the under secretary's declaration that they have 
the best teams on cybersecurity and that they are on top of 
this issue and we don't have anything to worry about?
    Mr. Caldwell. That is not an aspect we looked at. So I have 
no comments on that.
    Mr. McNerney. So cybersecurity is not within your, sort of, 
realm?
    Mr. Caldwell. It is one of the many standards that they 
apply here. We do have other experts in GAO on cybersecurity 
that if you want to ask us a question for the record, we might 
be able to take that and answer it for you, sir.
    Mr. McNerney. All right. Thank you.
    That is all I have, Mr. Chairman.
    Mr. Shimkus. The chair thanks the gentleman.
    The chair now recognizes, I believe, the gentleman from 
Ohio, Mr. Latta, for 5 minutes.
    Mr. Latta. Well, thank you very much, Mr. Chairman. And 
thank you very much for being here. And we have got a couple of 
hearings going on so I am sorry that we are kind of in out 
today.
    But if I could start with this question: how important is 
it for the Infrastructure Security Compliance Division to have 
a complete validated and verified risk assessment approach?
    Mr. Caldwell. I mean I think our position is that the 
current approach is incomplete. So to the extent that they are 
using an incomplete model, they don't have an assurance that 
they are tiering these in the right fashion appropriate with 
the National Infrastructure Protection Plans criteria, which 
is, pretty much the Department's criteria in terms of how you 
do risk assessments.
    Mr. Latta. So how would you have to go about to get that 
complete?
    Mr. Wulf. You would have to include vulnerability in it and 
economic consequences are maybe the two minimum things that 
would need to be added into it. We have also asked that they 
update some of their threat data. Some of the threat data that 
they were using was a few years old, which they have agreed to 
do.
    Mr. Latta. OK. Thank you. Also, how important is it for the 
ISCD to eventually conduct an independent peer-review on CFATS 
risk assessment approach?
    Mr. Caldwell. We think it is very critical that there be an 
independent peer review. And I think you might have missed my 
answer talking to the chairman a few minutes ago, but there are 
really two factors. One is to make sure they have the 
methodology right, and secondly, to make sure the model, once 
you have the methodology right or at least with existing 
methodology, is the model actually functioning as intended? And 
as we have noted, there has been some miscalculations in the 
model that have been found which should, again, call for doing 
a verification and validation of the model itself.
    Mr. Latta. And just to follow up on that, how soon should 
that independent peer review occur?
    Mr. Caldwell. Well, I think it has already started. At 
least the panel that they have now, I think that there is a 
statement in Mr. Beers' written comments that if they need to 
do a second one, they are willing to do that as well. So the 
first one may be to find out where they are now, make some 
recommendations, and maybe would require a second peer review 
to actually go in and validate the model----
    Mr. Latta. OK.
    Mr. Caldwell [continuing]. With any changes.
    Mr. Latta. OK. Mr. Chairman, I have no further questions. 
Thank you.
    Mr. Shimkus. And the chair thanks the gentleman.
    The chair now recognizes the gentleman from Florida, Mr. 
Bilirakis, for 5 minutes.
    Mr. Bilirakis. Thank you, Mr. Chairman. I appreciate it 
very much. I have one question. What is the difference between 
the current Site Security Plans and Alternative Security Plans?
    Mr. Caldwell. The Alternative Security Plans are written 
more like a plan. The Site Security Plans that DHS has I would 
describe as more of a data dump. It is a lot of different data 
that is in there. I mean, both can be useful, but I think 
industry feels--and you can ask the third panel--that the 
alternative site plan or the Alternative Security Plan is a 
little more user-friendly and still get you there in the end.
    Mr. Bilirakis. Thank you, Mr. Chairman.
    Mr. Shimkus. Seeing no other members present, we would like 
to thank you, Mr. Caldwell, for appearing before us. You have 
done great work on this report. It looks like we have got a lot 
more work to do.
    And with that, we will allow the second panel to be 
dismissed and ask the third panel to join us at the table. 
Thank you, sir.
    Mr. Caldwell. Thank you very much.
    Mr. Shimkus. We want to thank the third panel for joining 
us and sitting through most of the testimony. I am sure that is 
going to be helpful for the remaining members as we listened to 
your opening statements and direct questions. And we will do so 
now.
    The first person that I would like to recognize is--yes, I 
am going to recognize Mr. Allmond--that is oK, Jerry, I am 
great--Mr. Allmond, who is vice president of the Society of 
Chemical Manufactures and Affiliates. Sir, you are recognized 
for 5 minutes. Your full statement is in the record.

STATEMENTS OF BILL ALLMOND, VICE PRESIDENT, SOCIETY OF CHEMICAL 
MANUFACTURERS AND AFFILIATES; TIMOTHY J. SCOTT, CHIEF SECURITY 
 OFFICER AND CORPORATE DIRECTOR, THE DOW CHEMICAL COMPANY, ON 
   BEHALF OF THE AMERICAN CHEMISTRY COUNCIL; CHARLIE DREVNA, 
 PRESIDENT, AMERICAN FUEL AND PETROCHEMICAL MANUFACTURERS; AND 
          RICK HIND, LEGISLATIVE DIRECTOR, GREENPEACE

