Maritime security: General provisions,

[Federal Register: July 1, 2003 (Volume 68, Number 126)]

[Rules and Regulations]

[Page 39239-39284]

From the Federal Register Online via GPO Access [wais.access.gpo.gov]

[DOCID:fr01jy03-14]

[[Page 39239]]

Part II

Department of Homeland Security

Coast Guard

33 CFR Parts 101, 102, 103, et al.

46 CFR Parts 2, 31, 71, et al.

National Maritime Security Initiatives; Area Maritime, Vessel, Facility, and Outer Continental Shelf Security; Automatic Identification System, Vessel Carriage Requirement; Temporary Interim Rules Automatic Identification System, Expansion of Carriage Requirements for U.S. Waters; Notice

[[Page 39240]]

DEPARTMENT OF HOMELAND SECURITY

Coast Guard

33 CFR Parts 101 and 102

[USCG-2003-14792]

RIN 1625-AA69

Implementation of National Maritime Security Initiatives

AGENCY: Coast Guard, DHS.

ACTION: Temporary interim rule with request for comments and notice of meeting.

SUMMARY: The Coast Guard has published a series of six interim rules in today's Federal Register to promulgate maritime security requirements mandated by the Maritime Transportation Security Act of 2002. The six interim rules consist of: Implementation of National Maritime Security Initiatives; Area Maritime Security; Vessel Security; Facility Security; Outer Continental Shelf Facility Security; and Automatic Identification System. In addition to the Automatic Identification System interim rule, we have issued a separate request for comments for further expanding the implementation of the Automatic Identification System. The series of interim rules addresses security assessments and plans, as well as other security standards, measures, and provisions that, with the exception of Automatic Identification System, will be codified in the new subchapter H of Title 33 of the Code of Federal Regulations.

This interim rule, the Implementation of National Maritime Security Initiatives, establishes the general regulations for subchapter H. It does so by providing a comprehensive discussion of industry-related maritime security requirements and a summary of the cost and benefit assessments of the entire suite of interim rules. The alignment of domestic maritime security requirements with the International Ship and Port Facility Security Code and recent amendments to the International Convention for the Safety of Life at Sea is also addressed here.

The discussions provided within each of the other five interim rules are limited to the specific requirements they contain.

DATES: Effective date. This interim rule is effective from July 1, 2003 until November 25, 2003. On July 1, 2003, the Director of the Federal Register approved the incorporation by reference of certain publications listed in this rule.

Comments. Comments and related material must reach the Docket Management Facility on or before July 31, 2003. Comments on collection of information sent to the Office of Management and Budget (OMB) must reach OMB on or before July 31, 2003.

Meeting. A public meeting will be held on July 23, 2003, from 9 a.m. to 5 p.m., in Washington, DC.

ADDRESSES: Comments. To ensure that your comments and related material are not entered more than once in the docket, please submit them by only one of the following means:

(1) Electronically to the Docket Management System at http://dms.dot.gov .

(2) By mail to the Docket Management Facility (USCG-2003-14792) at the U.S. Department of Transportation, room PL-401, 400 Seventh Street SW., Washington, DC 20590-0001.

(3) By fax to the Docket Management Facility at 202-493-2251.

(4) By delivery to room PL-401 on the Plaza level of the Nassif Building, 400 Seventh Street SW., Washington, DC, between 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays. The telephone number is 202-366-9329.

You must also mail comments on collection of information to the Office of Information and Regulatory Affairs, Office of Management and Budget, 725 17th Street NW., Washington, DC 20503, Attn: Desk Officer, U.S. Coast Guard.

Meeting. A public meeting will be held on July 23, 2003 in Washington, DC at the Grand Hyatt Washington, DC, 1000 H Street, NW., Washington, DC 20001.

Availability. You may inspect the material incorporated by reference at room 2110, U.S. Coast Guard Headquarters, 2100 Second Street SW., Washington, DC 20593-0001 between 8 a.m. and 4 p.m., Monday through Friday, except Federal holidays. The telephone number is 202- 267-0257. Copies of the material are available as indicated in the ``Incorporation by Reference'' section of this preamble.

FOR FURTHER INFORMATION CONTACT: If you have questions on this rule, call Commander Suzanne Englebert (G-M-1), U.S. Coast Guard by telephone 202-267-1103, toll-free telephone 1-800-842-8740 ext. 7-1103, or by electronic mail msregs@comdt.uscg.mil. If you have questions on viewing or submitting material to the docket, call Dorothy Beard, Chief, Dockets, Department of Transportation, telephone 202-366-5149.

SUPPLEMENTARY INFORMATION: Due to the short timeframe given to implement these National Maritime Transportation Security initiatives, as directed by the Maritime Transportation Security Act (MTSA) of 2002 (MTSA, Public Law 107-295, 116 Stat. 2064), and to ensure all comments are in the public venue for these important rulemakings, we are not accepting comments containing protected information for these interim rules. We request you submit comments, as explained in the Request for Comments section below, and discuss your concerns or support in a manner that is not security sensitive. We also request that you not submit proprietary information as part of your comment.

The Docket Management Facility maintains the public docket for this rulemaking. Comments and material received from the public, as well as documents mentioned in this preamble as being available in the docket, will be available for inspection or copying at room PL-401 on the Plaza level of the Nassif Building, 400 Seventh Street SW., Washington, DC, between 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays. You may also find this docket on the Internet at http://dms.dot.gov .

Electronic forms of all comments received into any of our dockets can be searched by the name of the individual submitting the comment (or signing the comment, if submitted on behalf of an association, business, labor unit, etc.) and is open to the public without restriction. You may also review the Department of Transportation's complete Privacy Act Statement published in the Federal Register on April 11, 2000 (65 FR 19477-78), or you may visit http://dms.dot.gov/.

Request for Comments

We encourage you to participate in this rulemaking by submitting comments and related material. Your comments will be considered for the final rule we plan to issue before November 25, 2003, to replace this interim rule. If you choose to comment on this rule, please include your name and address, identify the specific docket number for this interim rule (USCG-2003-14792), indicate the specific heading of this document to which each comment applies, and give the reason for each comment. If you have comments on another rule please submit those comments in a separate letter to the docket for that rulemaking.

You may submit your public comments and material electronically, by fax, by delivery, or by mail to the Docket Management Facility at the address under ADDRESSES. Please submit

[[Page 39241]]

your public comments and material by only one means. If you submit them by mail or delivery, submit them in an unbound format, no larger than 8\1/2\ by 11 inches, suitable for copying and electronic filing. If you submit them by mail and would like to know that they reached the Facility, please enclose a stamped, self-addressed postcard or envelope. We will consider all comments and material received during the comment period.

Public Meetings

We will hold a public meeting on July 23, 2003, in Washington, DC at the Grand Hyatt Hotel, at the address listed under ADDRESSES. The meeting will be from 9 a.m. to 5 p.m. to discuss all of the maritime security interim rules, and the Automatic Identification System (AIS) interim rule, found in today's Federal Register. In addition, you may submit a request for other public meetings to the Docket Management Facility at the address under ADDRESSES explaining why another one would be beneficial. If we determine that other meetings would aid this rulemaking, we will hold them at a time and place announced by a later notice in the Federal Register.

Regulatory Information

We did not publish a notice of proposed rulemaking (NPRM) for this rulemaking and are making this rule effective upon publication. Section 102(d)(1) of the MTSA requires the publication of an interim rule as soon as practicable without regard to the provisions of chapter 5 of title 5, U.S. Code (Administrative Procedure Act). The MTSA also states that any interim rule issued to implement its provisions shall expire on November 25, 2003, unless it has been superseded by a final regulation. The Coast Guard finds that harmonization of U.S. regulations with maritime security measures adopted by the International Maritime Organization (IMO) in December 2002, and the need to institute measures for the protection of U.S. maritime security as soon as practicable, furnish good cause for this interim rule to take effect immediately under both the Administrative Procedure Act and section 808 of the Congressional Review Act.

Background and Purpose

In the aftermath of September 11, 2001, the Commandant of the Coast Guard reaffirmed the Coast Guard's Maritime Homeland Security mission and its lead role--in coordination with the Department of Defense; Federal, State, and local agencies; owners and operators of vessels and marine facilities; and others with interests in our nation's Marine Transportation System--to detect, deter, disrupt, and respond to attacks against U.S. territory, population, vessels, facilities, and critical maritime infrastructure by terrorist organizations.

In November 2001, the Commandant of the Coast Guard addressed the IMO General Assembly, urging that body to consider an international scheme for port and shipping security. Recommendations and proposals for comprehensive security requirements, including amendments to International Convention for Safety of Life at Sea, 1974, (SOLAS) and the new ISPS Code, were developed at a series of intersessional maritime security work group meetings held at the direction of the IMO's Maritime Safety Committee.

The Coast Guard submitted comprehensive security proposals in January 2002 to the intersessional maritime security work group meetings based on work we had been coordinating since October 2001. Prior to each intersessional meeting, the Coast Guard held public meetings as well as coordinated several outreach meetings with representatives from major U.S. and foreign associations for shipping, labor, and ports. We also discussed maritime security at each of our Federal Advisory Committee meetings and held meetings with other Federal agencies having security responsibilities.

In January 2002, the Coast Guard also held a 2-day public workshop in Washington, DC, attended by more than 300 individuals, including members of the public and private sectors, and representatives of the national and international marine community (66 FR 65020, December 17, 2001; docket number USCG-2001-11138). Their comments indicated the need for specific threat identification, analysis of threats, and methods for developing performance standards to plan for response to maritime threats. Additionally, the public comments stressed the importance of uniformity in the application and enforcement of requirements and the need to establish threat levels with a means to communicate threats to the Marine Transportation System.

At the Marine Safety Committee's 76th session and subsequent discussions internationally, we considered and advanced U.S. proposals for maritime security that took into account this public and agency input. The Coast Guard considers both the SOLAS amendments and the ISPS Code, as adopted by IMO Diplomatic Conference in December 2002, to reflect current industry, public, and agency concerns. The entry into force date of both the ISPS Code and related SOLAS amendments is July 1, 2004, with the exception of the Automatic Identification System (AIS) whose implementation for vessels on international voyages was accelerated to no later than December 31, 2004, depending on the particular class of SOLAS vessel.

Domestically, the Coast Guard had previously developed regulations for security of large passenger vessels that are contained in 33 CFR parts 120 and 128. Complementary guidance can be found in Navigation and Vessel Inspection Circular (NVIC) 3-96, Change 1, Security for Passenger Vessels and Passenger Terminals. Prior to development of additional regulations, the Coast Guard, with input from the public, needed to assess the current state of port and vessel security and their vulnerabilities. As mentioned previously, to accomplish this, the Coast Guard conducted a public workshop January 28-30, 2002, to assess existing Marine Transportation System security standards and measures and to gather ideas on possible improvements. Based on the comments received at the workshop, the Coast Guard cancelled NVIC 3-96 (Security for Passenger Vessels and Passenger Terminals) and issued a new NVIC 4- 02 (Security for Passenger Vessels and Passenger Terminals), developed in conjunction with the International Council of Cruise Lines, that incorporated guidelines consistent with international initiatives (the ISPS Code and SOLAS). Additional NVICs were also published to further guide maritime security efforts, including NVIC 9-02 (Guidelines for Port Security Committees, and Port Security Plans Required for U.S. Ports), NVIC 10-02 (Security Guidelines for Vessels); and NVIC 11-02 (Security Guidelines for Facilities). The documents are available in the public docket (USCG-2002-14069) for review at the locations under ADDRESSES.

On November 25, 2002, President George W. Bush signed into effect Public Law 107-295, MTSA, 2002, which had been proposed to Congress the year before as the Port and Maritime Security Act (S. 1214). The MTSA requires the Secretary to issue an interim rule, as soon as practicable, as a temporary regulation to implement the Port Security section of the Act. The MTSA expressly waives the requirements of the Administrative Procedure Act, including notice and comment, for this purpose.

Nevertheless, the Coast Guard, in coordination with other agencies of the Department of Homeland Security

[[Page 39242]]

(DHS) (e.g., the Transportation Security Administration (TSA)) and the Department of Transportation (e.g., the Maritime Administration (MARAD)), held seven public meetings in areas of high maritime interest to engage the public in discussions about the impact of its maritime security requirements. Prior to issuing this interim rule, the Coast Guard wanted to receive preliminary comments that helped to structure the rulemakings published today. The seven public meetings were announced in a ``notice of meeting; request for comment'' document that was published in the Federal Register on December 20, 2002 (67 FR 78742). The comprehensive notice of meeting requested comments addressing 40 issues as well as comments on the concepts presented in the ISPS Code and the MTSA. Comments made during the public meetings and those submitted to the public docket are available in the public docket (USCG-2002-14069) for review at the locations under ADDRESSES. A discussion of these comments is contained in this preamble under the Discussion of Comments to Maritime Security Public Meetings. The Coast Guard plans to publish a final rule by November 2003. This date is critical to meeting the timeline set in the MTSA for finalizing these security requirements. It is just as critical in order to uniformly implement the ISPS Code and SOLAS amendments.

To comply with the mandates of the MTSA, the Coast Guard is implementing portions of section 102 of the MTSA (46 U.S.C. sections 70102, 70103b through 70103d, 70104, 70114, and 70117) through this and a series of five other interim rules published elsewhere in today's Federal Register. Within this common preamble, we will generally discuss each of the six interim rules. This common preamble will also discuss the National Maritime Transportation Security Plan, found in 46 U.S.C. 70103a, transportation security cards, found in 46 U.S.C. 70105, and foreign port assessments, found in 46 U.S.C. 70108, as they relate to the requirements established in the six interim rules.

Organization

As already stated, we have segmented the maritime security regulations into six separate interim rules. The entire series of rulemakings establishes a new subchapter H, containing six new parts, in Title 33 of the Code of Federal Regulations. For the ease of reading and comprehension, the rulemakings were written to highlight each segment of the maritime community and structured based on the organization of the regulations rather than in one single interim rule. A brief description of each of the six interim rules follows:

  1. Implementation of National Maritime Security Initiatives. This general discussion includes the introduction of the new subchapter H into Title 33 of the Code of Federal Regulations. It also discusses the General Provisions within part 101 of that subchapter, and reserves part 102 for the National Maritime Security plan and Advisory Committee requirements. This discussion covers the overall methodology we used to determine the appropriate application of security measures in accordance with the MTSA. A summary of the costs and benefits associated with implementing security requirements used for subchapter H are presented as well as a discussion of the security-related benefit for AIS. The requirements set out in this interim rule include the definitions for the entire subchapter and the provisions that pertain to all parts. It is strongly recommended that this interim rule be read prior to consulting one or more of the other specific parts or the AIS interim rule, which are published elsewhere in today's Federal Register, to ensure terms and applicability issues are understood. Additionally, the preamble to this interim rule includes a discussion of the comments made during the public meetings held on Maritime Security in January and February of 2003 and the comments submitted to the docket [USCG-2002-14069] that were received by February 28, 2003. All comments received after February 28, 2003, will be considered prior to the issuance of the final rules.

  2. Area Maritime Security (AMS). The discussion in the preamble of the ``Area Maritime Security'' (USCG-2003-14733) interim rule found elsewhere in today's Federal Register relates to the provisions within part 103 of subchapter H. Discussions about cost and benefit assessment for the Area Maritime Security regulations are also found in the Area Maritime Security preamble.

  3. Vessel Security. The discussion in the preamble of the ``Vessel Security'' (USCG-2003-14749) interim rule found elsewhere in today's Federal Register relates to the provisions within part 104, titled Vessel Security, of subchapter H. It also includes a discussion of the additional parts of 33 CFR and 46 CFR amended or revised by the Vessel Security interim rule. Discussions about cost and benefit assessments for the vessel security regulations are found in the preamble of the interim rule ``Vessel Security.''. Consistent with customary international law, the requirements in part 104 do not apply to vessels engaged in innocent passage through the territorial sea of the U.S. or in transit passage through the navigable waters of the U.S. that form part of an international strait.

  4. Facility Security. The discussion in the preamble of the ``Facility Security'' (USCG-2003-14732) interim rule found elsewhere in today's Federal Register relates to the provisions within part 105, titled Facility Security, of subchapter H. Discussions about cost and benefit assessments for the facility security regulations are found in the preamble of the interim rule ``Facility Security.''

  5. Outer Continental Shelf (OCS) Facility Security. The discussion in the preamble of the ``Outer Continental Shelf Facility Security'' (USCG-2003-14759) interim rule found elsewhere in today's Federal Register relates to the provisions within part 106, titled ``Outer Continental Shelf Facility Security,'' of subchapter H. Discussions about cost and benefit assessments for the OCS facility security regulations are found in the preamble of the interim rule ``Outer Continental Shelf Facility Security.''

  6. Automatic Identification Systems (AIS). The discussion in the preamble of the ``Automatic Identification System; Vessel Carriage Requirement'' (USCG-2003-14757) interim rule found elsewhere in today's Federal Register relates to the provisions within 33 CFR parts 26, 161, 164, and 165. These requirements relate to the fitting of AIS on certain vessels as mandated in 46 U.S.C. 70114 and MTSA section 102(e). Discussions about cost and benefit assessments for the AIS regulations with respect to both safety and security are found in the preamble of the interim rule ``Automatic Identification System; Vessel Carriage Requirement.''

    Coordination With the SOLAS Requirements

    For each interim rule, the requirements of the MTSA Section 102 align, where appropriate, with the security requirements embodied in the SOLAS amendments and the ISPS Code; however, the MTSA has broader application that includes domestic vessels and facilities. Thus, where appropriate, the Coast Guard intends to implement the MTSA through the requirements in the SOLAS amendments and the ISPS Code, parts A and B, for all vessels and facilities that are currently required to meet SOLAS, as well as those vessels on international voyages that fall below the mandated 500 gross tonnage, ITC (International Convention on Tonnage Measurement of Ships, 1969 (ITC)) threshold and facilities that are at risk of being

    [[Page 39243]]

    involved in a transportation security incident. Further discussion on this risk and how we developed and assessed it for the maritime community is presented in the Applicability of National Maritime Security Initiatives discussion in this preamble.

    In aligning the MTSA Section 102 requirements with the SOLAS amendments and the ISPS Code security requirements, we consider that the implementation of these requirements is best done through mandating compliance with the SOLAS amendments and the ISPS Code. The Coast Guard considers ISPS Code, part B, an essential element to ensure full and effective compliance with the intent of the MTSA. Foreign flag vessels entering the U.S. will be expected to carry valid International Ship Security Certificates (ISSC) and have the security plans fully implemented. The relevant provisions in ISPS Code, part B, will be taken into account by Port State Control Officers to assess if the security plan is fully implemented as required by the interim rules found elsewhere in today's Federal Register. The flag administration may also choose to provide a document or endorsement to the ISSC to verify that the security plan was based upon full compliance with the relevant provisions of ISPS Code, part B, to assist Coast Guard Port State Control Officers. We intend to implement strong Port State Control measures to aggressively enforce these regulations that will include tracking the performance of all owners, operators, flag administrations, recognized security organizations, charterers, and port facilities. Noncompliance will subject the vessel to a range of control and compliance measures, which could include denial of entry into port or significant delay. We will strictly enforce compliance with SOLAS and the ISPS Code for foreign SOLAS vessels, including assessing the risks posed by such vessels and any control measures that may be required when they call on foreign port facilities that do not comply with SOLAS and the ISPS Code, and we will similarly ensure that other vessels or port facilities covered by these regulations meet the requirements of this subchapter. A vessel's or port facility's history of compliance, or lack thereof, or security incidents involving a vessel or port facility, will be important factors in determining what actions are deemed appropriate by Coast Guard Port State Control Officers to ensure that maritime security is preserved. As mentioned, the performance of the owner, operator, flag administration, recognized security organization, charterer, or port facility related to maritime security will also be some of the other factors that will be considered for the enforcement of maritime security in the U.S.

    In addition to tracking performance, the Coast Guard's Port State Control program will also closely scrutinize an Administration's designation of recognized security organizations to ensure that those organizations fully meet the competencies and qualifications in the ISPS Code. Vessels with International Ship Security Certificates issued by recognized security organizations that are not properly designated, or that do not meet the required competencies and qualifications, will be subject to strict control measures, including possible expulsion from port and denial of entry into the United States. Therefore, it is imperative that Administrations carefully evaluate an organization through a rational process, adhering to the stringent criteria in the ISPS Code and any future standards that are developed by IMO, before designating the organization as a recognized security organization and delegating certain security functions to it.

    The requirements for the AIS interim rule found elsewhere in today's Federal Register align with the recent amendments to SOLAS Chapter V, Regulation 19 that were adopted during the IMO Diplomatic Conference in December 2002 and the MTSA (specifically, MTSA sec. 102(e) and 46 U.S.C. 70114).

    Impact on Existing Domestic Requirements

    Many current requirements for security exist that are impacted by the interim rules published in today's Federal Register. 33 CFR part 120, Security of Vessels, and 33 CFR part 128, Security of Passenger Terminals, currently exist but apply only to certain cruise ships. We do not intend to revise 33 CFR parts 120 or 128 in the Vessel Security interim rule found elsewhere in today's Federal Register. However, in the future, this part may be revised or entirely deleted. This will consolidate the security requirements for all vessels in subchapter H. If this change to 33 CFR part 120 is made, foreign vessels that are required to comply with part 120 will be required to meet the requirements of part 104 including Sec. 104.295 Additional requirements--Cruise Ships and passenger terminals that are required to comply with part 128 will be required to meet part 105.

    The requirements in the interim rules also refer to and amend certain parts of 46 CFR and 49 CFR to ensure certificate of inspection requirements and other sections pertaining to facilities will include the new subchapter H requirements.

    Notice of arrival requirements found in 33 CFR 160 have also been amended in the Vessel Security interim rule found elsewhere in today's Federal Register to ensure security-related information is provided to appropriate authorities prior to a vessel's entry into port. Additionally, the Captain of the Port (COTP) authorities within 33 CFR have been revised to ensure security-related elements and authorities are clearly highlighted.

    Applicability of National Maritime Security Initiatives

    As required in section 102 of the MTSA (46 U.S.C. section 70102a), the Coast Guard conducted an assessment of vessel types and U.S. facilities on or adjacent to the waters subject to the jurisdiction of the U.S. to identify those vessel types and U.S. facilities that pose a high risk of being involved in a transportation security incident. The MTSA defines a transportation security incident as a security incident resulting in a significant loss of life, environmental damage, a disruption to the transportation system, or economic disruption in a particular area.

    Method of Assessment

    In October 2001, the U.S. Coast Guard urgently needed to prioritize vessels and facilities based on the vulnerabilities to potential security threats and the consequences of potential incidents. We used a systematic, scenario-based process known as Risk-Based Decision Making (RBDM) to meet those needs. RBDM ensured a comprehensive evaluation by considering the relative risks of various target and attack mode combinations or scenarios. This provided a more realistic estimation of risk (and more efficient risk management activities) than a simple ``worst-case outcome'' assessment where only the worst possible consequences were considered.

    In addition, the RBDM approach was based on the recommendations from the U.S. General Accounting Office (GAO). Managing risk is one of the best tools to complete a security assessment and to determine appropriate security measures (GAO-01-822). The GAO recommended a comprehensive security threat and risk assessment process (GAO-01- 1158T).

    Another GAO report, Homeland Security: A Risk Management Approach Can Guide Preparedness Efforts, illustrated a scenario-based, risk

    [[Page 39244]]

    management approach as used within the private sector. This GAO report explained how a company successfully created a security plan using a risk-based approach. Like the company described in the GAO report, the Coast Guard's approach to commercial maritime security featured the systematic development and consideration of potential scenarios of concern. The generation of scenarios ensured completeness of the risk- based method (GAO/NSIAD-98-74).

    Principles of Risk Management

    Risk management principles acknowledge that while risk generally cannot be eliminated, it can be reduced. Risk reduction is done by adjusting operations to reduce consequences, threats, or vulnerability of a security threat (consequences, threats and vulnerability will be discussed later in this document). Generally, it is easier to reduce vulnerabilities by adding security measures than to reduce consequences or threats (although reductions in all three are possible).

    Risk assessments provide visibility into those elements of the risk equation that exert the greatest influence on risk. Those elements become the priorities in the risk management approach. The goal for maritime security is to ensure that if the level of threat increases, either the consequences or vulnerabilities decrease enough to offset that increase.

    Process of Developing Maritime Security Risk Assessments

    First, to look at risk from the port level, local experts in the area of commercial maritime safety and security met with a team of professional risk consultants. Together we developed the Port Security Risk Assessment Tool (PS-RAT). The PS-RAT was provided to local authorities to evaluate vessels, facilities and infrastructure within their areas of responsibility for a variety of threat scenarios. The approach used for the PS-RAT was as previously described and advocated by GAO, where risk was assessed in terms of threat, vulnerability and consequence. The PS-RAT was initially implemented Coast Guard wide on 16 November 2001 and the individual COTPs completed baseline risk assessments on vessels, facilities, and infrastructure within their area of responsibility. Nationwide, the local assessors evaluated nearly 5200 scenarios on more than 2000 unique assets and infrastructure elements.

    Second, at the area level, regional Coast Guard and other maritime experts in the area of commercial maritime safety and security compiled and analyzed the local level PS-RAT results to gain a better understanding of the security risks affecting their Coast Guard Districts and Areas. This assessment identified some recurring scenarios and common issues that needed to be addressed beyond the local level. It also helped clarify the need for another tool with a wider perspective that would be capable of evaluating risks at the national level.

    Because of the local, relative nature of these assessments the PS- RAT did not support the national comparisons that were necessary for strategic planning. To accomplish strategic planning at the national level, a third team of Coast Guard subject matter and risk experts produced the National Maritime Homeland Security Risk Assessment Tool. Referred to in maritime circles as the National Risk Assessment Tool (N-RAT), the N-RAT provided a foundation for risk-based prioritization and subsequent regulatory assessment closely aligned with the guidance on conducting security risk assessments recommended by the GAO (GAO/ NSIAD-98-74, GAO-02-150T, GAO-03-616T). The results of the N-RAT provided a national evaluation of the relative security risk facing the Marine Transportation System of the U.S. The experts compared the results from the national assessment with the previously performed local assessments (PS-RAT) to ensure that consistent assumptions were made and that comparable measures of risk were produced.

    What Was Assessed

    The Coast Guard used the N-RAT to determine risks associated with specific threat scenarios against various classes of targets within the Marine Transportation System. The targets considered included vessels, facilities, waterways, and marine-related transportation systems. This allowed the Coast Guard to systematically consider all segments of the commercial maritime community to evaluate their potential for being involved in a transportation security incident.

    Maritime Security Incident Scenarios

    The scenarios considered each element within the maritime community with respect to three general exposures: Susceptibility as a target; Use as a means of transferring or enabling the transfer of terrorists or terrorism-related materials; and Use of vessel or facility as a weapon.

    The three above-mentioned general threat scenarios integrate multiple circumstances considered as specific attack modes. That is, there are subordinate scenarios under each general scenario. For example in the basic threat scenario of ``susceptibility as a target'', a ``boat loaded with explosives exploding alongside a docked tank vessel'' is one attack mode while ``tank vessel being commandeered and intentionally damaged'' is another.

    The N-RAT included over 50 target classes and 12 specific attack modes. This resulted in a matrix consisting of over 600 possible target/attack scenarios. Next, the 600 scenarios were screened for credibility by the expert panel. The credibility of a threat was based on the plausibility of an enemy actually carrying out the attack mode. For example, the ``use as a means of transferring or enabling the transfer of terrorists or terrorism-related materials;'' scenarios were screened out as ``not credible attack modes'' for military targets due to the inherent security measures in place. However, external attacks on these same targets were considered to be credible and were evaluated by the team. To balance comprehensiveness with efficiency, all scenarios were considered but only those scenarios deemed credible by the expert panel were further evaluated for risk.

    Each credible threat scenario was evaluated by the panel of experts to determine the risk associated with a given attack against a specific target. The evaluation is based on a model showing the possible outcomes from any potential transfer or attack mode. Using previously cited GAO guidance in this area; the N-RAT risk was modeled as a function of the threat, vulnerability and consequences associated with each target/attack scenario. Each element is explained in the following sections. We realize that the terms used to identify each element may have recognized meanings in other contexts. In order to reduce confusion, we have included, as the first sentence in each element's discussion, the meaning associated with these terms for the purposes of the N-RAT.

    Threat

    The term ``threat'' is a measure of the likelihood of an attack. It represents the perceived probability of an attack based on maritime domain awareness and the existence of intelligence.

    Within the N-RAT, five threat levels were identified. The threat magnitude was described, and scoring benchmarks were provided for each level. Each benchmark of threat intensity was assigned a probability of occurrence for use in risk calculations. For each scenario, the experts estimated the threat associated with an attack after considering the intent of hostile groups, prior security incidents, the capability

    [[Page 39245]]

    to carry out the attack mode and any intelligence that indicated an organization was planning an attack. Lacking specific, credible intelligence that would allow an increase or reduction in the threat score for a specific attack mode, this was fixed at a constant value consistent with the Maritime Security (MARSEC) Levels previously established by the Coast Guard. The baseline assumption was that terrorist cells were operating with unknown targets and methods of attack. Changes in MARSEC Levels or specific, credible intelligence would trigger an appropriate modification in threat.

    Vulnerability

    The term ``vulnerability'' measures the conditional probability of success given that a threat scenario occurs. It evaluates the adequacy and effectiveness of safeguards (both existing and proposed).

    For the N-RAT, an attack was estimated as likely to succeed only if: the target was available, the target was physically accessible to be attacked, organic security associated with the target would not detect and defeat the intended attack, and the mode of attack would be capable of producing the intended consequences by overcoming the inherent safeguards designed into the system.

    If all of the above mentioned barriers fail to halt the intended attack, then the attack would result in one or more outcomes. Outcomes ranged from relatively minor to catastrophic levels. The above mentioned four elements described the targets' overall vulnerability and were scored by the expert team.

    The availability of a target measured its presence and predictability as it relates to an enemy's ability to plan and conduct an attack. The accessibility of a target, evaluated its physical deterrence (i.e., location, perimeter fencing, etc.) against different attack modes. It related to physical and geographic barriers that deter the threat without organic security. Organic security of a target assessed the ability of the target's security measures to deter the attack. It included security plans, communication capabilities, guard forces, intrusion detection systems, and ability of outside law enforcement to prevent the attack. Target hardness was a measure of the ability of a target to withstand attack. It is based on the complexity of target design and material construction characteristics.

    Each vulnerability type was scored over five levels of magnitude (1-5--lowest to highest). Again, scoring benchmarks were used to help ensure consistency. Each level of magnitude in every vulnerability category was assigned a probability of allowing an attack mode to proceed. The probability for each vulnerability category was factored, along with the threat probability, in risk calculations to determine the probability term of the risk equation. The individual probabilities were then multiplied together to derive the overall probability assessment for the target/attack scenario under consideration.

    Consequence

    The term ``consequence'' is the estimation of adverse effect from the target/attack scenario and is an important consideration in risk evaluation and security planning. Six categories of effects were considered in evaluating the consequence of an attack: death/injury, economic, environmental, national defense, symbolic effect, and secondary (follow-on) national security threat. Inherent in this consideration was the criticality of the target. For each effect category, five levels of severity were described, and scoring benchmarks are provided. Unlike vulnerability, each severity level was assigned a common consequence value for use in risk calculations. For example, the most severe economic impact consequences were considered equivalent to the most severe death/injury and symbolic effect consequences. The selected level for each factor was then converted to a representative value of potential loss for the consequence factor. These consequence scores were then summed across all appropriate categories to develop the consequence values for the target/attack scenario combination.

    The estimated probability and consequence values were multiplied to calculate the overall risk for each target/attack scenario. This is essentially an estimate of the expected losses should a specific target/attack scenario occur.

    Assessment Results

    The following graph is a demonstration of the type of the relative- risk results the N-RAT gave. Specific results, including scores, have been designated as sensitive security information (SSI). This graph simply displays the relationship between some types/classes of vessels and facilities or port infrastructure based on their relative risk. In each line, the parenthetical (I) and (D) stands for ``international'' or ``domestic,'' respectively. BILLING CODE 4910-15-U

    [[Page 39246]]

    [GRAPHIC] [TIFF OMITTED] TR01JY03.000

    BILLING CODE 4910-15-C

    Below is a summary of the application requirements for these interim rules based on the N-RAT results:

    Applicability Evaluation for Ports

    The N-RAT results focused on individual vessel types and facilities subject to the authority of the Coast Guard. Scenarios were also developed that involved port transportation infrastructure that is vital to the port communities such as bridges, channel openings, and tunnels. This evaluation led to the conclusion that many structures within a port are also at risk of a transportation security incident and therefore should be covered by security measures. Therefore, we determined it would be appropriate to include specific guidance in part 103 to have the Area Maritime Security (AMS) Plan address these types of transportation infrastructure as well as those smaller vessels or facilities that fall below the transportation security incident threshold. This application for the AMS ensures all maritime concerns are assessed and security is systematically evaluated nationwide.

    Applicability Evaluation for Vessels

    The N-RAT results indicate the following vessel types are at a high risk of a transportation security incident and therefore are required to meet specific security measures as laid out in part 104 of subchapter H:

    [sbull] All ships, both cargo and passenger, that are subject to SOLAS;

    [sbull] All vessels greater than 100 gross register tons that are subject to 46 CFR subchapter I (this includes vessels on the Great Lakes);

    [sbull] All barges subject to 46 CFR subchapter I engaged on an international voyage;

    [sbull] All domestic passenger vessels subject to 46 CFR subchapters H and K;

    [sbull] All barges, regardless of route, which are subject to 46 CFR subchapter D and O;

    [sbull] All tank ships, regardless of route, which are subject to 46 CFR subchapters D and O;

    [sbull] All Mobile Offshore Drilling Units (MODUs) subject to 46 CFR subchapter I-A;

    [sbull] All vessels subject to 46 CFR subchapter L;

    [sbull] All towing vessels greater than 8 meters in registered length that are engaged in towing barges which are subject to 46 CFR subchapter D & O; and

    [sbull] All towing vessels greater than 8 meters in registered length that are

    [[Page 39247]]

    engaged in towing barges that are subject to 46 CFR subchapter I on an international voyage.

    The N-RAT results indicate that the following vessel types are at a lower risk of a transportation security incident and are therefore subject to parts 101 through 103 of subchapter H:

    [sbull] Uninspected vessels, unless otherwise noted;

    [sbull] Domestic small passenger vessels certificated under 46 CFR subchapter T;

    [sbull] Barges subject to 46 CFR subchapter I engaged exclusively on domestic voyages;

    [sbull] Towing vessels engaged in towing 46 CFR subchapter I barges not on international voyages;

    [sbull] Vessels certificated under 46 CFR subchapter I engaged exclusively on domestic voyages;

    [sbull] Fleeting tugs or harbor tugs; and

    [sbull] Other vessels not specifically addressed in part 104 (as an example, recreational vessels).

    The inclusion of towing vessels (traditionally included with other uninspected vessels) was done because these vessels interface with and are responsible for the movement of barges that carry higher consequence cargoes, such as Certain Dangerous Cargoes (CDCs). When scored on the N-RAT, the high consequence of the barge cargoes significantly adds to the risk of a transportation security incident for the towing vessel.

    The N-RAT was not able to provide the sensitivity needed to assess certain elements of the definition of a transportation security incident. For example, the transportation security incident calls for a determination of what the term ``significant loss of life'' should be or where the threshold for an ``economic disruption in a particular area'' should be placed. In order to determine these elements of a transportation security incident, the Coast Guard used the N-RAT model itself as a guide along with a comparison with other transportation modes. We also used the preliminary intermodal comparison work of the other agencies of the DHS (e.g., TSA).

    First, using the N-RAT, we assessed what consequences or combination of consequences would result given a vessel, facility, or port structure that had a high baseline vulnerability. Recalling from the previous N-RAT explanation that the consequence assessment portion of the N-RAT evaluation was based on six categories and five levels (as shown in Table 2), we looked at the numerical results of a scenario when given some vulnerability benefits assumed for implemented AMS Plans, and other general security measures in place for a port.

    Table 2.--Consequence

    Economic Environmental National

    Symbolic Follow-on HLS Consequence category--Level

    Death/injury impact

    impact

    defense

    effect

    threat

    Catastrophic

    High

    Medium

    Moderate

    Low

    The results showed that a score of at least one consequence factor at the ``Catastrophic'' level or a combination of two ``High'' scores could not be offset by the vulnerability reduction achieved by the AMS Plan or general port security efforts. The risk to these types of vessels, facilities, or port structures would need further vulnerability reduction to get out of the potentially ``Catastrophic'' or ``High'' consequence arena. This then, is the threshold that the Coast Guard determined could be considered a transportation security incident.

    To further determine the thresholds of a transportation security incident with respect to the ``loss for life'' category, the Coast Guard compared the potential loss of life between various transportation modes and various operations. To look at the ``economic disruption'' category of transportation security incident as well as its other elements, we looked at damage and casualty data to determine if comparisons between modes could be used to formulate thresholds based on vessel size.

    Passenger Vessel Threshold Determination

    To compare potential loss of life between transportation modes, we examined probable fatalities given an accident to the air, rail, or maritime mode. The first step in this process included a comparison of the current regulatory and operational thresholds that currently exist in each industry.