                   STATEMENT OF BILL ALLMOND

    Mr. Allmond. Thank you. And good morning, Chairman Shimkus, 
Ranking Member Tonko, and members of the subcommittee.
    My name is Bill Allmond and I am the vice president of 
Government and Public Relations at the Society of Chemical 
Manufacturers and Affiliates. I am pleased to have the 
opportunity to provide you with an update on the Department of 
Homeland Security's implementation of CFATS from the 
perspective of specialty chemical manufacturers, many of which 
are small and medium-sized companies.
    Since the previous hearing last September, there are 
several areas we feel are worthy to highlight in terms of 
implementation progress. First, CFATS continues to reduce risk. 
Second, authorizing inspections are revealing some positives 
about DHS' implementation but also some challenges for small 
and medium-sized facilities. Lastly, a collaboration with the 
regulated community has improved.
    With respect to risk reduction, CFATS continues to drive 
facilities to reduce inherent hazards where, in their judgment, 
doing so is in fact safer, does not transfer risk to some other 
point in the supply chain, and makes economic sense. Today, 
nearly 3,000 facilities have changed processes or inventories 
in ways that have enabled them to screen out of the regulation.
    Furthermore, due to the outstanding cooperation of the 
chemical sector, there has been 100 percent compliance with 
requirements to date. DHS has not yet had to institute a single 
administrative penalty action to enforce compliance. As a 
result of CFATS, our Nation is more secure from terrorist 
chemical attacks than it was before the regulation's inception.
    Turning to DHS' inspection process, the few that so far 
have been conducted at SOCMA members reveal some positive 
aspects about how the Department is carrying out the 
regulation, as well as some challenges being presented among 
small and medium-sized facilities. Among the positives is the 
level of interaction of DHS inspectors with facilities 
scheduled for an inspection. Inspectors are providing 
sufficient details with facilities prior to their arrival, 
which aids the planning process to ensure resources and 
facility personnel are available.
    Similarly, facilities are finding DHS inspectors generally 
to be reasonable during the onsite inspection, which is perhaps 
due to the fact that some of them have chemical facility 
experience. Such operational familiarity is necessary when 
interpreting how risk-based performance standards apply to, and 
could be implemented at, such facilities.
    Importantly, inspections have so far appropriately verified 
a facility's approach to addressing risk-based performance 
standards. Inspectors appear not to be adhering rigidly to the 
RBPS guidance and instead to permitting company personnel to 
explain from the facility perspective, how they are 
appropriately implementing their Site Security Plan.
    The principal challenge that SOCMA's smaller facilities are 
finding with the inspection process, however, is the enormous 
amount of time and resources to meet DHS demands following an 
inspection. Of highest concern is an unwillingness by DHS to 
reasonably extend deadlines for facility response. In SOCMA's 
opinion, DHS should be more willing to extend the time of which 
a small and medium-sized facility has to respond to a post-
inspection report.
    Facilities are learning that, even if they had an 
inspection that went well, they are having to rewrite much of 
their Site Security Plans. Under a 30-day deadline, which has 
been the usual case, facilities are having to pull two to three 
workers for 2 to 3 days each to ensure that they meet the 
deadline. To us, this is unreasonable. In small companies, 
there simply may not be more than a few people qualified to 
work on security measures and all those people have other 
obligations which frequently include compliance with other 
regulatory programs.
    It is still early in the inspections process, and these 
burdens are now coming to light. However, DHS still has time to 
make adjustments given a willingness to do so.
    And lastly, collaboration with facilities on implementation 
has improved. We are pleased that DHS has recently worked with 
industry to establish an alternative security program template 
with possibly more the future.

    Additionally, DHS appears prepared this year to co-host 
another Chemical Sector Security Summit. For the past 6 years 
the Summit has been a collaborative effort by the Department 
and the chemical sector to provide an educational forum for 
CFATS stakeholders. An overwhelming majority of attendees each 
year are industry personnel who, when satisfaction surveys, 
consistently rate the Summit as having a high value to them.
    Many of the improvements over the past year have occurred 
under leadership of Deputy Under Secretary Suzanne Spaulding 
and Director David Wulf and their actions to help put CFATS 
back on track is worthy of recognition. I appreciate the 
opportunity to testify this morning and I look forward to your 
questions.
    [The prepared statement of Mr. Allmond follows:]

    [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
    
    Mr. Shimkus. Thank you very much. I would now like to 
recognize, as I move my papers all around--where is his name? 
Here it is--Mr. Timothy Scott, Chief Security Officer and 
Corporate Director of Dow Chemical Company, on behalf of The 
American Chemistry Council. Sir, you are recognized for 5 
minutes.