    In aviation, regulations cover aircraft carrying 20 or more passengers as a commuter airline (14 CFR part 125). Most commercial aircraft are larger than this smaller commuter, with 69 percent of the U.S. market dominated by an aircraft with a capacity of 189 passengers.

    In rail, we considered transit service (light, heavy, or commuter) and long-haul rail travel. Light rail can carry up to 150 passengers in each car of the train. Heavy rail cars typically carry 100 passengers, though they can carry twice that many during periods of peak traffic. Commuter rail cars carry an average of 125 passengers, with peak capacities of over 200 passengers per car for certain seating configurations. Inter-city rail passenger coaches typically carry about 80 passengers per car depending on the configuration. The average train length is reported to be 6 to 8 cars.

    In the maritime passenger trade, we have small passenger vessels, commuter ferries of all sizes, large passenger vessels, and cruise ships. The average passenger capacity on small passenger vessels is 49. The average capacity for commuter ferries is 587 and for large passenger vessels the average capacity is 1154 passengers.

    Looking at casualty statistics for these three modes and different passenger operations, we estimated the probable fatalities given a successful transportation security incident occurred. We assume that, in general, a transportation security incident would have a higher fatality rate than that of an accident because of the hostile motivation behind perpetrators' actions deliberately produce more severe consequences. For aircraft, the more severe airline crashes were used to estimate the transportation security incident fatality rate. The hostile intent

    [[Page 39248]]

    may also render certain safety measures less effective in a transportation security incident compared to their demonstrated performance in an accident. We also considered average occupancy rates for each mode into the calculations to estimate a relative potential loss of life comparison. The table below compares the average estimated fatality rates across modes for various passenger-carrying operations.

    Table 3.--Comparison of Estimated Fatalities by Mode and Type of Incident

    Representative Estimated Estimated Fatality average rate \1\ (in Estimated average fatalities passenger

    average

    average

    percent)

    Mode

    capacity

    occupancy occupancy -------------------------------- (potential (percent of (number of

    Accident

    TSI fatalities) capacity) passengers) Accident

    TSI

    Air (14 CFR 135) Commuter Plane.........

    80

    78

    62

    74

    80

    46

    50 Air (14 CFR 121) Large Pass. Plane......

    189

    75

    142

    74

    80

    105

    113 Rail (single commuter car)..............

    180

    66

    119

    5

    25

    6

    30 Rail (6 car commuter Train).............

    1080

    66

    713

    5

    25

    36

    178 Rail (8 car long-haul Pass. Train)......

    640

    66

    422

    5

    25

    21

    106 Maritime \2\............................ (Subchapter H) Large Pass. Vessels (100 GT)......................... Maritime \2\ (Ferries--Sub. H & K)......

    587

    72

    423

    32

    46

    135

    194 Maritime \2\ (Subchapter T) Small Pass.

    49

    72

    35

    32

    46

    11

    16 Vessels (USCG-2002-12917. We requested comments in the notice of whether changes to this clarification were needed or if other forms of identification should be recognized in the interim.

    Many commenters suggested that we accept merchant mariner documents (MMD) and facility-issued ID cards as a form of identification. Some commenters stated that the existing requirements the Coast Guard set out in its clarification notice are sufficient until the TWIC project is complete. The majority of commenters submitted specific recommendations or suggestions with regard to the TWIC.

    Under the current clarification notice, identification such as an MMD or a facility-issued card meeting the requirements set out in the notice are acceptable. Based on the lack of comments requesting amendments to the clarification, we will not amend the requirements at this time. We have incorporated them into this interim rule in order to ensure personal identification is addressed in subchapter H. We will also continue furthering the identification efforts at ILO and through the TWIC project. Comments received on this docket that relate to the TWIC project have been

    [[Page 39265]]

    forwarded to the Transportation Security Administration's docket on that subject for consideration under that rulemaking, as appropriate.

  7. Advanced Notice of Arrival (ANOA) Requirements. In our notice of meeting, we discussed that the Coast Guard had a notice of proposed rule titled ``Notification of Arrival in U.S. Ports'' published in the Federal Register on June 19, 2002 (67 FR 41659). In the meeting notice, we discussed our intent to review the notification requirements based on the additional provisions contained in the SOLAS amendments and the ISPS Code and asked for comments relating to these provisions (specifically SOLAS Chapter XI-2 Regulation 9). Additionally, we requested comments on how foreign flag vessel owners or operators could provide us advance notification on their compliance with the ISPS Code, part B. Finally, we asked if any notification requirements for the upper Mississippi River (above mile marker 235) should be considered for security purposes.

    Several commenters suggested that it would be difficult for the vessel to provide the proper information mentioned in the SOLAS amendments or the ISPS Code. Several other commenters stated that the ANOA would be the proper place for a vessel to affirm that it is in compliance with the ISPS Code. Several comments were submitted with respect to the NOA rulemaking published in the Federal Register on June 19, 2002 (67 FR 41659). Several commenters expressed reservation at the value of requiring ANOA above mile marker 235 on the Mississippi River or any other remote locations and suggested it not be required.

    We have reviewed the issue and currently believe that an alternative process being developed locally could be more effective. We are incorporating notice of arrival requirements in the Vessel Security interim rule found elsewhere in today's Federal Register to capture the information needed to assess a vessel's compliance with the security requirements of SOLAS Chapter XI-2 and the ISPS Code. The reporting requirements are similar to those required when the International Safety Management Code was implemented and will allow us to have the basic information needed for the evaluation of vessel's security compliance prior to the vessel entering port. Since the publication of the notice of meeting, the Coast Guard published its final rulemaking titled ``Notification of Arrival in U.S. Ports'' published in the Federal Register on February 28. 2003 (68 FR 9537). Comments submitted to the public meeting notice that related to the proposed Notification of Arrival (NOA) rulemaking docket were not considered, because the proposed rulemaking comment period for the NOA rulemaking closed prior to the end of the public meeting notice comment period. As for the Mississippi River above mile marker 235 and other remote location reporting requirements, the interim rule does not add any further requirements to the notice of arrival requirements. We will continue reviewing notice of arrival information and the reporting requirements in the future to determine if further requirements are needed to ensure the security provisions are covered. Any additional requirements would be proposed in a future rulemaking.

  8. Foreign Port Assessments. In our notice of meeting, we discussed Section 102 of the MTSA (46 U.S.C. 70108) which requires the Secretary to assess the effectiveness of antiterrorism measures maintained at a foreign port that serves vessels departing on a voyage to the U.S. In the notice, we discussed the concept of accepting a foreign government's approval of the respective port facility security plans, thereby attesting to their compliance with SOLAS and the ISPS Code, to provide the initial assessment of that foreign port's antiterrorism security. We also suggested that we were considering any other relevant information or the possibility of conducting audits in foreign ports and requested comments on these ideas.

    Several commenters stated that accepting the foreign government's approval of a port facility security plan supports the international provisions and places the responsibility in the proper place. Many commenters did ask how the U.S. would keep track of those not meeting their obligations internationally with respect to the port facility requirements in SOLAS Chapter XI-2 and the ISPS Code. Many commenters also stated that the level of compliance of a facility would be directly related to the importance the Contracting Government places upon their obligations to meet the ISPS Code requirements.

    It is each Contracting Government's responsibility to ensure compliance; however, it remains our intent to verify the compliance of foreign port facilities in the future and we will work with relevant Contacting Governments to facilitate these evaluations. In the ``Area Maritime Security'' (USCG-2003-14733) interim final rule found elsewhere in today's Federal Register, recognition of another Contracting Government's port facility security plan is discussed. However, as mentioned, those vessels calling on foreign port facilities that do not meet the requirements of SOLAS and the ISPS Code may be subject to control and compliance measures, even if the vessel itself has a valid ISSC and an approved security plan.

  9. Automatic Identification System (AIS) Requirements. In our notice of meeting, we discussed regulation V/19 of SOLAS, which sets forth the international requirements for the carriage of AIS, including an implementation schedule that was recently accelerated by the newly adopted amendments to SOLAS. Domestically, section 102 of the MTSA (46 U.S.C. 70114) gives the Secretary additional broad discretion to require AIS on any vessel operating on the navigable waters of the U.S. if necessary for the safety of navigation. In the notice, we discussed our consideration of AIS for security purposes as an essential element in ensuring the safety of navigation. We also noted that the Department of Transportation's Fall 2002 Unified Agenda (67 FR 74853, December 9, 2002), reflected a separate AIS notice of proposed rulemaking (NPRM) which we anticipated publishing during the early months of 2003. However, since the SOLAS amendments made in December 2002 and the MTSA enactment directly impacted this intended notice of proposed rulemaking, which had not taken into account the provisions of the MTSA, we withdrew the NPRM from consideration to assess the impact of both and evaluate options for further development. We did ask for comments in the notice of public meetings on whether certain vessel types currently listed in the MTSA AIS requirements should be considered candidates for exemption or if the MTSA AIS application was too limited and should be expanded. We also requested comments on whether there are navigable waters of the U.S. where the AIS carriage requirement should be waived because no security benefit would be derived from the requirement.

    Several commenters stated that they believed small passenger vessels should not be required to carry AIS due to the equipment expense. Several other commenters asked that certain vessel types such as fleeting tugs, commercial assistance tugs, barges, and vessels of gross tonnage less than 300 on domestic voyages be exempted from the regulations. In contrast, a few commenters suggested that all vessels be required to carry AIS. Several other commenters provided specific areas and types of operations where the system

    [[Page 39266]]

    would be beneficial. A series of commenters asked what the policy would be if the SOLAS dates and the MTSA dates were in conflict. Several comments also suggested that vessels operating on remote waterways not be required to carry the system because it was not of any value to the safe navigation of the vessel.

    We believe that the MTSA AIS application is consistent with SOLAS and the domestic application is appropriate for the safety and security of navigation within our ports and waterways. Therefore, we have included this application in the AIS interim rule and notice for comment found elsewhere in today's Federal Register. We have also included a process for vessel owners and operators to request to waive or exempt the AIS requirements.

    Several comments were submitted that did not reflect the questions asked; however, a few are germane to the general subject of security. A few commenters asked how the Coast Guard intends to receive the AIS signal. A few commenters questioned the security of AIS and stated that they believed it could be used against a vessel or a port by terrorists; these comments went on to suggest that AIS had no benefit from a security aspect and was not applicable. Several commenters also proposed alternatives to AIS at different MARSEC Levels. Finally, a few commenters strongly suggested that we not require AIS in an interim rule but rather issue a notice of proposed rulemaking to ensure adequate notice and comment for this equipment requirement.

    We believe that there are quantifiable security and safety benefits from AIS. We are currently upgrading the Vessel Traffic Service (VTS) systems within the ports to be able to receive and process AIS information. As for the security of AIS, the signal is not secure however; we believe that the benefit of being able to quickly identify and warn mariners about threats directly related to their vessels out weighs the potential security gap presented by AIS's open broadcast nature. We are not considering alternates to AIS for those vessels that are not included in the MTSA requirements but have requested comments on the AIS equipment standards and requirements as well as nationwide implementation in the notice for comments on AIS that is found elsewhere in today's Federal Register. In the future, we may explore other long range tracking alternates and we will continue work in expanding AIS functionality (e.g., long range communication interfacing) and progeny (e.g., AIS Class A derivatives, AIS Class B), in pursuit of other options for those vessels not required to have AIS though could benefit from the safety and security aspects of this technology.

    We thoroughly considered the option of issuing a notice of proposed rule for AIS prior to issuing the interim rule found elsewhere in today's Federal Register. Based on the strong language of section 102(d) of the MTSA, which includes ``The Secretary shall issue an interim final rule as a temporary regulation implementing this section * * * as soon as practicable after the date of enactment of this section, without the regard to the provisions of chapter 5 of title 5, * * *'', we determined that AIS, as part 102, needed the same accelerated treatment as the other security requirements presented in the interim rules issued by the Coast Guard and found elsewhere in today's Federal Register. We have provisions for comments to this interim rule and will consider your input prior to the final rulemaking. Additionally, we have included a separate notice of comment found elsewhere in today's Federal Register to ensure that vessel owners and operators are afforded ample opportunity to comment on this equipment carriage requirement in the broad nationwide application that MTSA suggests.

    Discussion of Interim Rule

    This Interim rule establishes parts 101 and 102 in new subchapter H to title 33 of the Code of Federal Regulations. It provides the General Provisions for all of subchapter H, and is broken down into five subparts, which we will now discuss in order.

    Part 101--Subpart A--General

    Subpart A, section 101.100 explains the purpose behind all of the Regulations found in subchapter H. That purpose is to increase the level of maritime security found in our nation's ports, while at the same time aligning our domestic maritime security regulations with international standards, wherever such alignment is appropriate. These regulations should dissuade those persons or groups that would seek to disrupt the maritime elements of the national transportation system by ensuring that security arrangements are as compatible as possible for vessels trading internationally.

    Subpart A, section 101.105 goes on to define the terms that are used in subchapter H. Definitions found in this section of part 101, subpart A are applicable to the entire subchapter. We have included all definitions in part 101 in order to give the reader a common place for reference, a ``one stop shopping'' of sorts.

    Many of the definitions are self-explanatory, so we have not gone into detail about them here. For brevity, we are limiting this discussion to those definitions that we think may be confusing or novel. For instance, the MTSA and the ISPS Code use different terms to define similar, if not identical, persons or things. These differing terms sometimes match up with the terms used in subchapter H, but sometimes they do not. Thus, in some definitions you will find references to other terms, used in the MTSA or the ISPS Code. We are including a table of these terms here, for easy reference.

    Table 4.--Equivalent Terms

    Subchapter H terms

    USCG terms

    MTSA terms

    ISPS code terms

    Plans

    Area Maritime Security (AMS) Plan.... Port Security Plan..... Area Maritime Security Port Facility Security Transportation Plan. Plan. Vessel Security Plan................. Vessel Security Plan... Vessel Security Plan... Ship Security Plan. Facility Security Plan............... Facility Security Plan. Facility Security Plan. None.

    Assessments

    Area Maritime Security (AMS)

    Port Security

    None................... Port Facility Security Assessment.

    Assessment.

    Assessment. Vessel Security Assessment........... Vessel Security

    Vessel Security

    Ship Security Assessment.

    Assessment.

    Assessment.

    [[Page 39267]]

    Facility Security Assessment......... Facility Security

    Facility Security

    None. Assessment.

    Assessment.

    People

    Captain of the Port (COTP)........... Captain of the Port Federal Maritime

    Port Facility Security (COTP).

    Security Coordinator Officer (PFSO). (FMSC). Company Security Officer............. Company Security

    Company Security

    Company Security Officer.

    Officer.

    Officer. Vessel Security Officer.............. Vessel Security Officer Qualified Individual... Ship Security Officer. Facility Security Officer............ Facility Security

    Qualified Individual... None. Officer. Area Maritime Security (AMS)

    Port Security Committee Area Maritime Security None. Committee.

    Advisory Committee.

    We defined ``company'' broadly in order to ensure that we captured all persons and/or legal entities that may in fact own or operate a vessel or facility under this subchapter. We did not list out specific legal entities, in order to avoid unintentionally omitting one, making enforcement more difficult as new legal entities are created. We interpret our definition to include the following legal entities: Corporations, partnerships, business trusts, associations, joint ventures, sole proprietorships, and unincorporated organizations.

    We chose the term ``dangerous substances and devices'' for specific reasons. The ISPS Code uses the phrase ``weapons, dangerous substances or devices'' when identifying the intent of certain security measures. We use dangerous substances and devices because these interim rules do not prohibit weapons that are carried in accordance with the applicable local, State, or federal laws. However, vessel or facility owners or operators, in their own proprietary capacity, may prohibit lawfully possessed weapons as a condition of carriage/entrance. They may also develop and implement procedures whereby weapons and ammunition are temporarily relinquished to the vessel or facility owner or operator and placed in a secure location for the duration of the voyage or stay at the facility. The Coast Guard will retain the authority to impose restrictions on owners or operators when necessary to ensure safety or security, or to secure the observance of rights or obligations of the U.S., especially at heightened threat conditions. The Coast Guard is working with DHS (e.g., TSA) to develop an intermodal policy regarding items that passengers may be prohibited from carrying. The policy is still being developed but may affect the carriage of certain weapons onboard certain passenger vessels.

    We defined ``international voyage'' to include those vessels that solely navigate the Great Lakes and the St. Lawrence River as far east as a straight line drawn from Cap des Rosiers to West Point, Antiocosti Island and, on the north side of Anticosti Island, the 63rd meridian.

    We chose to apply length thresholds using the definition of ``registered length'' instead of overall length, under the authority of 46 U.S.C. 70114(2). This was done to facilitate enforcement and minimize confusion for vessel owners. Registered lengths are assigned for all documented vessels of the U.S. and appear in Coast Guard databases and on Certificates of Documentation. Conversely, overall lengths can vary as a function of voyage type, and are not assigned for all documented vessels of the U.S. In many cases the two definitions coincide, and where they do not coincide, the registered length is slightly less than overall length.

    We have expressed gross tonnage thresholds in one of two ways. If the threshold must be applied using the vessel's gross tonnage measurement under 46 U.S.C. Chapter 143, Convention Measurement, the threshold is expressed in terms of ``gross tonnage, ITC.'' If the threshold must be applied using the vessel's gross tonnage measurement under 46 U.S.C. Chapter 145, Regulatory Measurement, the threshold is expressed in terms of ``gross register tons.'' For those vessels that only have a gross tonnage, ITC measurement, yet the requirement calls for a gross register tons threshold, then the gross tonnage, ITC measurement must be used.

    We have included a definition of the phrase ``Maritime Security (MARSEC) Level,'' as well as definitions for each individual MARSEC Level. MARSEC Level, in general, refers to the prevailing threat environment to the maritime elements of the national transportation system. As the threat of a transportation security incident increases, the individual MARSEC Level moves higher, from one to three. Additional discussion on the concept of MARSEC Levels and how they interplay with DHS's HSAS is included below in the discussion for subpart B.

    We have also defined a new document, called a Maritime Security (MARSEC) Directive. All MARSEC Directives will qualify as SSI under 49 CFR 1520.7 of the Transportation Security Administration interim rule on SSI, that will be published in the near future. Once published, we will post a copy of this interim rule to the docket. The Coast Guard MARSEC Directives will be consistent with the National Transportation System Security Plan (NTSSP) and in accordance with Transportation Security Directives, as established by the Transportation Security Administration. Additional discussion on what a MARSEC Directive is, how MARSEC Directives will be issued and the proper response to a MARSEC Directive is included below in the discussion for subpart D.

    We have adopted the MTSA definition for ``transportation security incident.'' We also adopted the ISPS Code definitions for ``Company Security Officer'' and ``Vessel Security Officer.'' Using these two definitions as our basis, we were able to also define ``Facility Security Officer.''