                 STATEMENT OF TIMOTHY J. SCOTT

    Mr. Scott. Thank you, Chairman Shimkus, Ranking Member 
Tonko, and members of the subcommittee. I am Tim Scott, Chief 
Security officer of the Dow Chemical Company, speaking today on 
behalf of Dow and the American Chemistry Counsel.
    The chemical industry and Department of Homeland Security 
have a common goal: to improve the security profile of the 
chemical sector and reduce the risk of attack against industry 
or the use of chemicals as a weapon. Our positions are that 
security is a top priority of the chemical industry. Progress 
has been made in all areas of chemical security, but there is 
still, obviously, work to be done. ACC will continue to partner 
with DHS to achieve success and we need the certainty of a 
multiyear extension of DHS authority for a sustainable program. 
Progress has been made and we need to build on that progress as 
respectful partners with different skills and expertise but 
with a common goal.
    DHS has evaluated nearly 40,000 chemical facilities across 
United States initially identifying more than 7,000 as 
potentially high-risk. Since then, more than 3,000 facilities 
have lowered their chemical risk profile, clear evidence that 
we have made progress. Last year, ACC published an alternative 
security program guidance document available at no cost to the 
regulated community, the result of a year-long effort and full 
cooperation with DHS. This ASP approach offers an efficient 
alternative to DHS process and is an excellent example of how 
an effective public-private partnership can create smart 
regulatory solutions that benefit both partners, while ensuring 
the security and safety of our industry.
    While we have made progress, there are many more 
opportunities for efficient and effective compliance options 
that will accelerate CFATS implementation while maintaining the 
quality and integrity of the program. Existing industry 
security programs such as the Responsible Care Security Code 
should be recognized by DHS under their ASP authority as 
meeting the initial hurdles for authorization, thus 
streamlining and prioritizing reviews, especially at the lower 
tiered sites.
    We must develop a workable process regarding personnel 
surety. The goal of the PSP program is to ensure that personnel 
accessing sensitive sites of high-risk chemical facilities are 
trustworthy and do not pose a security risk. It is essential 
that these individuals are properly vetted against the 
terrorist screening database. We all agree on that. But is also 
essential that the site know these individuals are cleared 
before granting access to such sensitive areas.
    Under the current proposals, industry submits the 
individual's personal information and receives no verification 
of any kind. We are supposed to be satisfied that simply 
submitting the data is enough to grant site access. This is 
simply a poor security practice, especially when solutions 
already exist. It is good to hear that we may be making 
progress in this area with DHS. By leveraging existing PSP 
programs and allowing for corporate and third-party submissions 
for vetting against a terrorist screening database, a 
significant reporting burden will be minimized and the 
integrity of the program will be much improved.
    Another opportunity for efficiency that can easily be 
implemented is in what we call corporate audits. These audits 
cover areas of the risk-based performance standards in which 
many companies' sites operate under a single corporate process, 
such as cybersecurity or security escalation processes. Current 
inspections often have inspectors getting the same corporate 
answers site-by-site instead of addressing the issue once at 
the corporate level. This can unnecessarily extend the length 
of a site inspection. We also heard that DHS is working on 
this.
    ACC believes that DHS should be more transparent about all 
factors related to a covered facility's risk assessment. Trust 
is at the core of an effective security partnership and ACC 
strongly recommends that DHS improve the transparency of its 
risk determinations with the site security managers. A lack of 
transparency has been the source for many of the inefficiencies 
and missteps during the CFATS implementation.
    The CFATS concept is fundamentally sound, risk-based, 
focused on the right priorities allowing regulated sites to 
choose and apply customized security solutions for DHS review 
and evaluation for compliance with the DHS-established risk-
based performance standards. And that is the goal, to meet the 
standards. And industry will.
    DHS has demonstrated renewed commitment and effort to our 
partnership due in part by oversight of this committee. ACC 
urges Congress to provide DHS extended statutory authority for 
the CFATS program to provide the regulatory certainty and 
stability needed for industry to make prudent security 
investment and capital planning decisions. Industry and DHS 
have made progress in improving the security of the chemical 
sector. There have been missteps, but we should acknowledge the 
progress and the challenge and commit to making CFATS work. 
Thank you.
    [The prepared statement of Mr. Scott follows:]

    [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
    
    Mr. Shimkus. Thank you. Next, I would like to recognize Mr. 
Charlie Drevna, President, American Fuel and Petrochemical 
Manufacturers.
    Sir, you are recognized for 5 minutes.

                  STATEMENT OF CHARLIE DREVNA

    Mr. Drevna. Chairman Shimkus, Ranking Member Tonko, and 
members of the subcommittee, thank you for giving me the 
opportunity to testify today on today's hearing on the progress 
report of the CFATS program. I am Charlie Drevna and I serve as 
president of AFPM.
    We are a 111-year-old trade association representing high-
tech American manufactures that use oil and natural gas liquids 
as raw materials to make virtually the entire supply of U.S. 
gasoline, diesel, jet fuel, other fuels such as home heating 
oil, as well as the petrochemicals used as building blocks for 
thousands of products vital in everyone's daily lives.
    America's refining and petrochemical companies play a 
pivotal role in ensuring and maintaining the security of 
America's energy and petrochemical infrastructure. Nothing is 
more important to AFPM member companies than the safety and 
security of our employees, facilities, and communities. Our 
members have worked extensively with the Department of Homeland 
Security and we have invested hundreds of millions of dollars. 
And we don't mind investing the money as long as we know it is 
going for the right reasons, and again, toward strengthening 
facility security.
    Our industry also recognizes that protection of critical 
infrastructure against potential threats or terrorist attacks 
should be a shared responsibility between government and 
stakeholders.
    AFPM appreciates that DHS conducted an internal review to 
identify administrative and implementation problems that 
require immediate action and that the Agency developed an 
Action Plan for improving CFATS implementation. But it is 
important, however, to recognize that the structure of the 
CFATS framework itself is sound, even though the leaked report 
from GAO revealed the implementation of CFATS program was 
somewhat flawed.
    Additionally, America's critical infrastructure facilities 
are secure and there have been no attacks on chemical 
facilities since development of the CFATS program. Nonetheless, 
it is clear that DHS needs to better manage its resources and 
set priorities to make progress in areas that need immediate 
action, including faster approval of Site Security Plans and 
finalizing a workable Personnel Surety Program, a PSP. Such 
measures would work to strengthen the program and our national 
security.
    AFPM believes that DHS has made progress over the past year 
to address the problems identified in the DHS-leaked report and 
Action Plan. However, DHS should continue to make improvements 
by addressing issues including personnel surety with the help 
of the industry in order to enhance the overall effectiveness 
of CFATS implementation in the short-term.
    AFPM is pleased that DHS withdrew the personnel surety 
proposal from the Office of Management and Budget last July and 
then held a series of meetings with industry to take another 
look at this issue. Congress intended, and I heard today a 
repeat of that intent, that the risk-based performance standard 
on personnel surety which governs access to high-risk 
facilities, allow facilities the flexibility to determine the 
most efficient manner to meet that standard.
    Instead, DHS initially proposed and arguably prescribed PSP 
program that failed to recognize the Transportation Worker 
Identification Credential, or TWIC card, and other established 
federal vetting programs. Such a program would have been 
burdensome to both DHS and industry, and would be a wasteful 
and ineffective use of agency and industry resources. Instead 
of proposing a duplicative, burdensome PSP, DHS should remain 
focused on fixing the current problems and not expand beyond 
the scopes of the core CFATS program.
    The PSP program must be fixed soon and we hope that DHS 
will honor the TWIC and other federal credentials at CFATS 
sites. Facilities should have the option to use federally 
secure vetting programs such as TWIC to satisfy CFATS without 
submitting additional personnel information. AFPM supports a 
PSP program that requires only a one-time submission of 
personnel identifying information to DHS, recognition of TWIC 
and other federal credentials, and the use of third-party 
submitters for corporate submissions. This would lessen the 
burden on both DHS and industry, and would potentially account 
for half of the population affected by the Personnel Surety 
Programs, specifically, contractors coming to CFATS sites who 
would already have those cards.
    Stakeholder input is necessary. To assist DHS in addressing 
CFATS implementation challenges, continued stakeholder input is 
necessary. We are encouraged that we are seeing DHS do this 
more and more.
    In summary, AFPM believes that DHS has made progress over 
the year addressing the problems identified in the internal 
report. We also acknowledge that there is been far greater 
outreach and more detailed discussions with DHS, and we hope 
that those continue in the future.
    Thank you and I look forward to any questions you may have 
regarding my testimony.
    [The prepared statement of Mr. Drevna follows:]

    [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
    
    Mr. Shimkus. Thank you. And now the chair recognizes Mr. 
Rick Hind, Legislative Director for Greenpeace. Sir, you are 
recognized for 5 minutes.

                     STATEMENT OF RICK HIND

    Mr. Hind. Thank you, Mr. Chairman. My name is Rick Hind. I 
am the legislative director of Greenpeace, as you mentioned. I 
appreciate the opportunity to talk to you today both to this 
committee and with this panel here.
    We work with over 100 other organizations, mainly unions, 
environmental justice organizations, other environmental 
groups, security experts, 9/11 families, and others who, for 10 
years, have pushed for disaster prevention. The legislation 
that passed the House in 2009--November, actually, 2009--had 
that component in it but it also addressed a lot of the 
problems that you have been hearing about today. It provided 
for regular scheduling of the DHS issuing vulnerability and 
security plans as well as keeping regular reports back to 
Congress. I think you probably would have been hearing about 
any these problems in 2011 at the latest if that legislation 
had been enacted in 2010.
    That legislation also would have seamlessly replaced the 
2006 authorization that you have referred to earlier, which was 
never really thought to be adequate. Everybody knew that and 
that is why it had a 3-year expiration date on it. And today, 
we are extending it now 6 years, 1 or so years at a time, and 
therefore, I think you have appropriately given the due that 
DHS staff deserved. Their dedication and stick-to-itiveness in 
a program that is really inadequate, from the legislative 
foundation through to the continuity of its funding by 
Congress.
    However, the kind of big elephants in the room that we see 
unaddressed are the fact that the statute actually prohibits 
the government from requiring disaster prevention in the 
statute barring any particular security measure for approval of 
security plans. In addition, the statute actually exempts 
thousands of facilities. So what we are talking about here when 
you think of the classic Bhopal disaster of poison gas drifting 
out of a plant endangering people--and in this country we have 
hundreds of plants that can do that.
    In looking at the tiering of DHS, if you separate that by 
risk issue, or I should say security issue, the release issue 
security facilities in Tiers 1 and 2 totals 35. That is 
totaling, in all 4 tiers, 370 facilities. That data is 2011 so 
it may be slightly less now. The point is that less than 10 
percent of the facilities that you think of as the 3,900 CFATS 
facilities may be chemical disasters in the sense we all think 
of it as. And that is because they are being regulated by other 
programs like the MTSA, which look at more the water access of 
the facility.
    Major facilities in the country, like this Keeney plant, 
probably the highest-risk facility in the United States, is 
regulated by MTSA. That facility puts 12 million people at 
risk. They, for 2 years on their Web site, say they are 
converting. We hope they are. Clorox converted all of their 
facilities in 3 years eliminating these risks to 13 million 
people. And we say risk, we mean a consequence; we mean the 
poison gas like chlorine that can drift 14 to 20 miles from a 
facility and put everyone downwind in danger of pulmonary 
edema, which would mean your lungs would literally melt. You 
would drown in your lung fluid. Those who would survive could 
have long-lasting, lifelong health problems.
    So when we hear about the rush to approve security plans 
now, and were not comforted by the 7- to 9-year schedule GAO 
brings out, we are also not comforted by the fact that it is 
not a complete deck that we are dealing with here. So approval 
of a plan doesn't necessarily make it secure and it certainly 
doesn't make it no longer vulnerable. The CEO of DuPont 
admitted that if an airplane or a small helicopter coming into 
a plant couldn't be stopped by fence-line security, which is 
the entire basis of this kind of security.
    Similar communities living near these plants are not 
comforted by these Alternative Security Plans developed by 
industry lobbies. They have heard too often when they have 
sheltered in place, or see explosions and flares and fires--
were averaging about 45 a year, by the way, at refineries--that 
everything is oK. There are no dangerous levels of chemicals 
released.
    So when you look at our testimony, look at the people who 
we have quoted in there, but also look at the Center for 
American Progress reports we sited, which identified hundreds 
of facilities that have converted and eliminated these risks to 
millions of people. We think any plant that can convert should 
be required to convert and, in fact, the CEP studies found that 
87 percent of those converted that were surveyed did so for $1 
million or less; 1/3 expected to save money. So this is good 
business. It also means eliminating liability and regulatory 
obligations.
    And I have much more to say but I will wait for your 
questions. Thank you again for allowing us to appear today.
    [The prepared statement of Mr. Hind follows:]