    We have also defined the phrase ``waters subject to the jurisdiction of the U.S.'' to include the navigable waters of the U.S., the Exclusive Economic Zone (EEZ), the seabed and subsoil of the OCS of the U.S. and the resources thereof and the waters adjacent thereto.

    Subpart A section 101.110 sets the applicability for all of subchapter H. As stated, it is very broad, covering all vessels, structures, and facilities of any kind, located in, on, or adjacent to waters subject to the jurisdiction of the U.S. This broad application is necessary to cover all entities affected by at least one part of new subchapter H. Each individual part contains a separate applicability section, which is more

    [[Page 39268]]

    narrow than that contained in the General Provisions of part 101.

    In section 101.115 we have incorporated by reference the ISPS Code, 2003 Edition. Specifically, we are incorporating the amendments adopted on 12 December 2002 to the Annex to The International Convention for SOLAS, 1974 and the ISPS Code, parts A and B, also adopted on 12 December 2002. The material is incorporated for all of subchapter H.

    Sections 101.120 and 101.125 of subpart A reflect the flexibility that the Coast Guard has tried to build into these regulations. Section 101.120(a) reflects one of the SOLAS amendments, and allows the U.S. to agree upon alternative security arrangements with other SOLAS contracting governments, but only to cover short, international voyages on fixed routes between facilities subject to the jurisdiction of the U.S. and facilities subject to the jurisdiction of the other contracting government. Any vessel covered by one of the agreements is prohibited from engaging in any vessel-to-vessel activity, unless it would be conducting the vessel-to-vessel activity with another vessel covered by the same agreement.

    Section 101.120(b)-(c) allows applications for approval of Alternative Security Programs. As noted in the discussion of comments section above, we received many comments supporting the idea of allowing vessels or facilities to submit security plans or programs that meet, as an example, an industry standard, instead of requiring them to follow the plan requirements included in this subchapter, SOLAS, or ISPS Code, parts A and B. We have, accordingly, built this flexibility into the regulation. Once an Alternative Security Program is approved, it will be added to Section 101.125. An up-to-date list will also be kept by G-MP, and will be accessible on the Internet.

    Section 101.120(c) details the information that must be included in an application for approval. Part of that application includes an assessment of what vessels or facilities may use the proposed Alternative Security Program. This is important because not all Alternative Security Program will be appropriate for all vessels or facilities. For example, not all approved Alternative Security Programs for facilities will fit the security planning requirements necessary for a CDC facility. As part of the approval process, the Commandant will indicate, in his approval letter, those types of vessels or facilities that may use the approved Alternative Security Programs.

    Section 101.130 allows the Commandant to accept equivalent security measures, so long as they are at least as effective as those that are mandated in subchapter H, SOLAS, or ISPS Code, parts A and B. This allowance is made for both vessels and facilities required to have security programs under parts 104, 105, or 106. Equivalent security measures differ from Alternative Security Programs. Once an Alternative Security Program is approved, any vessel or facility that meets the approval qualifications may meet the provisions of the Alternative Security Program in lieu of meeting the security plan requirements of the applicable part of this subchapter. Equivalent security measures, once approved, are only approved for the particular vessel or facility making the application.

    Equivalent security measures are those distinct security measures, such as fences or alarm systems, which may be required within a security plan. Requests for approval of equivalent security measures should be made at the time that a vessel or facility is submitting their security plan for approval, and they should be made to the appropriate plan approval authority under part 104, 105, or 106.

    Part 101--Subpart B--Maritime Security Levels

    The SOLAS Amendments and ISPS Code lay out a series of requirements for Contracting Governments and Administrations to mandate security levels that are appropriate for their vessels and ports. The Coast Guard is implementing these requirements in coordination with the HSAS. Homeland Security Presidential Directive (HSPD)-3 defines a five-tiered system for setting threat levels. We are implementing MARSEC Levels, which directly correspond to the security levels as discussed in the SOLAS amendments and the ISPS Code. The MARSEC Levels will be linked to the HSAS as shown in the table below. This table is also included in the regulation itself.

    Table 5.--Relation Between HSAS, MARSEC Levels and SOLAS-Required Security Levels

    Homeland security advisory Equivalent maritime security (MARSEC) Equivalent SOLAS-required security system (HSAS) threat condition

    level

    level

    Low: Green..................... Maritime Security Level 1.............. Security Level 1. Elevated: Blue................. Guarded: Yellow................

    High: Orange................... Maritime Security Level 2.............. Security Level 2.

    Severe: Red.................... Maritime Security Level 3.............. Security Level 3.

    At all times, the Commandant retains the discretion to adjust the MARSEC Level when necessary to address any particular concerns or circumstances related to the maritime elements of the national transportation system. Additionally, the COTP retains the authority to temporarily raise the MARSEC Level for his/her AOR, or a specific segment thereof, when necessary to address exigent circumstances immediately affecting the security of the maritime elements of the national transportation system within his/her AOR.

    Part 101--Subpart C--Communication

    Subpart C, section 101.300 details the methods the COTP will use to communicate changes in the MARSEC Level. Note that individual ATMS Plans may outline additional communication methods that are particular to the Plan's covered area. It also details the threat information that the COTP will, when appropriate, communicate to the port stakeholders, vessels, and facilities located within his or her AOR. Finally, this section requires vessel and facility security plan holders to confirm that they have implemented the measures and/or actions in their security plans that correspond to the MARSEC Level.

    Subpart C, section 101.305 describes the reporting requirements placed on vessel and facility security plan holders. First, it requires that they report suspicious activities that may result in a transportation security incident. These reports are to be made to the National Response Center (NRC), and the

    [[Page 39269]]

    regulation lists several methods of contacting the NRC. We also require that security plan holders call the NRC to report breaches of security. This captures a broader range of activities that, while not severe enough to pose a threat of a transportation security incident, are still considered serious. Examples of breaches of security include attempts to smuggle dangerous substances or devices onto a facility or vessel, attempts to break into the facility or vessel, or attempts to tamper with, alter, or mix cargos. They would not, however, include acts of vandalism.

    It is advised, although not required, that vessel and facility security plan holders familiarize themselves with the type of information that will be asked of them when placing a call to the NRC. They may do this by visiting the NRC's Web site at http://www.nrc.uscg.mil , clicking on ``Services,'' then clicking on ``Online Reporting.'' This will call up a menu of several different types of incidents, such as vessel, pipeline, and aircraft. Clicking on any of these types will open the reporting form.

    This section also encourages other persons or entities to call the NRC to report suspicious activities that may result in a security incident.

    Vessel and facility security plan holders are also required to report the onset of an actual transportation security incident to their local COTP or, if a facility regulated by part 106 of this subchapter, their District Commander. They must also immediately begin implementing the provisions of their security plan, including contacting any other individuals or entities (such as the NRC or local authorities) listed within their security plan.

    Section 101.310 of subpart C lists two methods of communication, alert systems and AIS, which may be used to augment the communications methods listed in a vessel's security plan. Alert systems are discussed in more detail in part 104 of this subchapter; AIS is covered in 33 CFR parts 26, 161, 164 and 165.

    Part 101--Subpart D--Control Measures for Security

    This section also explicitly states that the provisions of subchapter H do not limit the powers conferred by any other law or regulation upon any Coast Guard commissioned, warrant, or petty officer.

    Subpart D, section 101.405 describes when the Coast Guard will issue a Maritime Security (MARSEC) Directive. MARSEC Directives will set mandatory measures that all defined entities must meet in a specified time. These entities will also be required to verbally confirm, to the local COTP or District Commander (as appropriate), receipt of the MARSEC Directive, as well as specify the method by which the mandatory measures have been (or will be) met. This section also builds in some flexibility by allowing the MARSEC Directive recipient to submit proposed equivalent security measures to the local COTP or District Commander (as appropriate), if the MARSEC Directive recipient is unable to implement the measures mandated in the MARSEC Directive. However, the entity will only be able to propose such alternatives for the length of time specified in the MARSEC Directive, and he/she will be required to implement any alternative measure that the COTP does approve.

    The Coast Guard plans to use MARSEC Directives to mandate additional security measures that are SSI. They may be applicable to all maritime elements of the national transportation system, or they may impose additional security measures on specific maritime elements of the national transportation system. As stated, only the Commandant or his/her delegate will issue these MARSEC Directives at the national level. All MARSEC Directives will be designated and disseminated as SSI, in accordance with 49 CFR part 1520 (to be amended by the Transportation Security Administration). As a result, the MARSEC Directives will only be issued to those persons who can demonstrate that they are a covered person and that they have a need to know, as those terms are defined in the SSI regulation. Company, Vessel, and Facility Security Officers should familiarize themselves with the SSI regulation.

    When a new MARSEC Directive is issued, the Coast Guard plans to publish, in the Federal Register and through other means (local notices to mariners, press releases, etc.), that it has issued a new MARSEC Directive. The MARSEC Directives will be individually numbered, and will be assigned to a series that corresponds with the part of this subchapter to which the MARSEC Directive refers. For example, the first MARSEC Directive addressing a new requirement for vessels regulated under part 104 of this subchapter would be identified as MARSEC Directive 104-01.

    Upon receiving notice that a new MARSEC Directive has been issued, affected entities would contact or be contacted by their local COTP (or, if appropriate, their District Commander) to receive a copy of the MARSEC Directive. The COTP or District Commander will confirm, prior to distributing the MARSEC Directive, that the requesting entity is a covered person with a need to know, and that the requesting entity will safeguard the MARSEC Directive as SSI. Thus, continuing with the example from the previous paragraph, upon receiving notice that a MARSEC Directive in the 104 series has been issued, owners and operators of vessels covered by part 104 of this subchapter would need to contact their local COTP to obtain a copy of the MARSEC Directive. They would then be required to comply with the MARSEC Directive, or follow the procedures set out in the MARSEC Directive for gaining approval of an equivalent security measure. COTPs may also use the AMS Committee as a mechanism for disseminating the MARSEC Directive to those with a need to know.

    MARSEC Directives will be issued under an extension of the Coast Guard's existing COTP authorities regarding maritime security, found in 33 U.S.C. 1226 and 50 U.S.C. 191. In part, the implementing regulations for 50 U.S.C. 191, found at 33 CFR 6.14-1 and promulgated by Executive Order 10277, contemplate action by the Commandant that is national in scope. Specifically, these regulations authorize the Commandant to prescribe such conditions and restrictions deemed necessary under existing circumstances for the safety of waterfront facilities and vessels. Additionally, 43 U.S.C. 1333(d) authorizes the Coast Guard to establish certain requirements for OCS facilities. Moreover, MARSEC Directives are a necessary and integral part of exercising the Coast Guard's authorities in 46 U.S.C. Chapter 701, to ensure that that Chapter's security requirements are met.

    The MARSEC Directives will provide specific instruction to the regulated maritime community to achieve the performance standards required by this subchapter and 46 U.S.C. Chapter 701. For example, the plans required by 46 U.S.C. 70103 are not subject to public disclosure, in accordance with 46 U.S.C. 70103(d), and contain SSI that, if disclosed, could be used to subvert or exploit the security program for vessels, facilities, OCS facilities, or ports. This could include passenger screening levels, means of monitoring restricted areas, and other requirements that may be necessary to ensure that the security plans remain viable. Like civil aviation security, these specific requirements cannot be placed in a public regulation and are better suited for issuance through a MARSEC Directive that is itself not subject to public disclosure.

    Since MARSEC Directives would be issued when necessary to protect national security and to preserve the rights and obligations of the U.S. with

    [[Page 39270]]

    regarding maritime security, the Coast Guard has determined that the issuance of MARSEC Directives do not fall within the requirements of the Administrative Procedure Act by virtue of the military and foreign affairs exemption (5 U.S.C. 553(a)(1)). Furthermore, the basis for the MARSEC Directive would also constitute ``good cause'' within the meaning of the Administrative Procedure Act (5 U.S.C. 553(b)(3)(B) and (d)(3)) regarding notice and comment rulemaking and effective dates since it would be contrary to the public interest and impracticable to provide SSI relating to maritime security and methods of detection, deterrence, and response in a public forum.

    Subpart D, section 101.410 lists examples of the types of control and compliance measures that a COTP may take on vessels and/or facilities within his/her AOR that are not in compliance with subchapter H. The lists of measures are not meant to be exhaustive. This section also notes that the COTP may impose one or more of these control and compliance measures on a vessel that is in compliance with subchapter H, if that vessel has called on a facility that is not in compliance, or if it has called on a port that does not maintain adequate security measures to ensure that the level of security achieved by subchapter H has not been compromised.

    Section 101.415 outlines the penalty provisions that may be taken against persons for violating the provisions of this subchapter. Civil and criminal penalties may be imposed under 33 U.S.C. 1232 or 50 U.S.C. 192, as appropriate, for violations of control and compliance measures, including COTP orders and security zones. This simply restates the current law applicable under the Magnuson Act, 590 U.S.C. 191, implemented at 33 CFR part 6, and the Ports and Waterways Safety Act, 33 U.S.C. 1221 et seq., implemented in part at 33 CFR parts 160 and 165. Pursuant to 46 U.S.C. 70117, civil penalties may also be assessed for non-compliance with any other requirement in this subchapter, including those imposed by a MARSEC Directive.

    Finally, section 101.420 outlines the appeal rights available to persons directly affected by a decision or action taken by the COTP or the Commanding Officer of the Marine Safety Center.

    Part 101--Subpart E--Other Provisions

    Subpart E sets out the remaining regulations that apply to all of subchapter H that do not fit in any of the subparts discussed above. We have reserved the first section in this subpart for procedures for authorizing a Recognized Security Organization (RSO). As noted above in the discussion of comments, the Coast Guard is authorized, under SOLAS, to delegate its assessment and plan approval authority to an RSO. The Coast Guard has decided to retain this authority for the time being. We may, however, delegate some (or all) of this authority to RSOs in the future. As a result, we are reserving this section for outlining the procedures an organization will need to follow in order to qualify as an RSO in the future.

    Section 101.505 describes the purpose behind a Declaration of Security (DoS). A DoS is intended to clarify the specific security responsibilities of a vessel and a facility (or another vessel) with which it will be conducting some activity. It will be used to eliminate situations where confusion leads the vessel to believe that the facility (or other vessel) will take care of certain security measures, while the facility (or other vessel) believes that the vessel will take care of the same security measure. Parts 104 through 106 of subchapter H describe in detail the who, what, where, when and how of completing a DoS for their respective regulated entities. Additionally, to ensure that vessels and facilities coordinate security during special marine events such as festivals that draw large numbers of people to the waterfront or vessels that wish to enter port with a higher MARSEC Level than what has been set for the port, we have included a provision to ensure the COTP's ability to mandate a DoS.

    Section 101.510 of subpart E lists the various assessment tools that may be used to meet the risk assessment requirements in parts 103 through 106 of this subchapter. This list is provided to ensure that security assessments done to meet these requirements are consistent with other modal assessments and are sufficient enough to enable the development of security plans. We have been working with other agencies to develop assessment tools that are sensitive to a diversity of transportation modes to ensure equity of security throughout the entire National transportation system. We anticipate that eventually one security assessment tool will be mandated for all transportation modes. In the interim, the list provided in Section 101.510 enables the maritime security provisions to advance until the national transportation security assessment mandate is complete. Even when a national transportation security assessment is in place, we intend to provide a ``grandfather clause'' to those security assessments done to meet the maritime security requirements found elsewhere in today's Federal Register.

    The Transportation Security Administration intends to publish a Notice of Proposed rulemaking with request for comment that promulgates rules in 49 CFR part 1574 to manage the access to and use of a user- friendly risk-based vulnerability assessment tool. This tool will be the result of inter-agency work, under the leadership of TSA thus far to establish a national transportation security assessment. It will be designed as a self-assessment tool for the owner or operator, and is one of the tools an owner or operator may use to meet the risk assessment requirements in parts 103, 104, 105 and 106 of subchapter H.

    Section 101.515 of subpart E prescribes the minimum requirements for personal identification credentials for purposes of access control under this subchapter. As discussed in the Discussion of Comments to Maritime Security Public Meetings section above, these requirements are consistent with the Coast Guard's previous policy notice on maritime credentials acceptable under 33 CFR part 125.

    Part 102--National Maritime Transportation Security Plan

    Part 102 in subchapter H has been reserved for the National Maritime Transportation Security (NMTS) Plan that is required under 46 U.S.C. 70103a. At this time we are coordinating the implementation of the National Maritime Security Advisory Committee (NMSAC) as required in the MTSA (46 U.S.C. 70112a). While the development of this overarching plan and the establishment of the National Advisory Committee are key sustaining National Maritime Security initiatives, we do not feel their development is necessary prior to the implementation of these interim rule requirements. We believe the concepts found in the interim rules published in today's Federal Register represent the foundation of National Maritime Transportation Security and intend to incorporate them in the development of the NMTS plan. We will promulgate the NMTS plan and Advisory Committee charter and membership requirements under a separate notice and rulemaking in the future.

    Additionally, the Aviation and Transportation Security Act (ATSA) assigns responsibility for managing the security of the nation's transportation modes to the Transportation Security Administration. In its role as the National Transportation System Security Manager, Transportation Security Administration intends to

    [[Page 39271]]

    develop a National Transportation System Security Plan (NTSSP) to define national strategy and provide tools to help manage risk across the nation's multi-modal transportation system.

    The NTSSP will provide a comprehensive and systematic approach to the national transportation system's risk management. It will set the framework and establish goals for National Security Plans for each of the transportation modes.

    Incorporation by Reference

    The Director of the Federal Register has approved the material in Sec. 101.115 for incorporation by reference under 5 U.S.C. 552 and 1 CFR part 51. You may inspect this material at U.S. Coast Guard Headquarters where indicated under ADDRESSES. Copies of the material are available from the sources listed in Sec. 101.115.

    This interim rule incorporates by reference the International Ship and Port Facility Security (ISPS) Code, 2003 Edition. Specifically, we are incorporating the amendments adopted on 12 December 2002 to the Annex to The International Convention for the Safety of Life at Sea (SOLAS), 1974 and The International Code For the Security of Ships and of Port Facilities, also adopted on 12 December 2002. The material is incorporated for all of subchapter H. The interim rule titled ``Automatic Identification System; Vessel Carriage Requirement'' (USCG- 2003-14757), found elsewhere in today's Federal Register, also incorporates material by reference.

    Regulatory Assessment

    This interim rule is a ``significant regulatory action'' under section 3(f) of Executive Order 12866, Regulatory Planning and Review, and has been reviewed by the Office of Management and Budget (OMB) under that Order. It requires an assessment of potential costs and benefits under section 6(a)(3) of that Order. It is significant under the regulatory policies and procedures of DHS. A draft assessment is available in the docket as indicated under ADDRESSES.