    [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
    
    Mr. Shimkus. Thank you, Mr. Hind.
    Now, I would like to recognize myself for the first 5 
minutes of questions.
    I want to start off whatever script I was given to ask Mr. 
Scott a question. Were you in the room when Representative 
McKinley was asking about the risk assessment issue? And, of 
course, DHS responded that, well, we don't know of any 
identifiable risks. And I am paraphrasing here--then the 
question went to about European security and DHS responded, 
well, we think we are the gold standard. Since you operate 
around the globe, does individual European countries or the EU 
at large have a CFATS-type program?
    Mr. Scott. No, but they are discussing a similar program. 
The difference you have there, you are working between various 
countries. But they do have regulations in place like the 
Seveso regulations that impact offsite types of emergencies. 
The EU is having a conversation about are there any general 
rules and regulations that we can put in place? They have been 
talking. They have talked with DHS in the past. We are working 
with----
    Mr. Shimkus. Maybe they should talk with our GAO, our 
Government Accounting Office, then DHS.
    Mr. Scott. Yes. Well, DHS is a standard; I wouldn't say it 
is a gold standard. But the folks overseas are looking at 
similar directions to go, both in transportation and site 
security. But we also have a lot of work that we have done over 
there through the Responsible Care Code. It is a global code. 
So that has been implemented. And a lot of the same safety and 
security cultures that are in place in the U.S. are in place 
throughout Europe.
    Mr. Shimkus. I appreciate that.
    Now, for Mr. Allmond and Mr. Scott and Mr. Drevna, GAO 
reports--and you all have heard these conversations earlier 
today--that DHS largely disregards vulnerability, economic 
criticality, and threat assessments as part of the risk 
calculations making CFATS a modified consequence prevention-
only program. Are you concerned your members might be 
overregulated or under-tiered? Mr. Allmond?
    Mr. Allmond. Well, certainly these revelations are 
concerning. And it is going to take me some time to get back to 
my members to find out from their perspective how they would 
like to proceed. I think completely stopping the CFATS program 
from going forward probably would be overboard. Perhaps some 
components could go forward. But certainly----
    Mr. Shimkus. OK. But you were here during the testimony. Do 
you think that some of your folks are overregulated or under-
tiered? It is pretty easy----
    Mr. Allmond. Well, at this point it seems like that may be 
the case.
    Mr. Shimkus. Thank you. Mr. Scott?
    Mr. Scott. I would say yes. Looking at the variability in 
the sites that we have that are covered, there is a lot of 
question on how we got where we got.
    Mr. Shimkus. Mr. Drevna?
    Mr. Drevna. I concur.
    Mr. Shimkus. You have heard from panels one and two that 
DHS has collected a lot of information that it will not use in 
risk assessment. Are you comfortable with that? Mr. Allmond?
    Mr. Allmond. No, we are not.
    Mr. Shimkus. And why?
    Mr. Allmond. DHS should use the information that is given 
to them. As has been testify before, there has been an enormous 
amount of resources given to--from our side--given to the 
Department that we are compelled to do and there is an 
understanding that the Department is going to use that 
information.
    Mr. Shimkus. Mr. Scott?
    Mr. Scott. I agree. The inefficiency in the process caused 
a lot of unnecessary work, a lot of information that they have 
never used, and we don't know where the information went. It 
seems like they felt like they had the answer before we started 
the process.
    Mr. Shimkus. Mr. Drevna?
    Mr. Drevna. Yes. And I would like to add to that, Chairman 
Shimkus, that in chemical facilities you are changing processes 
constantly. So we are submitting information, it goes 
somewhere, lots of information, up to 900 questions on some 
things. It goes somewhere. Whether it is used or not, probably 
not all of it. Again, if it is vital, perfect. If it is not, 
let us work with you to get it done. But then you change your 
process again, you may have to go through the whole thing again 
because these things are not static kinds of plants. We are 
always changing volumes and chemicals.
    Mr. Shimkus. Mr. Scott?
    Mr. Scott. I would like to add to that. That is one of the 
big issues that we have is we typically have larger plants, a 
lot of processes in those plants and we are required to submit 
any time we change anything in the process, make another 
submission. That puts you back to square one in the whole 
process.
    Mr. Shimkus. And just because my time is getting short, and 
Mr. McNerney is not here, but he talked a lot about cyber 
stuff. So you have got all this data going somewhere. If it is 
not being used, why it is being held and what is the risk of 
that being pulled out to make your facilities less secure. Is 
that a risk? Mr. Scott?
    Mr. Scott. Well, it is a risk whenever you release the 
information that you hope it is going to be secure. But in the 
earlier panel, we also heard that, well, maybe we can 
declassify that so everybody can talk about it. And I am 
concerned about the level of declassification. If it is just 
open to the public, that is a real security concern.
    Mr. Shimkus. Anyone else while my time is expired? Mr. 
Drevna?
    Mr. Drevna. I would like to add to that. You are probably 
one hit of forward or reply all from exactly what Mr. Scott was 
just talking about.
    Mr. Allmond. Absolutely.
    Mr. Shimkus. Mr. Allmond. OK. Thank you. The chair now 
recognizes ranking member, Mr. Tonko, for 5 minutes.
    Mr. Tonko. Thank you, Mr. Chairman.
    And to the gentleman on the panel, thank you for your time 
and your input today.
    To the industry witnesses, did you participate in GAO's 
survey?
    Mr. Allmond. Oh, SOCMA did, yes.
    Mr. Scott. ACC did, yes.
    Mr. Drevna. Yes, sir.
    Mr. Tonko. So you all did.
    GAO found that transparency in the tiering process should 
be improved. Can each of you state whether you agree with this 
GAO conclusion?
    Mr. Allmond. I will say absolutely. As Mr. Scott was 
saying, a lot of times these facilities give information 
without getting a really detailed understanding about why they 
got the tier level they did.
    Mr. Scott. All of the information was submitted. I 
absolutely think it should be more transparent with the people 
that we were supposed to be working as partners.
    Mr. Drevna. I agree, Mr. Tonko. But I will say that the 
process has somewhat improved. We have got a long way to go, 
but we weren't where we were before this report came out.
    Mr. Tonko. Mr. Drevna, you talked about the PSP process----
    Mr. Drevna. Yes, sir.
    Mr. Tonko [continuing]. And utilizing it more readily.
    Mr. Drevna. Yes, sir.
    Mr. Tonko. Can you just develop that a bit for me?
    Mr. Drevna. Well, at refineries and petrochemical 
facilities, you have constantly--you have your own employees--
but you have constant, contractors coming in and out, 
turnarounds, changeovers, et cetera, and they are authorized, 
the contractors, under TWIC, Transportation Worker 
Identification Credential. And what the DHS will tell us is 
that, well, we are coming up with a remedy for that but those 
rules aren't going to be ready for who knows how many more 
years. Meanwhile, we have to, perhaps, have other 
identification notices or identification cards for the various 
employees and contractors.
    It is sort of like if I can make some sort of an analogy, 
sort of like me or you going through an airport and you have to 
have your passport to go through the first gate, and your 
driver's license you through the second, and maybe your voter 
ID card to go through the third or whatever. But it doesn't 
make any sense. So you talk to us in industry and we usually 
object to the one-size-fits-all approach and maybe that is not 
applicable. But we need something that is not duplicative, 
time-consuming, and sometimes conflicting.
    Mr. Tonko. Thank you. Thank you, Mr. Drevna.
    Mr. Hind, you made mention, or I think to use your words, 
we are not dealing with a complete deck. Can you elaborate on 
that? What else should be done to make certain that we are 
providing for the public safety elements out there or in 
keeping with the mission of the legislation?
    Mr. Hind. Well, if you look at the EPA's database through 
its risk management program, which is really kind of an 
imperfect larger universe of the facilities we are worried 
about, those that have off-site consequences, the total number 
of facilities in that program is 12,440 according to CRS' 
latest update in November. Of those, 2,500 plants each put 
10,000 people or more at risk. Of the 2,500, some of them could 
put over a million at risk. In fact, 473 put 100,000 at risk. 
And so my question to the panel here is, which of your member 
companies are actually part of MTSA and exempt from CFATS or 
part of a DOE program or even Defense Department? And I think 
that the numbers would be rather revealing in terms of which 
they are.
    We have heard that Dow's largest plant the country at 
Freeport, Texas, is that MTSA facility. So that means there are 
huge holes, or as Congressman Waxman called them, gaps in the 
security and in terms of the continuity of security by the 
government accountability over the industry.
    Mr. Tonko. Thank you. And from the public interest 
perspective, what are the problems with incorrect tiering of 
facilities?
    Mr. Hind. You mean in terms of the way that the risk 
assessment has been conducted and so forth? Well, in our view, 
we are a little bit nervous to hear about economic 
considerations being added and also vulnerability. I think that 
all of these facilities are vulnerable. If somebody takes a 
small plane or hijacked it, all of the guards and cameras and 
gates are not going to be enough to stop a small plane, as the 
CEO of DuPont admitted years ago. So I think that, as the 
former EPA administrator Ruckels has warned, risk assessment is 
like a captured spy. If you torture it enough, you can get to 
say anything. And I fear that we are going down a slippery 
slope here, and what needs to be done is adding alternative 
assessment to the process. Each company should be going out and 
saying to the DHS, we have looked at all the alternatives and 
there is nothing feasible for facility, or we are like Clorox 
and we can convert. And then you have zero risk.
    Mr. Tonko. Thank you. I think some of you might have a 
comment to that, too, or----
    Mr. Scott. Yes, I just----
    Mr. Shimkus. Without objection, we will continue for a 
minute to get a response. Mr. Scott?
    Mr. Scott. OK. Yes, I would just like to reply on the MTSA 
question. There are several sites that are covered by MTSA, but 
rightly so. They have waterside security included on their 
security. But the Texas operation site is the one that Mr. Hind 
mentioned, which is our largest site. It is the largest 
chemical site in the United States. It is covered by MTSA so it 
does have different requirements. It also has exactly the same 
security upgrades already in place that are required of a Tier 
1 CFATS site. So if you come down to Freeport operations or 
Texas operations, you will see we would be in full compliance 
with CFATS right now as a Tier 1 site. All of our MTSA sites 
are upgraded security-wise exactly the same as our CFATS sites. 
And all of our sites globally are tiered the same way and have 
security upgrades in place the same way. So I think that 
addresses the issue that we can have integration of the two 
systems very well.
    Mr. Shimkus. Thank you very much.
    The chair now recognizes the gentleman from Pennsylvania, 
Mr. Pitts, for 5 minutes.
    Mr. Pitts. Mr. Drevna, did you want to add to that?
    Mr. Drevna. Well, if you don't mind, Mr. Chairman, thank 
you.
    I agree with everything that Mr. Scott had said 
exponentially. But since the question was asked from the panel 
to the panel, in short of installing Patriot missile batteries 
at all facilities, I don't see how we are going to stop 
anything from coming in from outside the gate like an airplane 
or helicopter.
    Mr. Pitts. Mr. Allmond, you testified that DHS should be 
more willing to extend the amount of time a small or medium-
sized facility has to respond to a post-inspection report. How 
much time is reasonable so that the small and medium-sized 
facility still feels the urge to promptly respond while also 
giving them the chance to provide a quality response?
    Mr. Allmond. Yes. Thank you for that question. I think a 
minimum of 90 days will be sufficient.
    Mr. Pitts. Do you believe DHS still has time to make 
program adjustments and will consider your perspective, and if 
so, what gives you that confidence?
    Mr. Allmond. I do. In fact, I have already broached this 
concern with the Department and they have been receptive to 
hearing our proposal.
    Mr. Pitts. Thank you. Mr. Drevna, your testimony discusses 
the importance your members place on getting a workable 
Personnel Surety Program. Is DHS addressing your particular 
concerns?
    Mr. Drevna. Well, we have been working with them, and as I 
said previously, ever since, the report came out and we have 
sat down--and I have to admit, there has been more transparency 
and they are willing to work with us. But we have got to 
establish the fact that we--you know, as I said before, the 
TWIC reader card implementation is years away. But we are in 
the process of doing all this now. So there has to be some 
meeting of the minds here that says, oK, let's get this done in 
a timely fashion so we can move on.
    Mr. Pitts. Has AFPM tried to get an Alternative Security 
Plan approved by DHS for its members? What has been your 
experience with DHS in trying to advance----
    Mr. Drevna. Well, we support the alternative plans. We 
haven't particularly as an association done it, but our members 
have. And that is one of the things we keep, the tiering 
process, the kind of data that is needed. It is a little bit 
confusing between what is needed for the full assessment, what 
is needed to get you into a quicker AV alternative plan. So we 
are working with them. We support it and again, we are seeing 
the light at the end of this tunnel but we still have a ways to 
go.
    Mr. Pitts. Assuming DHS, with the help from a Peer Review 
Panel, comes up with a better risk assessment model, when 
should it be applied to CFATS activities? Does it affect the 
speed with which your members would have their Site Security 
Plans reviewed and approved?
    Mr. Drevna. Is that for me, sir?
    Mr. Pitts. Yes.
    Mr. Drevna. I believe it would. I mean, we have three 
members companies on that tiering panel. And we are confident 
that we are getting joint cooperation. Anytime you get three 
companies on the panel, a government panel, we are happy with 
that. But the proof is going to be at the end of the day with 
what is accepted and what isn't.