    Summary of Changes in the Cost Assessment From the Meeting Notice

    In a December 30, 2002, meeting notice [67 FR 79742], the Coast Guard presented a preliminary cost assessment estimating the cost to the regulated public of implementing MTSA, the ISPS code, and complying with applicable security NVICs. We asked for comments on our estimates and have changed portions of our cost assessments for the interim rules based on those comments.

    We received a wide range of comments on the preliminary assessment. In some areas, commenters believed we were overestimating costs, in other areas they believed we were understating costs, and in many instances commenters believed we had accurately accounted for costs. As a result of the comments, our cost estimates for vessels and facilities increased, while our estimates for ports remained about the same. Additionally, the summary of costs we present below includes estimates for the OCS interim rule and the AIS interim rule, which were not part of our original assessment for the meeting notice.

    For vessels, we decreased the population of U.S. flag SOLAS fishing vessels from 39 to 1. We also removed domestic MODUs and domestic freight barges regulated under 46 CFR subchapter I from our assessment, as the Coast Guard is not regulating these vessels in these interim rules. We added 70 foreign vessels that make port calls in the United States but are not subject to SOLAS. We increased the cost for hand- held radios and portable vapor detectors based on information received in the comments.

    In our preliminary assessment, we assumed that equipment would be replaced every 10 years. Several commenters believed that this underestimated the replacement costs for several of the pieces of equipment that we considered. Specifically, several commenters stated some equipment would be broken, lost, or stolen before the 10-year replacement. We agreed that we should increase equipment costs to account for these situations. Because the replacement cycle of equipment will vary considerably among types of equipment and its uses, we increased the annual operations and maintenance (O&M) costs to more accurately capture increased replacement and repair. In the preliminary cost estimates, we assumed that annual O&M costs would be 5 percent of the initial capital purchase cost. In the Cost Assessment for this rulemaking, we increased annual O&M to 10 percent of the initial purchase cost. We also changed the annual cost for Vessel Security Officers to more accurately reflect the annual costs of the mariners that will perform security duties aboard their vessels. The net effect of these changes was to increase initial and annual costs for vessels.

    Based on comments, we found there was some confusion about labor costs. Labor costs presented in our assessment are not the hourly wage paid to the employee; rather, they are the fully loaded cost to the company of carrying the position and providing employee benefits. Additionally, there was some confusion about our estimates for Vessel Security Assessments and Vessel Security Plans. We believe that most companies will choose to develop one overarching assessment or plan, and then take that overarching document and add documentation specific to each vessel in their fleets. The ``incremental'' costs that we presented for each vessel type in the preliminary assessment represented the cost to add the vessel to the overarching company assessment or plan. Thus, in our preliminary cost assessment it may have seemed that it cost only a few dollars to develop a Vessel Security Assessment or Vessel Security Plan for a particular vessel. In fact, we believe that Vessel Security Assessments and Vessel Security Plans will represent a substantial initial cost, but adding vessels to an overarching plan will be a smaller, incremental cost. For annual updates to Vessel Security Assessments and Vessel Security Plans, we have increased the time required to amend these documents from 1 minute per vessel (0.02 hours) to 15 minutes per vessel (0.25 hours). The net effect of this change was to increase our annual costs slightly.

    For facilities, we added certain fleeting areas to our population based on our assessment of the risk these areas pose. We also increased equipment costs for most items for Group A facilities in response to several comments. (We recognize that not all facilities will incur the same cost for personnel salaries, hire the same number of security guards, or spend the same amount of time drafting Facility Security Assessments and Facility Security Plans. For the purpose of this assessment, we have divided the facility population in two groups. One group is composed of one third of all facilities and will have more security duties, hire more guards, and spend more time drafting Facility Security Assessments and Facility Security Plans than the other group that is composed of the remaining two-thirds of the total population. Facilities in the first group are addressed in this assessment as ``A'' and facilities in the second group as ``B.'') As in our vessel assessment, we increased annual O&M costs from 5 percent of purchase cost to 10 percent of purchase cost to more accurately capture annual repair and replacement. We received several comments on the cost estimated for security guards. Commenters stated the $40,000 annual cost presented was either too low, too high, or accurate. We believe these diverging opinions could be explained by the cost of living and the

    [[Page 39272]]

    corresponding wage variation among different regions of the country. The costs presented in the assessment are national averages, and we fully expect different regions of the country to pay different wage rates. However, we do believe that the $40,000 per year estimated per security guard may be lower than what could be expected. Consequently, we have revised our estimate from $40,000 per year to $50,000 per year per security guard. Finally, we included the cost of making Declaration of Security (DoS) annual. The net effect of these changes was to increase initial and annual costs for facilities.

    A detailed summary of the changes made from the December 2002 meeting notice and the Cost Assessment for the interim rules for security is presented in Table 6.

    Table 6.--Summary of Changes Made to Cost Assessment

    December 2002 meeting Item

    notice

    Cost assessment for IR

    Comment

    Population of fishing vessels........ 39 vessels............. 1 vessel............... Revised based on new information from commenter. Population of domestic MODUs......... 159 vessels............ 0 vessels.............. IR will not be applicable to domestic MODUs. Population of domestic freight barges 262 vessels............ 0 vessels.............. IR will not be applicable to domestic freight barges regulated under Subchapter I. Population of foreign non-SOLAS

    0 vessels.............. 70 vessels............. IR will be applicable vessels.

    to these vessels regulated under Subchapter I. Hand-held radio (vessels)............ $200 per item.......... $500 per item.......... Revised based on comment. Portable vapor detector (vessels).... $8,000 per item........ $15,000 per item....... Revised based on comment. O&M costs for equipment (vessels).... 5% of purchase cost.... 10% of purchase cost... Revised based on comment. Annual incremental costs to amend $0.02 per vessel per $25 per vessel per year Revised based on VSAs and VSPs.

    year.

    comment. Vessel Security Officers............. $5,000 per vessel per $8,500 per non-towing Revised based on year, non-towing

    vessel per year;

    comment. vessels only.

    $4,250 per towing vessel per year. Fleeting areas....................... 0 areas................ 600 areas.............. Population added to IR. Communications system (group A

    $300,000 per facility.. $400,000 per facility.. Revised based on facilities).

    comment. Gates (group A facilities)........... $100,000 per facility.. $200,000 per facility.. Revised based on comment. CCTVs (group A facilities)........... $130,000 per facility.. $260,000 per facility.. Revised based on comment. Lights (group A facilities).......... $200,000 per facility.. $400,000 per facility.. Revised based on comment. Fencing (group A facilities)......... $500,000 per facility.. $750,000 per facility.. Revised based on comment. Hand-held radio (group A and B

    $200 per item.......... $500 per item.......... Revised based on facilities).

    comment. O&M costs for equipment (facilities). 5% of purchase cost.... 10% of purchase cost... Revised based on comment. Security guard....................... $40,000 per year....... $50,000 per year....... Revised based on comment. Declaration of Security.............. No cost estimated...... Cost estimated......... Added requirement to IR.

    Cost Assessment Summary

    The following summary presents the estimated costs of complying with the interim rules on Vessel Security, Facility Security, OCS Facility Security, Area Maritime Security, and AIS, which are published elsewhere in today's Federal Register.

    For the purposes of good business practice, or to comply with regulations promulgated by other Federal and State agencies, many companies already have spent a substantial amount of money and resources to upgrade and improve security. The costs shown in this summary do not include the security measures these companies have already taken to enhance security.

    We realize that every company engaged in maritime commerce would not implement the interim rules exactly as presented in this assessment. Depending on each company's choices, some companies could spend much less than what is estimated herein, while others could spend significantly more. In general, we assume that each company would implement the interim rules based on the type of vessels or facilities it owns or operates, whether it engages in international or domestic trade, and the ports where it operates.

    This assessment presents the estimated cost if vessels, facilities, OCS facilities, and ports are operating at MARSEC Level 1, the current level of operations since the events of September 11, 2001. We also estimate the costs for operating for a brief period at MARSEC Level 2, an elevated level of security. We also discuss the potential effects of operating at MARSEC Level 3, the highest level of maritime security.

    We do not anticipate that implementing the interim rules will require additional manning aboard vessels or OCS facilities; existing personnel can assume the duties envisioned. For facilities, we anticipate additional personnel in the form of security guards that can be hired through contracting with a private firm specializing in security.

    Based on our assessment, the first-year cost of implementing the interim rules is approximately $1.507 billion. Following initial implementation, the annual cost is approximately $884 million, with costs of present value (PV) $7.348 billion over the next 10 years (2003-2012, 7 percent discount rate). Estimated costs are as follows.

    Vessel Security

    Implementing the interim rule will affect about 10,300 U.S. flag SOLAS, domestic (non-SOLAS), and foreign non-SOLAS vessels. The first- year cost of purchasing and installing equipment, hiring security officers, and preparing paperwork is approximately $218 million. Following initial implementation, the annual cost is approximately $176 million. Over the

    [[Page 39273]]

    next 10 years, the cost would be PV $1.368 billion.

    Facility Security

    Implementing the interim rule will affect about 5,000 facilities. The first-year cost of purchasing and installing equipment, hiring security officers, and preparing paperwork is an estimated $1.125 billion. Following initial implementation, the annual cost is approximately $656 million. Over the next 10 years, the cost would be PV $5.399 billion.

    OCS Facility Security

    Implementing the interim rule will affect about 40 OCS facilities under U.S. jurisdiction. The first-year cost of purchasing equipment and preparing paperwork is an estimated $3 million. Following initial implementation, the annual cost is approximately $5 million. Over the next 10 years, the cost would be PV $37 million.

    Port Security

    Implementing the interim rule will affect about 47 maritime areas containing 361 ports. The initial cost of the startup period (June 2003-December 2003) is estimated to be $120 million. Following the startup period, the first year of implementation (2004) is estimated to be $106 million. After the first year of implementation, the annual cost is approximately $46 million. Over the next 10 years, the cost would be PV $477 million.

    Automatic Identification System (AIS)

    Implementing the interim rule will affect about 4,600 U.S. flag SOLAS and domestic (non-SOLAS) vessels in VTS areas. The first-year cost of purchasing equipment and training for U.S. vessels (SOLAS and domestic) is approximately $40 million. Following initial implementation, the annual cost for U.S. vessels is approximately $1 million. Over the next 10 years, the cost for these vessels would be PV $66 million (with replacement of the units occurring 8 years after installation).

    An additional 70 foreign flag, non-SOLAS vessels will also be affected. The first-year cost of purchasing and installing equipment and training personnel for these vessels is approximately $0.6 million. Following initial implementation, the annual cost is less than $0.1 million. Over the next 10 years, the cost for these vessels would be PV $1 million.

    Maritime Security Levels 2 and 3

    MARSEC Level 2 is a heightened threat of a security incident, and intelligence indicates that terrorists are likely to be active within a specific target or class of targets. MARSEC Level 3 is a probable or imminent threat of a security incident. MARSEC Levels 2 and 3 costs are not included in the above summaries because of the uncertainty that arises from the unknown frequency of elevation of the MARSEC Level and the unknown duration of the elevation.

    The costs to implement MARSEC Levels 2 and 3 security measures in response to these increased threats do not include the costs of security measures and resources needed to meet MARSEC Level 1 (summarized above) and will vary depending on the type of security measures required to counter the specific nature of higher levels of threat. Such measures could include additional personnel or assigning additional responsibilities to current personnel for a limited period of time.

    We did not consider capital improvements, such as building a fence, to be true MARSEC Levels 2 or 3 costs. The nature of the response to MARSEC Levels 2 and 3 is intended to be a quick surge of resources to counter an increased threat level. Capital improvements generally take time to plan and implement and could not be in place rapidly. Capital improvement costs are estimated under MARSEC Level 1 costs.

    We did not calculate MARSEC Level 2 cost for the AMS because this will be primarily a cost to the Coast Guard for administering the heightened MARSEC Level in port and maritime areas.

    In order to estimate a cost for MARSEC Level 2, we made assumptions about the length of time the nation's ports can be expected to operate at the heightened security level. For the purpose of this assessment only, we estimate costs to the nation's ports elevating to MARSEC Level 2 twice a year, for 3 weeks each time, for a total period of 6 weeks at MARSEC Level 2. Again, this estimate of 6 weeks annually at MARSEC Level 2 is for the purposes of illustrating the order of magnitude of cost we can expect. Our estimate should not be interpreted as the Coast Guard's official position on how often the nation's ports will operate at MARSEC Level 2.

    We estimate that there are Vessel Security Officers aboard all U.S. flag SOLAS vessels and most domestic vessels. We estimate that there will also be key crewmembers that can assist with security duties during MARSEC Level 2 aboard these vessels. We assume that both Vessel Security Officers and key crewmembers will work 12 hours a day (8 hours of regular time, 4 hours of overtime) during the 42 days that the ports are at MARSEC Level 2. We then estimate daily and overtime rates for Vessel Security Officers and key crewmembers. Given these assumptions, we estimate that elevating the security level to MARSEC Level 2 twice a year each for 21 days will cost vessel owners and operators approximately $235 million annually.

    We estimate that every regulated facility will have a Facility Security Officer assigned to it. We also estimate that there will also be a key person that can assist with security duties during MARSEC Level 2 at each facility. We assume that both Facility Security Officers and key personnel will work 12 hours a day (8 hours of regular time, 4 hours of overtime). For facilities that have to acquire security personnel for MARSEC Level 1, we assumed that during MARSEC Level 2 the number security guards would double for this limited time. For the facilities for which we did not assume any additional guards at MARSEC Level 1, we assumed that during MARSEC Level 2 these would have to acquire a minimal number of security guards. Given these assumptions, we estimate that elevating the security level to MARSEC Level 2 twice a year each for 21 days will cost facility owners and operators approximately $424 million annually.

    We estimate that elevating the security level to MARSEC Level 2 twice a year each for 21 days will cost the regulated OCS facility owners and operators approximately $4 million annually. This cost is primarily due to increased cost for OCS Facility Security Officers and available key security personnel.

    Other costs that we did not attempt to quantify include possible operational restrictions such as limiting cargo operations to daylight hours or greatly limiting access to facilities or vessels.

    MARSEC Level 3 will involve significant restriction of maritime operations that could result in the temporary closure of individual facilities, ports, and waterways either in a region of the U.S. or the entire nation. Depending on the nature of the specific threat, this highest level of maritime security may have a considerable impact on the stakeholders in the affected ports or maritime areas. The ability to estimate the costs to business and government for even a short period at MARSEC Level 3 is virtually impossible with any level of accuracy or analytical confidence due to the infinite range of threats and scenarios that could trigger MARSEC Level 3.

    The length and the duration of the increased security level to MARSEC Level 3 will be entirely dependent on the intelligence received and the scope

    [[Page 39274]]

    of transportation security incidents or disasters that have already occurred or are imminent. While we can reasonably expect MARSEC Level 3 to increase the direct costs to businesses attributable to increased personnel or modified operations, we believe the indirect costs to society of the ``ripple effects'' associated with sustained port closures would greatly outweigh the direct costs to individual businesses.

    The U.S. Marine Transportation System

    The cost of MARSEC Level 3 can best be appreciated by the benefits of the U.S. MTS to the economy. Maritime commerce is the lifeblood of the modern U.S. trade-based economy, touching virtually every sector of our daily business and personal activities.

    Annually, the U.S. MTS contributes significant benefits to the economy. More than 95 percent of all overseas trade that enters or exits this country moves by ship, including 9 million barrels of oil a day that heats homes and businesses and fuels our automobiles.\1\ In addition, over $738 billion of goods are transported annually through U.S. ports and waterways.\2\

    \1\ See MTS Fact Sheet available at www.dot.gov/mts/fact_sheet.htm .

    \2\ See 2000 Exports and Imports by U.S. Customs District and Port available at www.marad.dot.gov/statististcs/usfwts/.

    Other benefits include the water transportation and shipping industry that generates over $24 billion in revenue and provides nearly $3 billion of payrolls.\3\ The annual economic impact of cruise lines, passengers, and their suppliers is more than $11.6 billion in revenue and 176,000 in jobs for the U.S. economy.\4\ Our national defense is also dependent on the MTS. Approximately 90 percent of all equipment and supplies for Desert Storm were shipped from strategic ports via our inland and coastal waterways.\5\

    \3\ U.S. Census Bureau, 1997 Economic Census, Transportation and Warehousing-Subject Series.

    \4\ See footnote 1.

    \5\ See footnote 1.

    The Ripple Effect of Port Closures on the U.S. Economy

    We could expect not just the immediate effects of port and waterway closures on waterborne commerce as described above, but also serious ``ripple effects'' for the entire U.S. economy that could last for months or more, including delayed commerce, decreased productivity, price increases, increased unemployment, unstable financial markets worldwide, and economic recession.

    To appreciate the impact, we can examine one sector of the economy: agriculture. Many farm exports are just-in-time commodities, such as cotton shipped to Japan, South Korea, Indonesia, and Taiwan. Asian textile mills receive cotton on a just-in-time basis because these mills do not have warehousing capabilities. A port shutdown may cause U.S. cotton wholesalers to lose markets, as textile producers find suppliers from other nations. U.S. wholesalers would lose sales until shipping is restored.

    Another example is the auto industry. A recent shutdown of West Coast ports due to a labor dispute caused an automobile manufacturer to delay production because it was not receiving parts to make its cars. We can see that a port shutdown can create a domino effect, from stalling the distribution of materials to causing stoppages and delays in production to triggering job losses, higher consumer prices, and limited selection.

    The macroeconomic effects of the recent shutdown of West Coast ports, while not in response to a security threat, are a good example of the economic costs that we could experience when a threat would necessitate broad-based port closures. The cost estimates of this 11- day interruption in cargo flow and closure of 29 West Coast ports have ranged between $140 million to $2 billion a day, but are obviously high enough to cause significant losses to the U.S. economy.\6\

    \6\ See Lost Earnings Due to West Coast Port Shutdown-- Preliminary Estimate, Patrick Anderson, October 7, 2002, available at http://www.AndersonEconomicGroup.com; An Assessment of the Impact of West Coast Container Operations and the Potential Impacts of an Interruption of Port Operations, 2000, Martin Associates, October 23, 2001, available from the Pacific Maritime Association. These two studies were widely quoted by most U.S. news services including Sam Zuckerman, San Francisco Chronicle, October 2002.

    Another proxy for the estimated costs to society of nationwide port closures and the consequential impact on the U.S. supply chain can be seen by a recent war game played by businesses and government agencies.\7\ In that recent war game, a terrorist threat caused 2 major ports to close for 3 days, and then caused a nationwide port closure for an additional 9 days. This closure spanned only 12 days, but resulted in a delay of approximately 3 months to clear the resulting containerized cargo backlog. The economic costs of the closings attributable to manufacturing slowdowns and halts in production, lost sales, and spoilage was estimated at approximately 58 billion. The simulation gauged how participants would respond to an attack and the ensuing economic consequences. Furthermore, a well-coordinated direct attack of multiple U.S. ports could shutdown the world economy by effectively halting international trade flows to and from the U.S. market--the largest market for goods and services in the world.