    Mr. Pitts. All right. Mr. Scott, your testimony raised 
concerns about transparency by DHS officials because they did a 
poor job of communicating threat information to CFATS-regulated 
facilities. Do you think DHS can formulate credible threat 
information and assessments?
    Mr. Scott. I think they can give us the information that 
they have available to us. There is a NIAC study out that is on 
communications amongst the intelligence communities in the D.C. 
area and DHS did not come out very highly on that panel.
    Mr. Pitts. Does it surprise you that GAO found that DHS 
really doesn't assess threat for 90 percent of terror threats 
at facilities with chemicals?
    Mr. Scott. Threat typically is not discussed, and when you 
have a meeting with DHS, typically, it starts with there are no 
credible threats to the chemical industry at this time. We go 
on the premise that because we are part of the critical 
infrastructure, we are a potential threat or there is always a 
potential threat. That is the discussions we have always had.
    Mr. Pitts. What recommendations do you have for DHS to 
improve its threat characterizations and communications?
    Mr. Scott. You have to identify the baseline on the threats 
that you are going to address, and then you have to have plans 
in place to escalate your security programs accordingly as the 
risk increases.
    Mr. Pitts. Do you agree with GAO that DHS assessment tools, 
particularly threat consequence and vulnerability ones, should 
be verified and valid before being deployed?
    Mr. Scott. Yes, I do. Validity is important, yes.
    Mr. Pitts. My time has expired. Thank you.
    Mr. Shimkus. The gentleman's time has expired.
    The chair now recognizes the gentleman from Texas, Mr. 
Green, for 5 minutes.
    Mr. Green. Thank you, Mr. Chairman. And obviously, our 
threat assessments are a work in progress because I remember in 
late 2001 there was in one of the caves in Afghanistan there 
was information on an attack on a refinery in Pasadena, 
California. It didn't take too long to know there are no 
refineries in Pasadena, California. But I represent Pasadena, 
Texas, and we have no shortage of refineries. And that was 
right after 9/11. Obviously, it was infancy.
    And today, though, there is a lot--and I know at least in 
the industries that I work with in my area in East Harris 
County, the coordination between the federal agencies and our 
local police agencies is amazing. Now, I don't know what DHS 
does with the local law enforcement, the FBI, the Customs and 
Border Protection, the Coast Guard. In fact, I was at the Coast 
Guard facility in our district that now is co-located at a 
Coast Guard facility with the Harris County Sheriff's office 
boats, along with the Houston Police Department boats at the 
same location in our district in Galena Park, Texas. So, I 
mean, it is a work in progress.
    Were you all here for the first panel? Do you feel 
confident that we are going to end up not having to jump 
through second hoops on your non-MTSA facilities and that the 
TWIC card is going to be able to be used? If you have a site 
that Dow does, for example, in Freeport, that the TWIC card 
works and you have a land-based site, the TWIC card will also, 
ultimately when they get through, will also be able to be used 
for an ID at that land-based facility for Dow?
    Mr. Scott. That is the direction that they are moving in. 
So yes, a TWIC card would be acceptable and usable at any of 
those sites. Yes.
    Mr. Green. Well, Mr. Chairman, we need to just monitor that 
because I know we in the Subcommittee had that discussion for a 
number of years, and frankly, we probably wouldn't have gotten 
where we are without a great GAO study to show that the problem 
is within DHS.
    For Mr. Drevna and Mr. Scott, over the past year, have you 
seen changes in outreach and cooperation from DHS and the 
industry, particularly as they relates to chemical and fuel and 
petrochemical manufacturers in the last year?
    Mr. Drevna. Yes. In the last year they have significantly 
improved the communications from DHS to their people in the 
field and from the people in the field to the sites. Yes.
    Mr. Green. Well, and I understand in your testimony you are 
concerned that the transparency on the decision-making ought to 
be much better and our committee ought to be encouraging that. 
Now, I do have some concern about the information provided on 
your plant facilities, because again, the experience we have 
over the last 12 years is that if a lot of your information is 
given to DHS, it is public record. There are folks in part of 
the world who can, with the punch of a button, look up plant 
design and plant vulnerability. That should not be public 
record. And I am concerned about that.
    We want transparency in the approval process but as much as 
I want as much public information for my constituents that live 
around and work on those plants, I also know I don't want to 
give a guide to somebody who wants to fly that Piper Cub over 
it. Is that some of your concern?
    Mr. Drevna. Absolutely. Like I said before, Congressman 
Green, we submit information and we submit it in good faith 
and----
    Mr. Green. Well, you are required to.
    Mr. Drevna. But like I say, it is either one reply all or 
one forward button away from getting into the wrong hands.
    Mr. Green. Well, I think in follow-up hearings we might 
have DHS come talk about what they do with information that is 
provided so it is protected. But I have to admit, Charlie, it 
is interesting, the ultimate 2nd Amendment is somebody having a 
Stinger missile to protect their plant or their house from a 
Piper Cub flying over it. I don't think we are going to get to 
that point. But I see planes fly over my plants literally every 
day when I am at home. And there is a special protection, 
though, you have to have special access to be able to fly over 
those facilities and no system is foolproof. But also, I don't 
know if I really want us to have to train our plant personnel 
to have a Stinger missile on their shoulder.
    Mr. Drevna. I would concur, Congressman Green.
    Mr. Green. But Mr. Chairman, I appreciate the hearing. It 
seems like we made progress, but obviously DHS needs to come a 
little more with plants who, as I have said before, have made a 
million dollars in federal tax dollars, millions of dollars of 
investments and partnerships with our local communities that we 
still don't know what hoops and what will be approved, whether 
it be Tier 1, 2, 3, or 4. And I would like to have some 
certainty there, and I know Greenpeace would like that to, and 
so would my constituents. Thank you.
    Mr. Shimkus. The gentleman yields back his time.
    We want to thank the third panel for being here and ask 
unanimous consent for 5 days for subcommittee members to submit 
opening statements for the record. Without objection, so 
ordered. We would also ask unanimous consent for 10 days to 
submit written questions for submittal to witnesses for an 
inclusion in the records. That also pertains to you all.
    And inclusion of a letter, I ask unanimous consent for the 
inclusion of a letter from the National Association of Chemical 
Distributors to myself and Mr. Tonko--your staff has approved--
dated March 12, 2013, on the CFATS program. Without objection, 
so ordered.
    [The information appears at the conclusion of the hearing.]
    Mr. Shimkus. And the hearing is now adjourned.
    [Whereupon, at 12:43 p.m., the subcommittee was adjourned.]
    [Material submitted for inclusion in the record follows:]