    \7\ The war game simulation was designed and sponsored by Booz Allen Hamilton and The Conference Board, details available at http://www.boozallen.com/ .

    We believe that the cost to the national economy of a port shutdown due to extreme security threats, while not insignificant, would be relatively small if it only persisted for a few days and involved very few ports. However, if the interruption in cargo flows would persist much longer than the 11-day shutdown recently experienced on the West Coast, the economic loss is estimated to geometrically increase (double) every additional 10 days the ports were closed.\8\ At a certain point, companies would start declaring bankruptcies, people would be laid off indefinitely, and the prices of goods would increase. This effect would continue and intensify until alternate economic activities took place, such as the unemployed finding less desirable jobs or companies finding secondary lines of operations and suppliers. Regardless, the economic hardship suffered by industry, labor, and the loss of public welfare due to a sustained nationwide port shutdown may have as significant an effect on the U.S. as the act of terror itself.

    \8\ See Anderson footnote 6.

    Benefit Assessment

    Why We Measured Benefits Using the N-RAT

    A team of experts considered the benefits of various security measures that will be implemented and used the N-RAT to estimate the reduction in risk associated with these security measures. Before the results of this assessment are discussed, it is helpful to understand why the Coast Guard chose this methodology to measure regulatory benefits.

    Traditionally, the Coast Guard's regulations intended to decrease marine-related casualties, which in turn reduced number of injuries, fatalities, and pollution (primarily oil) spilled into the marine environment. These sorts of safety and environmental benefits could be estimated with some degree of accuracy; the well-documented and detailed history of maritime incidents provides a solid foundation to estimate the ``costs to society'' that could be

    [[Page 39275]]

    avoided through enhanced requirements. By reviewing incident trends over time and the costs to society imposed by these incidents, the Coast Guard could determine if changes to the status quo were justified.

    Consequently, our environmental protection and marine safety regulations were generally accompanied by estimates of reduced injuries, fatalities, and pollution attributable to a specific regulation. For example, the recently promulgated Final Rule titled Tank Level or Pressure Monitoring Devices (published September 17, 2002) [67 FR 58515] estimated a benefit to society of approximately 900 barrels of oil not spilled into the environment over the period of assessment, though the regulation was not expected to prevent injuries or fatalities.

    Estimating the benefits of new security requirements, however, is more challenging. Incident causation probabilities, based on historic trends and analysis, can be estimated in a manner that terrorist activities cannot. Currently, we believe it is virtually impossible to estimate benefits for security regulations in the way benefits are estimated for non-security regulations. We do not believe we can state with any degree of certainty that a specific security regulation would save a number or a range of fatalities, as no viable baseline exists from which to project these benefits. We realize though, that the burden on the regulated public of bearing the costs of new security regulations will be high, and we must balance the benefits of these regulations with their associated costs. We must also consider the consequences of taking no action.

    We do not assume the benefits of the interim rules automatically offset their costs simply because these rules are security related. By using RBDM, however, we have measured the relative risk reduction resulting from these security measures, permitting us to estimate the ``value'' these regulations will have. In considering the applicability of the interim rules, we have strived to apply requirements to those maritime entities that pose the greatest risk, and the N-RAT was an important and powerful tool in our Risk-Based Decision Making process. We believe that through better-informed judgments that came, in part, from the results of the N-RAT, we are appropriately balancing the benefits of the interim rules with their costs.

    Results of the N-RAT Based Assessment

    The expert review and scoring process was complex and challenging. The fundamental principles of the N-RAT, however, are relatively simple to understand. For each applicable entity in the interim rules, we assigned an annual ``baseline'' risk score. We then considered the requirements of the six interim rules described herein and assigned an annual post-regulation risk score. The benefits attributable to part 101--General Provisions--were not considered separately because it is an overarching section for all the subparts. The benefits for part 101 are represented in each of the remaining security subparts. The difference between the baseline risk score and the post-regulation risk score is the quantified benefit of the remaining five interim rules.

    Besides the complex procedure to assign risk scores to the applicable maritime entities, we were faced with the further complication that rules will have multiple benefits; thus, we have the potential to double-count the risk reduced. For example, if the owner or operator of a petroleum tanker enhances his vessel's security, this will also benefit the receiving facility where this vessel transfers its cargo. The reverse is also true: If the owner or operator of the facility enhances his facility's security, this will benefit the vessels that arrive there. We recognize that the interim rules are a ``family'' of rulemakings that will reinforce and support one another in their implementation. We must ensure, however, that risk reduction that is credited in one rulemaking is not also credited in another.

    To avoid double-counting risk reduced, we first determined the ``universe'' of total benefits of all security measures recently implemented, about to be implemented, or planned for future rulemakings. Examples of other rules that were considered in the ``universal'' risk points are the Coast Guard's Notice of Arrival (96- Hour Rule), Custom's rulemaking regarding cargo manifests (24-Hour Rule), and a future rulemaking for transportation security cards. We then apportioned the total benefits to specific regulations. By approaching the benefits assessment in this manner, we were able to address the limitations of the N-RAT. The threat, vulnerability, and consequence scores are whole numbers between 1 and 5. The N-RAT did not allow us to score a relatively minor security initiative only 0.1 or 0.5 of a risk point, even though the initiative contributes to risk reduction. When we considered the rules as a group, however, security initiatives that could not be scored individually due to the limited granularity of the N-RAT can be scored when considered with the rest of the rules because of their cumulative risk reduction benefits.

    Once we determined the total risk reduction benefits of the all the applicable rules, we ``apportioned'' the total risk points back to each individual regulation. We avoided double-counting benefits among the rulemakings as each risk point was counted only once. While there was subjectivity in this apportionment of risk points back to the individual rulemakings, we believe this methodology's strength of allowing a systematic quantification of risk reduction for each regulation outweighs its subjectivity.

    Results of the N-RAT

    We determined annual risk points reduced for each of the six interim rules using the N-RAT. Table 7 presents the annual risk points reduced by the rules. As shown, the interim rule for vessel security plans reduces the most risk points annually. The interim rule for AIS reduces the least.

    Table 7.--Annual Risk Points Reduced by the Interim Rules

    Annual risk points reduced by rulemaking

    Maritime entity

    Vessel

    Facility OCS facility security plans security plans security plans AMS plans

    AIS

    Vessels.........................

    778,633

    3,385

    3,385

    3,385

    1,448 Facilities......................

    2,025

    469,686 ..............

    2,025 .............. OCS Facilities..................

    41 ..............

    9,903 .............. .............. Port Areas......................

    587

    587 ..............

    129,792

    105

    Total.......................

    781,285

    473,659

    13,288

    135,202

    1,553

    [[Page 39276]]

    Once we determined the annual risk points reduced, we discounted these estimates to their PV (7 percent discount rate, 2003-2012) so that they could be compared to the costs. We presented the cost effectiveness, or dollars per risk point reduced, in two ways: First, we compared first-year cost to first-year benefit, because first-year cost is the highest in our assessment as companies develop security plans and purchase equipment. Second, we compared the 10-year PV cost to the 10-year PV benefit. The results of our assessment are presented in Table 8.

    Table 8.--First-Year and 10-Year PV Cost and Benefit of the Interim Rules

    Interim rule

    Item

    Vessel

    Facility OCS facility security plans security plans security plans AMS plans

    AIS \1\

    First-Year Cost (millions)......

    $218

    $1,125

    $3

    $120

    $41 First-Year Benefit..............

    781,285

    473,659

    13,288

    135,202

    1,553 First-Year Cost Effectiveness ($/

    $279

    $2,375

    $205

    $890

    $26,391 Risk Point Reduced)............ 10-Year PV Cost (millions)......

    $1,368

    $5,399

    $37

    $477

    $42 10-Year PV Benefit.............. 5,871,540 3,559,655

    99,863 1,016,074

    11,671 10-Year PV Cost Effectiveness ($/

    $233

    $1,517

    $368

    $469

    $3,624 Risk Point Reduced)............

    \1\ Cost less monetized safety benefit.

    As shown, the rulemaking for vessel security plans is the most cost effective. This is due to the nature of the security measures we expect vessels will have to take to ensure compliance as well as the level of risk that is reduced by those measures. Facility security plans are less cost effective because they incur higher costs for capital purchases (such as gates and fences) and require more labor (such as security guards) to ensure security. OCS Facility and AMS Plans are almost equally cost effective; the entities these rules cover do not incur the highest expenses for capital equipment, but on this relative scale, they do not receive higher risk reduction in the N-RAT, either. The AIS rulemaking is the least cost effective, though it is important to remember that AIS provides increased maritime domain awareness and navigation safety, which is not robustly captured using the N-RAT.

    Small Entities

    Under the Regulatory Flexibility Act (5 U.S.C. 601-612), we have considered whether these interim rules would have a significant economic impact on a substantial number of small entities. The term ``small entities'' comprises small businesses, not-for-profit organizations that are independently owned and operated and are not dominant in their fields, and governmental jurisdictions with populations of less than 50,000. These interim rules do not require a general notice of proposed rulemaking and, therefore, are exempt from the requirements of the Regulatory Flexibility Act.

    Although these interim rules are exempt, we have reviewed each rule for potential economic impacts on small entities. We found that the facilities, vessels, and AIS rules may have a significant impact on a substantial number of small entities. However, we did certify no significant economic impact on a substantial number of small entities for the Area Maritime Security and OCS facility security rules. Additional information on small entity impacts is available in the Regulatory Assessment or Cost Assessment for each interim rule in their associated docket, where indicated in the ADDRESSES section for each interim rule.

    Assistance for Small Entities

    Under section 213(a) of the Small Business Regulatory Enforcement Fairness Act of 1996 (Public Law 104-121), we want to assist small entities in understanding these rules so that they can better evaluate the effects on them and participate in the rulemaking. If these rules affect your small business, organization, or governmental jurisdiction and you have questions concerning their provisions or options for compliance, please consult CDR Suzanne Englebert, G-M-1 by telephone 202-267-1103, toll-free telephone 1-800-842-8740 ext. 7-1103, or by electronic mail msregs@comdt.uscg.mil. Small businesses may send comments on the actions of Federal employees who enforce, or otherwise determine compliance with, Federal regulations to the Small Business and Agriculture Regulatory Enforcement Ombudsman and the Regional Small Business Regulatory Fairness Boards. The Ombudsman evaluates these actions annually and rates each agency's responsiveness to small business. If you wish to comment on actions by employees of the Coast Guard, call 1-888-REG-FAIR (1-888-734-3247).

    Collection of Information

    The interim rules published in today's Federal Register contain collection of information requirements under the Paperwork Reduction Act of 1995 (44 U.S.C. 3501-3520). As defined in 5 CFR 1320.3(c), ``collection of information'' comprises reporting, recordkeeping, monitoring, posting, labeling, and other, similar actions. The rules modify two existing OMB-approved collections--1625-0100 [formerly 2115- 0557] and 1625-0077 [formerly 2115-0622]. Details of the revision to 1625-0100 can be found in the ``Vessel Security'' [USCG-2003-14749] interim rule published elsewhere in today's Federal Register. A summary of the revised collection 1625-0077 follows.

    TITLE: Security Plans for Ports, Vessels, Facilities, and Outer Continental Shelf Facilities and Other Security-Related Requirements.

    OMB Control Number: 1625-0077.

    Summary of the Collection of Information: The Coast Guard requires security plans and communication procedures for U.S. ports and maritime areas as detailed in the interim rules. These rules provide a framework to ensure adequate security planning, drilling, and communication procedures for Ports, Vessels, Facilities, and OCS Facilities.

    Need for Information: The primary need for information would be to determine if stakeholders are in compliance with security standards.

    Proposed Use of Information: This information can help to determine appropriate security measures for the affected population. This information also can help determine, in the case of a transportation security incident, whether failure to meet these regulations contributed to the transportation security incident.

    [[Page 39277]]

    Description of the Respondents: This rule will affect owners, operators, and personnel operating in the U.S. Marine Transportation System. The respondents are regulated public and private stakeholders as detailed in the interim rules.

    Number of Respondents: 16,607 total respondents for the interim rules.

    Frequency of Response: Varies as specified in each interim rule. Security assessments and security plans are submitted for approval initially, and reviewed annually. After the first year, drills generally occur at various schedules. All frequencies are at the discretion of the COTP. Depending on the port or maritime area, there may be additional requirements and reporting frequencies.

    Burden of Response: Varies per each type of regulated population in the interim rules.

    Estimate of Total Annual Burden: The existing OMB-approved collection total annual burden is 1,811 hours. These interim rules are a program change that will increase the total annual burden. The new estimated total collection burden is indicated in the table below.

    Table 9.--Summary of Initial and Annual Burden Hours and Costs

    Burden (hours)

    Initial Annual

    Port Security (AMS)........................... 1,203,200 488,800 Vessel Security............................... 135,269 11,700 Facility Security............................. 528,240 608,187 OCS Facility Security.........................

    3,200

    160

    Subtotal.................................. 1,869,909 1,108,847 Pre 9/11 Security............................. * 3,549

    3,549

    Total..................................... 1,873,458 1,112,396

    * As pre-9/11/01 security requirements are existing regulations, they are included in both initial and annual burden calculations. (Note burden revised from year 2000 Estimate).

    As required by the Paperwork Reduction Act of 1995 (44 U.S.C. 3507(d)), we have submitted a copy of the interim rules to the OMB for its review of the collection of information. Due to the circumstances surrounding this temporary rule, we asked for ``emergency processing'' of our request. We received OMB approval for these collections of information on June 16, 2003. They are valid until December 31, 2003.

    We ask for public comment on the collection of information to help us determine how useful the information is; whether it can help us perform our functions better; whether it is readily available elsewhere; how accurate our estimate of the burden of collection is; how valid our methods for determining burden are; how we can improve the quality, usefulness, and clarity of the information; and how we can minimize the burden of collection.

    If you submit comments on the collection of information, submit them both to OMB and to the Docket Management Facility where indicated under ADDRESSES, by the date under DATES.

    You need not respond to a collection of information unless it displays a currently valid control number from OMB. We received OMB approval for these collections of information on June 16, 2003. They are valid until December 31, 2003.

    Federalism

    Executive Order 13132 requires USCG to develop an accountable process to ensure ``meaningful and timely input by State and local officials in the development of regulatory policies that have federalism implications.'' ``Policies that have federalism implications'' is defined in the Executive Order to include regulations that have ``substantial direct effects on the States, on the relationship between the national government and the States, or on the distribution of power and responsibilities among the various levels of government.'' Under the Executive Order, USCG may construe a Federal statute to preempt State law only where, among other things, the exercise of State authority conflicts with the exercise of Federal authority under the Federal statute.

    This action has been analyzed in accordance with the principles and criteria in the Executive Order, and it has been determined that this interim rule does have Federalism implications or a substantial direct effect on the States. This rulemaking requires those States which own or operate vessels or facilities that may be involved in a transportation security incident to conduct vulnerability assessments of their vessels and facilities and to develop security plans for their protection. These plans must contain measures that will be implemented at each of the three MARSEC Levels, and must be reviewed and approved by the Coast Guard.

    Additionally, the Coast Guard has reviewed the MTSA with a view to whether we may construe it as non-preemptive of State authority over the same subject matter. We have determined that it would be inconsistent with the federalism principles stated in the Executive Order to construe the MTSA as not preempting State regulations which conflict with the regulations in this rulemaking. This is because owners or operators of facilities and vessels that are subject to the requirements for conducting vulnerability assessments, planning to secure their facilities and vessels against threats revealed by those assessments and complying with the standards, both performance and specific construction, design, equipment and operating requirements, must have one uniform, national standard which they must meet. Vessels and shipping companies, particularly, would be confronted with an unreasonable burden if they had to comply with varying requirements as they moved from State to State. Therefore, we believe that the federalism principles enunciated by the Supreme Court in U.S. v. Locke, 529 U.S. 89 (2000) regarding field preemption of certain State vessel safety, equipment and operating requirements extends equally to this rulemaking, especially regarding the longstanding history of significant Coast Guard maritime security regulation and control of vessels for security purposes. But, the same considerations apply to facilities, at least insofar as a State law or regulation applicable to the same subject for the purpose of protecting the security of the facility would conflict with a federal regulation, i.e. it would either actually conflict or would frustrate an over-riding federal need for uniformity.

    Finally, it is important to note that the regulations implemented by this rulemaking bear on national and international commerce where there is no constitutional presumption of concurrent State regulation. Many aspects of these regulations are based on the U.S. international treaty obligations regarding vessel and port facility security contained in the International Convention for the SOLAS, 1974 and the complementary ISPS Code. These international obligations reinforce the need for uniformity regarding maritime commerce.

    Notwithstanding the foregoing preemption determinations and findings, the Coast Guard has consulted extensively with appropriate State officials, as well as private stakeholders during the development of this rule. Specifically, we have held seven public meetings across the country with invitation letters to all State homeland security representatives. Many State representatives attended these meetings and submitted comments to the public notice docket that we have considered for these interim rules. The State

    [[Page 39278]]

    comments ranged from State Boating Law Administrators concerns about recreational boating impacts and security for smaller marinas to State security representatives voicing concern about alignment with their State maritime security requirements. We also presented the SOLAS Amendments and ISPS Code, parts A and B, in the public notice and requested comments from the State homeland security advisors at a National Governors Association meeting on March 14, 2003. We encourage States to send in comments specifically on this Federalism analysis.

    Unfunded Mandates Reform Act

    The Unfunded Mandates Reform Act of 1995 (2 U.S.C. 1531-1538) requires Federal agencies to assess the effects of their discretionary regulatory actions. In particular, the Act addresses actions that may result in the expenditure by a State, local, or tribal government, in the aggregate, or by the private sector of $100,000,000 or more in any one year. This rule is exempted from assessing the effects of the regulatory action as required by the Act because it is necessary for the national security of the U.S. (2 U.S.C. 1503(5)).

    Taking of Private Property

    This rule will not effect a taking of private property or otherwise have taking implications under Executive Order 12630, Governmental Actions and Interference with Constitutionally Protected Property Rights.

    Civil Justice Reform

    This rule meets applicable standards in sections 3(a) and 3(b)(2) of Executive Order 12988, Civil Justice Reform, to minimize litigation, eliminate ambiguity, and reduce burden.

    Protection of Children

    We have analyzed this rule under Executive Order 13045, Protection of Children from Environmental Health Risks and Safety Risks. While this rule is an economically significant rule, it does not create an environmental risk to health or risk to safety that may disproportionately affect children.

    Indian Tribal Governments

    This rule does not have tribal implications under Executive Order 13175, Consultation and Coordination with Indian Tribal Governments, because it does not have a substantial disproportionate effect on one or more Indian tribes, on the relationship between the Federal Government and Indian tribes, or on the distribution of power and responsibilities between the Federal Government and Indian tribes. We would appreciate any comments, however, if you disagree with this conclusion.

    Energy Effects

    We have analyzed this rule under Executive Order 13211, Actions Concerning Regulations That Significantly Affect Energy Supply, Distribution, or Use. We have determined that it is not a ``significant energy action'' under that order. Although it is a ``significant regulatory action'' under Executive Order 12866, it is not likely to have a significant adverse effect on the supply, distribution, or use of energy. Additionally, the Administrator of the Office of Information and Regulatory Affairs has not designated it as a significant energy action. Therefore, it does not require a Statement of Energy Effects under Executive Order 13211.

    This rule has a positive effect on the supply, distribution, and use of energy. The rule provides for security assessments, plans, procedures, and standards, which will prove beneficial for the supply, distribution, and use of energy at increased levels of maritime security.

    Environment

    We have considered the environmental impact of this rule and concluded that under figure 2-1, paragraph (34)(a), (34)(c), (34)(d), and (34)(e) of Commandant Instruction M16475.lD, this rule is categorically excluded from further environmental documentation. A ``Categorical Exclusion Determination'' is available in the docket where indicated under ADDRESSES or SUPPLEMENTARY INFORMATION.

    This final rule concerns security assessments, plans, training, security positions, and organizations along with vessel equipment requirements that will contribute to a higher level of marine safety and security for U.S. ports. A ``Categorical Exclusion Determination'' is available in the docket where indicated under ADDRESSES or SUPPLEMENTARY INFORMATION.

    This rulemaking will not significantly impact the coastal zone. Further, the rulemaking and the execution of this rule will be done in conjunction with appropriate State coastal authorities. The Coast Guard will, therefore, comply with the requirements of the Coastal Zone Management Act while furthering its intent to protect the coastal zone.

    Trade Impact Assessment

    The Trade Agreement Act of 1979 prohibits federal agencies from engaging in any standards or related activities that create unnecessary obstacles to the foreign commerce of the U.S. Legitimate domestic objectives, such as safety and security, are not considered unnecessary obstacles. The Act also requires consideration of international standards and, where appropriate, that they be the basis for U.S. standards. We have assessed the potential effect of this regulation, and have determined that it would likely create obstacles to the foreign commerce of the U.S.. However, because these regulations are being put in place in order to further a legitimate domestic objective, namely to increase the security of the U.S., any obstacles created by the regulation are not considered unnecessary obstacles.

    List of Subjects

    33 CFR Part 101

    Facilities, Harbors, Incorporation by reference, Maritime security, Ports, Security assessments, Security plans, Reporting and recordkeeping requirements, Vessels, Waterways.

    33 CFR Part 102

    Maritime security.

    0 For the reasons discussed in the preamble, the Coast Guard is adding subchapter H consisting of part 101 and reserved part 102 to 33 CFR chapter I to read as follows:

    SUBCHAPTER H--MARITIME SECURITY

    PART 101--GENERAL PROVISIONS

    Subpart A--General Sec. 101.100 Purpose. 101.105 Definitions. 101.110 Applicability. 101.115 Incorporation by reference. 101.120 Alternatives. 101.125 Approved Alternative Security Programs. [Reserved] 101.130 Equivalent security measures. Subpart B--Maritime Security (MARSEC) Levels 101.200 MARSEC Levels. 101.205 Department of Homeland Security alignment. Subpart C--Communication (Port-Facility-Vessel) 101.300 Preparedness communications. 101.305 Reporting. 101.310 Additional communication devices. Subpart D--Control Measures for Security 101.400 Enforcement. 101.405 Maritime Security (MARSEC) Directives. 101.410 Control and Compliance Measures. 101.415 Penalties. 101.420 Right to appeal.

    [[Page 39279]]

    Subpart E--Other Provisions 101.500 Procedures for authorizing a Recognized Security Organization (RSO). [RESERVED] 101.505 Declaration of Security (DoS). 101.510 Assessment Tools. 101.515 Personal Identification.

    Authority: 33 U.S.C. 1231, 1226; 46 U.S.C. Chapter 701; 50 U.S.C. 191, 192; E.O. 12656, 3 CFR 1988 Comp. p. 585; 33 CFR 1.05-1, 6.04-11, 6.14, 6.16, and 6.19; Department of Homeland Security Delegation No. 0170.

    PART 101--GENERAL PROVISIONS

    Subpart A--General

    Sec. 101.100 Purpose.

    (a) The purpose of this part is:

    (1) To implement portions of the maritime security regime required by the Maritime Transportation Security Act of 2002, as codified in 46 U.S.C. Chapter 701;

    (2) To align, where appropriate, the requirements of domestic maritime security regulations with the international maritime security standards in the International Convention for the Safety of Life at Sea, 1974 (SOLAS Chapter XI-2) and the International Code for the Security of Ships and of Port Facilities, parts A and B, adopted on 12 December 2002; and

    (3) To ensure security arrangements are as compatible as possible for vessels trading internationally.

    (b) For those maritime elements of the national transportation system where international standards do not directly apply, the requirements in this subchapter emphasize cooperation and coordination with local port community stakeholders, and are based on existing domestic standards, as well as established industry security practices.

    Sec. 101.105 Definitions.

    Unless otherwise specified, as used in this subchapter:

    Alternative Security Program means a third-party or industry organization developed standard that the Commandant has determined provides an equivalent level of security to that established by this subchapter.

    Area Commander means the U.S. Coast Guard officer designated by the Commandant to command a Coast Guard Area as described in 33 CFR part 3.

    Area Maritime Security (AMS) Assessment means an analysis that examines and evaluates the infrastructure and operations of a port taking into account possible threats, vulnerabilities, and existing protective measures, procedures and operations.

    Area Maritime Security (AMS) Committee means the committee established pursuant to 46 U.S.C. 70112(a)(2)(A). This committee can be the Port Security Committee established pursuant to Navigation and Vessel Inspection Circular (NVIC) 09-02, available from the cognizant Captain of the Port (COTP) or at http://www.uscg.mil/hq/g-m/nvic.

    Area Maritime Security (AMS) Plan means the plan developed pursuant to 46 U.S.C. 70103(b). This plan may be the Port Security plan developed pursuant to NVIC 09-02 provided it meets the requirements of part 103 of this subchapter.

    Area of Responsibility (AOR) means a Coast Guard area, district, marine inspection zone or COTP zone described in 33 CFR part 3.

    Audit means an evaluation of a security assessment or security plan performed by an owner or operator, the owner or operator's designee, or an approved third-party, intended to identify deficiencies, non- conformities and/or inadequacies that would render the assessment or plan insufficient.

    Barge means a non-self-propelled vessel (46 CFR 24.10-1).

    Barge fleeting facility means a commercial area, permitted by the Army Corps of Engineers, as provided in 33 CFR part 322, the purpose of which is for the making up, breaking down, or staging of barge tows.

    Bulk or in bulk means a commodity that is loaded or carried on board a vessel without containers or labels, and that is received and handled without mark or count.

    Bunkers means a vessel's fuel supply.

    Captain of the Port (COTP) means the local officer exercising authority for the COTP zones described in 33 CFR part 3. The COTP is the Federal Maritime Security Coordinator described in 46 U.S.C. 70103(a)(2)(G) and also the Port Facility Security Officer as described in the ISPS Code, part A.

    Cargo means any goods, wares, or merchandise carried, or to be carried, for consideration, whether directly or indirectly flowing to the owner, charterer, operator, agent, or any other person interested in the vessel, facility, or OCS facility.

    Certain Dangerous Cargo (CDC) means the same as defined in 33 CFR 160.203.

    Commandant means the Commandant of the U.S. Coast Guard.

    Company means any person or entity that owns any facility, vessel, or OCS facility subject to the requirements of this subchapter, or has assumed the responsibility for operation of any facility, vessel, or OCS facility subject to the requirements of this subchapter, including the duties and responsibilities imposed by this subchapter.

    Company Security Officer (CSO) means the person designated by the Company as responsible for the security of the vessel or OSC facility, including implementation and maintenance of the vessel or OSC facility security plan, and for liaison with their respective vessel or facility security officer and the COTP.

    Contracting Government means any government of a nation that is a signatory to SOLAS, other than the U.S.

    Cruise ship means any vessel over 100 gross register tons, carrying more than 12 passengers for hire which makes voyages lasting more than 24 hours, of which any part is on the high seas. Passengers from cruise ships are embarked or disembarked in the U.S. or its territories. Cruise ships do not include ferries that hold Coast Guard Certificates of Inspection endorsed for ``Lakes, Bays, and Sounds'', that transit international waters for only short periods of time on frequent schedules.

    Dangerous substances or devices means any material, substance, or item that may cause damage or injury to any person, vessel, facility, harbor, port, or waters subject to the jurisdiction of the U.S. and that:

    (1) Is unlawful to possess under applicable Federal, State, or local law;

    (2) That has not been approved for entry onto the vessel, facility, or OCS facility by the owner or operator of the vessel, facility, or OCS facility; or

    (3) Has not been approved for entry onto a public area or property in a port by the government or property management official with jurisdictional responsibility of that area.

    Declaration of Security (DoS) means an agreement executed between the responsible Vessel and Facility Security Officer, or between Vessel Security Officers in the case of a vessel-to-vessel interface, that provides a means for ensuring that all shared security concerns are properly addressed and security will remain in place throughout the time a vessel is moored to the facility or for the duration of the vessel-to-vessel interface, respectively.

    District Commander means the U.S. Coast Guard officer designated by the Commandant to command a Coast Guard District described in 33 CFR part 3.

    Drill means a training event that tests at least one component of the AMS, vessel, or facility security plan and is used to maintain a high level of security readiness.

    Exercise means a comprehensive training event that involves several of the functional elements of the AMS, vessel, or facility security plan and tests

    [[Page 39280]]

    communications, coordination, resource availability, and response.

    Facility means any structure or facility of any kind located in, on, under, or adjacent to any waters subject to the jurisdiction of the U.S. and used, operated, or maintained by a public or private entity, including any contiguous or adjoining property under common ownership or operation.

    Facility Security Assessment (FSA) means an analysis that examines and evaluates the infrastructure and operations of the facility taking into account possible threats, vulnerabilities, consequences, and existing protective measures, procedures and operations.

    Facility Security Officer (FSO) means the person designated as responsible for the development, implementation, revision and maintenance of the facility security plan and for liaison with the COTP and Company and Vessel Security Officers.

    Facility Security Plan (FSP) means the plan developed to ensure the application of security measures designed to protect the facility and its servicing vessels or those vessels interfacing with the facility, their cargoes, and persons on board at the respective MARSEC Levels.

    Ferry means a vessel which is limited in its use to the carriage of deck passengers or vehicles or both, operates on a short run on a frequent schedule between two or more points over the most direct water route, other than in ocean or coastwise service.

    Foreign vessel means a vessel of foreign registry or a vessel operated under the authority of a country, except the U.S., that is engaged in commerce.

    Gross register tons (GRT) means the gross ton measurement of the vessel under 46 U.S.C. chapter 145, Regulatory Measurement. For a vessel measured under only 46 U.S.C. chapter 143, Convention Measurement, the vessel's gross tonnage, ITC is used to apply all thresholds expressed in terms of gross register tons.

    Gross tonnage, ITC (GT ITC) means the gross tonnage measurement of the vessel under 46 U.S.C. chapter 143, Convention Measurement. Under international conventions, this parameter may be referred to as ``gross tonnage (GT).''

    Hazardous materials means hazardous materials subject to regulation under 46 CFR parts 148, 150, 151, 153, or 154, or 49 CFR parts 171 through 180.

    Infrastructure means facilities, structures, systems, assets, or services so vital to the port and its economy that their disruption, incapacity, or destruction would have a debilitating impact on defense, security, the environment, long-term economic prosperity, public health or safety of the port.

    International voyage means a voyage between a country to which SOLAS applies and a port outside that country. A country, as used in this definition, includes every territory for the internal relations of which a contracting government to the convention is responsible or for which the United Nations is the administering authority. For the U.S., the term ``territory'' includes the Commonwealth of Puerto Rico, all possessions of the United States, and all lands held by the U.S. under a protectorate or mandate. For the purposes of this subchapter, vessels are considered as being on an ``international voyage'' when solely navigating the Great Lakes and the St. Lawrence River as far east as a straight line drawn from Cap des Rosiers to West Point, Anticosti Island and, on the north side of Anticosti Island, the 63rd meridian.

    ISPS Code means the International Ship and Port Facility Security Code, as incorporated into SOLAS.

    Maritime Security (MARSEC) Directive means an instruction issued by the Commandant, or his/her delegee, mandating specific security measures for vessels and facilities that may be involved in a transportation security incident.

    Maritime Security (MARSEC) Level means the level set to reflect the prevailing threat environment to the marine elements of the national transportation system, including ports, vessels, facilities, and critical assets and infrastructure located on or adjacent to waters subject to the jurisdiction of the U.S.

    MARSEC Level 1 means the level for which minimum appropriate protective security measures shall be maintained at all times.

    MARSEC Level 2 means the level for which appropriate additional protective security measures shall be maintained for a period of time as a result of heightened risk of a transportation security incident.

    MARSEC Level 3 means the level for which further specific protective security measures shall be maintained for a limited period of time when a transportation security incident is probable or imminent, although it may not be possible to identify the specific target.

    Master means the holder of a valid license that authorizes the individual to serve as a Master, operator, or person in charge of the rated vessel. For the purposes of this subchapter, Master also includes the Person in Charge of a MODU, and the operator of an uninspected towing vessel.

    OCS Facility means any artificial island, installation, or other complex of one or more structures permanently or temporarily attached to the subsoil or seabed of the OCS, erected for the purpose of exploring for, developing or producing oil, natural gas or mineral resources. This definition includes all mobile offshore drilling units (MODUs) not covered under part 104 of this subchapter, when attached to the subsoil or seabed of offshore locations, but does not include deepwater ports, as defined by 33 U.S.C. 1502, or pipelines.

    Operator, Uninspected Towing Vessel means an individual who holds a license described in 46 CFR 15.805(a)(5) or 46 CFR 15.810(d).

    Owner or operator means any person or entity that maintains operational control over any facility, vessel, or OCS facility subject to the requirements of this subchapter.

    Passenger vessel means--

    (1) On an international voyage, a vessel carrying more than 12 passengers; and

    (2) On other than an international voyage:

    (i) A vessel of at least 100 gross register tons carrying more than 12 passengers, including at least one passenger-for-hire;

    (ii) A vessel of less than 100 gross register tons carrying more than 6 passengers, including at least one passenger-for-hire;

    (iii) A vessel that is chartered and carrying more than 12 passengers;

    (iv) A submersible vessel that is carrying at least one passenger- for-hire; or

    (v) A wing-in-ground craft, regardless of tonnage, that is carrying at least one passenger-for-hire.

    Passenger-for-hire means a passenger for whom consideration is contributed as a condition of carriage on the vessel, whether directly or indirectly flowing to the owner, charterer, operator, agent, or any other person having an interest in the vessel.

    Registered length means the registered length as defined in 46 CFR part 69.

    Restricted areas mean the infrastructures or locations identified in an area, vessel, or facility security assessment or by the operator that require limited access and a higher degree of security protection. The entire facility may be designated the restricted area, as long as the entire facility is provided the appropriate level of security.

    Review and approval means the process whereby Coast Guard officials evaluate a plan or proposal to determine

    [[Page 39281]]

    if it complies with this subchapter and/or provides an equivalent level of security.

    Screening means a reasonable examination of persons, cargo, vehicles, or baggage for the protection of the vessel, its passengers and crew. The purpose of the screening is to secure the vital government interest of protecting vessels, harbors, and waterfront facilities from destruction, loss, or injury from sabotage or other causes of similar nature. Such screening is intended to ensure that dangerous substances and devices, or other items that pose a real danger of violence or a threat to security are not present.

    Security sweep means a walkthrough to visually inspect unrestricted areas to identify unattended packages, briefcases, or luggage and determine that all restricted areas are secure.

    Security system means a device or multiple devices designed, installed and operated to monitor, detect, observe or communicate about activity that may pose a security threat in a location or locations on a vessel or facility.

    Sensitive security information (SSI) means information within the scope of 49 CFR part 1520.

    SOLAS means the International Convention for the Safety of Life at Sea Convention, 1974, as amended.

    Survey means an on-scene examination and evaluation of the physical characteristics of a vessel or facility, and its security systems, processes, procedures, and personnel.

    Transportation security incident (TSI) means a security incident resulting in a significant loss of life, environmental damage, transportation system disruption, or economic disruption in a particular area.

    Unaccompanied baggage means any baggage, including personal effects, which are not with the passenger, crewmember or any other person at the point of inspection or screening prior to boarding the vessel.

    Vessel-to-facility interface means the interaction that occurs when a vessel is directly and immediately affected by actions involving the movement of persons, goods or the provisions of facility services to or from the vessel.

    Vessel-to-port interface means the interaction that occurs when a vessel is directly and immediately affected by actions involving the movement of persons, goods or the provisions of port services to or from the vessel.

    Vessel Security Assessment (VSA) means an analysis that examines and evaluates the vessel and its operations taking into account possible threats, vulnerabilities, consequences, and existing protective measures, procedures and operations.

    Vessel Security Plan (VSP) means the plan developed to ensure the application of security measures designed to protect the vessel and the facility that the vessel is servicing or interacting with, the vessel's cargoes, and persons on board at the respective MARSEC Levels.

    Vessel Security Officer (VSO) means the person onboard the vessel, accountable to the Master, designated by the Company as responsible for security of the vessel, including implementation and maintenance of the Vessel Security Plan, and for liaison with the Facility Security Officer and the vessel's Company Security Officer.

    Vessel stores means--

    (1) Materials that are on board a vessel for the upkeep, maintenance, safety, operation or navigation of the vessel; and

    (2) Materials for the safety or comfort of the vessel's passengers or crew, including any provisions for the vessel's passengers or crew.

    Vessel-to-vessel activity means any activity not related to a facility or port that involves the transfer of goods or persons from one vessel to another.

    Waters subject to the jurisdiction of the U.S., for purposes of this subchapter, means the navigable waters of the U.S., as defined in 46 U.S.C. 2101(17a); the Exclusive Economic Zone in respect to the living and non-living resources therein; and in respect to facilities located on the Outer Continental Shelf of the U.S., the waters superadjacent thereto.

    Sec. 101.110 Applicability.

    Unless otherwise specified, this subchapter applies to vessels, structures, and facilities of any kind, located under, in, on, or adjacent to waters subject to the jurisdiction of the U.S.

    Sec. 101.115 Incorporation by reference.