               Prepared statement of Hon. Henry A. Waxman

    I thank the Chairman for calling this hearing on this very 
important program. The Chemical Facilities Anti-Terrorism 
Standards Program, or CFATS, is a critical national security 
program designed to protect communities from potential 
terrorist attacks on industrial facilities with significant 
stores of dangerous chemicals.
    Since 2001, federal officials, the Government 
Accountability Office (GAO), and outside experts have warned 
that the nation's drinking water utilities and chemical 
facilities remain vulnerable to terrorist attack.
    Unfortunately, the CFATS program is a grave disappointment. 
At the end of 2011, we learned the program was in disarray. No 
facilities had approved site security plans. Homeland Security 
officials felt their enforcement authority was insufficient and 
ineffective. There were no procedures in place to document 
important programmatic decisions. No one on staff was even 
qualified to conduct a compliance inspection.
    There has been some progress. We will hear from the 
Department today about their efforts to strengthen the CFATS 
program and the advances the Department has made since 
undertaking a serious internal examination of the program in 
2011.
    But today we will also hear from the Government 
Accountability Office, which has undertaken the first rigorous 
external accounting of the program. GAO has found that 
fundamental problems still plague the program. More work is 
needed before Congress and the American public can have 
confidence in the risk assessments that determine the potential 
dangers facilities pose.
    Perhaps we shouldn't be surprised. CFATS was created in the 
sloppiest legislative fashion possible. It was established in 
2006 by a provision tucked into an appropriations bill without 
the benefit of hearings or markups by the Committee.
    The problems with the program are not all Congress' fault. 
Both the current and previous administrations have failed to 
implement the program effectively. The Department issued an 
interim final rule within six months of the law's passage. This 
rule determined what chemicals might be targets, how risk would 
be assessed, and what security standards would be applied. 
Given the quick action and limited statutory guidance, the rule 
was flawed. But now--six years later--it still hasn't been 
updated and improved.
    In the 111th Congress, we worked on a bipartisan basis with 
industry, labor, and other affected stakeholders to 
methodically resolve each of the issues surrounding the CFATS 
program.
    The result was H.R. 2868, the Chemical and Water Security 
Act of 2009, which passed the House by a vote of 230-193. That 
legislation would have addressed many of the challenges the 
program now faces, increased transparency and accountability, 
clarified the process for approving or disapproving site 
security plans, and set enforceable deadlines. It also would 
have strengthened security at covered facilities by requiring 
assessment, and in particular circumstances, adoption of safer 
chemicals, processes, or technologies to reduce the 
consequences of a terrorist attack.
    Unfortunately, that bill did not become law, and that 
opportunity to set this program on a more successful path was 
missed.
    In the years since, this Committee has failed to develop 
comprehensive legislation to reform the CFATS program. It has 
also failed to offer any legislation to close security gaps or 
address security at water facilities.
    This Committee needs to do more. Comprehensive legislation 
is long overdue.
    I look forward to the testimony of the witnesses today, and 
I invite all of them and other stakeholders to engage with this 
Committee and help us seek solutions to a troubled, yet 
critically important anti-terrorism program.
                              ----------                              


[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]