    (a) Certain material is incorporated by reference into this subchapter with the approval of the Director of the Federal Register under 5 U.S.C. 552(a) and 1 CFR part 51. To enforce any edition other than that specified in paragraph (b) of this section, the Coast Guard must publish notice of change in the Federal Register and the material must be available to the public. All approved material is on file at the Office of the Federal Register, 800 North Capitol Street, NW., Suite 700, Washington, DC, and at the Office of the Coast Guard Port Security Directorate (G-MP), Coast Guard Headquarters, 2100 Second Street, SW., Washington, DC 20593-0001, and is available from the sources indicated in paragraph (b) of this section.

    (b) The materials approved for incorporation by reference in this subchapter are as follows:

    International Maritime Organization (IMO)

    Publication Section, 4 Albert Embankment, London SE1 7SR, United Kingdom.

    Conference resolution 1, Adoption of

    101.120; 101.310; 101.410; amendments to the Annex to the

    101.505; 104.105; 104.115; International Convention for the Safety 104.120; 104.297; 104.400. of Life at Sea, 1974, and amendments to Chapter XI of SOLAS 1974, adopted December 12, 2002, (SOLAS Chapter XI-1 or SOLAS Chapter XI-2). Conference resolution 2, Adoption of the 101.410; 101.505; 104.105; International Code for the Security of 104.115; 104.120; 104.297; Ships and of Port Facilities, parts A and 104.400. B, adopted on December 12, 2002 (ISPS Code).

    Sec. 101.120 Alternatives.

    (a) Alternative Security Agreements. (1) The U.S. may conclude in writing, as provided in SOLAS Chapter XI-2, Regulation 11 (Incorporated by reference, see Sec. 101.115), a bilateral or multilateral agreements with other Contracting Governments to SOLAS on Alternative Security Arrangements covering short international voyages on fixed routes between facilities subject to the jurisdiction of the U.S. and facilities in the territories of those Contracting Governments.

    (2) As further provided in SOLAS Chapter XI-2, Regulation 11, a vessel covered by such an agreement shall not conduct any vessel-to- vessel activity with any vessel not covered by the agreement.

    (b) Alternative Security Programs. (1) Owners and operators of vessels and facilities required to have security plans under part 104, 105, or 106 of this subchapter, other than vessels that engage on international voyages and facilities that serve only vessels on international voyages, may meet an Alternative Security Program that has been reviewed and approved by the Commandant (G-MP) as meeting the requirements of part 104, 105, or 106, as applicable.

    [[Page 39282]]

    (2) Owners or operators must implement an approved Alternative Security Program in its entirety to be deemed in compliance with either part 104, 105, or 106.

    (3) Owners or operators who have implemented an Alternative Security Program must send a letter to the appropriate plan approval authority under part 104, 105, or 106 of this subchapter identifying which Alternative Security Program they have implemented, identifying those vessels or facilities that will implement the Alternative Security Program, and attesting that they are in full compliance therewith. A copy of this letter shall be retained on board the vessel or kept at the facility to which it pertains along with a copy of the Alternative Security Program.

    (c) Approval of Alternative Security Programs. You must submit to the Commandant (G-MP) for review and approval the Alternative Security Program and the following information to assess the adequacy of the proposed Alternative Security Program:

    (1) A list of the vessel and facility type that the Alternative Security Program is intended to apply;

    (2) A security assessment for the vessel or facility type;

    (3) Explanation of how the Alternative Security Program addresses the requirements of parts 104, 105, or 106, as applicable; and

    (4) Explanation of how owners and operators must implement the Alternative Security Program in its entirety, including performing an operational and vessel or facility specific assessment and verification of implementation.

    (d) The Commandant (G-MP) will examine each submission for compliance with this part, and either:

    (1) Approve it and specify any conditions of approval, returning to the submitter a letter stating its acceptance and any conditions, or

    (2) Disapprove it, returning a copy to the submitter with a brief statement of the reasons for disapproval.

    Sec. 101.125 Approved Alternative Security Programs. [Reserved]

    Sec. 101.130 Equivalent security measures.

    (a) For any measure required by part 104, 105, or 106 of this subchapter, the owner or operator may substitute an equivalent security measure that has been approved by the Commandant (G-MP) as meeting or exceeding the effectiveness of the required measure. The Commandant (G- MP) may require that the owner or operator provide data for use in assessing the effectiveness of the proposed equivalent security measure.

    (b) Requests for approval of equivalent security measures should be made to the appropriate plan approval authority under parts 104, 105 or 106 of this subchapter.

    Subpart B--Maritime Security (MARSEC) Levels

    Sec. 101.200 MARSEC Levels.

    (a) MARSEC Levels advise the maritime community and the public of the level of risk to the maritime elements of the national transportation system. Ports, under direction of the local COTP, will respond to changes in the MARSEC Level by implementing the measures specified in the AMS Plan. Similarly, vessels and facilities required to have security plans under part 104, 105, or 106 of this subchapter shall implement the measures specified in their security plans for the applicable MARSEC Level.

    (b) Unless otherwise directed, each port, vessel, and facility shall operate at MARSEC Level 1.

    (c) The Commandant will set the MARSEC Level consistent with the equivalent Homeland Security Advisory System (HSAS) Threat Condition and that Threat Condition's scope of application. Notwithstanding the HSAS, the Commandant retains discretion to adjust the MARSEC Level when necessary to address any particular security concerns or circumstances related to the maritime elements of the national transportation system.

    (d) The COTP may temporarily raise the MARSEC Level for the port, a specific marine operation within the port, or a specific industry within the port, when necessary to address an exigent circumstance immediately affecting the security of the maritime elements of the transportation system in his/her area of responsibility.

    Sec. 101.205 Department of Homeland Security alignment.

    The MARSEC Levels are aligned with the Department of Homeland Security's Homeland Security Advisory System (HSAS), established by Homeland Security Presidential Directive 3. Table 101.205, titled ``Relation between HSAS and MARSEC Levels'' in this section, shows this alignment.

    Table 101.205.--Relation Between HSAS and MARSEC Levels

    Homeland security advisory system Equivalent maritime security (HSAS) threat condition

    (MARSEC) level

    Low: Green........................... MARSEC Level 1. Elevated: Blue....................... Guarded: Yellow......................

    High: Orange......................... MARSEC Level 2.

    Severe: Red.......................... MARSEC Level 3.

    Subpart C--Communication (Port--Facility--Vessel)

    Sec. 101.300 Preparedness communications.

    (a) Notification of MARSEC Level change. The COTP will communicate any changes in the MARSEC Levels through a local Broadcast Notice to Mariners, a Maritime Security Directive issued under section 101.405 of this part, or as detailed in the AMS Plan.

    (b) Communication of threats. When the COTP is made aware of a threat that may cause a transportation security incident, the COTP will, when appropriate, communicate to the port stakeholders, vessels, and facilities in his or her AOR the following details:

    (1) Geographic area potentially impacted by the probable threat;

    (2) Any appropriate information identifying potential targets;

    (3) Onset and expected duration of probable threat;

    (4) Type of probable threat; and

    (5) Required actions to minimize risk.

    (c) Attainment. (1) Each owner or operator of a vessel or facility required to have a security plan under parts 104 or 105 of this subchapter affected by a change in the MARSEC Level must confirm to their local COTP the attainment of measures or actions described in their security plan and any other requirements imposed by the COTP that correspond with the MARSEC Level being imposed by the change.

    (2) Each owner or operator of a facility required to have a security plan under part 106 of this subchapter affected by a change in the MARSEC Level must confirm to their cognizant District Commander the attainment of measures or actions described in their security plan and any other requirements imposed by the District Commander or COTP that correspond with the MARSEC Level being imposed by the change.

    Sec. 101.305 Reporting.

    (a) Notification of suspicious activities. An owner or operator required to have a security plan under

    [[Page 39283]]

    part 104, 105, or 106 of this subchapter shall, without delay, report activities that may result in a transportation security incident to the National Response Center at the following toll free telephone: 1-800- 424-8802, direct telephone: 202-267-2675, fax: 202-267-2165, TDD: 202- 267-4477, or Email: lst-nrcinfo@comdt.uscg.mil. Any other person or entity is also encouraged to report activities that may result in a transportation security incident to the National Response Center.

    (b) Notification of breaches of security. An owner or operator required to have a security plan under parts 104, 105, or 106 of this subchapter shall, without delay, report breaches of security to the National Response Center via one of the means listed in paragraph (a) of this section.

    (c) Notification of transportation security incident (TSI). (1) Any owner or operator required to have a security plan under part 104 or 105 of this subchapter shall, without delay, report a TSI to their local COTP and immediately thereafter begin following the procedures set out in their security plan, which may include contacting the National Response Center via one of the means listed in paragraph (a) of this section.

    (2) Any owner or operator required to have a security plan under part 106 of this subchapter shall, without delay, report a TSI to their cognizant District Commander and immediately thereafter begin following the procedures set out in their security plan, which may include contacting the National Response Center via one of the means listed in paragraph (a) of this section.

    (d) Callers to the National Response Center should be prepared to provide as much of the following information as possible:

    (1) Their own name and contact information;

    (2) The name and contact information of the suspicious or responsible party;

    (3) The location of the incident, as specifically as possible; and

    (4) The description of the incident or activity involved.

    Sec. 101.310 Additional communication devices.

    (a) Alert Systems. Alert systems, such as the ship security alert system required in SOLAS Chapter XI-2, Regulation 6 (Incorporated by reference, see Sec. 101.115), may be used to augment communication and may be one of the communication methods listed in a vessel or facility security plan under part 104, 105, or 106 of this subchapter.

    (b) Automated Identification Systems (AIS). AIS may be used to augment communication, and may be one of the communication methods listed in a vessel security plan under part 104 of this subchapter. See 33 CFR part 164 for additional information on AIS device requirements.

    Subpart D--Control Measures for Security

    Sec. 101.400 Enforcement.

    (a) The rules and regulations in this subchapter are enforced by the COTP under the supervision and general direction of the District Commander, Area Commander, and the Commandant. All authority and power vested in the COTP by the rules and regulations in this subchapter is also vested in, and may be exercised by, the District Commander, Area Commander, and the Commandant.

    (b) The COTP, District Commander, Area Commander, or Commandant may assign the enforcement authority described in paragraph (a) of this section to any other officer or petty officer of the Coast Guard or other designees authorized by the Commandant.

    (c) The provisions in this subchapter do not limit the powers conferred upon Coast Guard commissioned, warrant, or petty officers by any other law or regulation, including but not limited to 33 CFR parts 6, 160, and 165.

    Sec. 101.405 Maritime Security (MARSEC) Directives.

    (a)(1) When the Coast Guard determines that additional security measures are necessary to respond to a threat assessment or to a specific threat against the maritime elements of the national transportation system, the Coast Guard may issue a MARSEC Directive setting forth mandatory measures. Only the Commandant or his/her delegee may issue MARSEC Directives under this section. Prior to issuing a MARSEC Directive, the Commandant or his/her delegee will consult with those Federal agencies having an interest in the subject matter of that MARSEC Directive. All MARSEC Directives issued under this section shall be marked as sensitive security information (SSI) in accordance with 49 CFR part 1520.

    (2) When a MARSEC Directive is issued, the Coast Guard will immediately publish a notice in the Federal Register, and affected owners and operators will need to go to their local COTP or cognizant District Commander to acquire a copy of the MARSEC Directive. COTPs and District Commanders will require the owner or operator to prove that they have a ``need to know'' the information in the MARSEC Directive and that they are a ``covered person,'' as those terms are defined in 49 CFR part 1520.

    (b) Each owner or operator of a vessel or facility to whom a MARSEC Directive applies is required to comply with the relevant instructions contained in a MARSEC Directive issued under this section within the time prescribed by that MARSEC Directive.

    (c) Each owner or operator of a vessel or facility required to have a security plan under parts 104, 105 or 106 of this subchapter that receives a MARSEC Directive must:

    (1) Within the time prescribed in the MARSEC Directive, acknowledge receipt of the MARSEC Directive to their local COTP or, if a facility regulated under part 106 of this subchapter, to their cognizant District Commander; and

    (2) Within the time prescribed in the MARSEC Directive, specify the method by which the measures in the MARSEC Directive have been implemented (or will be implemented, if the MARSEC Directive is not yet effective).

    (d) In the event that the owner or operator of a vessel or facility required to have a security plan under part 104, 105, or 106 of this subchapter is unable to implement the measures in the MARSEC Directive, the owner or operator must submit proposed equivalent security measures and the basis for submitting the equivalent security measures to the COTP or, if a facility regulated under part 106 of this subchapter, to their cognizant District Commander, for approval.

    (e) The owner or operator must submit the proposed equivalent security measures within the time prescribed in the MARSEC Directive. The owner or operator must implement any equivalent security measures approved by the COTP, or, if a facility regulated under part 106 of this subchapter, by their cognizant District Commander.

    Sec. 101.410 Control and Compliance Measures.

    (a) The COTP may exercise authority pursuant to 33 CFR parts 6, 160 and 165, as appropriate, to rectify non-compliance with this subchapter. COTPs or their designees are the officers duly authorized to exercise control and compliance measures under SOLAS Chapter XI-2, Regulation 9, and the ISPS Code (Incorporated by reference, see Sec. 101.115).

    (b) Control and compliance measures for vessels not in compliance with this

    [[Page 39284]]

    subchapter may include, but are not limited to, one or more of the following:

    (1) Inspection of the vessel;

    (2) Delay of the vessel;

    (3) Detention of the vessel;

    (4) Restriction of vessel operations;

    (5) Denial of port entry;

    (6) Expulsion from port;

    (7) Lesser administrative and corrective measures; or

    (8) For U.S. vessels, suspension or revocation of security plan approval, thereby making that vessel ineligible to operate in, on, or under waters subject to the jurisdiction of the U.S. in accordance with 46 U.S.C. 70103(c)(5).

    (c) Control and compliance measures for facilities not in compliance with this subchapter may include, but are not limited to, one or more of the following:

    (1) Restrictions on facility access;

    (2) Conditions on facility operations;

    (3) Suspension of facility operations;

    (4) Lesser administrative and corrective measures; or

    (5) Suspension or revocation of security plan approval, thereby making that facility ineligible to operate in, on, under or adjacent to waters subject to the jurisdiction of the U.S. in accordance with 46 U.S.C. 70103(c)(5).

    (d) Control and compliance measures under this section may be imposed on a vessel when it has called on a facility or at a port that does not maintain adequate security measures to ensure that the level of security to be achieved by this subchapter has not been compromised.

    Sec. 101.415 Penalties.

    (a) Civil and criminal penalty. Violation of any order or other requirement imposed under section 101.405 of this part is punishable by the civil and criminal penalties prescribed in 33 U.S.C. 1232 or 50 U.S.C. 192, as appropriate.

    (b) Civil penalty. As provided in 46 U.S.C. 70117, any person who does not comply with any other applicable requirement under this subchapter, including a Maritime Security Directive, shall be liable to the U.S. for a civil penalty of not more than $ 25,000 for each violation. Enforcement and administration of this provision will be in accordance with 33 CFR 1.07.

    Sec. 101.420 Right to appeal.

    (a) Any person directly affected by a decision or action taken by a COTP under this subchapter, may appeal that action or decision to the cognizant District Commander according to the procedures in 46 CFR 1.03-15.

    (b) Any person directly affected by a decision or action taken by a District Commander, whether made under this subchapter generally or pursuant to paragraph (a) of this section, may be appealed to the Commandant (G-MP), according to the procedures in 46 CFR 1.03-15.

    (c) Any person directly affected by a decision or action taken by the Commanding Officer, Marine Safety Center, under this subchapter, may appeal that action or decision to the Commandant (G-MP) according to the procedures in 46 CFR 1.03-15.

    (d) Decisions made by Commandant (G-MP), whether made under this subchapter generally or pursuant to the appeal provisions of this section, are considered final agency action.

    Subpart E--Other Provisions

    Sec. 101.500 Procedures for authorizing a Recognized Security Organization (RSO). [Reserved]

    Sec. 101.505 Declaration of Security (DoS).

    (a) The purpose of a DoS, as described in SOLAS Chapter XI-2, Regulation 10, and the ISPS Code (Incorporated by reference, see Sec. 101.115), is to state the agreement reached between a vessel and a facility, or between vessels in the case of a vessel-to-vessel activity, as to the respective security measures each must undertake during a specific vessel-to-facility interface, during a series of interfaces between the vessel and the facility, or during a vessel-to- vessel activity.

    (b) Details as to who must complete a DoS, when a DoS must be completed, and how long a DoS must be retained are included in parts 104 through 106 of this subchapter.

    (c) All vessels and facilities required to comply with parts 104, 105, and 106 of this subchapter must, at a minimum, comply with the DoS requirements of the MARSEC Level set for the port.

    (d) The COTP may also require a DoS be completed for vessels and facilities during periods of critical port operations, special marine events, or when vessels give notification of a higher MARSEC Level than that set in the COTP's Area of Responsibility (AOR).

    Sec. 101.510 Assessment tools.

    Ports, vessels, and facilities required to conduct risk assessments by part 103, 104, 105, or 106 of this subchapter may use any assessment tool that meets the standards set out in part 103, 104, 105, or 106, as applicable. These tools include:

    (a) DHS/TSA's vulnerability self-assessment tool located at http://www.tsa.gov/risk ; and

    (b) USCG assessment tools, available from the cognizant COTP or at http://www.uscg.mil/hq/g-m/nvic, as set out in the following:

    (1) Navigation and Vessel Inspection Circular titled, ``Guidelines for Port Security Committees, and Port Security Plans Required for U.S. Ports'' (NVIC 9-02);

    (2) Navigation and Vessel Inspection Circular titled, ``Security Guidelines for Vessels'', (NVIC 10-02); and

    (3) Navigation and Vessel Inspection Circular titled, ``Security Guidelines for Facilities'', (NVIC 11-02).

    Sec. 101.515 Personal identification.

    (a) Any personal identification credential accepted under the access control provisions of this subchapter must, at a minimum, meet the following requirements:

    (1) Be laminated or otherwise secure against tampering;

    (2) Contain the individual's full name (full first and last names, middle initial is acceptable);

    (3) Contain a photo that accurately depicts that individual's current facial appearance; and

    (4) Bear the name of the issuing authority.

    (b) The issuing authority in paragraph (a)(4) of this section must be:

    (1) A government authority, or an organization authorized to act on behalf of a government authority; or

    (2) The individual's employer, union, or trade association.

    PART 102--NATIONAL MARITIME TRANSPORTATION SECURITY [RESERVED]

    Dated: June 23, 2003. Thomas H. Collins, Admiral, Coast Guard Commandant.

    [FR Doc. 03-16186 Filed 6-27-03; 8:45 am]

    BILLING CODE 4910-15-U

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT